WO2023045534A1 - Blockchain-based infringement detection - Google Patents

Blockchain-based infringement detection Download PDF

Info

Publication number
WO2023045534A1
WO2023045534A1 PCT/CN2022/107797 CN2022107797W WO2023045534A1 WO 2023045534 A1 WO2023045534 A1 WO 2023045534A1 CN 2022107797 W CN2022107797 W CN 2022107797W WO 2023045534 A1 WO2023045534 A1 WO 2023045534A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
local
feature vector
infringement
original
Prior art date
Application number
PCT/CN2022/107797
Other languages
French (fr)
Chinese (zh)
Inventor
潘覃
张伟
黄凯明
钱烽
张晓博
Original Assignee
蚂蚁区块链科技(上海)有限公司
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 蚂蚁区块链科技(上海)有限公司, 支付宝(杭州)信息技术有限公司 filed Critical 蚂蚁区块链科技(上海)有限公司
Publication of WO2023045534A1 publication Critical patent/WO2023045534A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Definitions

  • the embodiments of this specification relate to the technical field of blockchain, and in particular to a blockchain-based infringement detection method, device, and electronic equipment.
  • infringement detection In infringement detection for images, it is usually detected based on the global features of the overall image. However, global infringement detection cannot identify local infringement images such as image stitching and picture-in-picture.
  • the embodiments of this specification provide a blockchain-based infringement detection method, device, and electronic equipment.
  • a blockchain-based infringement detection method comprising: performing saliency detection on an image to be detected to obtain at least one partial sub-image; from the at least one partial sub-image extracting local features, constructing local feature vectors based on the local features; performing infringement detection on the local feature vectors and the original feature vectors stored in the block chain to determine the infringement detection results; wherein, the original feature vectors include A local feature vector constructed from local features extracted from local sub-images of the original image.
  • a blockchain-based infringement detection method comprising: receiving an image to be detected uploaded by a client; performing saliency detection on the image to be detected to obtain at least one partial sub-image ; Extracting local features from the at least one local sub-image, constructing a local feature vector based on the local features; performing infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original The feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image; when the infringement detection result is non-infringing, the image to be detected is stored in the block chain.
  • a block chain-based infringement detection device the device includes: a salience detection unit, which performs salience detection on an image to be detected to obtain at least one partial sub-image; a feature extraction unit , extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features; the infringement detection unit performs infringement detection on the local feature vector and the original feature vector stored in the blockchain, to Determine the infringement detection result; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image.
  • a block chain-based infringement detection device the device includes: an image receiving unit, receiving an image to be detected uploaded by a client; property detection to obtain at least one local sub-image; a feature extraction unit extracts local features from the at least one local sub-image, and constructs a local feature vector based on the local features; an infringement detection unit combines the local feature vector with the block
  • the original feature vector stored in the chain is used for infringement detection; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image; the image storage unit, when the infringement detection result is When there is no infringement, the image to be detected is stored in the block chain.
  • an electronic device including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to execute any of the above-mentioned blockchain-based infringement detection method.
  • the embodiment of this specification provides a blockchain-based infringement detection scheme.
  • the infringement detection By refining the infringement detection to a local area, if the local feature vector of the image to be detected is the same as the local feature vector of the original image stored in the blockchain Similar, it means that there is an infringing area that infringes the original image in the image to be detected. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
  • the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
  • FIG. 1 is a schematic diagram of a blockchain-related network environment provided by an embodiment of this specification
  • FIG. 2 is a flow chart of a blockchain-based infringement detection method based on a traditional blockchain provided by an embodiment of this specification;
  • Fig. 3 is a flow chart of a blockchain-based infringement detection method based on a traditional blockchain provided by an embodiment of this specification;
  • Fig. 4 is a hardware structural diagram of a blockchain-based infringement detection device provided by an embodiment of this specification
  • Fig. 5 is a block chain-based infringement detection device module provided by an embodiment of this specification.
  • Fig. 6 is a module of a blockchain-based infringement detection device provided by an embodiment of this specification.
  • This manual aims to propose a blockchain-based infringement detection scheme.
  • the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, It means that there is an infringing area that infringes the original image in the image to be detected.
  • partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
  • the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
  • the blockchain described in this specification may specifically include private chains, public chains, and consortium chains, etc., which are not specifically limited in this specification.
  • Node devices in the blockchain can be added without limit, and each node device can synchronize a system time to ensure the timeliness of smart contract execution.
  • Transaction refers to a piece of data that is created by the client of the blockchain and needs to be finally released to the data storage system of the blockchain.
  • a transaction in a narrow sense refers to a value transfer issued by a user to the blockchain; for example, in the traditional Bitcoin blockchain network, a transaction can be a transfer initiated by a user in the blockchain.
  • a transaction refers to a piece of business data with business intentions released by the user to the blockchain; for example, the operator can build a consortium chain based on actual business needs, relying on the consortium chain to deploy some other types of data that have nothing to do with value transfer online business (for example, can be broadly divided into query business, calling business, etc.), and in this type of consortium chain, a transaction can be a business message or business request with business intent published by a user in the consortium chain.
  • the above-mentioned client can include any type of upper-layer application that uses the underlying business data stored in the blockchain as data support to realize specific business functions.
  • FIG. 1 is a schematic diagram of a blockchain-related network environment shown in this specification.
  • it may include a client-side computing device 101, a server-side 102, and at least one blockchain system; for example, a blockchain system 103, a blockchain system 104, and a blockchain system 105.
  • a blockchain system 103 for example, a blockchain system 103, a blockchain system 104, and a blockchain system 105.
  • the client-side computing device 101 may include various types of client-side computing devices; for example, the client-side terminal device may include PC terminal devices, mobile terminal devices, Internet of Things devices, and Other forms of smart devices with some computing power, and so on.
  • the client-side terminal device may include PC terminal devices, mobile terminal devices, Internet of Things devices, and Other forms of smart devices with some computing power, and so on.
  • At least part of the computing devices in the client-side terminal device 101 may be coupled to the server-side 102 through various communication networks; for example, the device 3 shown in FIG. 1 is coupled to the server-side 102 catch.
  • terminal devices in the client-side terminal device 101 may not be coupled with the server 102, but are directly coupled to the blockchain system as blockchain nodes through various communication networks; for example, The device 4 shown in FIG. 1 can be coupled to the blockchain system as a blockchain node.
  • the above-mentioned communication network may include a wired and/or wireless communication network; for example, it may be a local area network (Local Area Network, LAN) implemented based on a wired access network or a wireless access network (such as a mobile cellular network) provided by an operator, Wide Area Network (Wide Area Network, WAN), the Internet, or a combination thereof.
  • LAN Local Area Network
  • WAN Wide Area Network
  • the client-side computing device 101 may further include one or more user-side servers; for example, the device 5 shown in FIG. 1 . At least part of the computing devices in the client-side terminal device 101 may be coupled to the user-side server, and the user-side server may be further coupled to the above-mentioned server 102; for example, the device 1 and the device shown in FIG. 1 2 is coupled to device 5, and device 5 is further coupled to server end 102.
  • the above-mentioned user-side server may be implemented by a service entity that has established a user account system; the above-mentioned service entity may include an operating entity that provides various online and/or offline service carriers for users; wherein , the above-mentioned service carrier may include a service carrier in the form of software, and may also include a service carrier in the form of hardware.
  • the above-mentioned service carrier may include various client softwares that provide online Internet services; for example, websites, webpages, APPs, and the like.
  • the above-mentioned service carrier may also include various smart devices deployed offline and capable of providing offline services; for example, smart express cabinets deployed in residential areas, office areas, and public places.
  • the above-mentioned operating entity may include the operator corresponding to the above-mentioned service carrier; for example, the above-mentioned operating entity may include individuals, organizations, companies, enterprises, etc. that operate and manage the above-mentioned service carrier.
  • the server end 102 can also be coupled to one or more blockchain systems through various communication networks; for example, the server end 102 shown in FIG. 1 can be respectively coupled to the blockchain system 103 , block chain system 104 and block chain system 105, and so on.
  • each blockchain system can maintain one or more blockchains (for example, public blockchains, private blockchains, consortium blockchains, etc.), and includes a or multiple blockchain nodes of multiple blockchains; for example, blockchain node 1, blockchain node 2, blockchain node 3, blockchain node 4, blockchain Node i, etc. can jointly host one or more blockchains.
  • Cross-chain data access can also be performed between the blockchains contained in each blockchain system and between each blockchain system.
  • blockchain nodes may include full nodes and light nodes.
  • the full node can fully download the blockchain transactions contained in each block in the blockchain, and can perform consensus verification on the blockchain transactions contained in each blockchain according to the blockchain consensus algorithm carried .
  • the light node does not need to download the complete blockchain, but can only download the block header data of each block in the blockchain, and use the data contained in the block header as the verification root to verify the blockchain authenticity of the transaction.
  • Light nodes can attach to full nodes to access more functions of the blockchain.
  • each blockchain node in the blockchain system 103 shown in Figure 1 can be used as a full node; and the device 4 directly coupled to the blockchain system shown in Figure 1 can be used as a light node , attached to each full node in the blockchain system 103.
  • the blockchain node can be a physical device, or a virtual device implemented in a server or a server cluster; for example, a blockchain node device can be a physical host in a server cluster, or it can be It is a virtual machine created after virtualizing the hardware resources carried by a server or server cluster based on virtualization technology.
  • Each blockchain node can be coupled together through various types of communication methods (such as TCP/IP) to form a network to carry one or more blockchains.
  • the server end 102 may include a BaaS platform (also referred to as a BaaS cloud) for providing Blockchain as a Service (BaaS, Blockchain as a Service).
  • the BaaS platform can provide pre-written software for activities that occur on the blockchain (such as subscriptions and notifications, user verification, database management, and remote updates), oriented to client-side computing devices coupled with the BaaS platform, providing Easy to use, one-click deployment, fast verification, flexible and customizable blockchain services, which can accelerate the development, testing, and launch of blockchain business applications, and help the implementation of blockchain business application scenarios in various industries.
  • the BaaS platform can provide software such as MQ (Message Queue, message queue) service; the client-side computing device coupled with the BaaS platform can subscribe to the blockchain system coupled with the BaaS platform A smart contract deployed on a certain blockchain in the blockchain generates contract events on the blockchain after the execution is triggered; while the BaaS platform can monitor the events generated by the smart contract on the blockchain after the execution is triggered, and then based on the MQ
  • the service-related software adds the contract event to the message queue in the form of a notification message, so that the client-side computing device that subscribes to the message queue can get notifications related to the above contract event.
  • the BaaS platform can also provide enterprise-level platform services based on blockchain technology to help enterprise-level customers build a safe and stable blockchain environment and easily manage the deployment, operation, and maintenance of blockchain and development.
  • the BaaS platform can implement rich security policies and a multi-tenant isolation environment based on cloud technology, provide advanced security protection based on chip encryption technology, and provide rapid expansion based on highly reliable data storage. End-to-end high-availability services that will not be interrupted; in another example, enhanced management capabilities can be provided to help customers build enterprise-level blockchain network environments; and local Support, support mainstream open source blockchain technologies such as Hyperledger Fabric and Enterprise Ethereum-Quorum to build an open and inclusive technology ecosystem.
  • Fig. 2 is a flow chart of a blockchain-based infringement detection method shown in an embodiment of this specification, which can be applied on the server side.
  • the server end may be the server end 102 shown in the aforementioned FIG. 1 ; it may also be the client (such as the device 4 ) directly connected to the block chain shown in the aforementioned FIG. 1 .
  • the method described in FIG. 2 may include the following steps.
  • Step 210 Perform saliency detection on the image to be detected to obtain at least one partial sub-image.
  • the image to be detected may refer to an image work completed by the user; usually, the user may upload the original image work to an original platform for registration after completing the original image work, and the original platform may be the above-mentioned server.
  • the server can detect the salient region in the image to be detected based on the saliency detection (Saliency Detection) technology, and cut out the salient region to obtain N local sub-images.
  • saliency detection Session Detection
  • the saliency detection technology can use common algorithms in the industry, such as machine learning models such as detection network and Mask RCNN network. These machine learning models usually require model training in advance, through a large number of sample images with labels, in which each region with salient features and the label information represented by the region are marked. For example, for a face image sample, it is possible to mark the facial features region of the face and the name label of the facial features represented by each region.
  • a large number of sample images can be used to train the aforementioned machine learning model, and various parameters in the model can be optimized through continuous calculation, so that the recognition accuracy of the model is getting higher and higher.
  • the model training meets the preset requirements (for example, the accuracy rate exceeds the threshold, and the number of iterations exceeds the preset number)
  • the trained model can be used.
  • the image to be detected is input into the model for calculation, and local sub-images with salient features can be output.
  • Step 220 Extract local features from the at least one local sub-image, and construct a local feature vector based on the local features.
  • the local feature vectors of N local sub-images can also be obtained from the local feature vectors extracted from each local sub-image.
  • feature extraction can use including but not limited to deep feature extraction network, such as VGG model, ResNet, MobileNet; or feature extraction methods such as SIFT, SURF, ORB.
  • deep feature extraction network such as VGG model, ResNet, MobileNet
  • feature extraction methods such as SIFT, SURF, ORB.
  • the model used for feature extraction Similar to the model training method adopted by the aforementioned local sub-images, the model used for feature extraction also needs to be trained in advance. No more details will be given at this time.
  • Step 230 Perform infringement detection on the local feature vector and the original feature vector stored in the blockchain to determine the infringement detection result; wherein, the original feature vector includes local features extracted from local sub-images of the original image Constructed local feature vectors.
  • the local sub-images of the original image and the local feature vectors in the local sub-images are all obtained in the same manner as the image to be detected.
  • Smart contracts on the blockchain are contracts that can be triggered by transactions on the blockchain. Smart contracts can be defined in the form of code.
  • Smart contracts can be independently executed on each node in the blockchain network in a prescribed manner, and all execution records and data are stored on the blockchain, so when such a transaction is executed, the blockchain will save Tampering, non-lost transaction credentials.
