WO2023061082A1 - Image security processing method and apparatus, electronic device, and storage medium - Google Patents

Image security processing method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
WO2023061082A1
WO2023061082A1 PCT/CN2022/116227 CN2022116227W WO2023061082A1 WO 2023061082 A1 WO2023061082 A1 WO 2023061082A1 CN 2022116227 W CN2022116227 W CN 2022116227W WO 2023061082 A1 WO2023061082 A1 WO 2023061082A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
geographic
security level
security
target
Prior art date
Application number
PCT/CN2022/116227
Other languages
French (fr)
Chinese (zh)
Inventor
陈斌
王国利
张骞
黄畅
Original Assignee
北京地平线信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京地平线信息技术有限公司 filed Critical 北京地平线信息技术有限公司
Publication of WO2023061082A1 publication Critical patent/WO2023061082A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Definitions

  • the present disclosure relates to image processing technology, in particular to an image security processing method and device, electronic equipment and a storage medium.
  • Image security is one of the important areas of information security. Image acquisition using image acquisition equipment is widely used in all aspects of society, such as driving, mobile phones, monitoring, Internet of Things and so on. Since the collected images may involve personal privacy and national security, it is often necessary to perform image security processing on the collected images, such as coding faces, coding license plates, and coding sensitive objects related to national security.
  • Embodiments of the present disclosure provide an image security processing method and device, electronic equipment, and a storage medium.
  • an image security processing method including:
  • an image security processing device including:
  • the first determining module is used to determine the geographic location when the image sensor collects the image to be processed
  • the second determination module is used to determine the geographic security level corresponding to the geographic location
  • a third determination module configured to determine the target object in the image to be processed based on the geographic security level
  • a processing module configured to perform privacy protection processing on the image region where the target object is located.
  • a computer-readable storage medium stores a computer program, and the computer program is used to execute the image security processing method described in any of the above-mentioned embodiments of the present disclosure.
  • an electronic device includes:
  • the processor is configured to execute the image security processing method described in any one of the above-mentioned embodiments of the present disclosure.
  • the geographic security level corresponding to the geographic location when the image sensor collects the image to be processed is determined to be processed.
  • the target object in the image and perform privacy protection processing on the image area where the target object is located, realize the privacy protection processing of the corresponding target object based on the security protection requirements of different geographical locations, and realize the corresponding security protection; at the same time, it can avoid Privacy protection processing of non-essential objects consumes computing resources.
  • Fig. 1 is a schematic flowchart of an image security processing method provided by an exemplary embodiment of the present disclosure.
  • Fig. 2 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure.
  • Fig. 3 is a schematic flowchart of an image security processing method provided by yet another exemplary embodiment of the present disclosure.
  • Fig. 4 is a schematic flowchart of an image security processing method provided by yet another exemplary embodiment of the present disclosure.
  • Fig. 5 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure.
  • Fig. 6 is a schematic structural diagram of an image security processing device provided by an exemplary embodiment of the present disclosure.
  • Fig. 7 is a schematic structural diagram of an image security processing device provided by another exemplary embodiment of the present disclosure.
  • Fig. 8 is a schematic structural diagram of an image security processing device provided by yet another exemplary embodiment of the present disclosure.
  • Fig. 9 is a structural diagram of an electronic device provided by an exemplary embodiment of the present disclosure.
  • the embodiments of the present disclosure can be applied to any first electronic device with a camera function, such as an imaging device such as a monitoring camera, or can also be applied to a terminal device, a computer system, a server, etc. that communicate with the first electronic device with a camera function.
  • a camera function such as an imaging device such as a monitoring camera
  • Two electronic devices, the first electronic device with camera function sends the original image data collected by the image sensor and the geographic location when collecting the original image data to the second electronic device, and the second electronic device returns to the first electronic device after security processing , the second electronic device is operable with numerous other general purpose or special purpose computing system environments or configurations.
  • a first electronic device and a second electronic device such as a terminal device, a computer system, a server, etc. may be described in the general context of computer system executable instructions (such as program modules) executed by the computer system.
  • program modules may include routines, programs, objects, components, logic, data structures, etc., that perform particular tasks or implement particular abstract data types.
  • the computer system/server can be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computing system storage media including storage devices.
  • Embodiments of the present disclosure may be applicable to a vehicle monitoring system
  • the vehicle monitoring system may include a camera device and a server
  • the camera device communicates with the server, and transmits the captured monitoring images to the server for storage and other processing
  • the camera device is set outside the vehicle for preset Position
  • the preset position is determined according to the scene information that can capture the geographic location of the vehicle.
  • the camera device can first determine the geographic location when the image sensor collects the image to be processed, then determine the geographic security level corresponding to the geographic location, and determine the location to be processed based on the geographic security level.
  • the target object in the image and then perform privacy and security protection processing on the image area where the target object is located.
  • the image security processing of the image to be processed can be realized by adding an image security processing unit between the image sensor and the image signal processor (Image Signal Processing, referred to as: ISP), and the image security processing unit can use a GPU (graphics processing unit, graphics processor) or AI (Artificial Intelligence, artificial intelligence) chip; in addition, the image security processing of the image to be processed can also be implemented by the ISP, which can be set according to actual needs, which is not limited in this disclosure.
  • the image security processing of the image to be processed can also be realized by a second electronic device other than the camera device, and by communicating with the camera device, the image to be processed collected by the image sensor of the camera device is transmitted to the second electronic device. The second electronic device returns to the camera device after image security processing.
  • Fig. 1 is a schematic flowchart of an image security processing method provided by an exemplary embodiment of the present disclosure. This embodiment can be applied to electronic equipment, as shown in Figure 1, including the following steps:
  • Step 101 determine the geographic location when the image sensor captures the image to be processed.
  • the image to be processed may be a scene image of the current geographic location collected by the image sensor.
  • the image to be processed may be a scene image of the geographic location of the vehicle collected by the camera outside the vehicle during assisted driving or automatic driving of the vehicle.
  • the scene image of the geographic location of the vehicle may include any object captured by the camera outside the vehicle, for example, a license plate, a human face, a building, a road facility, etc., which are not limited in this embodiment of the present disclosure.
  • the image to be processed may be an unprocessed original image (also referred to as raw data) collected by an image sensor.
  • the unprocessed original image is specifically an unprocessed image obtained by converting the light source signal captured by the image sensor into a digital signal.
  • the image to be processed may be an unprocessed original scene image of the geographic location of the vehicle collected by the camera outside the vehicle during assisted driving or automatic driving.
  • the geographic location when the image sensor collects the image to be processed may be determined by a positioning device, and may be represented by latitude and longitude coordinates.
  • the positioning device can be set in the device where the image sensor is located, or can also be set near the device where the image sensor is located, so as to ensure that the geographic location determined by the positioning device is consistent with the geographic location when the image sensor collects the image to be processed.
  • the positioning device may be any one of positioning devices such as a Beidou positioning device and a GPS positioning device, which is not limited in this embodiment of the present disclosure.
  • Step 102 determine the geographic security level corresponding to the geographic location.
  • the geographic security level may be used to identify the level of geographic information security requirements of the geographic location, and the geographic security level of the geographic location may be determined according to the geographic information security requirements of the geographic location. Specifically, a higher geographic security level may be determined for a geographic location with a higher geographic information security requirement; a lower geographic security level may be determined for a geographic location with a lower geographic information security requirement. It should be noted that geographic information security specifically refers to the protection of hardware, software, and data in systems involved in the collection, processing, storage, processing, transmission, service, and application of geographic information.
  • the geographical security level of the geographical location can be determined as High level; if the geographical location of the image to be processed collected by the camera outside the vehicle is a semi-public place, and the geographical information security requirements of the semi-public place are medium, the geographic security level of the geographical location can be determined as a medium level; if the camera outside the vehicle collects the image to be processed The geographical location of the image is a public place, and the geographical information security requirements of the public place are low, and the geographical security level of the geographical location can be determined as a low level.
  • the geographic security level may include more than two levels.
  • the two or more levels may include: geographic security level one, geographic security level two, and geographic security level three.
  • two or more levels It may also include: geographic security level A, geographic security level B, and geographic security level C, which are not limited in this embodiment of the present disclosure.
  • any one or more of symbols such as Roman numerals, lowercase Arabic numerals, uppercase Arabic numerals, Chinese numerals, lowercase English letters, and uppercase English letters can be used to name different geographic security levels to distinguish between different geographical locations.
  • Security level the embodiment of the present disclosure does not limit the naming manner of the geographic security level.
  • Step 103 determine the target object in the image to be processed based on the geographic security level.
  • the image sensor when the image sensor collects images to be processed, it is easy to collect images of objects (also referred to as sensitive objects) in the current geographic location that do not want to be known to the public.
  • the target object in the image to be processed is a sensitive object that needs privacy protection processing in the image to be processed.
  • sensitive objects may include, but are not limited to, license plates, human faces, buildings, and road facilities.
  • sensitive object types corresponding to each geographic security level may be preset, and the sensitive object types corresponding to each geographic security level may be partly the same or completely different.
  • the sensitive object type corresponding to geo-security level 1 as building, the sensitive object type corresponding to geo-security level 2 as license plate, and the sensitive object type corresponding to geo-security level 3 as face.
  • the types of sensitive objects corresponding to the first level of geographic security may be buildings and road facilities
  • the types of sensitive objects corresponding to the second level of geographic security may be license plates and buildings
  • the types of sensitive objects corresponding to the third level of geographic security may be license plates and faces.
  • the level of each geographic security level can be distinguished according to preset rules.
  • the default rule may be that the smaller the Arabic numeral contained in the name of the geographical security level, the higher the geographical security level, or that the larger the Arabic number contained in the name of the geographical security level, the higher the geographical security level. It may also be that the lower the English letters contained in the naming of the geographical security level, the higher the geographical security level, or the earlier the English letters contained in the naming of the geographical security level, the higher the geographical security level. It should be noted that using the size of the Arabic numerals contained in the naming of the geographic security level, or the order of the English letters can simply and effectively distinguish different geographic security levels, but it is not limited to this.
  • a higher geographic security level may correspond to a greater number of sensitive object types, and a lower geographic security level may correspond to a smaller number of sensitive object types. It should be noted that, the embodiment of the present disclosure does not limit the specific number of sensitive object types corresponding to each geographic security level.
  • each geographic security level may include three levels: geographic security level A, geographic security level B, and geographic security level C.
  • the sensitive object types corresponding to the geographic security level C can be license plates, faces, buildings, and road facilities.
  • the types of sensitive objects corresponding to geo-security level B are license plates, faces, and buildings
  • the sensitive types corresponding to geo-security level A are license plates and faces.
  • a higher geographic security level can correspond to more sensitive object types, and a lower geographic security level can correspond to fewer sensitive object types.
  • a higher geographic security level can be determined through a preset threshold.
  • Security level and lower geographic security level for example, a level higher than or equal to a preset threshold may be considered a higher geographic security level in this disclosure, and a level lower than a preset threshold may be considered a lower geographic security level grade. It should be noted that, the embodiment of the present disclosure does not limit the specific number of sensitive object types corresponding to each geographical security level.
  • each geographic security level may include four levels of geographic security level A, geographic security level B, geographic security level C, and geographic security level D, among which the level of geographic security level A is the lowest, and the level of geographic security level D is the highest.
  • the preset threshold can be set as C level, so that it can be determined that geographic security level A and geographic security level B are lower geographic security levels, and geographic security level C and geographic security level D are higher geographic security levels, and then can be
  • the types of sensitive objects corresponding to higher geographic security levels are license plates, faces, buildings, and road facilities, etc., and the types of sensitive objects corresponding to lower geographic security levels are license plates and faces.
  • the sensitive object types corresponding to the geographic security levels determined in step 102 can be obtained according to the preset correspondence between each geographic security level and the sensitive object type, and the type identified from the image to be processed can be compared with the sensitive object type Image objects of the same type as target objects in the image to be processed.
  • Step 104 performing privacy protection processing on the image area where the target object is located.
  • step 103 since step 103 has acquired the target object that needs to be processed for privacy protection in the image to be processed, the image data in the image area where the target object is located can be processed for privacy protection, for example, by means of image occlusion or image blurring Perform privacy protection processing to ensure the security of sensitive data in the image to be processed.
  • the target object in the image to be processed is determined based on the geographic security level corresponding to the geographic location when the image sensor collects the image to be processed, and the image area where the target object is located is determined.
  • Privacy protection processing realizes the privacy protection processing of corresponding target objects based on the security protection requirements of different geographical locations to achieve corresponding security protection; at the same time, it can avoid the consumption of computing resources for privacy protection processing of unnecessary objects.
  • FIG. 2 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in FIG. 2 , on the basis of the above-mentioned embodiment shown in FIG. 1 , step 102 may include the following steps:
  • Step 102-1 acquiring a target geographic location for geographic location matching from preset geographic location matching information.
  • the preset geographic location matching information may be stored in the form of a database or a data table, and the preset geographic location matching information may include at least one preset geographic location, and each preset geographic location in the at least one preset geographic location The location area range corresponding to the location.
  • the geographic location of the image sensor determined in the above step 101 when the image to be processed is collected can be compared with each preset geographic location in the preset geographic location matching information and the location area range corresponding to each preset geographic location. Compare to obtain the target geographic location that the geographic location matches.
  • the target geographic location matched by the geographic location may be any preset geographic location that is the same as the geographic location, or may also be a preset geographic location corresponding to any location area that includes the geographic location.
  • Step 102-2 obtaining the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from the preset geographic security matching information.