  • the business logic of the smart contract can be published to the blockchain in the form of code, so that the blockchain can create a corresponding smart contract, and the smart contract can access the code after being called to realize the execution of the business logic.
  • the server can call the infringement detection logic declared in the smart contract published in the blockchain, and perform infringement detection on the local feature vector and the original feature vector stored in the blockchain.
  • the server can act as a node of the blockchain and directly call the smart contract locally for infringement detection.
  • the server can publish the local feature vector as a blockchain transaction to the blockchain; so that the accounting node in the blockchain responds to the transaction and calls the The infringement detection logic declared in the smart contract performs infringement detection based on the local feature vector and the original feature vector stored in the blockchain.
  • the server can initiate a transaction for infringement detection, so that the accounting nodes in the blockchain call the smart contract for infringement detection.
  • the method may further include: performing dimensionality reduction processing on the local feature vector; however, based on the reduced dimensionality of the local feature vector and the blockchain Infringement detection is performed on the original feature vector stored in the certificate; wherein, the original feature vector can also be an original feature vector after dimensionality reduction.
  • the dimensionality reduction processing can adopt PCA (Principal Component Analysis, principal component analysis) algorithm, SVD (Singular Value Decomposition, singular value decomposition) and other dimensionality reduction algorithms.
  • PCA Principal Component Analysis, principal component analysis
  • SVD Single Value Decomposition, singular value decomposition
  • the data volume of local feature vectors can be reduced through dimensionality reduction, thereby reducing the amount of calculations consumed in infringement detection calculations, and thus the detection efficiency will be improved due to the reduced calculations.
  • step 230 the infringement detection is performed on the local feature vector and the original feature vector stored in the blockchain through steps A1 to A2.
  • Step A1 Calculate the similarity between the local feature vector and the original feature vector stored in the blockchain; when implementing, compare the N local feature vectors with the original feature vector, so that each local feature The vector can recall M original eigenvectors (M represents the number of original eigenvectors); then, screen the N*M eigenvector groups (1 local eigenvector and 1 original eigenvector) to determine that there are similar The original feature vector of .
  • feature aggregation can be performed on original feature vectors of the same original image to obtain an original feature aggregation vector; feature aggregation can be performed on local feature vectors to obtain a local feature aggregation vector; the local feature aggregation vector and each original feature aggregation vector can be calculated. Similarity of feature aggregation vectors; determine original feature aggregation vectors whose similarity is greater than a threshold.
  • original feature vectors similar to local feature vectors can be screened out by means of similar feature number threshold screening, score confidence interval screening, and the like.
  • the threshold screening of the number of similar features may refer to calculating the number of similar features in the local feature vector and the original feature vector, and when the similar number exceeds a certain threshold, it can be determined that the original feature vector is similar to the local feature vector.
  • Step A2 When there is no similarity between the local feature vector and the original feature vector greater than the threshold, determine that the infringement detection result is non-infringing; publish the relevant information of the local sub-image to the blockchain for deposit.
  • the relevant information of the image to be detected and partial sub-images can be stored in the blockchain.
  • the relevant information of the local sub-image includes: the local feature vector (as new original feature information), the corresponding relationship between the local feature vector and the image to be detected, and the local sub-image corresponds to the image to be detected location information.
  • the content of the local feature library stored in the blockchain is improved, so as to provide credible local feature information of the original image for subsequent infringement detection.
  • Step A3 When the similarity between the local feature vector and the original feature vector is greater than the threshold, determine that the infringement detection result is infringement.
  • the infringement information is stored in the blockchain; wherein the infringement information includes: the image to be detected and the infringement area in the original image; wherein the infringement area includes similarity Local feature vectors greater than a threshold correspond to local subimages in the image to be detected, and original feature vectors whose similarity is greater than a threshold correspond to local subimages in the original image.
  • the purpose of solidifying the certificate can be achieved.
  • the infringement information stored in the blockchain can be used as the evidence of the original party's rights protection, thereby improving the success rate of rights protection.
  • the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, it means that there is an infringement area in the image to be detected that infringes the original image. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
  • the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
  • Fig. 3 is a flow chart of a blockchain-based infringement detection method shown in an embodiment of this specification, which can be applied to a server corresponding to a client; wherein, the client includes A decentralized client (such as the aforementioned device 3 shown in FIG. 1 ), and the server includes a blockchain-as-a-service platform (such as the aforementioned server 102 shown in FIG. 1 ).
  • the method may include the following steps: Step 310: Receive the image to be detected uploaded by the client.
  • the image to be detected may refer to an image work completed by the user; usually, the user may upload the original image work to an original platform for registration after completing the original image work, and the original platform may be the above-mentioned server.
  • Step 320 Perform saliency detection on the image to be detected to obtain at least one partial sub-image; this step is the same as step 210 described in the embodiment of FIG.
  • Step 330 extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features; this step is the same as step 220 described in the embodiment of FIG. No more details are given here.
  • Step 340 performing infringement detection on the local feature vector and the original feature vector stored in the blockchain; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image;
  • the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image;
  • Step 350 When the infringement detection result is non-infringement, store the image to be detected in the block chain.
  • the infringement detection result is non-infringement, it means that the image to be detected is an original image, so the image to be detected can be stored in the blockchain as an original image.
  • This embodiment provides a block chain-based infringement detection scheme, by refining the infringement detection to a local area, using the local feature vector of the original image stored in the block chain to detect the local salient area in the image Perform local infringement detection. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
  • the image to be detected can be stored in the blockchain as an original work, and the original information of the original work can be recorded by using the non-tamperable characteristics of the blockchain (for example, the time on the chain can be regarded as The original time of the work); the original works stored in the blockchain can guarantee the original rights and interests. For example, the original information recorded can be used as evidence for rights protection.
  • An embodiment of the present specification below also provides a blockchain-based infringement detection method based on traditional blockchains. This method is written from the blockchain side, with the nodes in the blockchain as the execution subject. The method may include steps as described below.
  • Step B1 Receive a call transaction for infringement detection of the image to be detected; wherein, the call transaction includes a local feature vector constructed from local features extracted from a local subimage of the image to be detected, and the partial subimage includes An image region obtained by performing saliency detection on the image to be detected.
  • the call transaction may only include the image to be detected, and then the saliency detection, local feature extraction, and feature vector construction can be executed by calling the declaration infringement detection logic in the smart contract.
  • Step B2 In response to the call transaction, invoke the infringement detection logic declared in the smart contract published in the blockchain, and perform infringement detection based on the local feature vector and the original feature vector stored in the blockchain; where , the original feature vector includes a local feature vector extracted from a local sub-image of the original image.
  • Step B3 Store the infringement detection result in the blockchain.
  • the infringement detection result includes: the image to be detected and the infringement area in the original image; wherein the infringement area includes similar local feature vectors and original The feature vectors correspond to local sub-images in the image to be detected and the original image.
  • the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, it means that there is an infringement area in the image to be detected that infringes the original image. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
  • the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
  • this specification also provides an embodiment of a blockchain-based infringement detection device.
  • the device embodiments can be implemented by software, or by hardware or a combination of software and hardware. Taking software implementation as an example, as a device in a logical sense, it is formed by reading the corresponding computer business program instructions in the non-volatile memory into the memory for operation through the processor of the device where it is located.
  • FIG. 4 it is a hardware structure diagram of the device where the blockchain-based infringement detection device in this manual is located, except for the processor, network interface, memory and non-volatile In addition to the memory, the device where the device in the embodiment is usually based on the actual function of the blockchain-based infringement detection may also include other hardware, which will not be repeated here.
  • Figure 5 is a block diagram of a block chain-based infringement detection device provided by an embodiment of this specification.
  • the device corresponds to the embodiment shown in Figure 2.
  • the device includes: a significant detection unit 510, to be detected The image is subjected to saliency detection to obtain at least one local sub-image; the feature extraction unit 520 extracts local features from the at least one local sub-image, and constructs a local feature vector based on the local features; the infringement detection unit 530 extracts the local The feature vector and the original feature vector stored in the block chain are used for infringement detection to determine the infringement detection result; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image.
  • the infringement detection of the local feature vector and the original feature vector stored in the block chain includes: calling the infringement statement declared in the smart contract published in the block chain The detection logic performs infringement detection on the local feature vector and the original feature vector stored in the blockchain.
  • performing infringement detection on the local feature vector and the original feature vector stored in the blockchain including: a calculation subunit, combining the local feature vector with the original feature vector in the blockchain Calculate the similarity of the stored original feature vector; determine the sub-unit, and when the similarity between the local feature vector and the original feature vector is greater than the threshold, determine the infringement detection result as infringement.
  • the calculation subunit includes: performing feature aggregation on original feature vectors of the same original image to obtain an original feature aggregation vector; performing feature aggregation on local feature vectors to obtain a local feature aggregation vector; calculating the local feature aggregation The similarity between the vector and each original feature aggregation vector; determine the original feature aggregation vector whose similarity is greater than a threshold.
  • the device further includes: a certificate storage subunit, which stores the infringement information in the block chain when the infringement detection result is infringement; wherein, the infringement information includes: the image to be detected and the original An infringing area in an image; wherein, the infringing area includes a local feature vector whose similarity is greater than a threshold corresponding to a local sub-image in the image to be detected, and an original feature vector whose similarity is greater than a threshold corresponds to a sub-image in the original image local subimage.
  • a certificate storage subunit which stores the infringement information in the block chain when the infringement detection result is infringement
  • the infringement information includes: the image to be detected and the original An infringing area in an image; wherein, the infringing area includes a local feature vector whose similarity is greater than a threshold corresponding to a local sub-image in the image to be detected, and an original feature vector whose similarity is greater than a threshold corresponds to a sub-image in the original image local sub
  • the device further includes: a certificate storage subunit, when there is no similarity between the local feature vector and the original feature vector greater than the threshold, determine that the infringement detection result is not infringement; publish the relevant information of the partial sub-image To the blockchain for depositing certificates.
  • the relevant information of the local sub-image includes: the local feature vector, the corresponding relationship between the local feature vector and the image to be detected, and the position information of the local sub-image corresponding to the image to be detected.
  • FIG. 6 is a block diagram of a block chain-based infringement detection device provided by an embodiment of this specification.
  • the device corresponds to the embodiment shown in FIG. 3 , and the device includes: an image receiving unit 610, a receiving client The uploaded image to be detected; the saliency detection unit 620, which performs saliency detection on the image to be detected to obtain at least one local sub-image; the feature extraction unit 630, extracts local features from the at least one local sub-image, based on the local features Construct a local feature vector; the infringement detection unit 640 performs infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original feature vector includes a partial sub-image extracted from the original image The local feature vector constructed by the feature; the image certificate storage unit 650, when the infringement detection result is non-infringement, deposit the image to be detected to the block chain.
  • the image storage unit 650 includes: when the infringement detection result is non-infringement, the local feature vector of the image to be detected, the corresponding relationship between the local feature vector and the image to be detected , The local sub-image corresponding to the location information in the image to be detected is stored in the block chain as original information.
  • the device is applied to a server corresponding to the client; wherein, the client includes a decentralized client, and the server includes a blockchain-as-a-service platform.
  • a block diagram of a block chain-based infringement detection device includes: a receiving unit, receiving a calling transaction for performing infringement detection on an image to be detected; wherein, the calling transaction includes the pending Detect the image; the determining unit, in response to the calling transaction, invokes the infringement detection logic declared in the smart contract published in the block chain, and determines the partial sub-image in the image to be detected; wherein, the partial sub-image includes the to-be-determined Detecting an image region with distinctive features in an image; an extraction unit, extracting a local feature vector from the partial sub-image; a detection unit, based on the local feature vector and the original feature vector stored in the block chain Infringement detection; wherein, the original feature vector includes a local feature vector extracted from a local sub-image of the original image; a proof storage unit stores the result of the infringement detection into the block chain.
  • a typical implementing device is a computer, which may take the form of a personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, navigation device, e-mail device, game control device, etc. desktops, tablets, wearables, or any combination of these.
  • the device embodiment since it basically corresponds to the method embodiment, for related parts, please refer to the part description of the method embodiment.
  • the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in One place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. It can be understood and implemented by those skilled in the art without creative effort.
  • This specification also provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to execute any one of the above blockchain-based infringement detection methods.
  • the processor may be a central processing unit (English: Central Processing Unit, referred to as: CPU), and may also be other general-purpose processors, digital signal processors (English: Digital Signal Processor , referred to as: DSP), application specific integrated circuit (English: Application Specific Integrated Circuit, referred to as: ASIC) and so on.
  • the general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc.
  • the aforementioned memory can be a read-only memory (English: read-only memory, abbreviated: ROM), random access memory (English: : random access memory, referred to as: RAM), flash memory, hard disk or solid state disk.
  • the steps of the methods disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments.
  • the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Library & Information Science (AREA)
  • Artificial Intelligence (AREA)
  • Molecular Biology (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Image Analysis (AREA)

Abstract

Embodiments of the present description provide a blockchain-based infringement detection method and apparatus and an electronic device. The method comprises: performing significance detection on an image to be detected to obtain at least one local sub-image; extracting a local feature from the at least one local sub-image, and constructing a local feature vector on the basis of the local feature; and performing infringement detection on the local feature vector and an original feature vector stored in a blockchain to determine an infringement detection result, wherein the original feature vector comprises a local feature vector constructed by a local feature extracted from a local sub-image of an original image.

Description

基于区块链的侵权检测Blockchain-based infringement detection 技术领域technical field
本说明书实施例涉及区块链技术领域,尤其涉及一种基于区块链的侵权检测方法及装置和电子设备。The embodiments of this specification relate to the technical field of blockchain, and in particular to a blockchain-based infringement detection method, device, and electronic equipment.
背景技术Background technique
随着版权意识的不断增强,如何更准确地进行侵权检测逐渐成为热点。With the continuous enhancement of copyright awareness, how to more accurately detect infringement has gradually become a hot spot.
在针对图像的侵权检测中,通常是基于整体图像的全局特征进行检测的。然而,针对图像拼接、画中画等局部侵权的图像,全局侵权检测无法很好的识别出来。In infringement detection for images, it is usually detected based on the global features of the overall image. However, global infringement detection cannot identify local infringement images such as image stitching and picture-in-picture.
因此,需要提供一种可以识别出局部图像侵权的方案。Therefore, it is necessary to provide a scheme that can identify partial image infringement.
发明内容Contents of the invention
本说明书实施例提供的一种基于区块链的侵权检测方法及装置和电子设备。The embodiments of this specification provide a blockchain-based infringement detection method, device, and electronic equipment.
根据本说明书实施例的第一方面,提供一种基于区块链的侵权检测方法,所述方法包括:对待检测图像进行显著性检测,得到至少一个局部子图像;从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。According to the first aspect of the embodiments of this specification, there is provided a blockchain-based infringement detection method, the method comprising: performing saliency detection on an image to be detected to obtain at least one partial sub-image; from the at least one partial sub-image extracting local features, constructing local feature vectors based on the local features; performing infringement detection on the local feature vectors and the original feature vectors stored in the block chain to determine the infringement detection results; wherein, the original feature vectors include A local feature vector constructed from local features extracted from local sub-images of the original image.
根据本说明书实施例的第二方面,提供一种基于区块链的侵权检测方法,所述方法包括:接收客户端上传的待检测图像;对待检测图像进行显著性检测,得到至少一个局部子图像;从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。According to the second aspect of the embodiment of this specification, there is provided a blockchain-based infringement detection method, the method comprising: receiving an image to be detected uploaded by a client; performing saliency detection on the image to be detected to obtain at least one partial sub-image ; Extracting local features from the at least one local sub-image, constructing a local feature vector based on the local features; performing infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original The feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image; when the infringement detection result is non-infringing, the image to be detected is stored in the block chain.
根据本说明书实施例的第三方面,提供一种基于区块链的侵权检测装置,所述装置包括:显著性检测单元,对待检测图像进行显著性检测,得到至少一个局部子图像;特征提取单元,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;侵权检测单元,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。According to the third aspect of the embodiment of this specification, there is provided a block chain-based infringement detection device, the device includes: a salience detection unit, which performs salience detection on an image to be detected to obtain at least one partial sub-image; a feature extraction unit , extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features; the infringement detection unit performs infringement detection on the local feature vector and the original feature vector stored in the blockchain, to Determine the infringement detection result; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image.
根据本说明书实施例的第四方面,提供一种基于区块链的侵权检测装置,所述装置 包括:图像接收单元,接收客户端上传的待检测图像;显著性检测单元,对待检测图像进行显著性检测,得到至少一个局部子图像;特征提取单元,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;侵权检测单元,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;图像存证单元,在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。According to the fourth aspect of the embodiments of this specification, there is provided a block chain-based infringement detection device, the device includes: an image receiving unit, receiving an image to be detected uploaded by a client; property detection to obtain at least one local sub-image; a feature extraction unit extracts local features from the at least one local sub-image, and constructs a local feature vector based on the local features; an infringement detection unit combines the local feature vector with the block The original feature vector stored in the chain is used for infringement detection; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image; the image storage unit, when the infringement detection result is When there is no infringement, the image to be detected is stored in the block chain.
根据本说明书实施例的第五方面,提供一种电子设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行上述任一项基于区块链的侵权检测方法。According to a fifth aspect of the embodiments of this specification, there is provided an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to execute any of the above-mentioned blockchain-based infringement detection method.
本说明书实施例,提供了一种基于区块链的侵权检测方案,通过将侵权检测细化到局部区域,如果待检测图像的局部特征向量与区块链中存证的原创图像的局部特征向量相似,则说明待检测图像中存在侵犯原创图像的侵权区域。如此,可以识别例如画中画、图像拼接等局部侵权的图像。The embodiment of this specification provides a blockchain-based infringement detection scheme. By refining the infringement detection to a local area, if the local feature vector of the image to be detected is the same as the local feature vector of the original image stored in the blockchain Similar, it means that there is an infringing area that infringes the original image in the image to be detected. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
另一方面,由于区块链上存证的数据具有不可篡改的特性,因此从原创图像的局部子图像中提取的局部特征向量存证到区块链后可以构建可信的局部特性库;从而使得基于区块链上存证的局部特征库对待检测图像进行侵权检测的侵权检测结果也是可信的;而且侵权检测结果的上链可以避免被篡改,保证了侵权检测结果的安全性。On the other hand, since the data stored on the blockchain is non-tamperable, the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
附图说明Description of drawings
图1是本说明书一实施例提供的一种与区块链相关的网络环境的示意图;FIG. 1 is a schematic diagram of a blockchain-related network environment provided by an embodiment of this specification;
图2是本说明书一实施例提供的基于传统区块链的基于区块链的侵权检测方法的流程图;FIG. 2 is a flow chart of a blockchain-based infringement detection method based on a traditional blockchain provided by an embodiment of this specification;
图3是本说明书一实施例提供的基于传统区块链的基于区块链的侵权检测方法的流程图;Fig. 3 is a flow chart of a blockchain-based infringement detection method based on a traditional blockchain provided by an embodiment of this specification;
图4是本说明书一实施例提供的基于区块链的侵权检测装置的硬件结构图;Fig. 4 is a hardware structural diagram of a blockchain-based infringement detection device provided by an embodiment of this specification;
图5是本说明书一实施例提供的基于区块链的侵权检测装置的模块;Fig. 5 is a block chain-based infringement detection device module provided by an embodiment of this specification;
图6是本说明书一实施例提供的基于区块链的侵权检测装置的模块。Fig. 6 is a module of a blockchain-based infringement detection device provided by an embodiment of this specification.
具体实施方式Detailed ways
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本说明书相一致的所有实施方式。相反,它们仅是与 如所附权利要求书中所详述的、本说明书的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.
在本说明书使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书。在本说明书和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and/or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.
应当理解,尽管在本说明书可能采用术语、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书范围的情况下,信息也可以被称为第二信息,类似地,第二信息也可以被称为信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。It should be understood that although the terms, second, third, etc. may be used in this specification to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, information may also be called second information without departing from the scope of this specification, and similarly, second information may also be called information. Depending on the context, the word "if" as used herein may be interpreted as "at" or "when" or "in response to a determination."
本说明书旨在提出一种基于区块链的侵权检测方案,通过将侵权检测细化到局部区域,如果待检测图像的局部特征向量与区块链中存证的原创图像的局部特征向量相似,则说明待检测图像中存在侵犯原创图像的侵权区域。如此,可以识别例如画中画、图像拼接等局部侵权的图像。This manual aims to propose a blockchain-based infringement detection scheme. By refining the infringement detection to local areas, if the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, It means that there is an infringing area that infringes the original image in the image to be detected. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
另一方面,由于区块链上存证的数据具有不可篡改的特性,因此从原创图像的局部子图像中提取的局部特征向量存证到区块链后可以构建可信的局部特性库;从而使得基于区块链上存证的局部特征库对待检测图像进行侵权检测的侵权检测结果也是可信的;而且侵权检测结果的上链可以避免被篡改,保证了侵权检测结果的安全性。On the other hand, since the data stored on the blockchain is non-tamperable, the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
在本说明书所描述的区块链,具体可以包括私有链、共有链以及联盟链等,在本说明书中不进行特别限定。所述区块链中的节点设备可以无限制的添加,各个节点设备可以同步一个系统时间,以保障智能合约执行的时效性。The blockchain described in this specification may specifically include private chains, public chains, and consortium chains, etc., which are not specifically limited in this specification. Node devices in the blockchain can be added without limit, and each node device can synchronize a system time to ensure the timeliness of smart contract execution.
需要说明的是,在本说明书中所描述的交易(Transaction),是指通过区块链的客户端创建,并需要最终发布至区块链的数据存储系统中的一笔数据。It should be noted that the transaction (Transaction) described in this specification refers to a piece of data that is created by the client of the blockchain and needs to be finally released to the data storage system of the blockchain.
区块链中的交易,通常存在狭义的交易以及广义的交易之分。狭义的交易是指用户向区块链发布的一笔价值转移;例如,在传统的比特币区块链网络中,交易可以是用户在区块链中发起的一笔转账。而广义的交易是指用户向区块链发布的一笔具有业务意图的业务数据;例如,运营方可以基于实际的业务需求搭建一个联盟链,依托于联盟链部署一些与价值转移无关的其它类型的在线业务(比如,宽泛的可以分为查询业务、调用业务等),而在这类联盟链中,交易可以是用户在联盟链中发布的一笔具有业务意图的业务消息或者业务请求。Transactions in the blockchain usually have narrow-sense transactions and broad-sense transactions. A transaction in a narrow sense refers to a value transfer issued by a user to the blockchain; for example, in the traditional Bitcoin blockchain network, a transaction can be a transfer initiated by a user in the blockchain. In a broad sense, a transaction refers to a piece of business data with business intentions released by the user to the blockchain; for example, the operator can build a consortium chain based on actual business needs, relying on the consortium chain to deploy some other types of data that have nothing to do with value transfer online business (for example, can be broadly divided into query business, calling business, etc.), and in this type of consortium chain, a transaction can be a business message or business request with business intent published by a user in the consortium chain.
上述客户端,可以包括任意类型的以区块链中存储的底层业务数据作为数据支撑, 来实现特定的业务功能的上层应用。The above-mentioned client can include any type of upper-layer application that uses the underlying business data stored in the blockchain as data support to realize specific business functions.
请参考图1,图1是本说明书示出的一种与区块链相关的网络环境的示意图。Please refer to FIG. 1, which is a schematic diagram of a blockchain-related network environment shown in this specification.
在如图1所示的网络环境中,可以包括客户端侧计算设备101、服务器端102,以及至少一个区块链系统;例如,区块链系统103、区块链系统104和区块链系统105。In the network environment shown in Figure 1, it may include a client-side computing device 101, a server-side 102, and at least one blockchain system; for example, a blockchain system 103, a blockchain system 104, and a blockchain system 105.
在一种实施方式中,客户端侧计算设备101,可以包括各种不同类型的客户端侧计算设备;例如,客户端侧终端设备可以包括诸如PC终端设备、移动终端设备、物联网设备,以及其它形式的具有一定的计算能力的智能设备,等等。In one embodiment, the client-side computing device 101 may include various types of client-side computing devices; for example, the client-side terminal device may include PC terminal devices, mobile terminal devices, Internet of Things devices, and Other forms of smart devices with some computing power, and so on.
在一种实施方式中,客户端侧终端设备101中的至少部分计算设备,可以通过各种通信网络耦接到服务器端102;例如,图1中示出的设备3与服务器端102进行了耦接。In one embodiment, at least part of the computing devices in the client-side terminal device 101 may be coupled to the server-side 102 through various communication networks; for example, the device 3 shown in FIG. 1 is coupled to the server-side 102 catch.
不难理解,客户端侧终端设备101中的部分终端设备,也可以不与服务器端102进行耦接,而是作为区块链节点通过各种通信网络直接耦接到区块链系统;例如,图1中示出的设备4,可以作为区块链节点耦接到区块链系统。It is not difficult to understand that some terminal devices in the client-side terminal device 101 may not be coupled with the server 102, but are directly coupled to the blockchain system as blockchain nodes through various communication networks; for example, The device 4 shown in FIG. 1 can be coupled to the blockchain system as a blockchain node.
其中,上述通信网络可以包括有线和/或无线通信网络;例如,可以是基于运营商提供的有线接入网络或者无线接入网络(比如移动蜂窝网络)实现的局域网(Local Area Network,LAN)、广域网(Wide Area Network,WAN)、因特网或其组合。Wherein, the above-mentioned communication network may include a wired and/or wireless communication network; for example, it may be a local area network (Local Area Network, LAN) implemented based on a wired access network or a wireless access network (such as a mobile cellular network) provided by an operator, Wide Area Network (Wide Area Network, WAN), the Internet, or a combination thereof.
在一种实施方式中,客户端侧计算设备101,还可以包括一个或多个用户侧服务器;例如,图1中示出的设备5。客户端侧终端设备101中的至少部分计算设备,可以耦接到该用户侧服务器,而该用户侧服务器可以进一步与上述服务端102进行耦接;例如,图1中示出的设备1和设备2耦接到设备5,设备5进一步耦接服务器端102。In one embodiment, the client-side computing device 101 may further include one or more user-side servers; for example, the device 5 shown in FIG. 1 . At least part of the computing devices in the client-side terminal device 101 may be coupled to the user-side server, and the user-side server may be further coupled to the above-mentioned server 102; for example, the device 1 and the device shown in FIG. 1 2 is coupled to device 5, and device 5 is further coupled to server end 102.