  • the preset geographic security matching information may be stored in the form of a database or a data table, and the preset geographic security matching information may include: the geographic security level corresponding to each preset geographic location, and the geographic security level corresponding to each geographic security level. object type.
  • the object types in the preset geographic security matching information may include any one or more of the following: license plate, human face, building, and road facilities.
  • the target geographic location determined in step 102-2 can be compared with each preset geographic location in the preset geographic security matching information, and the geographic location corresponding to the preset geographic location that is the same as the target geographic location can be obtained.
  • the security level is used as the target geographic security level corresponding to the target geographic location.
  • the geographic location when determining the geographic security level corresponding to the geographic location, the geographic location can be quickly found by comparing the geographic location with the preset geographic location matching information and the preset geographic security matching information.
  • the geographic security level corresponding to the geographic location and the target object type corresponding to the geographic security level help to reduce the time consumption of image security processing and improve the efficiency of image security processing.
  • Fig. 3 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in Fig. 3 , on the basis of the embodiment shown in Fig. 2 above, step 103 may include the following steps:
  • Step 103-1a performing semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
  • Step 103-2a performing semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
  • the first pre-trained image semantic analysis model can be used to perform semantic segmentation and semantic recognition on the image to be processed.
  • the semantic segmentation can obtain at least one region of interest in the image to be processed, and the region of interest is the There may be an image area of an object of interest in the image.
  • Semantic recognition can determine the type of each pixel in the area of interest. Based on each pixel in the area of interest and the type of each pixel, the object of interest in the area of interest (including pixels belonging to the object of interest) and the type of the object of interest.
  • Types of objects of interest may include, but are not limited to, license plates, human faces, buildings, and road facilities.
  • the first pre-trained image semantic analysis model can be obtained in the following manner:
  • Construct the first initial image semantic analysis model obtain a plurality of image samples from the training sample set; use the plurality of image samples as input respectively, provide the first initial image semantic analysis model, and use the first initial image semantic analysis model to
  • the input image samples are respectively subjected to semantic segmentation and semantic recognition, and according to the output of the first initial image semantic analysis model, at least one object of interest of each predicted image sample is obtained; according to at least one object of interest of each predicted image sample
  • the object and the object of interest annotation information of each image sample are used to adjust the model parameters of the first initial image semantic analysis model.
  • the first initial image semantic analysis model may be a convolutional neural network model or a fully convolutional neural network model.
  • Step 103-3a based on the object type corresponding to the geographic security level, determine the target object from at least one object of interest.
  • At least one object of interest in the image to be processed has been determined through step 103-2a, the type of each object of interest is compared with the object type corresponding to the geographic security level, and the type and geographic security level are selected from at least one interested object Objects of interest corresponding to the same object type are used as target objects.
  • the pre-trained image semantic analysis model through the pre-trained image semantic analysis model, at least one object of interest in the image to be processed can be quickly and accurately identified, so that the target that needs privacy protection processing in the image to be processed can be quickly and accurately determined Objects that help improve the efficiency and accuracy of image security processing.
  • the hierarchical security processing of the image to be processed according to the geographic security level is helpful to improve the flexibility of image security processing compared with the existing method of uniform security processing for all collected images.
  • FIG. 4 is a schematic flowchart of a method for image security processing provided by another exemplary embodiment of the present disclosure. As shown in FIG. 4 , on the basis of the above-mentioned embodiment shown in FIG. 2 , step 102-2 may include the following steps:
  • Step 102-2a obtaining the target geographic security level corresponding to the target geographic location from preset geographic security matching information.
  • the preset geographic security matching information can be stored in the form of a database or a data table, and the preset geographic security matching information can include: the geographic security level corresponding to each preset geographic location, and the objects corresponding to each geographic security level type and the object classes included in the corresponding object type.
  • the object types in the geographic security matching information include any one or more of the following: license plates, faces, buildings, and road facilities.
  • an object category is a further subdivision of an object type, and an object type can be further subdivided into more than one object category.
  • the object type "license plate” may include three object categories “military license plate”, “civilian license plate” and “police license plate”, and the object type "human face” may include two object categories “eyes” and “face”.
  • the object type "building” may include an object category “building”
  • the object type "road facilities” may include two object categories "traffic light” and "road sign”. It should be noted that the object type subdivision method and subdivision quantity disclosed in the embodiment of the present disclosure are not limited, and those skilled in the art can determine the object type subdivision method and subdivision quantity according to actual needs.
  • the target geographic location determined in step 102-2 can be compared with each preset geographic location in the preset geographic security matching information, and the geographic location corresponding to the preset geographic location that is the same as the target geographic location can be obtained.
  • the security level is used as the target geographic security level corresponding to the target geographic location.
  • step 102-2b the target object type corresponding to the target geographic security level and the object categories included in the target object type are obtained from the preset geographic security matching information.
  • step 102-2a Compare the target geographic security level corresponding to the target geographic location determined in step 102-2a with the geographic security levels in the preset geographic security matching information, and obtain the object type corresponding to the same geographic security level as the target geographic security level as The target object type, and obtain each object category included in the target object type.
  • the accuracy of distinguishing the target objects requiring privacy protection processing in the image to be processed can be improved, thereby helping to improve the accuracy of image security processing.
  • Fig. 5 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in Fig. 5 , on the basis of the embodiment shown in Fig. 4 above, step 103 may include the following steps:
  • Step 103-1b performing semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
  • Step 103-2b performing semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
  • the second pre-trained image semantic analysis model can be used to perform semantic segmentation and semantic recognition on the image to be processed.
  • the semantic segmentation can obtain at least one region of interest in the image to be processed, and the region of interest is the There may be an image area of an object of interest in the image.
  • Semantic recognition can determine the category to which each pixel in the area of interest belongs. Based on each pixel in the area of interest and the category to which each pixel belongs, the object of interest in the area of interest (including pixels belonging to the object of interest) and the category of the object of interest.
  • the category of the object of interest is a subdivision of the type of the object of interest, and the subdivision manner of the type of the object in the region of interest is the same as the subdivision manner of the above object type.
  • the second pre-trained image semantic analysis model can be obtained in the following manner: constructing the second initial image semantic analysis model; obtaining multiple image samples from the training sample set; using the multiple image samples as The input is provided to the second initial image semantic analysis model, and the input image samples are respectively subjected to semantic segmentation and semantic recognition through the second initial image semantic analysis model, and each predicted image is obtained according to the output of the second initial image semantic analysis model. At least one object of interest in the image sample; adjust the model parameters of the second initial image semantic analysis model according to the predicted at least one object of interest in each image sample and the annotation information of the object of interest in each image sample.
  • the second initial image semantic analysis model may be a convolutional neural network model or a fully convolutional neural network model.
  • Step 103-3b based on the object type corresponding to the geographic security level and the object categories included in the corresponding object type, determine the target object from at least one object of interest.
  • At least one object of interest in the image to be processed has been determined via step 103-2b, and the category of each object of interest is compared with the object categories included in the object type corresponding to the geographic security level, and selected from at least one object of interest An object of interest whose category is the same as any object category in each object category is used as a target object.
  • the accuracy of distinguishing the target objects requiring privacy protection processing in the image to be processed can be improved, thereby helping to improve the accuracy of image security processing.
  • the above step 104 may include: according to the mask image corresponding to the image to be processed, performing occlusion processing on pixels in the image area where the target object is located in the image to be processed to obtain target image data.
  • a mask image having the same size as the image to be processed is provided, and the image area requiring privacy protection processing is marked by the mask image.
  • a mark (for example, a value of 1) is set in the image area corresponding to the target object in the image to be processed that requires privacy protection processing, so that when the privacy protection processing is performed in the subsequent steps, it can be According to whether there is a mark in the image block of the mask image, it is determined whether to perform occlusion processing on the pixel points in the corresponding image block of the image to be processed.
  • the mask image can be used to mark the image area where the target object in the image to be processed needs to be processed for privacy protection, which can facilitate subsequent steps to accurately perform privacy protection processing on the image to be processed, and can effectively protect the image to be processed Privacy data security in.
  • Any image security processing method provided in the embodiments of the present disclosure may be executed by any appropriate device with data processing capabilities, including but not limited to: terminal devices, servers, and the like.
  • any image security processing method provided in the embodiments of the present disclosure may be executed by a processor, for example, the processor executes any image security processing method mentioned in the embodiments of the present disclosure by calling a corresponding instruction stored in a memory. I won't go into details below.
  • Fig. 6 is a schematic structural diagram of an image security processing device provided by an exemplary embodiment of the present disclosure.
  • the device of this embodiment can be used to implement the corresponding method embodiment of the present disclosure.
  • the apparatus shown in FIG. 6 includes: a first determining module 201 , a second determining module 202 , a third determining module 203 and a processing module 204 .
  • the first determination module 201 is used to determine the geographic location when the image sensor captures the image to be processed.
  • the second determination module 202 is used to determine the geographic security level corresponding to the geographic location.
  • the third determining module 203 is configured to determine the target object in the image to be processed based on the geographic security level.
  • the processing module 204 is configured to perform privacy protection processing on the image area where the target object is located.
  • Fig. 7 is a schematic structural diagram of an image security processing apparatus provided by another exemplary embodiment of the present disclosure.
  • the second determination module 202 shown in Fig. 7 may include a first obtaining unit 202-1 and a second obtaining unit 202-2.
  • the first acquiring unit 202-1 is configured to acquire a target geographic location matched by the geographic location from preset geographic location matching information.
  • the preset geographic location matching information includes at least one preset geographic location, and a location area range corresponding to each preset geographic location in the at least one preset geographic location.
  • the second acquiring unit 202-2 is configured to acquire the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from preset geographic security matching information.
  • the preset geographic security matching information includes: geographic security levels corresponding to each preset geographic location, and object types corresponding to each geographic security level.
  • the object types in the geographic security matching information include any one or more of the following: license plate, human face, building, and preset equipment.
  • Fig. 8 is a schematic structural diagram of an image security processing device provided by another exemplary embodiment of the present disclosure.
  • the third determination module 203 shown in Fig. 8 may include a first identification unit 203-1, a second identification unit 203-2 and Determining unit 203-3.
  • the first recognition unit 203-1 is configured to perform semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
  • the second recognition unit 203-2 is configured to perform semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
  • the determining unit 203-3 is configured to determine the target object from at least one object of interest based on the object type corresponding to the geographic security level.
  • the second acquiring unit 202-2 is further configured to acquire the target geographic security level corresponding to the target geographic location from the preset geographic security matching information; The target object type of and the object categories included in the target object type.
  • the preset geographic security matching information includes: geographic security levels corresponding to each preset geographic location, object types corresponding to each geographic security level, and object categories included in the corresponding object types.
  • the determining unit 203-3 is further configured to determine the target object from at least one object of interest based on the object type corresponding to the geographic security level and each object category included in the corresponding object type.
  • the processing module 204 is specifically configured to, according to the mask image corresponding to the image to be processed, perform occlusion processing on pixels corresponding to the image area where the target object is located in the image to be processed to obtain target image data.
  • the electronic device includes one or more processors 901 and memory 902 .
  • the processor 901 may be a central processing unit (CPU) or other forms of processing units having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions.
  • CPU central processing unit
  • Memory 902 may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory.
  • the volatile memory may include, for example, random access memory (RAM) and/or cache memory (cache).
  • the non-volatile memory may include, for example, a read-only memory (ROM), a hard disk, a flash memory, and the like.
  • One or more computer program instructions may be stored on the computer-readable storage medium, and the processor 901 may execute the program instructions to implement the above-mentioned image security processing methods and/or other desired features.
  • Various contents such as input signal, signal component, noise component, etc. may also be stored in the computer-readable storage medium.
  • the electronic device may further include: an input device 903 and an output device 904, and these components are interconnected through a bus system and/or other forms of connection mechanisms (not shown).
  • the input device 903 may include, for example, a keyboard, a mouse, and the like.
  • the output device 904 may include, for example, a display, a speaker, a printer, a communication network and remote output devices connected thereto, and the like.
  • the electronic device may also include any other suitable components according to specific applications.
  • embodiments of the present disclosure may also be computer program products, which include computer program instructions that, when executed by a processor, cause the processor to perform the above-mentioned "exemplary method" of this specification. Steps in the image security processing method according to various embodiments of the present disclosure described in the section.
  • the computer program product can be written in any combination of one or more programming languages to execute the program codes for performing the operations of the embodiments of the present disclosure, and the programming languages include object-oriented programming languages, such as Java, C++, etc. , also includes conventional procedural programming languages, such as the "C" language or similar programming languages.
  • the program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server to execute.
  • embodiments of the present disclosure may also be a computer-readable storage medium, on which computer program instructions are stored, and the computer program instructions, when executed by a processor, cause the processor to perform the above-mentioned "Exemplary Method" section of this specification.
  • the methods and apparatus of the present disclosure may be implemented in many ways.
  • the methods and apparatuses of the present disclosure may be implemented by software, hardware, firmware or any combination of software, hardware, and firmware.
  • the above sequence of steps for the method is for illustration only, and the steps of the method of the present disclosure are not limited to the sequence specifically described above unless specifically stated otherwise.
  • each component or each step can be decomposed and/or reassembled. These decompositions and/or recombinations should be considered equivalents of the present disclosure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Molecular Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Evolutionary Computation (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)