在一种实施方式中,上述用户侧服务器可以由搭建了用户账户体系的服务实体来实现;上述服务实体可以包括面向用户提供各种线上和/或线下服务的服务载体的运营实体;其中,上述服务载体可以包括软件形式的服务载体,也可以包括硬件形式的服务载体。In one embodiment, the above-mentioned user-side server may be implemented by a service entity that has established a user account system; the above-mentioned service entity may include an operating entity that provides various online and/or offline service carriers for users; wherein , the above-mentioned service carrier may include a service carrier in the form of software, and may also include a service carrier in the form of hardware.
在一种实施方式中,上述服务载体可以包括提供线上互联网服务的各种客户端软件;例如,网站、网页、APP等。In one embodiment, the above-mentioned service carrier may include various client softwares that provide online Internet services; for example, websites, webpages, APPs, and the like.
在一种实施方式中,上述服务载体也可以包括部署在线下的,能够提供线下服务的各种智能设备;例如,部署在居住区、办公区、公共场所的智能快递柜。In one embodiment, the above-mentioned service carrier may also include various smart devices deployed offline and capable of providing offline services; for example, smart express cabinets deployed in residential areas, office areas, and public places.
相应的,上述运营实体可以包括上述服务载体对应的运营方;例如,上述运营实体可以包括对上述服务载体进行运营和管理的个人、组织、公司和企业,等等。Correspondingly, the above-mentioned operating entity may include the operator corresponding to the above-mentioned service carrier; for example, the above-mentioned operating entity may include individuals, organizations, companies, enterprises, etc. that operate and manage the above-mentioned service carrier.
在一种实施方式中,服务器端102也可以通过各种通信网络耦接到一个或者多个区块链系统;例如,图1中示出的服务器端102可以分别耦接到区块链系统103、区块链系统104和区块链系统105,等等。In one embodiment, the server end 102 can also be coupled to one or more blockchain systems through various communication networks; for example, the server end 102 shown in FIG. 1 can be respectively coupled to the blockchain system 103 , block chain system 104 and block chain system 105, and so on.
在一种实施方式中,每个区块链系统都可以维护一个或多个区块链(例如,公有区块链、私有区块链、联盟区块链等),并包括用于承载上述一个或多个区块链的多个区块链节点;例如,如图1中示出的区块链节点1、区块链节点2、区块链节点3、区块链节点4、区块链节点i等可以共同承载一个或者多个区块链。各个区块链系统包含的区块链之间,以及各个区块链系统之间,还可以进行跨链的数据访问。In one embodiment, each blockchain system can maintain one or more blockchains (for example, public blockchains, private blockchains, consortium blockchains, etc.), and includes a or multiple blockchain nodes of multiple blockchains; for example, blockchain node 1, blockchain node 2, blockchain node 3, blockchain node 4, blockchain Node i, etc. can jointly host one or more blockchains. Cross-chain data access can also be performed between the blockchains contained in each blockchain system and between each blockchain system.
在一种实施方式中,区块链节点可以包括全节点和轻节点。全节点可以全量下载区块链中的每个区块所包含的区块链交易,并可以根据搭载的区块链共识算法,对每个区块链中所包含的区块链交易进行共识验证。In one embodiment, blockchain nodes may include full nodes and light nodes. The full node can fully download the blockchain transactions contained in each block in the blockchain, and can perform consensus verification on the blockchain transactions contained in each blockchain according to the blockchain consensus algorithm carried .
而轻节点可以不下载完整的区块链,而是可以只下载区块链中的每个区块的区块头数据,并将区块头所包含的数据作为验证根,用于以验证区块链交易的真实性。轻节点可以依附于全节点来访问区块链的更多功能。The light node does not need to download the complete blockchain, but can only download the block header data of each block in the blockchain, and use the data contained in the block header as the verification root to verify the blockchain authenticity of the transaction. Light nodes can attach to full nodes to access more functions of the blockchain.
例如,图1中示出的区块链系统103中的各个区块链节点都可以作为全节点;而图1中示出的直接耦接到区块链系统的设备4,就可以作为轻节点,依附于区块链系统103中的各个全节点。For example, each blockchain node in the blockchain system 103 shown in Figure 1 can be used as a full node; and the device 4 directly coupled to the blockchain system shown in Figure 1 can be used as a light node , attached to each full node in the blockchain system 103.
在一种实施方式中,区块链节点可以是物理设备,也可以是在服务器或者服务器集群中实现的虚拟设备;例如,区块链节点设备可以是服务器集群中的一台物理主机,也可以是基于虚拟化技术对服务器或者服务器集群搭载的硬件资源进行虚拟化后,创建的虚拟机。每个区块链节点之间,可以通过各种类型的通信方法(比如TCP/IP)耦接在一起形成网络,来承载一个或者多个区块链。In one embodiment, the blockchain node can be a physical device, or a virtual device implemented in a server or a server cluster; for example, a blockchain node device can be a physical host in a server cluster, or it can be It is a virtual machine created after virtualizing the hardware resources carried by a server or server cluster based on virtualization technology. Each blockchain node can be coupled together through various types of communication methods (such as TCP/IP) to form a network to carry one or more blockchains.
在一种实施方式中,服务器端102可以包括用于提供区块链即服务(BaaS,Blockchain as a Service)的BaaS平台(也称之为BaaS云)。BaaS平台可以通过为区块链上发生的活动(诸如订阅和通知、用户验证、数据库管理和远程更新),提供预先编写的软件的方式,面向与BaaS平台耦接的客户端侧计算设备,提供简单易用,一键部署,快速验证,灵活可定制的区块链服务,进而可以加速区块链业务应用开发、测试、上线,助力各行业区块链商业应用场景的落地。In one embodiment, the server end 102 may include a BaaS platform (also referred to as a BaaS cloud) for providing Blockchain as a Service (BaaS, Blockchain as a Service). The BaaS platform can provide pre-written software for activities that occur on the blockchain (such as subscriptions and notifications, user verification, database management, and remote updates), oriented to client-side computing devices coupled with the BaaS platform, providing Easy to use, one-click deployment, fast verification, flexible and customizable blockchain services, which can accelerate the development, testing, and launch of blockchain business applications, and help the implementation of blockchain business application scenarios in various industries.
例如,在一个例子中,与BaaS平台可以提供诸如MQ(Message Queue,消息队列)服务之类的软件;与BaaS平台耦接的客户端侧计算设备,可以订阅BaaS平台耦接的区块链系统中某一区块链上部署的智能合约,在触发执行后在区块链上产生的合约事件;而BaaS平台可以监听该智能合约在触发执行后在区块链上产生的事件,再基于MQ服务相关的软件,将该合约事件以通知消息的形式添加到消息队列中,使得订阅该消息队列的客户端侧计算设备,能够得到与上述合约事件相关的通知。For example, in one example, the BaaS platform can provide software such as MQ (Message Queue, message queue) service; the client-side computing device coupled with the BaaS platform can subscribe to the blockchain system coupled with the BaaS platform A smart contract deployed on a certain blockchain in the blockchain generates contract events on the blockchain after the execution is triggered; while the BaaS platform can monitor the events generated by the smart contract on the blockchain after the execution is triggered, and then based on the MQ The service-related software adds the contract event to the message queue in the form of a notification message, so that the client-side computing device that subscribes to the message queue can get notifications related to the above contract event.
在一种实施方式中,BaaS平台还可以提供基于区块链技术的企业级平台服务,以帮助企业级客户构建安全且稳定的区块链环境,并轻松管理区块链的部署、操作、维护和开发。In one implementation, the BaaS platform can also provide enterprise-level platform services based on blockchain technology to help enterprise-level customers build a safe and stable blockchain environment and easily manage the deployment, operation, and maintenance of blockchain and development.
例如,在一个例子中,BaaS平台可以基于云技术实现丰富的安全策略和多租户的隔离环境、基于芯片加密技术来提供高级的安全保护、基于高度可靠的数据存储,提供可以快速扩展,而不会中断的端到端的高可用性服务;在另一个例子中,还可以提供增强的管理功能,以帮助客户构建企业级区块链网络环境;以及,还可以为标准区块链应用和数据提供本地支持,支持例如Hyperledger Fabric和Enterprise Ethereum-Quorum的主流开源区块链技术,以构建开放且包容的技术生态系统。For example, in one example, the BaaS platform can implement rich security policies and a multi-tenant isolation environment based on cloud technology, provide advanced security protection based on chip encryption technology, and provide rapid expansion based on highly reliable data storage. End-to-end high-availability services that will not be interrupted; in another example, enhanced management capabilities can be provided to help customers build enterprise-level blockchain network environments; and local Support, support mainstream open source blockchain technologies such as Hyperledger Fabric and Enterprise Ethereum-Quorum to build an open and inclusive technology ecosystem.
在介绍完上述区块链技术,下面介绍下本说明书提供的基于区块链的侵权检测方法。After introducing the blockchain technology above, the blockchain-based infringement detection method provided in this specification is introduced below.
参见图2,图2是本说明书一实施例示出的一种基于区块链的侵权检测方法的流程图,该方法可以应用在服务端。所述服务端可以是前述图1所示的服务器端102;也可以是前述图1所示的与区块链直连的客户端(如设备4)。Referring to Fig. 2, Fig. 2 is a flow chart of a blockchain-based infringement detection method shown in an embodiment of this specification, which can be applied on the server side. The server end may be the server end 102 shown in the aforementioned FIG. 1 ; it may also be the client (such as the device 4 ) directly connected to the block chain shown in the aforementioned FIG. 1 .
具体地,图2所述的方法可以包括如下所述步骤。Specifically, the method described in FIG. 2 may include the following steps.
步骤210:对待检测图像进行显著性检测,得到至少一个局部子图像。Step 210: Perform saliency detection on the image to be detected to obtain at least one partial sub-image.
其中,所述待检测图像可以是指用户完成的图像作品;通常,用户完成原创的图像作品后可以上传到原创平台进行登记,所述原创平台可以为上述服务端。Wherein, the image to be detected may refer to an image work completed by the user; usually, the user may upload the original image work to an original platform for registration after completing the original image work, and the original platform may be the above-mentioned server.
在实现时,服务端可以基于显著性检测(Saliency Detection)技术,检测待检测图像中的显著性区域,并剪裁出该显著性区域,以得到N个局部子图像。During implementation, the server can detect the salient region in the image to be detected based on the saliency detection (Saliency Detection) technology, and cut out the salient region to obtain N local sub-images.
这里的显著性检测技术可以采用业内通用的算法,例如detection网络、Mask RCNN网络等机器学习模型。这些机器学习模型通常需要预先进行模型训练,通过大量的具有标签的样本图像,这些样本图像中标记了各个具有显著性特征的区域以及区域代表的标签信息。例如,针对人脸图像样本,则可以标记人脸的五官区域以及每个区域代表的五官名称标签。The saliency detection technology here can use common algorithms in the industry, such as machine learning models such as detection network and Mask RCNN network. These machine learning models usually require model training in advance, through a large number of sample images with labels, in which each region with salient features and the label information represented by the region are marked. For example, for a face image sample, it is possible to mark the facial features region of the face and the name label of the facial features represented by each region.
通常海量的样本图像可以训练前述的机器学习模型,通过不断计算可以优化模型中的各个参数,使得模型的识别准确率越来越高。当模型训练达到预设要求(例如准确率超过阈值,迭代次数超过预设次数)后,就可以使用训练好的模型。此时,将待检测图像输入到模型中进行计算,就可以输出具有显著性特征的局部子图像。Usually, a large number of sample images can be used to train the aforementioned machine learning model, and various parameters in the model can be optimized through continuous calculation, so that the recognition accuracy of the model is getting higher and higher. When the model training meets the preset requirements (for example, the accuracy rate exceeds the threshold, and the number of iterations exceeds the preset number), the trained model can be used. At this point, the image to be detected is input into the model for calculation, and local sub-images with salient features can be output.
步骤220:从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量。Step 220: Extract local features from the at least one local sub-image, and construct a local feature vector based on the local features.
在获取到N个局部子图像后,还可以从每个局部子图像中提取的局部特征向量,即 可得到N张局部子图像的局部特征向量。After obtaining N local sub-images, the local feature vectors of N local sub-images can also be obtained from the local feature vectors extracted from each local sub-image.
这里特征提取可以使用包括但不限于深度特征提取网络,例如VGG模型、ResNet、MobileNet;或者SIFT、SURF、ORB等特征提取方法。Here feature extraction can use including but not limited to deep feature extraction network, such as VGG model, ResNet, MobileNet; or feature extraction methods such as SIFT, SURF, ORB.
与前述局部子图像采用的模型训练方法类似的,特征提取采用的模型也需要预先进行模型训练。此时不再进行赘述。Similar to the model training method adopted by the aforementioned local sub-images, the model used for feature extraction also needs to be trained in advance. No more details will be given at this time.
步骤230:将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。Step 230: Perform infringement detection on the local feature vector and the original feature vector stored in the blockchain to determine the infringement detection result; wherein, the original feature vector includes local features extracted from local sub-images of the original image Constructed local feature vectors.
区块链中存证有经过原创认证的原创图像,以及从原创图像的局部子图像中提取的局部特征构建的局部特征向量;这些原创图像的局部特征向量作为原创特征向量可以用于为侵权检测提供可信的局部特征库。There are original certified original images in the blockchain, as well as local feature vectors constructed from local features extracted from local sub-images of original images; these local feature vectors of original images can be used as original feature vectors for infringement detection Provide a credible local feature library.
其中,所述原创图像的局部子图像,以及局部子图像中的局部特征向量,都是采用与待检测图像相同的方式得到的。Wherein, the local sub-images of the original image and the local feature vectors in the local sub-images are all obtained in the same manner as the image to be detected.
在实际应用中,不论是公有链、私有链还是联盟链,都可能提供智能合约(Smart contract)的功能。区块链上的智能合约是在区块链上可以被交易触发执行的合约。智能合约可以通过代码的形式定义。In practical applications, whether it is a public chain, a private chain or an alliance chain, it is possible to provide the function of a smart contract (Smart contract). Smart contracts on the blockchain are contracts that can be triggered by transactions on the blockchain. Smart contracts can be defined in the form of code.
智能合约可以以规定的方式在区块链网络中每个节点独立的执行,所有执行记录和数据都保存在区块链上,所以当这样的交易执行完毕后,区块链上就保存了无法篡改、不会丢失的交易凭证。Smart contracts can be independently executed on each node in the blockchain network in a prescribed manner, and all execution records and data are stored on the blockchain, so when such a transaction is executed, the blockchain will save Tampering, non-lost transaction credentials.
在实现时,可以将智能合约的业务逻辑以代码的形式发布到区块链,以使区块链创建对应的智能合约,该智能合约被调用后就可以访问代码以实现业务逻辑的执行。When implementing, the business logic of the smart contract can be published to the blockchain in the form of code, so that the blockchain can create a corresponding smart contract, and the smart contract can access the code after being called to realize the execution of the business logic.
而在本说明书中,可以将包含侵权检测逻辑的代码的智能合约发布到区块链中。In this specification, however, smart contracts containing codes for infringement detection logic can be published to the blockchain.
在一种实现方式中,服务端可以调用发布于区块链的智能合约中声明的侵权检测逻辑,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测。In one implementation, the server can call the infringement detection logic declared in the smart contract published in the blockchain, and perform infringement detection on the local feature vector and the original feature vector stored in the blockchain.
这种方式中,服务端可以作为区块链的节点,直接在本地调用智能合约进行侵权检测。In this way, the server can act as a node of the blockchain and directly call the smart contract locally for infringement detection.
在另一种实现方式中,服务端可以将局部特征向量作为区块链的交易,发布到区块链;以使区块链中的记账节点响应于该交易,调用发布于区块链的智能合约中声明的侵权检测逻辑,基于所述局部特征向量与所述区块链中存证的原创特征向量进行侵权检测。In another implementation, the server can publish the local feature vector as a blockchain transaction to the blockchain; so that the accounting node in the blockchain responds to the transaction and calls the The infringement detection logic declared in the smart contract performs infringement detection based on the local feature vector and the original feature vector stored in the blockchain.
这种方式中,服务端可以发起用于侵权检测的交易,以使区块链中的记账节点调用智能合约进行侵权检测。In this way, the server can initiate a transaction for infringement detection, so that the accounting nodes in the blockchain call the smart contract for infringement detection.
在一实施例中,在所述步骤230之前,所述方法还可以包括:对所述局部特征向量进行降维处理;然而,再基于所述降维后的局部特征向量与所述区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量同样可以是降维后的原创特征向量。In an embodiment, before the step 230, the method may further include: performing dimensionality reduction processing on the local feature vector; however, based on the reduced dimensionality of the local feature vector and the blockchain Infringement detection is performed on the original feature vector stored in the certificate; wherein, the original feature vector can also be an original feature vector after dimensionality reduction.
其中,所述降维处理可以采用PCA(Principal Component Analysis,主成份分析)算法、SVD(Singular Value Decomposition,奇异值分解)等降维算法。Wherein, the dimensionality reduction processing can adopt PCA (Principal Component Analysis, principal component analysis) algorithm, SVD (Singular Value Decomposition, singular value decomposition) and other dimensionality reduction algorithms.
该实施例中,通过降维可以减少局部特征向量的数据量,从而可以降低侵权检测计算时消耗的计算量,如此由于减少了计算量因此检测效率就会提高。In this embodiment, the data volume of local feature vectors can be reduced through dimensionality reduction, thereby reducing the amount of calculations consumed in infringement detection calculations, and thus the detection efficiency will be improved due to the reduced calculations.
下面通过步骤A1至A2介绍前述步骤230中,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测。In the foregoing step 230, the infringement detection is performed on the local feature vector and the original feature vector stored in the blockchain through steps A1 to A2.
步骤A1:将所述局部特征向量与区块链中存证的原创特征向量进行相似度计算;在实现时,可以将N个局部特征向量分别与原创特征向量进行比对,这样每个局部特征向量可以召回M个原创特征向量(M表示原创特征向量的个数);然后,对这N*M个的特征向量组(1个局部特征向量与1个原创特征向量)进行筛选以确定存在相似的原创特征向量。Step A1: Calculate the similarity between the local feature vector and the original feature vector stored in the blockchain; when implementing, compare the N local feature vectors with the original feature vector, so that each local feature The vector can recall M original eigenvectors (M represents the number of original eigenvectors); then, screen the N*M eigenvector groups (1 local eigenvector and 1 original eigenvector) to determine that there are similar The original feature vector of .
在一种实现方式中,可以对相同原创图片的原创特征向量进行特征聚合,得到原创特征聚合向量;对局部特征向量进行特征聚合,得到局部特征聚合向量;计算所述局部特征聚合向量和各个原创特征聚合向量的相似度;确定相似度大于阈值的原创特征聚合向量。In one implementation, feature aggregation can be performed on original feature vectors of the same original image to obtain an original feature aggregation vector; feature aggregation can be performed on local feature vectors to obtain a local feature aggregation vector; the local feature aggregation vector and each original feature aggregation vector can be calculated. Similarity of feature aggregation vectors; determine original feature aggregation vectors whose similarity is greater than a threshold.
在另一种实现方式中,可以采用相似特征个数阈值筛选、分数置信区间筛选等方式筛选出与局部特征向量相似的原创特征向量。In another implementation manner, original feature vectors similar to local feature vectors can be screened out by means of similar feature number threshold screening, score confidence interval screening, and the like.
其中,相似特征个数阈值筛选可以是指通过计算局部特征向量和原创特征向量中相似特征的个数,当相似个数超过一定阈值时可以确定原创特征向量与局部特征向量相似。Wherein, the threshold screening of the number of similar features may refer to calculating the number of similar features in the local feature vector and the original feature vector, and when the similar number exceeds a certain threshold, it can be determined that the original feature vector is similar to the local feature vector.
步骤A2:当不存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为不侵权;将所述局部子图像的相关信息发布至所述区块链进行存证。Step A2: When there is no similarity between the local feature vector and the original feature vector greater than the threshold, determine that the infringement detection result is non-infringing; publish the relevant information of the local sub-image to the blockchain for deposit.
如果不存在与所述局部特征向量相似的原创特征向量,则说明待检测图像与区块链中存证的原创图像都不相似,因此可以得出待检测图像是原创图像,没有侵权已登记的原创图像。If there is no original feature vector similar to the local feature vector, it means that the image to be detected is not similar to the original image stored in the blockchain, so it can be concluded that the image to be detected is an original image, and there is no infringement registered original image.
在确定待检测图像不侵权后,可以将该待检测图像以及局部子图像的相关信息存证到区块链中。After it is determined that the image to be detected does not infringe, the relevant information of the image to be detected and partial sub-images can be stored in the blockchain.
其中,所述局部子图像的相关信息包括:所述局部特征向量(作为新的原创特征信息),所述局部特征向量与待检测图像的对应关系,所述局部子图像对应在待检测图像 中的位置信息。Wherein, the relevant information of the local sub-image includes: the local feature vector (as new original feature information), the corresponding relationship between the local feature vector and the image to be detected, and the local sub-image corresponds to the image to be detected location information.
通过将属于原创图像的待检测图像的局部特征向量存证到区块链,以完善区块链存证的局部特征库的内容,从而为后续侵权检测提供可信的原创图像的局部特征信息。By storing the local feature vector of the image to be detected belonging to the original image to the blockchain, the content of the local feature library stored in the blockchain is improved, so as to provide credible local feature information of the original image for subsequent infringement detection.
步骤A3:当存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为侵权。Step A3: When the similarity between the local feature vector and the original feature vector is greater than the threshold, determine that the infringement detection result is infringement.
在侵权检测结果为侵权时,将侵权信息存证至区块链;其中,所述侵权信息包括:所述待检测图像和所述原创图像中的侵权区域;其中,所述侵权区域包括相似度大于阈值的局部特征向量对应在所述待检测图像中的局部子图像,相似度大于阈值的原创特征向量对应在所述原创图像中的局部子图像。When the infringement detection result is an infringement, the infringement information is stored in the blockchain; wherein the infringement information includes: the image to be detected and the infringement area in the original image; wherein the infringement area includes similarity Local feature vectors greater than a threshold correspond to local subimages in the image to be detected, and original feature vectors whose similarity is greater than a threshold correspond to local subimages in the original image.
通过将侵权信息存证到区块链,以实现固证的目的。当发生侵权纠纷时,可以将区块链存证的侵权信息作为原创方的维权证据,从而提高维权成功率。By storing the infringement information in the blockchain, the purpose of solidifying the certificate can be achieved. When an infringement dispute occurs, the infringement information stored in the blockchain can be used as the evidence of the original party's rights protection, thereby improving the success rate of rights protection.
通过将侵权检测细化到局部区域,如果待检测图像的局部特征向量与区块链中存证的原创图像的局部特征向量相似,则说明待检测图像中存在侵犯原创图像的侵权区域。如此,可以识别例如画中画、图像拼接等局部侵权的图像。By refining the infringement detection to the local area, if the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, it means that there is an infringement area in the image to be detected that infringes the original image. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
另一方面,由于区块链上存证的数据具有不可篡改的特性,因此从原创图像的局部子图像中提取的局部特征向量存证到区块链后可以构建可信的局部特性库;从而使得基于区块链上存证的局部特征库对待检测图像进行侵权检测的侵权检测结果也是可信的;而且侵权检测结果的上链可以避免被篡改,保证了侵权检测结果的安全性。On the other hand, since the data stored on the blockchain is non-tamperable, the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
以下再参见图3,图3是本说明书一实施例示出的一种基于区块链的侵权检测方法的流程图,该方法可以应用在与客户端对应的服务端;其中,所述客户端包括去中心化的客户端(例如前述图1所示的设备3),所述服务端包括区块链即服务平台(例如前述图1所示的服务器端102)。所述的方法可以包括如下所述步骤:步骤310:接收客户端上传的待检测图像。Referring to Fig. 3 again below, Fig. 3 is a flow chart of a blockchain-based infringement detection method shown in an embodiment of this specification, which can be applied to a server corresponding to a client; wherein, the client includes A decentralized client (such as the aforementioned device 3 shown in FIG. 1 ), and the server includes a blockchain-as-a-service platform (such as the aforementioned server 102 shown in FIG. 1 ). The method may include the following steps: Step 310: Receive the image to be detected uploaded by the client.
所述待检测图像可以是指用户完成的图像作品;通常,用户完成原创的图像作品后可以上传到原创平台进行登记,所述原创平台可以为上述服务端。The image to be detected may refer to an image work completed by the user; usually, the user may upload the original image work to an original platform for registration after completing the original image work, and the original platform may be the above-mentioned server.
步骤320:对待检测图像进行显著性检测,得到至少一个局部子图像;该步骤与前述图2实施例记载的步骤210相同,可以参考前述步骤210所记载的内容,此处不再进行赘述。Step 320: Perform saliency detection on the image to be detected to obtain at least one partial sub-image; this step is the same as step 210 described in the embodiment of FIG.
步骤330:从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;该步骤与前述图2实施例记载的步骤220相同,可以参考前述步骤220所记载的内容,此处不再进行赘述。Step 330: extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features; this step is the same as step 220 described in the embodiment of FIG. No more details are given here.
步骤340:将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;该步骤与前述图2实施例记载的步骤230类似,可以参考前述步骤230所记载的内容,此处不再进行赘述。Step 340: performing infringement detection on the local feature vector and the original feature vector stored in the blockchain; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image; This step is similar to the step 230 described in the aforementioned embodiment of FIG. 2 , and reference may be made to the content recorded in the aforementioned step 230 , which will not be repeated here.
步骤350:在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。Step 350: When the infringement detection result is non-infringement, store the image to be detected in the block chain.
在侵权检测结果为未侵权时,说明待检测图像为原创图像,因此可以将待检测图像作为原创图像存证到区块链中。When the infringement detection result is non-infringement, it means that the image to be detected is an original image, so the image to be detected can be stored in the blockchain as an original image.
该实施例中提供了一种基于区块链的侵权检测方案,通过将侵权检测细化到局部区域,利用区块链中存证的原创图像的局部特征向量对待检测图像中的局部显著性区域进行局部侵权检测。如此,可以识别例如画中画、图像拼接等局部侵权的图像。This embodiment provides a block chain-based infringement detection scheme, by refining the infringement detection to a local area, using the local feature vector of the original image stored in the block chain to detect the local salient area in the image Perform local infringement detection. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
由于待检测图像并没有局部侵权原创作品,因此可以将待检测图像作为原创作品存证到区块链,利用区块链不可篡改的特性,记录原创作品的原创信息(例如上链时间可以认为是作品的原创时间);通过区块链存证的原创作品可以保障原创权益。例如可以将记录的原创信息作为维权证据使用。Since the image to be detected does not partially infringe the original work, the image to be detected can be stored in the blockchain as an original work, and the original information of the original work can be recorded by using the non-tamperable characteristics of the blockchain (for example, the time on the chain can be regarded as The original time of the work); the original works stored in the blockchain can guarantee the original rights and interests. For example, the original information recorded can be used as evidence for rights protection.
以下本说明书一实施例还提供的一种基于传统区块链的基于区块链的侵权检测方法。该方法从区块链侧进行撰写,以区块链中的节点作为执行主体。该方法可以包括如下所述步骤。An embodiment of the present specification below also provides a blockchain-based infringement detection method based on traditional blockchains. This method is written from the blockchain side, with the nodes in the blockchain as the execution subject. The method may include steps as described below.
步骤B1:接收用于对待检测图像进行侵权检测的调用交易;其中,所述调用交易包括从所述待检测图像的局部子图像中提取的局部特征构建的局部特征向量,所述局部子图像包括对所述待检测图像进行显著性检测得到的图像区域。Step B1: Receive a call transaction for infringement detection of the image to be detected; wherein, the call transaction includes a local feature vector constructed from local features extracted from a local subimage of the image to be detected, and the partial subimage includes An image region obtained by performing saliency detection on the image to be detected.
该步骤中显著性检测、局部特征提取等都已经在前述实施例中介绍过了,这里不再进行赘述。The saliency detection, local feature extraction, etc. in this step have been introduced in the foregoing embodiments, and will not be repeated here.
值得一提的是,在有的实施例中,调用交易可以仅包括待检测图像,然后显著性检测、局部特征提取、和与特征向量构建可以调用智能合约中声明侵权检测逻辑来执行。It is worth mentioning that in some embodiments, the call transaction may only include the image to be detected, and then the saliency detection, local feature extraction, and feature vector construction can be executed by calling the declaration infringement detection logic in the smart contract.
步骤B2:响应于所述调用交易,调用发布于区块链的智能合约中声明的侵权检测逻辑,基于所述局部特征向量与所述区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征向量。Step B2: In response to the call transaction, invoke the infringement detection logic declared in the smart contract published in the blockchain, and perform infringement detection based on the local feature vector and the original feature vector stored in the blockchain; where , the original feature vector includes a local feature vector extracted from a local sub-image of the original image.
该步骤中侵权检测可以参考前述实施例中的示例,这里不再进行赘述。For infringement detection in this step, reference may be made to the examples in the foregoing embodiments, and details are not repeated here.
步骤B3:将侵权检测结果存证至所述区块链。Step B3: Store the infringement detection result in the blockchain.
针对存在与所述局部特征向量相似的原创特征向量,所述侵权检测结果包括:所述待检测图像和所述原创图像中的侵权区域;其中,所述侵权区域包括相似的局部特征向 量和原创特征向量对应在所述待检测图像和原创图像中的局部子图像。In view of the presence of original feature vectors similar to the local feature vectors, the infringement detection result includes: the image to be detected and the infringement area in the original image; wherein the infringement area includes similar local feature vectors and original The feature vectors correspond to local sub-images in the image to be detected and the original image.