Abstract

Disclosed in embodiments of the present disclosure are an image security processing method and apparatus, an electronic device, and a storage medium. The method comprises: determining a geographic position when an image sensor acquires an image to be processed; determining a geographic security level corresponding to the geographic position; determining a target object in said image on the basis of the geographic security level; and performing privacy protection processing on an image area where the target object is located. According to the embodiments of the present disclosure, privacy protection processing can be performed on a corresponding target object on the basis of security protection requirements of different geographic positions, such that corresponding security protection is realized; and meanwhile, consumption of computing resources due to privacy protection processing on unnecessary objects can be avoided.

Description

图像安全处理方法和装置、电子设备和存储介质Image security processing method and device, electronic equipment and storage medium
本公开要求在2021年10月14日提交的、申请号为202111199504.7、发明名称为“图像安全处理方法和装置、电子设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。This disclosure claims the priority of the Chinese patent application with application number 202111199504.7 and titled "Image security processing method and device, electronic equipment and storage medium" filed on October 14, 2021, the entire contents of which are incorporated by reference in In this disclosure.
技术领域technical field
本公开涉及图像处理技术,尤其是一种图像安全处理方法和装置、电子设备和存储介质。The present disclosure relates to image processing technology, in particular to an image security processing method and device, electronic equipment and a storage medium.
背景技术Background technique
图像安全是信息安全的重要领域之一。利用图像采集设备进行图像采集被广泛应用于社会的方方面面,如驾驶、手机、监测、物联网等等。由于采集的图像可能会涉及到个人隐私和国家安全,往往需要对采集后的图像进行图像安全处理,例如对人脸打码,对车牌打码,对涉及国家安全的敏感对象进行打码等。Image security is one of the important areas of information security. Image acquisition using image acquisition equipment is widely used in all aspects of society, such as driving, mobile phones, monitoring, Internet of Things and so on. Since the collected images may involve personal privacy and national security, it is often necessary to perform image security processing on the collected images, such as coding faces, coding license plates, and coding sensitive objects related to national security.
现有的图像安全处理方法通常是对所有采集的图像进行统一的安全处理。Existing image security processing methods usually perform unified security processing on all collected images.
发明内容Contents of the invention
为了解决上述技术问题,提出了本公开。本公开的实施例提供了一种图像安全处理方法和装置、电子设备和存储介质。In order to solve the above-mentioned technical problems, the present disclosure is proposed. Embodiments of the present disclosure provide an image security processing method and device, electronic equipment, and a storage medium.
根据本公开实施例的一个方面,提供了一种图像安全处理方法,包括:According to an aspect of an embodiment of the present disclosure, an image security processing method is provided, including:
确定图像传感器采集待处理图像时的地理位置;Determine the geographic location when the image sensor collects the image to be processed;
确定所述地理位置对应的地理安全等级;determining the geographic security level corresponding to the geographic location;
基于所述地理安全等级确定所述待处理图像中的目标对象;determining a target object in the image to be processed based on the geographic security level;
对所述目标对象所在的图像区域进行隐私安全保护处理。Perform privacy and security protection processing on the image area where the target object is located.
根据本公开实施例的另一个方面,提供了一种图像安全处理装置,包括:According to another aspect of the embodiments of the present disclosure, an image security processing device is provided, including:
第一确定模块,用于确定图像传感器采集待处理图像时的地理位置;The first determining module is used to determine the geographic location when the image sensor collects the image to be processed;
第二确定模块,用于确定所述地理位置对应的地理安全等级;The second determination module is used to determine the geographic security level corresponding to the geographic location;
第三确定模块,用于基于所述地理安全等级确定所述待处理图像中的目标对象;A third determination module, configured to determine the target object in the image to be processed based on the geographic security level;
处理模块,用于对所述目标对象所在的图像区域进行隐私保护处理。A processing module, configured to perform privacy protection processing on the image region where the target object is located.
根据本公开实施例的又一个方面,提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行本公开上述任一实施例所述的图像安全处理方法。According to still another aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, the storage medium stores a computer program, and the computer program is used to execute the image security processing method described in any of the above-mentioned embodiments of the present disclosure. .
根据本公开实施例的再一个方面,提供了一种电子设备,所述电子设备包括:According to still another aspect of the embodiments of the present disclosure, an electronic device is provided, and the electronic device includes:
处理器;processor;
用于存储所述处理器可执行指令的存储器;memory for storing said processor-executable instructions;
所述处理器,用于执行本公开上述任一实施例所述的图像安全处理方法。The processor is configured to execute the image security processing method described in any one of the above-mentioned embodiments of the present disclosure.
基于本公开上述实施例提供的图像安全处理方法和装置、电子设备和存储介质,在对待处理图像进行安全处理时,通过基于图像传感器采集待处理图像时的地理位置对应的地理安全等级确定待处理图像中的目标对象,并对目标对象所在的图像区域进行隐私保护处理,实现了基于不同地理位置的安全保护需求对相应的目标对象进行隐私保护处理,实现相应的安全保护;同时,可以避免对非必要对象进行隐私保护处理消耗计算资源。Based on the image security processing method and device, electronic equipment, and storage medium provided by the above-mentioned embodiments of the present disclosure, when performing security processing on the image to be processed, the geographic security level corresponding to the geographic location when the image sensor collects the image to be processed is determined to be processed. The target object in the image, and perform privacy protection processing on the image area where the target object is located, realize the privacy protection processing of the corresponding target object based on the security protection requirements of different geographical locations, and realize the corresponding security protection; at the same time, it can avoid Privacy protection processing of non-essential objects consumes computing resources.
下面通过附图和实施例,对本公开的技术方案做进一步的详细描述。The technical solution of the present disclosure will be described in further detail below with reference to the drawings and embodiments.
附图说明Description of drawings
通过结合附图对本公开实施例进行更详细的描述,本公开的上述以及其他目的、特征和优势将变得更加明显。附图用来提供对本公开实施例的进一步理解,并且构成说明书的一部分,与本公开实施例一起用于解释本公开,并不构成对本公开的限制。在附图中,相同的参考标号通常代表相同部件或步骤。The above and other objects, features and advantages of the present disclosure will become more apparent by describing the embodiments of the present disclosure in more detail with reference to the accompanying drawings. The accompanying drawings are used to provide a further understanding of the embodiments of the present disclosure, and constitute a part of the specification, and are used together with the embodiments of the present disclosure to explain the present disclosure, and do not constitute limitations to the present disclosure. In the drawings, the same reference numerals generally represent the same components or steps.
图1是本公开一示例性实施例提供的图像安全处理方法的流程示意图。Fig. 1 is a schematic flowchart of an image security processing method provided by an exemplary embodiment of the present disclosure.
图2是本公开另一示例性实施例提供的图像安全处理方法的流程示意图。Fig. 2 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure.
图3是本公开再一示例性实施例提供的图像安全处理方法的流程示意图。Fig. 3 is a schematic flowchart of an image security processing method provided by yet another exemplary embodiment of the present disclosure.
图4是本公开再一示例性实施例提供的图像安全处理方法的流程示意图。Fig. 4 is a schematic flowchart of an image security processing method provided by yet another exemplary embodiment of the present disclosure.
图5是本公开又一示例性实施例提供的图像安全处理方法的流程示意图。Fig. 5 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure.
图6是本公开一示例性实施例提供的图像安全处理装置的结构示意图。Fig. 6 is a schematic structural diagram of an image security processing device provided by an exemplary embodiment of the present disclosure.
图7是本公开另一示例性实施例提供的图像安全处理装置的结构示意图。Fig. 7 is a schematic structural diagram of an image security processing device provided by another exemplary embodiment of the present disclosure.
图8是本公开再一示例性实施例提供的图像安全处理装置的结构示意图。Fig. 8 is a schematic structural diagram of an image security processing device provided by yet another exemplary embodiment of the present disclosure.
图9是本公开一示例性实施例提供的电子设备的结构图。Fig. 9 is a structural diagram of an electronic device provided by an exemplary embodiment of the present disclosure.
具体实施方式Detailed ways
下面,将参考附图详细地描述根据本公开的示例实施例。显然,所描述的实施例仅仅是本公开的一部分实施例,而不是本公开的全部实施例,应理解,本公开不受这里描述的示例实施例的限制。Hereinafter, exemplary embodiments according to the present disclosure will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present disclosure, rather than all the embodiments of the present disclosure, and it should be understood that the present disclosure is not limited by the exemplary embodiments described here.
应注意到:除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对布置、数字表达式和数值不限制本公开的范围。本领域技术人员可以理解,本公开实施例中的“第一”、“第二”等术语仅用于区别不同步骤、设备或模块等,既不代表任何特定技术含义,也不表示它们之间的必然逻辑顺序。应理解,在本公开实施例中,“多个”可以指两个或两个以上,“至少一个”可以指一个、两个或两个以上。对于相关领域普通技术人员已知的技术、方法和设备可能不作详细讨论,但在适当情况下,所述技术、方法和设备应当被视为说明书的一部分。It should be noted that relative arrangements of components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise. Those skilled in the art can understand that terms such as "first" and "second" in the embodiments of the present disclosure are only used to distinguish different steps, devices or modules, etc. necessary logical sequence. It should be understood that in the embodiments of the present disclosure, "plurality" may refer to two or more than two, and "at least one" may refer to one, two or more than two. Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the description.
本公开实施例可以应用于任意具有摄像功能的第一电子设备,比如监测摄像机等成像设备,或者也可以应用于与具有摄像功能的第一电子设备连接通信的终端设备、计算机系统、服务器等第二电子设备,具有摄像功能的第一电子设备将图像传感器采集的原始图像数据和采集原始图像数据时的地理位置发送给第二电子设备,第二电子设备进行安全处理后返回给第一电子设备,第二电子设备可与众多其它通用或专用计算系统环境或配置一起操作。The embodiments of the present disclosure can be applied to any first electronic device with a camera function, such as an imaging device such as a monitoring camera, or can also be applied to a terminal device, a computer system, a server, etc. that communicate with the first electronic device with a camera function. Two electronic devices, the first electronic device with camera function sends the original image data collected by the image sensor and the geographic location when collecting the original image data to the second electronic device, and the second electronic device returns to the first electronic device after security processing , the second electronic device is operable with numerous other general purpose or special purpose computing system environments or configurations.
第一电子设备和终端设备、计算机系统、服务器等第二电子设备可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。A first electronic device and a second electronic device such as a terminal device, a computer system, a server, etc. may be described in the general context of computer system executable instructions (such as program modules) executed by the computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc., that perform particular tasks or implement particular abstract data types. The computer system/server can be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computing system storage media including storage devices.
示例性系统exemplary system
本公开实施例可以适用于车辆监测系统,该车辆监测系统可以包括摄像机设备和服务器,摄像机设备与服务器通信,将拍摄的监测图像传输到服务器进行存储及其他处理,摄像机设备设置在车辆外预设位置,预设位置根据能够拍摄到车辆所在地理位置的场景信息来确定。Embodiments of the present disclosure may be applicable to a vehicle monitoring system, the vehicle monitoring system may include a camera device and a server, the camera device communicates with the server, and transmits the captured monitoring images to the server for storage and other processing, and the camera device is set outside the vehicle for preset Position, the preset position is determined according to the scene information that can capture the geographic location of the vehicle.
本公开实施例中,摄像机设备在图像传感器采集到待处理图像后,可以先确定图像传感器采集待处理 图像时的地理位置,然后确定地理位置对应的地理安全等级,并基于地理安全等级确定待处理图像中的目标对象,进而对目标对象所在的图像区域进行隐私安全保护处理。在实际应用中,待处理图像的图像安全处理可以是在图像传感器和图像信号处理器(Image Signal Processing,简称:ISP)之间增加图像安全处理单元实现,图像安全处理单元可以采用GPU(graphics processing unit,图形处理器)或AI(Artificial Intelligence,人工智能)芯片实现;此外,待处理图像的图像安全处理也可以是由ISP实现,具体可以根据实际需求设置,本公开不做限定。在一些应用中,待处理图像的图像安全处理还可以是由摄像机设备以外的第二电子设备实现,通过与摄像机设备通信,将摄像机设备图像传感器采集的待处理图像传输给第二电子设备,第二电子设备进行图像安全处理后返回给摄像机设备。In the embodiment of the present disclosure, after the image sensor collects the image to be processed, the camera device can first determine the geographic location when the image sensor collects the image to be processed, then determine the geographic security level corresponding to the geographic location, and determine the location to be processed based on the geographic security level. The target object in the image, and then perform privacy and security protection processing on the image area where the target object is located. In practical applications, the image security processing of the image to be processed can be realized by adding an image security processing unit between the image sensor and the image signal processor (Image Signal Processing, referred to as: ISP), and the image security processing unit can use a GPU (graphics processing unit, graphics processor) or AI (Artificial Intelligence, artificial intelligence) chip; in addition, the image security processing of the image to be processed can also be implemented by the ISP, which can be set according to actual needs, which is not limited in this disclosure. In some applications, the image security processing of the image to be processed can also be realized by a second electronic device other than the camera device, and by communicating with the camera device, the image to be processed collected by the image sensor of the camera device is transmitted to the second electronic device. The second electronic device returns to the camera device after image security processing.
示例性方法exemplary method
图1是本公开一示例性实施例提供的图像安全处理方法的流程示意图。本实施例可应用在电子设备上,如图1所示,包括如下步骤:Fig. 1 is a schematic flowchart of an image security processing method provided by an exemplary embodiment of the present disclosure. This embodiment can be applied to electronic equipment, as shown in Figure 1, including the following steps:
步骤101,确定图像传感器采集待处理图像时的地理位置。 Step 101, determine the geographic location when the image sensor captures the image to be processed.
本公开实施例中,待处理图像可以为图像传感器采集到的当前地理位置的场景图像。示例性地,待处理图像可以是在车辆辅助驾驶或自动驾驶时,通过车外摄像头采集到的车辆所在地理位置的场景图像。车辆所在地理位置的场景图像中可以包括车外摄像头拍摄到的任何对象,例如,车牌、人脸、建筑、道路设施等,本公开实施例不做限定。In the embodiment of the present disclosure, the image to be processed may be a scene image of the current geographic location collected by the image sensor. Exemplarily, the image to be processed may be a scene image of the geographic location of the vehicle collected by the camera outside the vehicle during assisted driving or automatic driving of the vehicle. The scene image of the geographic location of the vehicle may include any object captured by the camera outside the vehicle, for example, a license plate, a human face, a building, a road facility, etc., which are not limited in this embodiment of the present disclosure.
本公开实施例中,待处理图像可以为图像传感器采集到的未经加工的原始图像(也称为raw data数据)。未经加工的原始图像具体为图像传感器将捕捉到的光源信号转化为数字信号的未经加工的图像。示例性地,待处理图像可以是在车辆辅助驾驶或自动驾驶时,通过车外摄像头采集到的、且未经加工的本车所在地理位置的原始场景图像。In the embodiment of the present disclosure, the image to be processed may be an unprocessed original image (also referred to as raw data) collected by an image sensor. The unprocessed original image is specifically an unprocessed image obtained by converting the light source signal captured by the image sensor into a digital signal. Exemplarily, the image to be processed may be an unprocessed original scene image of the geographic location of the vehicle collected by the camera outside the vehicle during assisted driving or automatic driving.
本公开实施例中,图像传感器采集待处理图像时的地理位置可以通过定位装置确定,并可以采用经纬度坐标表示。定位装置可以设置在图像传感器所在设备中,或者也可以设置在图像传感器所在设备附近,以确保定位装置确定的地理位置,与图像传感器采集待处理图像时的地理位置一致。In the embodiment of the present disclosure, the geographic location when the image sensor collects the image to be processed may be determined by a positioning device, and may be represented by latitude and longitude coordinates. The positioning device can be set in the device where the image sensor is located, or can also be set near the device where the image sensor is located, so as to ensure that the geographic location determined by the positioning device is consistent with the geographic location when the image sensor collects the image to be processed.
在一个可选示例中,定位装置可以是北斗定位装置、GPS定位装置等定位装置中的任一项,本公开实施例不做限定。In an optional example, the positioning device may be any one of positioning devices such as a Beidou positioning device and a GPS positioning device, which is not limited in this embodiment of the present disclosure.
步骤102,确定地理位置对应的地理安全等级。 Step 102, determine the geographic security level corresponding to the geographic location.
本公开实施例中,地理安全等级可以用于标识地理位置的地理信息安全要求的高低,可以根据地理位置的地理信息安全要求,确定地理位置的地理安全等级。具体地,对于地理信息安全要求较高的地理位置,可以确定较高的地理安全等级;对于地理信息安全要求较低的地理位置,可以确定较低的地理安全等级。需要说明的是,地理信息安全具体可以指地理信息的采集、处理、存储、加工、传输、服务和应用等环节涉及的硬件、软件及其系统中的数据受到保护。In the embodiment of the present disclosure, the geographic security level may be used to identify the level of geographic information security requirements of the geographic location, and the geographic security level of the geographic location may be determined according to the geographic information security requirements of the geographic location. Specifically, a higher geographic security level may be determined for a geographic location with a higher geographic information security requirement; a lower geographic security level may be determined for a geographic location with a lower geographic information security requirement. It should be noted that geographic information security specifically refers to the protection of hardware, software, and data in systems involved in the collection, processing, storage, processing, transmission, service, and application of geographic information.
示例性的,在车辆辅助驾驶或自动驾驶过程中,若车外摄像头采集到待处理图像的地理位置为未公开场所,未公开场所的地理信息安全要求高,可以确定地理位置的地理安全等级为高等级别;若车外摄像头采集到待处理图像的地理位置为半公开场所,半公开场所的地理信息安全要求中等,可以确定地理位置的地理安全等级为中等级别;若车外摄像头采集到待处理图像的地理位置为公开场所,公开场所的地理信息安全要求低,可以确定地理位置的地理安全等级为低等级别。For example, in the process of vehicle assisted driving or automatic driving, if the geographical location of the image to be processed collected by the camera outside the vehicle is an undisclosed place, and the geographical information security requirements of the undisclosed place are high, the geographical security level of the geographical location can be determined as High level; if the geographical location of the image to be processed collected by the camera outside the vehicle is a semi-public place, and the geographical information security requirements of the semi-public place are medium, the geographic security level of the geographical location can be determined as a medium level; if the camera outside the vehicle collects the image to be processed The geographical location of the image is a public place, and the geographical information security requirements of the public place are low, and the geographical security level of the geographical location can be determined as a low level.
一个可选示例中,地理安全等级可以包括两个以上的等级,例如,两个以上的等级可以包括:地理安全一级、地理安全二级和地理安全三级,再例如,两个以上的等级也可以包括:地理安全A级、地理安全B级和地理安全C级,本公开实施例不做限定。In an optional example, the geographic security level may include more than two levels. For example, the two or more levels may include: geographic security level one, geographic security level two, and geographic security level three. For example, two or more levels It may also include: geographic security level A, geographic security level B, and geographic security level C, which are not limited in this embodiment of the present disclosure.
一个可选示例中,可以利用罗马数字、小写阿拉伯数字、大写阿拉伯数字、中文数字、小写英文字母和大写英文字母等符号中的任一项或多项为不同地理安全等级命名,以区分不同地理安全等级,本公开实施例对地理安全等级的命名方式不做限定。In an optional example, any one or more of symbols such as Roman numerals, lowercase Arabic numerals, uppercase Arabic numerals, Chinese numerals, lowercase English letters, and uppercase English letters can be used to name different geographic security levels to distinguish between different geographical locations. Security level, the embodiment of the present disclosure does not limit the naming manner of the geographic security level.
步骤103,基于地理安全等级确定待处理图像中的目标对象。 Step 103, determine the target object in the image to be processed based on the geographic security level.
本公开实施例中,图像传感器在采集待处理图像时,容易采集到当前地理位置的不想被公众所知的对象(也可以称为敏感对象)的图像。待处理图像中的目标对象为待处理图中需要进行隐私保护处理的敏感对象。In the embodiments of the present disclosure, when the image sensor collects images to be processed, it is easy to collect images of objects (also referred to as sensitive objects) in the current geographic location that do not want to be known to the public. The target object in the image to be processed is a sensitive object that needs privacy protection processing in the image to be processed.
一个可选示例中,敏感对象可以包括但不限于车牌、人脸、建筑、道路设施。In an optional example, sensitive objects may include, but are not limited to, license plates, human faces, buildings, and road facilities.
本公开实施例中,可以预先设置各地理安全等级对应的敏感对象类型,各地理安全等级对应的敏感对象类型可以部分相同,也可以完全不同。In the embodiment of the present disclosure, sensitive object types corresponding to each geographic security level may be preset, and the sensitive object types corresponding to each geographic security level may be partly the same or completely different.
作为一个示例,可以设置地理安全一级对应的敏感对象类型为建筑,地理安全二级对应的敏感对象类型为车牌,地理安全等级三级对应的敏感对象类型为人脸。As an example, it is possible to set the sensitive object type corresponding to geo-security level 1 as building, the sensitive object type corresponding to geo-security level 2 as license plate, and the sensitive object type corresponding to geo-security level 3 as face.
作为另一个示例,可以设置地理安全一级对应的敏感对象类型为建筑和道路设施,地理安全二级对应的敏感对象类型为车牌和建筑,地理安全三级对应的敏感类型为车牌和人脸。As another example, the types of sensitive objects corresponding to the first level of geographic security may be buildings and road facilities, the types of sensitive objects corresponding to the second level of geographic security may be license plates and buildings, and the types of sensitive objects corresponding to the third level of geographic security may be license plates and faces.
本公开实施例中,可以根据预设规则区分各地理安全等级的高低。一个可选示例中,预设规则可以是地理安全等级的命名中包含的阿拉伯数字越小地理安全等级越高,也可以是地理安全等级的命名中包含的阿拉伯数字越大地理安全等级越高,也可以是地理安全等级的命名中包含的英文字母越靠后地理安全等级越高,还可以是地理安全等级的命名中包含的英文字母越靠前地理安全等级越高。需要说明的是,利用地理安全等级的命名中包含的阿拉伯数字的大小,或者英文字母的排序可以简单有效的区分不同的地理安全等级,但不限于此,其它方式,如利用地理安全等级的命名中包含的罗马数字的大小,中文数字的大小等也同样适用。一个可选示例中,在各地理安全等级中,越高的地理安全等级对应的敏感对象类型的数量可以越多,越低的地理安全等级对应的敏感对象类型的数量可以越少。需要说明的是,本公开实施例对各地理安全等级对应的敏感对象类型的具体数量不做限定。In the embodiment of the present disclosure, the level of each geographic security level can be distinguished according to preset rules. In an optional example, the default rule may be that the smaller the Arabic numeral contained in the name of the geographical security level, the higher the geographical security level, or that the larger the Arabic number contained in the name of the geographical security level, the higher the geographical security level. It may also be that the lower the English letters contained in the naming of the geographical security level, the higher the geographical security level, or the earlier the English letters contained in the naming of the geographical security level, the higher the geographical security level. It should be noted that using the size of the Arabic numerals contained in the naming of the geographic security level, or the order of the English letters can simply and effectively distinguish different geographic security levels, but it is not limited to this. Other methods, such as using the naming of the geographic security level The size of Roman numerals contained in , the size of Chinese numerals, etc. are also applicable. In an optional example, in each geographic security level, a higher geographic security level may correspond to a greater number of sensitive object types, and a lower geographic security level may correspond to a smaller number of sensitive object types. It should be noted that, the embodiment of the present disclosure does not limit the specific number of sensitive object types corresponding to each geographic security level.
作为一个示例,各地理安全等级可以包括地理安全A级、地理安全B级和地理安全C级共三个等级,上述预设规则可以为地理安全等级的命名中包含的英文字母越靠后地理安全等级越高。由此,在各地理安全等级中,地理安全A级的等级最低,地理安全C级的等级最高,可以设定地理安全C级对应的敏感对象类型可以为车牌、人脸、建筑、和道路设施,地理安全B级对应的敏感对象类型为车牌、人脸和建筑,地理安全A级对应的敏感类型为车牌和人脸。As an example, each geographic security level may include three levels: geographic security level A, geographic security level B, and geographic security level C. The higher the level. Therefore, among the various geographic security levels, the geographic security level A is the lowest, and the geographic security level C is the highest. It can be set that the sensitive object types corresponding to the geographic security level C can be license plates, faces, buildings, and road facilities. , the types of sensitive objects corresponding to geo-security level B are license plates, faces, and buildings, and the sensitive types corresponding to geo-security level A are license plates and faces.
一个可选示例中,较高的地理安全等级可以对应较多的敏感对象类型,较低的地理安全等级可以对应较少的敏感对象类型,具体可以通过预设阈值的方式来确定较高的地理安全等级和较低的地理安全等级,例如,等级高于或等于预设阈值的可以视为本公开中的较高的地理安全等级,等级低于预设阈值的可以视为较低的地理安全等级。需要说明的是,本公开实施例对各地理安全等级对应的敏感对象类型的具体数量不做限定。In an optional example, a higher geographic security level can correspond to more sensitive object types, and a lower geographic security level can correspond to fewer sensitive object types. Specifically, a higher geographic security level can be determined through a preset threshold. Security level and lower geographic security level, for example, a level higher than or equal to a preset threshold may be considered a higher geographic security level in this disclosure, and a level lower than a preset threshold may be considered a lower geographic security level grade. It should be noted that, the embodiment of the present disclosure does not limit the specific number of sensitive object types corresponding to each geographical security level.
作为一个示例,各地理安全等级可以包括地理安全A级、地理安全B级、地理安全C级和地理安全D级共四个等级,其中地理安全A级的等级最低,地理安全D级的等级最高,可以设定预设阈值为C级,从而可以确定地理安全A级和地理安全B级为较低的地理安全等级,地理安全C级和地理安全D级为较高的地理安全等级,进而可以设定较高的地理安全等级对应的敏感对象类型为车牌、人脸、建筑和道路设施等,较低的地理安全等级对应的敏感对象类型为车牌和人脸等。实际应用中,可以根据预先设置的各地理安全等级与敏感对象类型的对应关系,得到步骤102中确定的地理安全等级对应的敏感对象类型,并可以将从待处理图像中识别的类型与敏感对象类型相同的图像对象作为待处理图像中的目标对象。As an example, each geographic security level may include four levels of geographic security level A, geographic security level B, geographic security level C, and geographic security level D, among which the level of geographic security level A is the lowest, and the level of geographic security level D is the highest. , the preset threshold can be set as C level, so that it can be determined that geographic security level A and geographic security level B are lower geographic security levels, and geographic security level C and geographic security level D are higher geographic security levels, and then can be The types of sensitive objects corresponding to higher geographic security levels are license plates, faces, buildings, and road facilities, etc., and the types of sensitive objects corresponding to lower geographic security levels are license plates and faces. In practical applications, the sensitive object types corresponding to the geographic security levels determined in step 102 can be obtained according to the preset correspondence between each geographic security level and the sensitive object type, and the type identified from the image to be processed can be compared with the sensitive object type Image objects of the same type as target objects in the image to be processed.
步骤104,对目标对象所在的图像区域进行隐私保护处理。 Step 104, performing privacy protection processing on the image area where the target object is located.
具体地,由于步骤103已经获取到待处理图像中的需要进行隐私保护处理的目标对象,可以对该目标对象所在的图像区域内的图像数据进行隐私保护处理,例如通过图像遮挡或图像模糊的方式进行隐私保护处理,保证待处理图像中敏感数据的安全性。Specifically, since step 103 has acquired the target object that needs to be processed for privacy protection in the image to be processed, the image data in the image area where the target object is located can be processed for privacy protection, for example, by means of image occlusion or image blurring Perform privacy protection processing to ensure the security of sensitive data in the image to be processed.
本公开实施例中,在对待处理图像进行安全处理时,通过基于图像传感器采集待处理图像时的地理位置对应的地理安全等级确定待处理图像中的目标对象,并对目标对象所在的图像区域进行隐私保护处理,实现了基于不同地理位置的安全保护需求对相应的目标对象进行隐私保护处理,实现相应的安全保护;同时,可以避免对非必要对象进行隐私保护处理消耗计算资源。In the embodiment of the present disclosure, when performing security processing on the image to be processed, the target object in the image to be processed is determined based on the geographic security level corresponding to the geographic location when the image sensor collects the image to be processed, and the image area where the target object is located is determined. Privacy protection processing realizes the privacy protection processing of corresponding target objects based on the security protection requirements of different geographical locations to achieve corresponding security protection; at the same time, it can avoid the consumption of computing resources for privacy protection processing of unnecessary objects.
图2是本公开另一示例性实施例提供的图像安全处理方法的流程示意图,如图2所示,在上述图1所示实施例的基础上,步骤102可以包括如下步骤:FIG. 2 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in FIG. 2 , on the basis of the above-mentioned embodiment shown in FIG. 1 , step 102 may include the following steps:
步骤102-1,从预设地理位置匹配信息中获取地理位置匹配的目标地理位置。Step 102-1, acquiring a target geographic location for geographic location matching from preset geographic location matching information.
本公开实施例中,预设地理位置匹配信息可以采用数据库或数据表格等形式进行存储,预设地理位置匹配信息可以包括至少一个预设地理位置、以及至少一个预设地理位置中各预设地理位置对应的位置区域范围。In the embodiment of the present disclosure, the preset geographic location matching information may be stored in the form of a database or a data table, and the preset geographic location matching information may include at least one preset geographic location, and each preset geographic location in the at least one preset geographic location The location area range corresponding to the location.
本公开实施例中,可以将上述步骤101确定的图像传感器采集待处理图像时的地理位置,与预设地理位置匹配信息中的各预设地理位置以及各预设地理位置对应的位置区域范围进行对比,以获取该地理位置匹配的目标地理位置。In the embodiment of the present disclosure, the geographic location of the image sensor determined in the above step 101 when the image to be processed is collected can be compared with each preset geographic location in the preset geographic location matching information and the location area range corresponding to each preset geographic location. Compare to obtain the target geographic location that the geographic location matches.
一个可选示例中,该地理位置匹配的目标地理位置可以是与该地理位置相同的任一预设地理位置,或者也可以是包含该地理位置的任一位置区域范围对应的预设地理位置。In an optional example, the target geographic location matched by the geographic location may be any preset geographic location that is the same as the geographic location, or may also be a preset geographic location corresponding to any location area that includes the geographic location.