通过将侵权检测细化到局部区域,如果待检测图像的局部特征向量与区块链中存证的原创图像的局部特征向量相似,则说明待检测图像中存在侵犯原创图像的侵权区域。如此,可以识别例如画中画、图像拼接等局部侵权的图像。By refining the infringement detection to the local area, if the local feature vector of the image to be detected is similar to the local feature vector of the original image stored in the blockchain, it means that there is an infringement area in the image to be detected that infringes the original image. In this way, partially infringing images such as picture-in-picture, image mosaic, etc. can be identified.
另一方面,由于区块链上存证的数据具有不可篡改的特性,因此从原创图像的局部子图像中提取的局部特征向量存证到区块链后可以构建可信的局部特性库;从而使得基于区块链上存证的局部特征库对待检测图像进行侵权检测的侵权检测结果也是可信的;而且侵权检测结果的上链可以避免被篡改,保证了侵权检测结果的安全性。On the other hand, since the data stored on the blockchain is non-tamperable, the local feature vectors extracted from the local sub-images of the original image can be stored in the blockchain to build a credible local feature library; thus This makes the infringement detection result of the image to be detected based on the local feature library stored on the blockchain credible; and the uplink of the infringement detection result can avoid being tampered with, ensuring the security of the infringement detection result.
与前述基于区块链的侵权检测方法实施例相对应,本说明书还提供了基于区块链的侵权检测装置的实施例。所述装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,是通过其所在设备的处理器将非易失性存储器中对应的计算机业务程序指令读取到内存中运行形成的。从硬件层面而言,如图4所示,为本说明书基于区块链的侵权检测装置所在设备的一种硬件结构图,除了图4所示的处理器、网络接口、内存以及非易失性存储器之外,实施例中装置所在的设备通常根据基于区块链的侵权检测实际功能,还可以包括其他硬件,对此不再赘述。Corresponding to the aforementioned embodiment of the blockchain-based infringement detection method, this specification also provides an embodiment of a blockchain-based infringement detection device. The device embodiments can be implemented by software, or by hardware or a combination of software and hardware. Taking software implementation as an example, as a device in a logical sense, it is formed by reading the corresponding computer business program instructions in the non-volatile memory into the memory for operation through the processor of the device where it is located. From the hardware level, as shown in Figure 4, it is a hardware structure diagram of the device where the blockchain-based infringement detection device in this manual is located, except for the processor, network interface, memory and non-volatile In addition to the memory, the device where the device in the embodiment is usually based on the actual function of the blockchain-based infringement detection may also include other hardware, which will not be repeated here.
请参见图5,为本说明书一实施例提供的基于区块链的侵权检测装置的模块图,所述装置对应了图2所示实施例,所述装置包括:显著性检测单元510,对待检测图像进行显著性检测,得到至少一个局部子图像;特征提取单元520,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;侵权检测单元530,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。Please refer to Figure 5, which is a block diagram of a block chain-based infringement detection device provided by an embodiment of this specification. The device corresponds to the embodiment shown in Figure 2. The device includes: a significant detection unit 510, to be detected The image is subjected to saliency detection to obtain at least one local sub-image; the feature extraction unit 520 extracts local features from the at least one local sub-image, and constructs a local feature vector based on the local features; the infringement detection unit 530 extracts the local The feature vector and the original feature vector stored in the block chain are used for infringement detection to determine the infringement detection result; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image.
可选的,所述侵权检测单元530中,所述将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,包括:调用发布于区块链的智能合约中声明的侵权检测逻辑,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测。Optionally, in the infringement detection unit 530, the infringement detection of the local feature vector and the original feature vector stored in the block chain includes: calling the infringement statement declared in the smart contract published in the block chain The detection logic performs infringement detection on the local feature vector and the original feature vector stored in the blockchain.
可选的,所述侵权检测单元530中,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,包括:计算子单元,将所述局部特征向量与区块链中存证的原创特征向量进行相似度计算;确定子单元,当存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为侵权。Optionally, in the infringement detection unit 530, performing infringement detection on the local feature vector and the original feature vector stored in the blockchain, including: a calculation subunit, combining the local feature vector with the original feature vector in the blockchain Calculate the similarity of the stored original feature vector; determine the sub-unit, and when the similarity between the local feature vector and the original feature vector is greater than the threshold, determine the infringement detection result as infringement.
可选的,所述计算子单元,包括:对相同原创图像的原创特征向量进行特征聚合, 得到原创特征聚合向量;对局部特征向量进行特征聚合,得到局部特征聚合向量;计算所述局部特征聚合向量和各个原创特征聚合向量的相似度;确定相似度大于阈值的原创特征聚合向量。Optionally, the calculation subunit includes: performing feature aggregation on original feature vectors of the same original image to obtain an original feature aggregation vector; performing feature aggregation on local feature vectors to obtain a local feature aggregation vector; calculating the local feature aggregation The similarity between the vector and each original feature aggregation vector; determine the original feature aggregation vector whose similarity is greater than a threshold.
可选的,所述装置还包括:存证子单元,在侵权检测结果为侵权时,将侵权信息存证至区块链;其中,所述侵权信息包括:所述待检测图像和所述原创图像中的侵权区域;其中,所述侵权区域包括相似度大于阈值的局部特征向量对应在所述待检测图像中的局部子图像,相似度大于阈值的原创特征向量对应在所述原创图像中的局部子图像。Optionally, the device further includes: a certificate storage subunit, which stores the infringement information in the block chain when the infringement detection result is infringement; wherein, the infringement information includes: the image to be detected and the original An infringing area in an image; wherein, the infringing area includes a local feature vector whose similarity is greater than a threshold corresponding to a local sub-image in the image to be detected, and an original feature vector whose similarity is greater than a threshold corresponds to a sub-image in the original image local subimage.
可选的,所述装置还包括:存证子单元,当不存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为不侵权;将所述局部子图像的相关信息发布至所述区块链进行存证。Optionally, the device further includes: a certificate storage subunit, when there is no similarity between the local feature vector and the original feature vector greater than the threshold, determine that the infringement detection result is not infringement; publish the relevant information of the partial sub-image To the blockchain for depositing certificates.
可选的,所述局部子图像的相关信息包括:所述局部特征向量,所述局部特征向量与待检测图像的对应关系,所述局部子图像对应在待检测图像中的位置信息。Optionally, the relevant information of the local sub-image includes: the local feature vector, the corresponding relationship between the local feature vector and the image to be detected, and the position information of the local sub-image corresponding to the image to be detected.
请参见图6,为本说明书一实施例提供的基于区块链的侵权检测装置的模块图,所述装置对应了图3所示实施例,所述装置包括:图像接收单元610,接收客户端上传的待检测图像;显著性检测单元620,对待检测图像进行显著性检测,得到至少一个局部子图像;特征提取单元630,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;侵权检测单元640,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;图像存证单元650,在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。Please refer to FIG. 6 , which is a block diagram of a block chain-based infringement detection device provided by an embodiment of this specification. The device corresponds to the embodiment shown in FIG. 3 , and the device includes: an image receiving unit 610, a receiving client The uploaded image to be detected; the saliency detection unit 620, which performs saliency detection on the image to be detected to obtain at least one local sub-image; the feature extraction unit 630, extracts local features from the at least one local sub-image, based on the local features Construct a local feature vector; the infringement detection unit 640 performs infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original feature vector includes a partial sub-image extracted from the original image The local feature vector constructed by the feature; the image certificate storage unit 650, when the infringement detection result is non-infringement, deposit the image to be detected to the block chain.
可选的,所述图像存证单元650,包括:在所述侵权检测结果为未侵权时,将所述待检测图像的局部特征向量、所述局部特征向量与所述待检测图像的对应关系、所述局部子图像对应在所述待检测图像中的位置信息作为原创信息存证到区块链。Optionally, the image storage unit 650 includes: when the infringement detection result is non-infringement, the local feature vector of the image to be detected, the corresponding relationship between the local feature vector and the image to be detected , The local sub-image corresponding to the location information in the image to be detected is stored in the block chain as original information.
可选的,所述装置应用在与所述客户端对应的服务端;其中,所述客户端包括去中心化的客户端,所述服务端包括区块链即服务平台。Optionally, the device is applied to a server corresponding to the client; wherein, the client includes a decentralized client, and the server includes a blockchain-as-a-service platform.
本说明书一实施例提供的基于区块链的侵权检测装置的模块图,所述装置包括:接收单元,接收用于对待检测图像进行侵权检测的调用交易;其中,所述调用交易包括所述待检测图像;确定单元,响应于所述调用交易,调用发布于区块链的智能合约中声明的侵权检测逻辑,确定待检测图像中的局部子图像;其中,所述局部子图像包括所述待检测图像中具有显著性特点的图像区域;提取单元,从所述局部子图像中提取的局部特征向量;检测单元,基于所述局部特征向量与所述区块链中存证的原创特征向量进行侵 权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征向量;存证单元,将侵权检测结果存证至所述区块链。A block diagram of a block chain-based infringement detection device provided by an embodiment of this specification, the device includes: a receiving unit, receiving a calling transaction for performing infringement detection on an image to be detected; wherein, the calling transaction includes the pending Detect the image; the determining unit, in response to the calling transaction, invokes the infringement detection logic declared in the smart contract published in the block chain, and determines the partial sub-image in the image to be detected; wherein, the partial sub-image includes the to-be-determined Detecting an image region with distinctive features in an image; an extraction unit, extracting a local feature vector from the partial sub-image; a detection unit, based on the local feature vector and the original feature vector stored in the block chain Infringement detection; wherein, the original feature vector includes a local feature vector extracted from a local sub-image of the original image; a proof storage unit stores the result of the infringement detection into the block chain.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。The systems, devices, modules, or units described in the above embodiments can be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementing device is a computer, which may take the form of a personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, navigation device, e-mail device, game control device, etc. desktops, tablets, wearables, or any combination of these.
上述装置中各个单元的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。For the implementation process of the functions and effects of each unit in the above device, please refer to the implementation process of the corresponding steps in the above method for details, and will not be repeated here.
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本说明书方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。As for the device embodiment, since it basically corresponds to the method embodiment, for related parts, please refer to the part description of the method embodiment. The device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in One place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. It can be understood and implemented by those skilled in the art without creative effort.
本说明书还提供了一种电子设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行上述任一项基于区块链的侵权检测方法。This specification also provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein, the processor is configured to execute any one of the above blockchain-based infringement detection methods.
在上述电子设备的实施例中,应理解,该处理器可以是中央处理单元(英文:Central Processing Unit,简称:CPU),还可以是其他通用处理器、数字信号处理器(英文:Digital Signal Processor,简称:DSP)、专用集成电路(英文:Application Specific Integrated Circuit,简称:ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,而前述的存储器可以是只读存储器(英文:read-only memory,缩写:ROM)、随机存取存储器(英文:random access memory,简称:RAM)、快闪存储器、硬盘或者固态硬盘。结合本发明实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the embodiment of the above-mentioned electronic device, it should be understood that the processor may be a central processing unit (English: Central Processing Unit, referred to as: CPU), and may also be other general-purpose processors, digital signal processors (English: Digital Signal Processor , referred to as: DSP), application specific integrated circuit (English: Application Specific Integrated Circuit, referred to as: ASIC) and so on. The general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc., and the aforementioned memory can be a read-only memory (English: read-only memory, abbreviated: ROM), random access memory (English: : random access memory, referred to as: RAM), flash memory, hard disk or solid state disk. The steps of the methods disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于电子设备实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the electronic device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本说明书的其它实施方案。本说明书旨在涵盖本说明书的任何变型、用途或者适应性变化,这些变型、 用途或者适应性变化遵循本说明书的一般性原理并包括本说明书未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本说明书的真正范围和精神由下面的权利要求指出。Other embodiments of the specification will readily occur to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This description is intended to cover any modification, use or adaptation of this description, and these modifications, uses or adaptations follow the general principles of this description and include common knowledge or conventional technical means in the technical field not disclosed in this description . The specification and examples are to be considered exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
应当理解的是,本说明书并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本说明书的范围仅由所附的权利要求来限制。It should be understood that this specification is not limited to the precise constructions which have been described above and shown in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the specification is limited only by the appended claims.