步骤102-2,从预设地理安全匹配信息中获取目标地理位置对应的目标地理安全等级、以及目标地理安全等级对应的目标对象类型。Step 102-2, obtaining the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from the preset geographic security matching information.
本公开实施例中,预设地理安全匹配信息可以采用数据库或数据表格等形式进行存储,预设地理安全匹配信息可以包括:各预设地理位置对应的地理安全等级、以及各地理安全等级对应的对象类型。In the embodiments of the present disclosure, the preset geographic security matching information may be stored in the form of a database or a data table, and the preset geographic security matching information may include: the geographic security level corresponding to each preset geographic location, and the geographic security level corresponding to each geographic security level. object type.
在一个可选的示例中,预设地理安全匹配信息中的对象类型可以包括以下任意一项或多项:车牌,人脸,建筑,道路设施。In an optional example, the object types in the preset geographic security matching information may include any one or more of the following: license plate, human face, building, and road facilities.
本公开实施例中,可以将步骤102-2确定的目标地理位置,与预设地理安全匹配信息中的各预设地理位置进行对比,获取与该目标地理位置相同的预设地理位置对应的地理安全等级,作为该目标地理位置对应的目标地理安全等级。In the embodiment of the present disclosure, the target geographic location determined in step 102-2 can be compared with each preset geographic location in the preset geographic security matching information, and the geographic location corresponding to the preset geographic location that is the same as the target geographic location can be obtained. The security level is used as the target geographic security level corresponding to the target geographic location.
将目标地理位置对应的目标地理安全等级,与预设地理安全匹配信息中的各地理安全等级进行对比,获取与该目标地理安全等级相同的地理安全等级对应的对象类型,作为该目标地理安全等级对应的目标对象类型。Compare the target geographic security level corresponding to the target geographic location with each geographic security level in the preset geographic security matching information, and obtain the object type corresponding to the same geographic security level as the target geographic security level as the target geographic security level The corresponding target object type.
本公开实施例中,在确定地理位置对应的地理安全等级时,通过将地理位置与预先设置的预设地理位置匹配信息和预设地理安全匹配信息中的各项信息进行对比,可以快速查找到地理位置对应的地理安全等级,以及地理安全等级对应的目标对象类型,有助于减少图像安全处理的时间消耗,提高图像安全处理的效率。In the embodiment of the present disclosure, when determining the geographic security level corresponding to the geographic location, the geographic location can be quickly found by comparing the geographic location with the preset geographic location matching information and the preset geographic security matching information. The geographic security level corresponding to the geographic location and the target object type corresponding to the geographic security level help to reduce the time consumption of image security processing and improve the efficiency of image security processing.
图3是本公开再一示例性实施例提供的图像安全处理方法的流程示意图,如图3所示,在上述图2所示实施例的基础上,步骤103可以包括如下步骤:Fig. 3 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in Fig. 3 , on the basis of the embodiment shown in Fig. 2 above, step 103 may include the following steps:
步骤103-1a,对待处理图像进行语义分割,得到待处理图像中的至少一个感兴趣区域。Step 103-1a, performing semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
步骤103-2a,对至少一个感兴趣区域进行语义识别,得到待处理图像中的至少一个感兴趣物体。Step 103-2a, performing semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
本公开实施例中,可以利用第一预先训练的图像语义分析模型,对待处理图像进行语义分割和语义识 别,语义分割可以得到待处理图像中的至少一个感兴趣区域,该感兴趣区域为待处理图像中可能存在感兴趣物体的图像区域,语义识别可以确定感兴趣区域中各像素所属的类型,基于感兴趣区域中的各像素及各像素所属的类型可以确定感兴趣区域中感兴趣物体(包括属于该感兴趣物体的像素)及该感兴趣物体的类型。感兴趣物体的类型可以包括但不限于车牌、人脸、建筑、道路设施。In the embodiment of the present disclosure, the first pre-trained image semantic analysis model can be used to perform semantic segmentation and semantic recognition on the image to be processed. The semantic segmentation can obtain at least one region of interest in the image to be processed, and the region of interest is the There may be an image area of an object of interest in the image. Semantic recognition can determine the type of each pixel in the area of interest. Based on each pixel in the area of interest and the type of each pixel, the object of interest in the area of interest (including pixels belonging to the object of interest) and the type of the object of interest. Types of objects of interest may include, but are not limited to, license plates, human faces, buildings, and road facilities.
本公开实施例中,可以通过以下方式得到第一预先训练的图像语义分析模型:In the embodiment of the present disclosure, the first pre-trained image semantic analysis model can be obtained in the following manner:
构建第一初始图像语义分析模型;从训练样本集合中获取多个图像样本;将所述多个图像样本分别作为输入,提供给第一初始图像语义分析模型,经由第一初始图像语义分析模型对输入的各图像样本分别进行语义分割和语义识别,根据第一初始图像语义分析模型的输出,获得预测出的各图像样本的至少一个感兴趣物体;根据预测出的各图像样本的至少一个感兴趣物体和各图像样本的感兴趣物体标注信息,调整第一初始图像语义分析模型的模型参数。Construct the first initial image semantic analysis model; obtain a plurality of image samples from the training sample set; use the plurality of image samples as input respectively, provide the first initial image semantic analysis model, and use the first initial image semantic analysis model to The input image samples are respectively subjected to semantic segmentation and semantic recognition, and according to the output of the first initial image semantic analysis model, at least one object of interest of each predicted image sample is obtained; according to at least one object of interest of each predicted image sample The object and the object of interest annotation information of each image sample are used to adjust the model parameters of the first initial image semantic analysis model.
一个可选示例中,第一初始图像语义分析模型可以是卷积神经网络模型或全卷积神经网络模型。In an optional example, the first initial image semantic analysis model may be a convolutional neural network model or a fully convolutional neural network model.
步骤103-3a,基于地理安全等级对应的对象类型,从至少一个感兴趣物体中确定目标对象。Step 103-3a, based on the object type corresponding to the geographic security level, determine the target object from at least one object of interest.
经由步骤103-2a已经确定了待处理图像中的至少一个感兴趣物体,将各感兴趣物体的类型与地理安全等级对应的对象类型进行对比,从至少一个感性兴趣物体中选取类型与地理安全等级对应的对象类型相同的感兴趣物体作为目标对象。At least one object of interest in the image to be processed has been determined through step 103-2a, the type of each object of interest is compared with the object type corresponding to the geographic security level, and the type and geographic security level are selected from at least one interested object Objects of interest corresponding to the same object type are used as target objects.
本公开实施例中,通过预先训练的图像语义分析模型,可以快速、准确地识别出待处理图像中的至少一个感兴趣物体,从而可以快速、准确地确定待处理图像中需要隐私保护处理的目标对象,有助于提高图像安全处理的效率和准确度。同时,对待处理图像根据地理安全等级进行分等级的安全处理,相对于现有的对所有采集的图像进行统一的安全处理的方法,有助于提高图像安全处理的灵活性。In the embodiment of the present disclosure, through the pre-trained image semantic analysis model, at least one object of interest in the image to be processed can be quickly and accurately identified, so that the target that needs privacy protection processing in the image to be processed can be quickly and accurately determined Objects that help improve the efficiency and accuracy of image security processing. At the same time, the hierarchical security processing of the image to be processed according to the geographic security level is helpful to improve the flexibility of image security processing compared with the existing method of uniform security processing for all collected images.
图4是本公开再一示例性实施例提供图像安全处理方法的流程示意图,如图4所示,在上述图2所示实施例的基础上,步骤102-2可以包括如下步骤:FIG. 4 is a schematic flowchart of a method for image security processing provided by another exemplary embodiment of the present disclosure. As shown in FIG. 4 , on the basis of the above-mentioned embodiment shown in FIG. 2 , step 102-2 may include the following steps:
步骤102-2a,从预设地理安全匹配信息中获取目标地理位置对应的目标地理安全等级。Step 102-2a, obtaining the target geographic security level corresponding to the target geographic location from preset geographic security matching information.
本公开实施例中,预设地理安全匹配信息可以采用数据库或数据表格等形式进行存储,预设地理安全匹配信息可以包括:各预设地理位置对应的地理安全等级,各地理安全等级对应的对象类型以及对应的对象类型包括的各对象类别。In the embodiment of the present disclosure, the preset geographic security matching information can be stored in the form of a database or a data table, and the preset geographic security matching information can include: the geographic security level corresponding to each preset geographic location, and the objects corresponding to each geographic security level type and the object classes included in the corresponding object type.
在一个可选的示例中,地理安全匹配信息中的对象类型包括以下任意一项或多项:车牌,人脸,建筑,道路设施。In an optional example, the object types in the geographic security matching information include any one or more of the following: license plates, faces, buildings, and road facilities.
本公开实施例中,对象类别是对象类型的进一步细分,对象类型可以被进一步细分为一个以上对象类别。示例性地,对象类型“车牌”可以包括“军用车牌”、“民用车牌”和“警用车牌”三个对象类别,对象类型“人脸”可以包括“眼睛”和“面部”两个对象类别,对象类型“建筑”可以包括“建筑”一个对象类别,对象类型“道路设施”可以包括“红绿灯”和“路向标”两个对象类别。需要说明的是,本公开实施例公开的对象类型的细分方式和细分数量不做限定,本领域技术人员可以根据实际需要确定对象类型的细分方式和细分数量。In the embodiments of the present disclosure, an object category is a further subdivision of an object type, and an object type can be further subdivided into more than one object category. Exemplarily, the object type "license plate" may include three object categories "military license plate", "civilian license plate" and "police license plate", and the object type "human face" may include two object categories "eyes" and "face". , the object type "building" may include an object category "building", and the object type "road facilities" may include two object categories "traffic light" and "road sign". It should be noted that the object type subdivision method and subdivision quantity disclosed in the embodiment of the present disclosure are not limited, and those skilled in the art can determine the object type subdivision method and subdivision quantity according to actual needs.
本公开实施例中,可以将步骤102-2确定的目标地理位置,与预设地理安全匹配信息中的各预设地理位置进行对比,获取与该目标地理位置相同的预设地理位置对应的地理安全等级,作为该目标地理位置对应的目标地理安全等级。In the embodiment of the present disclosure, the target geographic location determined in step 102-2 can be compared with each preset geographic location in the preset geographic security matching information, and the geographic location corresponding to the preset geographic location that is the same as the target geographic location can be obtained. The security level is used as the target geographic security level corresponding to the target geographic location.
步骤102-2b,从预设地理安全匹配信息中获取目标地理安全等级对应的目标对象类型和目标对象类型包括的各对象类别。In step 102-2b, the target object type corresponding to the target geographic security level and the object categories included in the target object type are obtained from the preset geographic security matching information.
将步骤102-2a确定的目标地理位置对应的目标地理安全等级,与预设地理安全匹配信息中的各地理安全等级进行对比,获取与该目标地理安全等级相同的地理安全等级对应的对象类型作为目标对象类型,并 获取目标对象类型包括的各对象类别。Compare the target geographic security level corresponding to the target geographic location determined in step 102-2a with the geographic security levels in the preset geographic security matching information, and obtain the object type corresponding to the same geographic security level as the target geographic security level as The target object type, and obtain each object category included in the target object type.
本公开实施例中,通过将地理安全等级对应的对象类型进一步划分为各对象类别,可以提高待处理图像中需要隐私保护处理的目标对象的区分精度,从而有助于提高图像安全处理的精度。In the embodiment of the present disclosure, by further dividing the object types corresponding to the geographic security level into object categories, the accuracy of distinguishing the target objects requiring privacy protection processing in the image to be processed can be improved, thereby helping to improve the accuracy of image security processing.
图5是本公开又一示例性实施例提供的图像安全处理方法的流程示意图,如图5所示,在上述图4所示实施例的基础上,步骤103可以包括如下步骤:Fig. 5 is a schematic flowchart of an image security processing method provided by another exemplary embodiment of the present disclosure. As shown in Fig. 5 , on the basis of the embodiment shown in Fig. 4 above, step 103 may include the following steps:
步骤103-1b,对待处理图像进行语义分割,得到待处理图像中的至少一个感兴趣区域。Step 103-1b, performing semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
步骤103-2b,对至少一个感兴趣区域进行语义识别,得到待处理图像中的至少一个感兴趣物体。Step 103-2b, performing semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
本公开实施例中,可以利用第二预先训练的图像语义分析模型,对待处理图像进行语义分割和语义识别,语义分割可以得到待处理图像中的至少一个感兴趣区域,该感兴趣区域为待处理图像中可能存在感兴趣物体的图像区域,语义识别可以确定感兴趣区域中各像素所属的类别,基于感兴趣区域中的各像素及各像素所属的类别可以确定感兴趣区域中感兴趣物体(包括属于该感兴趣物体的像素)及该感兴趣物体的类别。In the embodiment of the present disclosure, the second pre-trained image semantic analysis model can be used to perform semantic segmentation and semantic recognition on the image to be processed. The semantic segmentation can obtain at least one region of interest in the image to be processed, and the region of interest is the There may be an image area of an object of interest in the image. Semantic recognition can determine the category to which each pixel in the area of interest belongs. Based on each pixel in the area of interest and the category to which each pixel belongs, the object of interest in the area of interest (including pixels belonging to the object of interest) and the category of the object of interest.
本公开实施例中,感兴趣物体的类别是上述感兴趣物体的类型的细分,感兴趣区域物体的类型的细分方式与上述对象类型的细分方式相同。In the embodiment of the present disclosure, the category of the object of interest is a subdivision of the type of the object of interest, and the subdivision manner of the type of the object in the region of interest is the same as the subdivision manner of the above object type.
本公开实施例中,可以通过以下方式得到第二预先训练的图像语义分析模型:构建第二初始图像语义分析模型;从训练样本集合中获取多个图像样本;将所述多个图像样本分别作为输入,提供给第二初始图像语义分析模型,经由第二初始图像语义分析模型对输入的各图像样本分别进行语义分割和语义识别,根据第二初始图像语义分析模型的输出,获得预测出的各图像样本的至少一个感兴趣物体;根据预测出的各图像样本的至少一个感兴趣物体和各图像样本的感兴趣物体标注信息,调整第二初始图像语义分析模型的模型参数。一个可选示例中,第二初始图像语义分析模型可以是卷积神经网络模型或全卷积神经网络模型。In the embodiment of the present disclosure, the second pre-trained image semantic analysis model can be obtained in the following manner: constructing the second initial image semantic analysis model; obtaining multiple image samples from the training sample set; using the multiple image samples as The input is provided to the second initial image semantic analysis model, and the input image samples are respectively subjected to semantic segmentation and semantic recognition through the second initial image semantic analysis model, and each predicted image is obtained according to the output of the second initial image semantic analysis model. At least one object of interest in the image sample; adjust the model parameters of the second initial image semantic analysis model according to the predicted at least one object of interest in each image sample and the annotation information of the object of interest in each image sample. In an optional example, the second initial image semantic analysis model may be a convolutional neural network model or a fully convolutional neural network model.
步骤103-3b,基于地理安全等级对应的对象类型、以及对应的对象类型包括的各对象类别,从至少一个感兴趣物体中确定目标对象。Step 103-3b, based on the object type corresponding to the geographic security level and the object categories included in the corresponding object type, determine the target object from at least one object of interest.
经由步骤103-2b已经确定了待处理图像中的至少一个感兴趣物体,将各感兴趣物体的类别与地理安全等级对应的对象类型包括的各对象类别进行对比,从至少一个感性兴趣物体中选取类别与各对象类别中任一对象类别相同的感兴趣物体作为目标对象。At least one object of interest in the image to be processed has been determined via step 103-2b, and the category of each object of interest is compared with the object categories included in the object type corresponding to the geographic security level, and selected from at least one object of interest An object of interest whose category is the same as any object category in each object category is used as a target object.
本公开实施例中,通过将地理安全等级对应的对象类型进一步划分为各对象类别,可以提高待处理图像中需要隐私保护处理的目标对象的区分精度,从而有助于提高图像安全处理的精度。In the embodiment of the present disclosure, by further dividing the object types corresponding to the geographic security level into object categories, the accuracy of distinguishing the target objects requiring privacy protection processing in the image to be processed can be improved, thereby helping to improve the accuracy of image security processing.
在一个可选的示例中,上述步骤104可以包括:根据待处理图像对应的掩码图像,对待处理图像中目标对象所在图像区域的像素点进行遮挡处理,得到目标图像数据。In an optional example, the above step 104 may include: according to the mask image corresponding to the image to be processed, performing occlusion processing on pixels in the image area where the target object is located in the image to be processed to obtain target image data.
本公开实施例中,提供与待处理图像尺寸相同的掩码图像,通过掩码图像标记需要进行隐私保护处理的图像区域。In the embodiment of the present disclosure, a mask image having the same size as the image to be processed is provided, and the image area requiring privacy protection processing is marked by the mask image.
本公开实施例中,在掩码图像中,将对应待处理图像中需要进行隐私保护处理的目标对象所在图像区域设置一个标记(例如数值1),这样,当后续步骤进行隐私保护处理时,可以根据掩码图像的图像块内是否有标记,从而决定是否对待处理图像的对应图像块内的像素点进行遮挡处理。In the embodiment of the present disclosure, in the mask image, a mark (for example, a value of 1) is set in the image area corresponding to the target object in the image to be processed that requires privacy protection processing, so that when the privacy protection processing is performed in the subsequent steps, it can be According to whether there is a mark in the image block of the mask image, it is determined whether to perform occlusion processing on the pixel points in the corresponding image block of the image to be processed.
在本实施例中,通过掩码图像可以标记出待处理图像中需要进行隐私保护处理的目标对象所在图像区域,进而可以便于后续步骤准确地对待处理图像进行隐私保护处理,能够有效保护待处理图像中的隐私数据安全。In this embodiment, the mask image can be used to mark the image area where the target object in the image to be processed needs to be processed for privacy protection, which can facilitate subsequent steps to accurately perform privacy protection processing on the image to be processed, and can effectively protect the image to be processed Privacy data security in.
本公开实施例提供的任一种图像安全处理方法可以由任意适当的具有数据处理能力的设备执行,包括但不限于:终端设备和服务器等。或者,本公开实施例提供的任一种图像安全处理方法可以由处理器执行,如处理器通过调用存储器存储的相应指令来执行本公开实施例提及的任一种图像安全处理方法。下文不再 赘述。Any image security processing method provided in the embodiments of the present disclosure may be executed by any appropriate device with data processing capabilities, including but not limited to: terminal devices, servers, and the like. Alternatively, any image security processing method provided in the embodiments of the present disclosure may be executed by a processor, for example, the processor executes any image security processing method mentioned in the embodiments of the present disclosure by calling a corresponding instruction stored in a memory. I won't go into details below.
示例性装置Exemplary device
图6是本公开一示例性实施例提供的图像安全处理装置的结构示意图。该实施例的装置可用于实现本公开相应的方法实施例。如图6所示的装置包括:第一确定模块201、第二确定模块202、第三确定模块203以及处理模块204。Fig. 6 is a schematic structural diagram of an image security processing device provided by an exemplary embodiment of the present disclosure. The device of this embodiment can be used to implement the corresponding method embodiment of the present disclosure. The apparatus shown in FIG. 6 includes: a first determining module 201 , a second determining module 202 , a third determining module 203 and a processing module 204 .
第一确定模块201用于确定图像传感器采集待处理图像时的地理位置。The first determination module 201 is used to determine the geographic location when the image sensor captures the image to be processed.
第二确定模块202用于确定地理位置对应的地理安全等级。The second determination module 202 is used to determine the geographic security level corresponding to the geographic location.
第三确定模块203用于基于地理安全等级确定待处理图像中的目标对象。The third determining module 203 is configured to determine the target object in the image to be processed based on the geographic security level.
处理模块204用于对目标对象所在的图像区域进行隐私保护处理。The processing module 204 is configured to perform privacy protection processing on the image area where the target object is located.
图7是本公开另一示例性实施例提供的图像安全处理装置的结构示意图,如图7所示的第二确定模块202可以包括第一获取单元202-1和第二获取单元202-2。Fig. 7 is a schematic structural diagram of an image security processing apparatus provided by another exemplary embodiment of the present disclosure. The second determination module 202 shown in Fig. 7 may include a first obtaining unit 202-1 and a second obtaining unit 202-2.
第一获取单元202-1用于从预设地理位置匹配信息中获取地理位置匹配的目标地理位置。The first acquiring unit 202-1 is configured to acquire a target geographic location matched by the geographic location from preset geographic location matching information.
在一个可选的示例中,预设地理位置匹配信息包括至少一个预设地理位置、以及至少一个预设地理位置中各预设地理位置对应的位置区域范围。In an optional example, the preset geographic location matching information includes at least one preset geographic location, and a location area range corresponding to each preset geographic location in the at least one preset geographic location.
第二获取单元202-2用于从预设地理安全匹配信息中获取目标地理位置对应的目标地理安全等级、以及目标地理安全等级对应的目标对象类型。The second acquiring unit 202-2 is configured to acquire the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from preset geographic security matching information.
在一个可选示例中,预设地理安全匹配信息包括:各预设地理位置对应的地理安全等级、以及各地理安全等级对应的对象类型。In an optional example, the preset geographic security matching information includes: geographic security levels corresponding to each preset geographic location, and object types corresponding to each geographic security level.
在一个可选示例中,地理安全匹配信息中的对象类型包括以下任意一项或多项:车牌,人脸,建筑,预设装备。In an optional example, the object types in the geographic security matching information include any one or more of the following: license plate, human face, building, and preset equipment.
图8是本公开再一示例性实施例提供的图像安全处理装置的结构示意图,如图8所示的第三确定模块203可以包括第一识别单元203-1、第二识别单元203-2和确定单元203-3。Fig. 8 is a schematic structural diagram of an image security processing device provided by another exemplary embodiment of the present disclosure. The third determination module 203 shown in Fig. 8 may include a first identification unit 203-1, a second identification unit 203-2 and Determining unit 203-3.
第一识别单元203-1用于对待处理图像进行语义分割,得到待处理图像中的至少一个感兴趣区域。The first recognition unit 203-1 is configured to perform semantic segmentation on the image to be processed to obtain at least one region of interest in the image to be processed.
第二识别单元203-2用于对至少一个感兴趣区域进行语义识别,得到待处理图像中的至少一个感兴趣物体。The second recognition unit 203-2 is configured to perform semantic recognition on at least one region of interest to obtain at least one object of interest in the image to be processed.
确定单元203-3用于基于地理安全等级对应的对象类型,从至少一个感兴趣物体中确定目标对象。The determining unit 203-3 is configured to determine the target object from at least one object of interest based on the object type corresponding to the geographic security level.
在一个可选示例中,第二获取单元202-2还用于从预设地理安全匹配信息中获取目标地理位置对应的目标地理安全等级;从预设地理安全匹配信息中获取目标地理安全等级对应的目标对象类型和目标对象类型包括的各对象类别。In an optional example, the second acquiring unit 202-2 is further configured to acquire the target geographic security level corresponding to the target geographic location from the preset geographic security matching information; The target object type of and the object categories included in the target object type.
在一个可选示例中,预设地理安全匹配信息包括:各预设地理位置对应的地理安全等级,各地理安全等级对应的对象类型、以及对应的对象类型包括的各对象类别。In an optional example, the preset geographic security matching information includes: geographic security levels corresponding to each preset geographic location, object types corresponding to each geographic security level, and object categories included in the corresponding object types.
在一个可选示例中,确定单元203-3还用于基于地理安全等级对应的对象类型、以及对应的对象类型包括的各对象类别,从至少一个感兴趣物体中确定目标对象。In an optional example, the determining unit 203-3 is further configured to determine the target object from at least one object of interest based on the object type corresponding to the geographic security level and each object category included in the corresponding object type.
在一个可选示例中,处理模块204具体用于根据待处理图像对应的掩码图像,对待处理图像中目标对象所在图像区域对应位置的像素点进行遮挡处理,得到目标图像数据。In an optional example, the processing module 204 is specifically configured to, according to the mask image corresponding to the image to be processed, perform occlusion processing on pixels corresponding to the image area where the target object is located in the image to be processed to obtain target image data.
示例性电子设备Exemplary electronic device
下面,参考图9来描述根据本公开一示例性实施例提供的电子设备。如图9所示,电子设备包括一个或多个处理器901和存储器902。Hereinafter, an electronic device provided according to an exemplary embodiment of the present disclosure is described with reference to FIG. 9 . As shown in FIG. 9 , the electronic device includes one or more processors 901 and memory 902 .
处理器901可以是中央处理单元(CPU)或者具有数据处理能力和/或指令执行能力的其他形式的处理单元,并且可以控制电子设备中的其他组件以执行期望的功能。The processor 901 may be a central processing unit (CPU) or other forms of processing units having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions.
存储器902可以包括一个或多个计算机程序产品,所述计算机程序产品可以包括各种形式的计算机可读存储介质,例如易失性存储器和/或非易失性存储器。所述易失性存储器例如可以包括随机存取存储器(RAM)和/或高速缓冲存储器(cache)等。所述非易失性存储器例如可以包括只读存储器(ROM)、硬盘、闪存等。在所述计算机可读存储介质上可以存储一个或多个计算机程序指令,处理器901可以运行所述程序指令,以实现上文所述的本公开的各个实施例的图像安全处理方法以及/或者其他期望的功能。在所述计算机可读存储介质中还可以存储诸如输入信号、信号分量、噪声分量等各种内容。 Memory 902 may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random access memory (RAM) and/or cache memory (cache). The non-volatile memory may include, for example, a read-only memory (ROM), a hard disk, a flash memory, and the like. One or more computer program instructions may be stored on the computer-readable storage medium, and the processor 901 may execute the program instructions to implement the above-mentioned image security processing methods and/or other desired features. Various contents such as input signal, signal component, noise component, etc. may also be stored in the computer-readable storage medium.
在一个示例中,电子设备还可以包括:输入装置903和输出装置904,这些组件通过总线系统和/或其他形式的连接机构(未示出)互连。输入装置903可以包括例如键盘、鼠标等。输出装置904可以包括例如显示器、扬声器、打印机、以及通信网络及其所连接的远程输出设备等。In an example, the electronic device may further include: an input device 903 and an output device 904, and these components are interconnected through a bus system and/or other forms of connection mechanisms (not shown). The input device 903 may include, for example, a keyboard, a mouse, and the like. The output device 904 may include, for example, a display, a speaker, a printer, a communication network and remote output devices connected thereto, and the like.
当然,为了简化,图9中仅示出了该电子设备中与本公开有关的组件中的一些,省略了诸如总线、输入/输出接口等等的组件。除此之外,根据具体应用情况,电子设备还可以包括任何其他适当的组件。Of course, for simplicity, only some of the components related to the present disclosure in the electronic device are shown in FIG. 9 , and components such as bus, input/output interface, etc. are omitted. In addition, the electronic device may also include any other suitable components according to specific applications.
示例性计算机程序产品和计算机可读存储介质Exemplary computer program product and computer readable storage medium
除了上述方法和设备以外,本公开的实施例还可以是计算机程序产品,其包括计算机程序指令,所述计算机程序指令在被处理器运行时使得所述处理器执行本说明书上述“示例性方法”部分中描述的根据本公开各种实施例的图像安全处理方法中的步骤。In addition to the above-mentioned methods and devices, embodiments of the present disclosure may also be computer program products, which include computer program instructions that, when executed by a processor, cause the processor to perform the above-mentioned "exemplary method" of this specification. Steps in the image security processing method according to various embodiments of the present disclosure described in the section.
所述计算机程序产品可以以一种或多种程序设计语言的任意组合来编写用于执行本公开实施例操作的程序代码,所述程序设计语言包括面向对象的程序设计语言,诸如Java、C++等,还包括常规的过程式程序设计语言,诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。The computer program product can be written in any combination of one or more programming languages to execute the program codes for performing the operations of the embodiments of the present disclosure, and the programming languages include object-oriented programming languages, such as Java, C++, etc. , also includes conventional procedural programming languages, such as the "C" language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server to execute.
此外,本公开的实施例还可以是计算机可读存储介质,其上存储有计算机程序指令,所述计算机程序指令在被处理器运行时使得所述处理器执行本说明书上述“示例性方法”部分中描述的根据本公开各种实施例的图像安全处理方法中的步骤。In addition, the embodiments of the present disclosure may also be a computer-readable storage medium, on which computer program instructions are stored, and the computer program instructions, when executed by a processor, cause the processor to perform the above-mentioned "Exemplary Method" section of this specification. The steps in the image security processing method according to various embodiments of the present disclosure described in .
以上结合具体实施例描述了本公开的基本原理,但是,需要指出的是,在本公开中提及的优点、优势、效果等仅是示例而非限制,不能认为这些优点、优势、效果等是本公开的各个实施例必须具备的。另外,上述公开的具体细节仅是为了示例的作用和便于理解的作用,而非限制,上述细节并不限制本公开为必须采用上述具体的细节来实现。The basic principles of the present disclosure have been described above in conjunction with specific embodiments, but it should be pointed out that the advantages, advantages, effects, etc. mentioned in the present disclosure are only examples rather than limitations, and these advantages, advantages, effects, etc. Various embodiments of the present disclosure must have. In addition, the specific details disclosed above are only for the purpose of illustration and understanding, rather than limitation, and the above details do not limit the present disclosure to be implemented by using the above specific details.
本公开中涉及的器件、装置、设备、系统的方框图仅作为例示性的例子并且不意图要求或暗示必须按照方框图示出的方式进行连接、布置、配置。如本领域技术人员将认识到的,可以按任意方式连接、布置、配置这些器件、装置、设备、系统。诸如“包括”、“包含”、“具有”等等的词语是开放性词汇,指“包括但不限于”,且可与其互换使用。这里所使用的词汇“或”和“和”指词汇“和/或”,且可与其互换使用,除非上下文明确指示不是如此。这里所使用的词汇“诸如”指词组“诸如但不限于”,且可与其互换使用。The block diagrams of devices, devices, devices, and systems involved in the present disclosure are only illustrative examples and are not intended to require or imply that they must be connected, arranged, and configured in the manner shown in the block diagrams. As will be appreciated by those skilled in the art, these devices, devices, devices, systems may be connected, arranged, configured in any manner. Words such as "including", "comprising", "having" and the like are open-ended words meaning "including but not limited to" and may be used interchangeably therewith. As used herein, the words "or" and "and" refer to the word "and/or" and are used interchangeably therewith, unless the context clearly dictates otherwise. As used herein, the word "such as" refers to the phrase "such as but not limited to" and can be used interchangeably therewith.
可能以许多方式来实现本公开的方法和装置。例如,可通过软件、硬件、固件或者软件、硬件、固件的任何组合来实现本公开的方法和装置。用于所述方法的步骤的上述顺序仅是为了进行说明,本公开的方法的步骤不限于以上具体描述的顺序,除非以其它方式特别说明。还需要指出的是,在本公开的装置、设备和方法中,各部件或各步骤是可以分解和/或重新组合的。这些分解和/或重新组合应视为本公开的等效方案。The methods and apparatus of the present disclosure may be implemented in many ways. For example, the methods and apparatuses of the present disclosure may be implemented by software, hardware, firmware or any combination of software, hardware, and firmware. The above sequence of steps for the method is for illustration only, and the steps of the method of the present disclosure are not limited to the sequence specifically described above unless specifically stated otherwise. It should also be pointed out that, in the devices, equipment and methods of the present disclosure, each component or each step can be decomposed and/or reassembled. These decompositions and/or recombinations should be considered equivalents of the present disclosure.