Claims (13)

  1. 一种基于区块链的侵权检测方法,所述方法包括:A blockchain-based infringement detection method, the method comprising:
    对待检测图像进行显著性检测,得到至少一个局部子图像;performing saliency detection on the image to be detected to obtain at least one local sub-image;
    从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features;
    将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。Perform infringement detection on the local feature vector and the original feature vector stored in the block chain to determine the infringement detection result; wherein the original feature vector includes a local feature constructed from local sub-images of the original image. Feature vector.
  2. 根据权利要求1所述的方法,所述将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,包括:According to the method according to claim 1, the infringement detection of the local feature vector and the original feature vector stored in the block chain includes:
    调用发布于区块链的智能合约中声明的侵权检测逻辑,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测。Invoke the infringement detection logic declared in the smart contract published in the blockchain, and perform infringement detection on the local feature vector and the original feature vector stored in the blockchain.
  3. 根据权利要求1或2所述的方法,所述将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,包括:According to the method according to claim 1 or 2, said performing infringement detection on said local feature vector and the original feature vector stored in the block chain, comprising:
    将所述局部特征向量与区块链中存证的原创特征向量进行相似度计算;Computing the similarity between the local feature vector and the original feature vector stored in the blockchain;
    当存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为侵权。When the similarity between the local feature vector and the original feature vector is greater than a threshold, it is determined that the infringement detection result is infringement.
  4. 根据权利要求3所述的方法,所述方法还包括:The method of claim 3, further comprising:
    对相同原创图像的原创特征向量进行特征聚合,得到原创特征聚合向量;Perform feature aggregation on the original feature vectors of the same original image to obtain the original feature aggregation vector;
    对局部特征向量进行特征聚合,得到局部特征聚合向量;Perform feature aggregation on local feature vectors to obtain local feature aggregation vectors;
    计算所述局部特征聚合向量和各个原创特征聚合向量的相似度;Calculating the similarity between the local feature aggregation vector and each original feature aggregation vector;
    确定相似度大于阈值的原创特征聚合向量。Determine the original feature aggregation vectors whose similarity is greater than a threshold.
  5. 根据权利要求3所述的方法,所述方法还包括:The method of claim 3, further comprising:
    在侵权检测结果为侵权时,将侵权信息存证至区块链;其中,所述侵权信息包括:When the infringement detection result is an infringement, the infringement information is stored in the block chain; wherein, the infringement information includes:
    所述待检测图像和所述原创图像中的侵权区域;其中,所述侵权区域包括相似度大于阈值的局部特征向量对应在所述待检测图像中的局部子图像,相似度大于阈值的原创特征向量对应在所述原创图像中的局部子图像。The image to be detected and the infringing area in the original image; wherein, the infringing area includes a local feature vector whose similarity is greater than a threshold corresponding to a local sub-image in the image to be detected, and an original feature whose similarity is greater than a threshold The vectors correspond to local sub-images in the original image.
  6. 根据权利要求3所述的方法,所述方法还包括:The method of claim 3, further comprising:
    当不存在局部特征向量与原创特征向量的相似度大于阈值时,确定侵权检测结果为不侵权;When there is no similarity between the local feature vector and the original feature vector greater than the threshold, it is determined that the infringement detection result is non-infringement;
    将所述局部子图像的相关信息发布至所述区块链进行存证。Publish the relevant information of the partial sub-image to the block chain for certificate deposit.
  7. 根据权利要求6所述的方法,所述局部子图像的相关信息包括:According to the method according to claim 6, the relevant information of the partial sub-image comprises:
    所述局部特征向量,所述局部特征向量与待检测图像的对应关系,所述局部子图像对应在待检测图像中的位置信息。The local feature vector, the corresponding relationship between the local feature vector and the image to be detected, and the local sub-image corresponds to position information in the image to be detected.
  8. 一种基于区块链的侵权检测方法,所述方法包括:A blockchain-based infringement detection method, the method comprising:
    接收客户端上传的待检测图像;Receive the image to be detected uploaded by the client;
    对待检测图像进行显著性检测,得到至少一个局部子图像;performing saliency detection on the image to be detected to obtain at least one local sub-image;
    从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features;
    将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;performing infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image;
    在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。When the infringement detection result is non-infringement, the image to be detected is stored in the block chain.
  9. 根据权利要求8所述的方法,所述在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链,包括:According to the method according to claim 8, when the infringement detection result is non-infringement, storing the image to be detected in the block chain includes:
    在所述侵权检测结果为未侵权时,将所述待检测图像的局部特征向量、所述局部特征向量与所述待检测图像的对应关系、所述局部子图像对应在所述待检测图像中的位置信息作为原创信息存证到区块链。When the infringement detection result is non-infringement, corresponding the local feature vector of the image to be detected, the corresponding relationship between the local feature vector and the image to be detected, and the local sub-image in the image to be detected The location information is stored in the blockchain as original information.
  10. 根据权利要求8所述的方法,应用在与所述客户端对应的服务端;其中,所述客户端包括去中心化的客户端,所述服务端包括区块链即服务平台。The method according to claim 8, which is applied on a server corresponding to the client; wherein the client includes a decentralized client, and the server includes a blockchain-as-a-service platform.
  11. 一种基于区块链的侵权检测装置,所述装置包括:A blockchain-based infringement detection device, said device comprising:
    显著性检测单元,对待检测图像进行显著性检测,得到至少一个局部子图像;A saliency detection unit is configured to perform saliency detection on the image to be detected to obtain at least one local sub-image;
    特征提取单元,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;a feature extraction unit, extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features;
    侵权检测单元,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测,以确定侵权检测结果;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量。The infringement detection unit performs infringement detection on the local feature vector and the original feature vector stored in the block chain to determine the infringement detection result; wherein, the original feature vector includes the partial sub-image extracted from the original image Local feature vectors for feature construction.
  12. 一种基于区块链的侵权检测装置,所述装置包括:A blockchain-based infringement detection device, said device comprising:
    图像接收单元,接收客户端上传的待检测图像;The image receiving unit receives the image to be detected uploaded by the client;
    显著性检测单元,对待检测图像进行显著性检测,得到至少一个局部子图像;A saliency detection unit is configured to perform saliency detection on the image to be detected to obtain at least one local sub-image;
    特征提取单元,从所述至少一个局部子图像中提取局部特征,基于所述局部特征构建局部特征向量;a feature extraction unit, extracting local features from the at least one local sub-image, and constructing a local feature vector based on the local features;
    侵权检测单元,将所述局部特征向量与区块链中存证的原创特征向量进行侵权检测;其中,所述原创特征向量包括从原创图像的局部子图像中提取的局部特征构建的局部特征向量;The infringement detection unit performs infringement detection on the local feature vector and the original feature vector stored in the block chain; wherein, the original feature vector includes a local feature vector constructed from local features extracted from local sub-images of the original image ;
    图像存证单元,在所述侵权检测结果为未侵权时,将所述待检测图像存证至区块链。The image certificate storage unit stores the image to be detected in the block chain when the infringement detection result is non-infringement.
  13. 一种电子设备,包括:An electronic device comprising:
    处理器;processor;
    用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;
    其中,所述处理器被配置为执行上述权利要求1-10中任一项所述的方法。Wherein, the processor is configured to execute the method described in any one of claims 1-10 above.
PCT/CN2022/107797 2021-09-23 2022-07-26 Blockchain-based infringement detection WO2023045534A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111113227.3A CN113763211A (en) 2021-09-23 2021-09-23 Infringement detection method and device based on block chain and electronic equipment
CN202111113227.3 2021-09-23