Claims (10)

  1. 一种图像安全处理方法,包括:An image security processing method, comprising:
    确定图像传感器采集待处理图像时的地理位置;Determine the geographic location when the image sensor collects the image to be processed;
    确定所述地理位置对应的地理安全等级;determining the geographic security level corresponding to the geographic location;
    基于所述地理安全等级确定所述待处理图像中的目标对象;determining a target object in the image to be processed based on the geographic security level;
    对所述目标对象所在的图像区域进行隐私保护处理。Perform privacy protection processing on the image area where the target object is located.
  2. 根据权利要求1所述的方法,其中,所述确定所述地理位置对应的地理安全等级,包括:The method according to claim 1, wherein said determining the geographic security level corresponding to said geographic location comprises:
    从预设地理位置匹配信息中获取所述地理位置匹配的目标地理位置;其中,所述预设地理位置匹配信息包括至少一个预设地理位置;Obtaining the target geographic location matched by the geographic location from preset geographic location matching information; wherein the preset geographic location matching information includes at least one preset geographic location;
    从预设地理安全匹配信息中获取所述目标地理位置对应的目标地理安全等级、以及所述目标地理安全等级对应的目标对象类型;其中,所述预设地理安全匹配信息包括:所述各预设地理位置对应的地理安全等级以及各地理安全等级对应的对象类型。Obtain the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from the preset geographic security matching information; wherein, the preset geographic security matching information includes: each preset Set the geographic security level corresponding to the geographic location and the object type corresponding to each geographic security level.
  3. 根据权利要求2所述的方法,其中,所述地理安全匹配信息中的对象类型包括以下任意一项或多项:车牌,人脸,建筑和道路设施。The method according to claim 2, wherein the object types in the geographic security matching information include any one or more of the following: license plates, human faces, buildings and road facilities.
  4. 根据权利要求2所述的方法,其中,所述基于所述地理安全等级确定所述待处理图像中的目标对象,包括:The method according to claim 2, wherein said determining the target object in the image to be processed based on the geographic security level comprises:
    对所述待处理图像进行语义分割,得到所述待处理图像中的至少一个感兴趣区域;Semantically segmenting the image to be processed to obtain at least one region of interest in the image to be processed;
    对所述至少一个感兴趣区域进行语义识别,得到所述待处理图像中的至少一个感兴趣物体;Perform semantic recognition on the at least one region of interest to obtain at least one object of interest in the image to be processed;
    基于所述地理安全等级对应的对象类型,从所述至少一个感兴趣物体中确定目标对象。A target object is determined from the at least one object of interest based on the object type corresponding to the geographic security level.
  5. 根据权利要求2所述的方法,其中,所述从预设地理安全匹配信息中获取所述目标地理位置对应的目标地理安全等级、以及所述目标地理安全等级对应的目标对象类型,包括:The method according to claim 2, wherein said acquiring the target geographic security level corresponding to the target geographic location and the target object type corresponding to the target geographic security level from the preset geographic security matching information includes:
    从所述预设地理安全匹配信息中获取所述目标地理位置对应的目标地理安全等级;Obtain the target geographic security level corresponding to the target geographic location from the preset geographic security matching information;
    从所述预设地理安全匹配信息中获取所述目标地理安全等级对应的目标对象类型和所述目标对象类型包括的各对象类别;其中,所述预设地理安全匹配信息还包括:所述对象类型包括的各对象类别。The target object type corresponding to the target geographic security level and the object categories included in the target object type are obtained from the preset geographic security matching information; wherein, the preset geographic security matching information further includes: the object Each object class that the type includes.
  6. 根据权利要求5所述的方法,其中,所述基于所述地理安全等级确定所述待处理图像中的目标对象,包括:The method according to claim 5, wherein said determining the target object in the image to be processed based on the geographic security level comprises:
    对所述待处理图像进行语义分割,得到所述待处理图像中的至少一个感兴趣区域;Semantically segmenting the image to be processed to obtain at least one region of interest in the image to be processed;
    对所述至少一个感兴趣区域进行语义识别,得到所述待处理图像中的至少一个感兴趣物体;Perform semantic recognition on the at least one region of interest to obtain at least one object of interest in the image to be processed;
    基于所述地理安全等级对应的对象类型以及所述对应的对象类型包括的各对象类别,从所述至少一个感兴趣物体中确定目标对象。A target object is determined from the at least one object of interest based on the object type corresponding to the geographic security level and each object category included in the corresponding object type.
  7. 根据权利要求1-6任一项所述的方法,其中,所述对所述目标对象所在的图像区域进行隐私保护处理,包括:The method according to any one of claims 1-6, wherein the performing privacy protection processing on the image area where the target object is located comprises:
    根据所述待处理图像对应的掩码图像,对所述待处理图像中所述目标对象所在图像区域的像素点进行遮挡处理,得到目标图像数据。According to the mask image corresponding to the image to be processed, occlusion processing is performed on the pixels in the image area where the target object is located in the image to be processed to obtain target image data.
  8. 一种图像安全处理装置,包括:An image security processing device, comprising:
    第一确定模块,用于确定图像传感器采集待处理图像时的地理位置;The first determining module is used to determine the geographic location when the image sensor collects the image to be processed;
    第二确定模块,用于确定所述地理位置对应的地理安全等级;The second determination module is used to determine the geographic security level corresponding to the geographic location;
    第三确定模块,用于基于所述地理安全等级确定所述待处理图像中的目标对象;A third determination module, configured to determine the target object in the image to be processed based on the geographic security level;
    处理模块,用于对所述目标对象所在的图像区域进行隐私保护处理。A processing module, configured to perform privacy protection processing on the image region where the target object is located.
  9. 一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求1-7任一所述的图像安全处理方法。A computer-readable storage medium, the storage medium stores a computer program, and the computer program is used to execute the image security processing method described in any one of claims 1-7.
  10. 一种电子设备,所述电子设备包括:An electronic device comprising:
    处理器;processor;
    用于存储所述处理器可执行指令的存储器;memory for storing said processor-executable instructions;
    所述处理器,用于从所述存储器中读取所述可执行指令,并执行所述指令以实现上述权利要求1-7任一所述的图像安全处理方法。The processor is configured to read the executable instruction from the memory, and execute the instruction to implement the image security processing method described in any one of claims 1-7.
PCT/CN2022/116227 2021-10-14 2022-08-31 Image security processing method and apparatus, electronic device, and storage medium WO2023061082A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111199504.7A CN113936202A (en) 2021-10-14 2021-10-14 Image security processing method and device, electronic equipment and storage medium
CN202111199504.7 2021-10-14

Publications (1)

Publication Number Publication Date
WO2023061082A1 true WO2023061082A1 (en) 2023-04-20

Family

ID=79279332

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/116227 WO2023061082A1 (en) 2021-10-14 2022-08-31 Image security processing method and apparatus, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN113936202A (en)
WO (1) WO2023061082A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116664849A (en) * 2023-05-18 2023-08-29 中关村科学城城市大脑股份有限公司 Data processing method, device, electronic equipment and computer readable medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113936202A (en) * 2021-10-14 2022-01-14 北京地平线信息技术有限公司 Image security processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112347512A (en) * 2020-11-13 2021-02-09 支付宝(杭州)信息技术有限公司 Image processing method, device, equipment and storage medium
CN113259721A (en) * 2021-06-18 2021-08-13 长视科技股份有限公司 Video data sending method and electronic equipment
CN113393471A (en) * 2021-05-26 2021-09-14 中国联合网络通信集团有限公司 Image processing method and device
CN113936202A (en) * 2021-10-14 2022-01-14 北京地平线信息技术有限公司 Image security processing method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112347512A (en) * 2020-11-13 2021-02-09 支付宝(杭州)信息技术有限公司 Image processing method, device, equipment and storage medium
CN113393471A (en) * 2021-05-26 2021-09-14 中国联合网络通信集团有限公司 Image processing method and device
CN113259721A (en) * 2021-06-18 2021-08-13 长视科技股份有限公司 Video data sending method and electronic equipment
CN113936202A (en) * 2021-10-14 2022-01-14 北京地平线信息技术有限公司 Image security processing method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116664849A (en) * 2023-05-18 2023-08-29 中关村科学城城市大脑股份有限公司 Data processing method, device, electronic equipment and computer readable medium
CN116664849B (en) * 2023-05-18 2024-01-16 中关村科学城城市大脑股份有限公司 Data processing method, device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN113936202A (en) 2022-01-14

Similar Documents

Publication Publication Date Title
WO2023061082A1 (en) Image security processing method and apparatus, electronic device, and storage medium
US10599709B2 (en) Object recognition device, object recognition method, and program for recognizing an object in an image based on tag information
CN107133569B (en) Monitoring video multi-granularity labeling method based on generalized multi-label learning
WO2021139191A1 (en) Method for data labeling and apparatus for data labeling
CN112200081A (en) Abnormal behavior identification method and device, electronic equipment and storage medium
WO2020238556A1 (en) Configuration platform-based data transmission method, apparatus and computer device
WO2021238586A1 (en) Training method and apparatus, device, and computer readable storage medium
CN111226226A (en) Motion-based object detection method, object detection device and electronic equipment
CN111461105B (en) Text recognition method and device
CN116863286A (en) Double-flow target detection method and model building method thereof
CN112101302B (en) Illegal poster detection method and system and electronic equipment
CN114708545A (en) Image-based object detection method, device, equipment and storage medium
CN111881900B (en) Corpus generation method, corpus translation model training method, corpus translation model translation method, corpus translation device, corpus translation equipment and corpus translation medium
CN112001300A (en) Building monitoring method and device based on cross entropy according to position and electronic equipment
CN115966061B (en) Disaster early warning processing method, system and device based on 5G message
CN115690615B (en) Video stream-oriented deep learning target recognition method and system
TWI803243B (en) Method for expanding images, computer device and storage medium
CN114140723B (en) Multimedia data identification method and device, readable medium and electronic equipment
CN112784691B (en) Target detection model training method, target detection method and device
CN114821513A (en) Image processing method and device based on multilayer network and electronic equipment
CN114579876A (en) False information detection method, device, equipment and medium
Bharathi et al. A Conceptual Real-Time Deep Learning Approach for Object Detection, Tracking and Monitoring Social Distance using Yolov5
CN115883147B (en) Attacker portrait method based on graphic neural network
US20220198295A1 (en) Computerized system and method for identifying and applying class specific features of a machine learning model in a communication network
CN116030315A (en) Vehicle attribute identification model training method, vehicle attribute identification method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22880028

Country of ref document: EP

Kind code of ref document: A1