Publications (1)

Publication Number Publication Date
WO2023045534A1 true WO2023045534A1 (en) 2023-03-30

Family

ID=78796951

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107797 WO2023045534A1 (en) 2021-09-23 2022-07-26 Blockchain-based infringement detection

Country Status (2)

Country Link
CN (1) CN113763211A (en)
WO (1) WO2023045534A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113763211A (en) * 2021-09-23 2021-12-07 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN114492373A (en) * 2022-04-07 2022-05-13 中国信息通信研究院 Method and device for judging infringement of works based on block chain
CN115495712B (en) * 2022-09-28 2024-04-16 支付宝(杭州)信息技术有限公司 Digital work processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239565A (en) * 2017-06-14 2017-10-10 电子科技大学 A kind of image search method based on salient region
US20180032837A1 (en) * 2015-04-20 2018-02-01 Hitachi Ltd. Object Detection Method and Image Search System
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN113763211A (en) * 2021-09-23 2021-12-07 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376052B (en) * 2014-11-03 2017-07-14 杭州淘淘搜科技有限公司 A kind of same money commodity merging method based on commodity image
CN110110500B (en) * 2019-06-04 2023-04-07 施建锋 Decentralized image copyright protection system and method with immediate infringement detection function
CN110765291A (en) * 2019-10-28 2020-02-07 广东三维家信息科技有限公司 Retrieval method and device and electronic equipment
CN110851608A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
CN111737522B (en) * 2020-08-14 2021-03-02 支付宝(杭州)信息技术有限公司 Video matching method, and block chain-based infringement evidence-saving method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180032837A1 (en) * 2015-04-20 2018-02-01 Hitachi Ltd. Object Detection Method and Image Search System
CN107239565A (en) * 2017-06-14 2017-10-10 电子科技大学 A kind of image search method based on salient region
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN112650978A (en) * 2020-08-14 2021-04-13 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN113763211A (en) * 2021-09-23 2021-12-07 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment

Also Published As

Publication number Publication date
CN113763211A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
US10795992B2 (en) Self-adaptive application programming interface level security monitoring
WO2023045534A1 (en) Blockchain-based infringement detection
CN113711536B (en) Extracting data from a blockchain network
Van Steen et al. A brief introduction to distributed systems
CN106341381B (en) Manage the method and system of the safe golden key of frame server system
US8661103B2 (en) Business application address determination
US9578502B2 (en) Device authentication using inter-person message metadata
US10891282B1 (en) Mutations with immediate feedback
US10891569B1 (en) Dynamic task discovery for workflow tasks
TWI676111B (en) Method and device for starting business process
US11916936B2 (en) Techniques for incentivized intrusion detection system
US11159634B1 (en) Subscription fan out
WO2020108152A1 (en) Method, device and electronic equipment for preventing misuse of identity data
US11089133B1 (en) Synchronizing data with delayed subscriptions
US11038803B2 (en) Correlating network level and application level traffic
Fernando Blockchain technology implementation in raspberry pi for private network
US20150221043A1 (en) Method and system for providing global ready financial applications
US20180082060A1 (en) System Call Vectorization
Mthunzi et al. Cloudlet solution for digital forensic investigation of multiple cases of multiple devices
US11743327B2 (en) Topological ordering of blockchain associated proposals
US20230105375A1 (en) Scalable messaging framework for providing machine learning services across multiple availability zones
US20240107344A1 (en) Systems and methods for autonomous program signature generation
EP4343594A1 (en) Systems and methods for autonomous program classification generation
US20230368259A1 (en) Distributable crowdsourcable commission methods and systems
US20240080210A1 (en) Systems and methods for a digital register of models monitoring changes in accuracy of artificial intelligence models

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22871593

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE