WO2020223858A1 - 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质 - Google Patents

发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质 Download PDF

Info

Publication number
WO2020223858A1
WO2020223858A1 PCT/CN2019/085552 CN2019085552W WO2020223858A1 WO 2020223858 A1 WO2020223858 A1 WO 2020223858A1 CN 2019085552 W CN2019085552 W CN 2019085552W WO 2020223858 A1 WO2020223858 A1 WO 2020223858A1
Authority
WO
WIPO (PCT)
Prior art keywords
scrambled
image
area
data
backup
Prior art date
Application number
PCT/CN2019/085552
Other languages
English (en)
French (fr)
Inventor
吴辉
詹国松
Original Assignee
浙江宇视科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 浙江宇视科技有限公司 filed Critical 浙江宇视科技有限公司
Priority to EP19927810.2A priority Critical patent/EP3968264A4/en
Priority to PCT/CN2019/085552 priority patent/WO2020223858A1/zh
Priority to US17/608,964 priority patent/US20220215071A1/en
Priority to CN201980095987.0A priority patent/CN113795861A/zh
Publication of WO2020223858A1 publication Critical patent/WO2020223858A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1062Editing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • H04N21/23476Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • H04N21/44055Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption by partially decrypting, e.g. decrypting a video stream that has been partially encrypted

Definitions

  • This article relates to the technical field of privacy protection, and in particular to a privacy protection method at the sender and receiver, electronic equipment, and computer-readable storage media.
  • This paper proposes a privacy protection method, electronic equipment, and computer-readable storage medium for the sender and receiver, which can protect user privacy during image and video transmission.
  • This article proposes a privacy protection method at the sender, which includes:
  • This article also proposes a privacy protection method at the receiving end, which includes:
  • the initial image is generated according to the scrambled image and the backup information.
  • This article also proposes an electronic device including:
  • At least one processor At least one processor
  • Memory set to store at least one program
  • the at least one processor When the at least one program is executed by the at least one processor, the at least one processor implements the method described above.
  • This document also proposes a computer-readable storage medium that stores computer-executable instructions, and the computer-executable instructions are used to execute the method described above.
  • FIG. 1 is a flowchart of the first embodiment of the privacy protection method of the sender provided herein;
  • FIG. 3 is a flowchart of a variation of the second embodiment of the privacy protection method of the sender provided herein;
  • FIG. 4 is a flowchart of the third embodiment of the privacy protection method of the sender provided herein;
  • FIG. 5 is a flowchart of the fourth embodiment of the privacy protection method of the sender provided herein;
  • FIG. 6 is a flowchart of the fifth embodiment of the privacy protection method of the sender provided herein;
  • FIG. 7 is a flowchart of the sixth embodiment of the privacy protection method of the sender provided herein;
  • FIG. 8 is a flowchart of the first embodiment of the privacy protection method of the receiving end provided herein;
  • FIG. 9 is an overall flowchart of an embodiment of the privacy protection method of the sending end and the receiving end provided herein;
  • FIG. 10 is a schematic structural diagram of an embodiment of the electronic device provided herein.
  • FIG. 1 is a schematic flowchart of the first embodiment of the privacy protection method of the sender in this document.
  • the privacy protection method of the sender includes the following steps:
  • Step S1 Obtain an initial image
  • the initial image is an image that requires privacy protection
  • the initial image may be an image captured by a monitoring device or the like.
  • the initial image may also be obtained by intercepting a frame of a video that requires privacy protection (such as surveillance video, etc.), that is, the step S1 may include the step of extracting a frame of image in the initial video as the initial image.
  • the initial video is a video that requires privacy protection.
  • Step S2 Obtain the area to be scrambled in the initial image
  • the area to be scrambled refers to an area that needs to be scrambled to protect user privacy.
  • the area to be scrambled may be any area designated by the user, the area to be scrambled may also be a characteristic area (such as a face area), and the area to be scrambled may also be a motion area ( That is, the area with moving objects in the image).
  • the step S2 may include the following steps: step S21, extract the area to be selected in the initial image according to preset rules; step S22, select the area from the extracted area according to the area selection setting performed by the user The user selection area is selected from the area to be selected, and the user selection area is used as the area to be scrambled.
  • the preset rule may be to use the motion area as the candidate area, or to use the characteristic area as the candidate area, or to use any area set by the user as the candidate area.
  • Step S3 Perform backup and scrambling processing on the initial image according to the area to be scrambled to obtain a scrambled image and backup information;
  • the area to be scrambled may be backed up first, and then the area to be scrambled may be scrambled to obtain a scrambled image and backup information.
  • the area to be scrambled can also be backed up first, the area to be scrambled is scrambled, and then the backup information is generated according to the result of scrambling the area to be scrambled (see The second embodiment below).
  • the scrambled image can be processed as a new initial image again, so as to obtain a new scrambled image and new backup information.
  • this step may also include multiple backup processes and multiple scrambling processes, and the multiple backup processes and the multiple scrambling processes are set alternately. Perform multiple backup processing and multiple scrambling processing on the original image, so that when the scrambled image and backup information are intercepted, it is more difficult for the interceptor to restore the original image based on the scrambled image and backup information, which is beneficial to protect the image And user privacy during video transmission.
  • This step may be to perform backup processing on the entire initial image.
  • This step may also be backup processing only for the area to be scrambled in the initial image, that is, this step may specifically be: backup and scramble the area to be scrambled in the initial image Process, get scrambled image and backup information. In this way, only the area to be scrambled is backed up, which helps reduce the data volume of the backup information.
  • this step may include the following steps: step S34, extract the data to be scrambled in the initial image according to the region to be scrambled; step S35, generate backup information based on the data to be scrambled; Step S36: Perform tampering processing on the data to be scrambled in the initial image to generate a scrambled image.
  • the data to be scrambled is data corresponding to the area to be scrambled in the initial image.
  • the data to be scrambled may be a quantizer parameter (QP) matrix of the area to be scrambled, and the quantizer parameter matrix is composed of multiple quantization parameter values (ie QP values), and Random virtual value processing is performed on the quantization parameter values in the quantization parameter matrix (that is, the quantization parameter values in the quantization parameter matrix are randomly changed to 0-51 integers), so that the region to be scrambled can be tampered with into a mosaic, So as to realize the scrambling of the area to be scrambled.
  • QP quantizer parameter
  • the quantization parameter value in the quantization parameter matrix can be re-processed with random virtual values within a certain range, so that It helps to ensure the scrambling effect on the initial picture.
  • the initial image is a frame of image in the initial video
  • the frame before the initial image in the initial video can be used to tamper with the area to be scrambled in the initial image.
  • the pixels in the static area in the frame before the initial image may be replaced with the pixels in the area to be scrambled, so as to achieve the technical effect of disappearing the objects in the area to be scrambled in the initial image. It should be noted that, by performing motion detection on each frame in the initial video, the motion area and the static area in each frame in the initial video can be distinguished.
  • the key frame (the key frame may specifically be an I frame in the relevant video standard)
  • the data of the static area of other frames that have been backed up before is directly used for replacement.
  • the predicted frame (the predicted frame may specifically be a P frame in a related video standard)
  • data replacement is directly performed on the area to be scrambled through a P-SKIP operation.
  • Step S4 Encrypt the backup information to obtain an encryption result
  • the backup information is encrypted using Advanced Encryption Standard (AES) and/or Data Encryption Standard (DES).
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • Step S5 Send the scrambled image and the encryption result.
  • the encryption result may be transmitted with the scrambled image, or may be transmitted separately from the scrambled image.
  • the encryption result is transmitted through the private data channel used.
  • the initial image is acquired; the area to be scrambled in the initial image is acquired; the initial image is backed up and scrambled according to the area to be scrambled to obtain the scrambled image and backup information Encrypt the backup information to obtain the encryption result; send the scrambled image and the encryption result so that even if the image or video is intercepted during transmission, the interceptor cannot obtain the complete content of the original image, thereby protecting User privacy.
  • decryption the original image can be restored based on the scrambled image and the encryption result, thereby realizing the transmission of the original image while protecting user privacy.
  • this embodiment mainly describes the privacy protection process of the initial image.
  • the privacy protection of the video file ie, the initial video
  • the above transmission can be used for each frame of the initial video.
  • the privacy protection method at the end is processed to realize the privacy protection of the initial video.
  • FIG. 2 is a schematic flowchart of the second embodiment of the privacy protection method of the sender in this document.
  • the step S3 includes the following steps:
  • Step S31 Generate a backup area image according to the area to be scrambled in the initial image
  • the backup area image may be consistent with the pixel value of each corresponding pixel of the area to be scrambled, and the backup area image may also be processed by processing the area to be scrambled according to a specific process. Generate (please refer to the third embodiment).
  • Step S32 Perform scrambling processing on the region to be scrambled in the initial image to obtain a scrambled image
  • this step can be performed through the following process: divide the area to be scrambled into N ⁇ N areas (where N>8 and N/8>4, if N>8 and N/8 cannot be satisfied >4, the value of N can be 4), get the median value of all pixels in each segmented area (that is, all pixels are arranged in order of pixel value, the value in the middle of the arrangement result), or calculate each segment The average value of all pixels in the obtained area, in any divided area, the median value or the average value is used to replace the pixel value of each pixel in the divided area.
  • Step S33 Generate backup information according to the backup area image.
  • the backup area image can be directly used as backup information, or the backup area image can be processed to generate backup information.
  • Fig. 3 is a variation of this embodiment.
  • the step S33 includes: step S331, analyzing the difference between the scrambled image and the backup area image to obtain a difference analysis Result; Step S332, use the difference analysis result as backup information.
  • the difference analysis result may be obtained by calculating the difference of each pixel in the same position in the scrambled image and the backup area image.
  • the backup information may include position information of the area to be scrambled, and the position information of the area to be scrambled refers to information used to record the position of the area to be scrambled in the initial image.
  • the location information of the area to be scrambled may be acquired when the area to be scrambled in the initial image is acquired.
  • the backup information may not include the location information of the area to be scrambled, and the location information of the area to be scrambled may be transmitted independently of the backup information without being encrypted or after being encrypted.
  • the backup information and the The scrambled image can be restored to obtain the initial image, and a recoverable scrambling process is realized.
  • FIG. 4 is a schematic flowchart of a third embodiment of the privacy protection method of the sender in this document.
  • the step S331 includes the following steps:
  • Step S3311 compare and analyze the scrambled image and the backup area image to obtain a comparison result image
  • comparison result image refers to an image that can reflect the difference between the scrambled image and the backup area image, and the comparison result image and the scrambled image can be used to obtain the Backup area image.
  • each pixel at the same position in the scrambled image and the backup region image may be calculated, and the difference obtained is used as the pixel value of the pixel at the corresponding position in the comparison result image. In this way, based on the comparison result image and the scrambled image, the backup area image can be obtained.
  • Step S3312 Perform compression coding on the comparison result image to obtain compressed comparison result data
  • the comparison result image can be compressed according to formats such as JPEG, H264, and H265.
  • the data volume of the comparison result image can be compressed, thereby helping to reduce the data volume of the backup information that needs to be transmitted, thereby helping to reduce the network transmission pressure.
  • Step S3313 Generate a difference analysis result according to the compressed comparison result data.
  • the compressed comparison result data can be directly used as the difference analysis result.
  • the compressed comparison result data is obtained by compressing and encoding the comparison result image; according to the compressed comparison result data, the difference analysis result is generated; the difference analysis result is used as backup information, which is beneficial to reduce the need The data volume of the transmitted backup information, thereby helping to reduce the network transmission pressure.
  • the initial image is a frame of image in the initial video
  • the step S3313 may include the following steps: Step S33131, according to the pre-detected motion area in the initial image Range, extract the motion area data in the compressed comparison result data; step S33132, use the motion area data in the compressed comparison result data as a difference analysis result.
  • the range of the motion area in the initial image may be obtained by performing motion detection on the initial image. It is worth noting that in the video file, the image in the non-motion area can be restored by the frame in the initial video before the initial image, so the non-motion area in the compressed comparison result data can be discarded after being discarded. restore.
  • the motion area and non-motion area in the compressed comparison result data can be specifically recorded by a private coding table, etc., so that the motion area data in the compressed comparison result data can be extracted.
  • the private coding table may be the following table The form shown in 1:
  • Table 1 An embodiment of a private coding table
  • the area corresponding to 1 is the moving area, and the area corresponding to 0 is the non-moving area.
  • the data in the non-motion area in the compressed comparison result data can be discarded, so that only the data in the motion area in the compressed comparison result data is transmitted, thereby helping to reduce the backup information that needs to be transmitted.
  • the amount of data can help reduce network transmission pressure.
  • the initial image may be a frame of image in the initial video.
  • Step S3313 may include the following steps: Step S33133, determine whether the initial image is a key frame (that is, determine whether the initial image is a key frame in the initial video); Step S33134, based on the initial image is not a key frame Use the real quantized data in the compressed comparison result data as the difference analysis result; step S33135, based on the judgment result that the initial image is a key frame, compare the bit stream header and the real data in the compressed comparison result data Quantitative data are used as the result of difference analysis.
  • the bit stream header refers to data used to store a standardized quantization table (the standardized quantization table is usually used to record image compression loss) in an image such as JPEG format;
  • the real quantized data includes private information and encoded data Information, the private information is used to store the location information of the characteristic area, the location information of the motion area, the private coding table, etc.
  • step S33133 By setting step S33133, step S33134, and step S33135, the code stream header of key frames can be retained in the difference analysis result, and the code stream header of non-key frames is not retained, which helps to reduce the amount of backup information that needs to be transmitted. , Thereby helping to reduce network transmission pressure.
  • FIG. 5 is a schematic flowchart of the fourth embodiment of the privacy protection method of the sender in this document.
  • the method before the step S5, the method further includes the following steps:
  • Step S45 Perform compression coding processing on the scrambled image to obtain scrambled coded data
  • the scrambled image can be compressed according to JPEG, H264, H265 and other formats.
  • the data amount of the scrambled image can be compressed, thereby helping to reduce the network transmission pressure in the process of transmitting the scrambled image.
  • step S5 includes:
  • Step S51 Generate scrambled coded information according to the scrambled coded data and the encryption result
  • the scrambled coded data and the data in the encryption result may be combined to obtain the scrambled coded information.
  • the initial image is a frame of image in the initial video
  • the step S51 may include: step S511, storing the encryption result in the scrambled encoded data In Supplemental Enhancement Information (SEI), scrambling coding information is generated.
  • SEI Supplemental Enhancement Information
  • the encryption result can be used as additional information, and the additional information can be transmitted in other ways.
  • Step S52 Send the scrambled coding information.
  • the scrambled image is compressed and coded to obtain scrambled coded data; the scrambled coded information is generated according to the scrambled coded data and the encryption result; and the scrambled coded information is sent , So that the data volume of the scrambled coded information to be sent is compressed and reduced, thereby helping to reduce the network transmission pressure in the process of transmitting the scrambled image.
  • FIG. 6 is a schematic flowchart of a fifth embodiment of the privacy protection method of the sender in this document.
  • the step S45 includes the following steps:
  • Step S451 Use the scrambled image as an image to be repeatedly scrambled
  • the difference between this embodiment and the fourth embodiment is that in this embodiment, in the process of compressing and encoding the scrambled image, the scrambled image is repeatedly scrambled. Before performing this step, it can be determined whether it can be executed according to the capability of at least one of the CPU, coprocessor, and encoder of the sending end, or according to whether the chip in the sending end supports pre-data processing for entropy decoding Step S451.
  • step S451 it can be determined whether the step S451 can be executed through the following process: acquiring the capability of at least one of the CPU, coprocessor, and encoder of the sending end, so that it can be distinguished whether the encoder is capable of processing quantized data (ie, compressed The ability of the encoded data), or the ability to determine whether the CPU/coprocessor can support the development of related services; according to the acquired ability of at least one of the CPU, coprocessor, and encoder of the sending end, the user can choose The scrambling effect of repeated scrambling (for example, the area to be scrambled is displayed in a mosaic, so that the objects in the area to be scrambled disappear).
  • quantized data ie, compressed The ability of the encoded data
  • the user can choose The scrambling effect of repeated scrambling (for example, the area to be scrambled is displayed in a mosaic, so that the objects in the area to be scrambled disappear).
  • Step S452 Extract the data to be tampered in the image to be repeatedly scrambled according to the region to be scrambled;
  • the data to be tampered is data corresponding to the area to be scrambled in the image to be repeatedly scrambled.
  • Step S453 Generate backup data according to the data to be tampered with
  • the data to be tampered may be copied to obtain the backup data.
  • Step S454 Generate a new encryption result according to the backup data and the encryption result
  • the backup data may be encrypted, and the encrypted backup data and the encryption result obtained in step S4 are collectively used as a new encryption result.
  • Step S455 Perform tampering processing on the data to be tampered in the image to be repeatedly scrambled to generate a repeatedly scrambled image;
  • the data to be tampered may be a quantizer parameter (QP) matrix of a region corresponding to the region to be scrambled in the image to be repeatedly scrambled, and the quantizer parameter matrix Composed of multiple quantization parameter values (ie QP values), by performing random virtual value processing on the quantization parameter values in the quantization parameter matrix (that is, the quantization parameter values in the quantization parameter matrix are randomly changed to 0-51 integers) ,
  • QP quantizer parameter
  • the area corresponding to the area to be scrambled in the image to be repeatedly scrambled can be tampered with into a mosaic, so as to realize the scrambling of the image to be repeatedly scrambled.
  • the quantization parameter value in the quantization parameter matrix can be re-processed with random virtual values within a certain range, so that This helps ensure the repeated scrambling effect on the image to be scrambled repeatedly.
  • the initial image is a frame of image in the initial video
  • the frame in the initial video that is located before the initial image can be used for the image to be repeatedly scrambled corresponding to the area to be scrambled Tampered with the area.
  • the pixels in the static area in the frame before the initial image may be replaced with pixels in the area to be scrambled, so as to achieve the technical effect of disappearing one or more moving objects in the initial image. It should be noted that, by performing motion detection on each frame in the initial video, the motion area and the static area in each frame in the initial video can be distinguished.
  • Step S456 Use the repeatedly scrambled image as scrambled coded data.
  • this step realizes that the repeatedly scrambled image (ie, the repeatedly scrambled image) is used as the scrambled coded data.
  • FIG. 7 is a schematic flowchart of the sixth embodiment of the privacy protection method of the sender in this document.
  • the method before the step S456, the method further includes the following steps:
  • Step S4551 Obtain the current number of repeated scrambling
  • the current number of repeated scrambling is used to count the number of repeated scrambling.
  • the current number of repeated scrambling may be stored in the sending end, and each time the repeated scrambling is completed, the current number of repeated scrambling is increased.
  • Step S4552 Compare the current number of repeated scrambling with the preset number of repeated scrambling
  • the preset number of times of repeated scrambling may be set by the user, or may be set according to the capability of at least one of the CPU, coprocessor, and encoder of the sending end.
  • the recommended number of repeated scrambling can be obtained according to the capabilities of at least one of the CPU, coprocessor, and encoder of the sending end, and then a value not greater than the recommended number of repeated scrambling can be set by the user as The preset number of repeated scrambling.
  • the preset number of times of repeated scrambling may be set to 1, and after each repeated scrambling is completed, according to the capability of at least one of the CPU, coprocessor, and encoder of the sending end, The user chooses whether to repeat the scrambling again.
  • Step S4553 Based on the judgment result that the current number of repeated scrambling times is not greater than the preset number of repeated scrambling times, use the repeatedly scrambled image as a new image to be repeatedly scrambled, and return according to the region to be scrambled , The step of extracting the data to be tampered in the scrambled image to be repeated (that is, returning to the step S452).
  • FIG. 8 is a schematic flowchart of the first embodiment of the privacy protection method at the receiving end in this document.
  • the privacy protection method of the receiving end is executed by the receiving end, and the receiving end may specifically be a receiving end of surveillance video, surveillance image, etc.
  • the privacy protection method at the receiving end includes the following steps:
  • Step S6 receiving the scrambled image and the encryption result
  • the scrambled image and the encryption result are sent according to the privacy protection method of the sending end in any of the embodiments described above.
  • the encryption result may be received simultaneously with the scrambled image, or may be received separately from the scrambled image.
  • the encryption result is transmitted through the user's private data channel.
  • Step S7 decrypt the encryption result to obtain the backup information
  • the decryption algorithm used in this step should be an algorithm corresponding to the encryption algorithm used in step S4.
  • the advanced encryption standard Advanced Encryption Standard, AES
  • the Data Encryption Standard Data Encryption Standard, DES
  • Step S8 Generate the initial image according to the scrambled image and the backup information.
  • the initial image may be generated from the scrambled image and the backup information.
  • FIG. 9 is an overall flowchart of an embodiment of the privacy protection method of the sending end and the receiving end provided herein. The process includes the following steps:
  • Step S100 Provide the user with an option to scramble the initial video, so that the user can select the option to specify a region to be scrambled for each frame of the image in the initial video.
  • the user can designate a specific area of each frame of image in the initial video as the area to be selected by selecting the options.
  • the specific area may be an area that satisfies any condition, may also be a motion area obtained through motion detection, or may be a characteristic area obtained through feature area detection, or the like.
  • Step S200 Acquire a frame of image in the initial video as an initial image, and perform motion detection and feature area detection on the initial image to obtain the motion area and the feature area in the initial image.
  • the motion detection can be implemented by comparing the initial image with a frame adjacent to the initial image in the initial video.
  • the characteristic area may be a face area, and the characteristic area detection may specifically be a face area detection.
  • the face area detection can be specifically implemented by comparing the color of the pixel with the skin color of the face.
  • Step S300 Perform backup processing on the area to be scrambled to obtain an image of the backup area, and perform a strong filtering process on the area to be scrambled according to N ⁇ N macroblocks to obtain a scrambled image.
  • the powerful filtering process can be performed by the following process: dividing the area to be scrambled into N ⁇ N areas (where N>8 and N/8>4, if N>8 and N/8>4 cannot be satisfied Condition, N value can take 4), get the median value of all pixels in each segmented area (that is, all pixels are arranged in order of pixel value, the value in the middle of the arrangement result), or calculate the value of each segment
  • N value can take 4
  • the average value of all pixels in the area, in any divided area, the median value or the average value is used to replace the pixel value of each pixel in the divided area.
  • Step S400 Perform difference calculation (ie, compare and analyze) the backup area image and the area to be scrambled of the initial image to obtain a difference image (ie, a comparison result image), and perform the difference image according to the JPEG format Compress encoding to obtain compressed difference data (that is, compressed comparison result data), and extract the motion area data in the compressed difference data as the difference analysis result.
  • the difference image is compressed and encoded first to obtain compressed difference data, and then the motion area data in the compressed difference data is extracted to obtain the difference analysis result.
  • the motion area in the difference image may be extracted first, and then the motion area of the extracted difference image may be compressed and coded to obtain the difference analysis result.
  • Step S500 The scrambled image is sent to the video encoder at the sending end for encoding to obtain a scrambled video.
  • each frame of image in the initial video is taken as the initial image in turn, and scrambled is performed to obtain multiple scrambled images, and then the multiple scrambled images obtained are sent to the video encoder for encoding.
  • the initial scrambled video that is, the scrambled video.
  • the scrambled image may also be repeatedly scrambled.
  • the repeated scrambling process may include the following steps: acquiring CPU/coprocessor and encoder capabilities, so that it can be distinguished whether the encoder has the ability to process quantized data or whether the CPU/coprocessor can support the development of related services;
  • the acquired CPU/coprocessor and encoder capabilities provide the user with options to enable the user to select the scrambling effect of mosaic or the scrambling effect of disappearing objects; obtain the user area scrambled before compression encoding, that is, the scrambling effect
  • the area in the scrambled image corresponding to the area to be scrambled back up the area in the scrambled image that corresponds to the area to be scrambled; and the area in the scrambled image corresponding to the area to be scrambled
  • the data obtained from the backup in the area of the data center is packaged and transmitted to the receiving end.
  • Step S600 Encrypt the difference analysis result, and store the encrypted difference analysis result into the supplementary enhancement information of the scrambled image in the scrambled video.
  • the backup information may be encrypted by adopting the Advanced Encryption Standard (AES) and/or the Data Encryption Standard (DES).
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • Step S700 Decode the received video data, decrypt the supplementary enhancement information, obtain the difference analysis result, and decode the difference analysis result to obtain the motion area in the difference image, according to the The motion area in the difference image generates the initial image.
  • the video data received in this step contains supplementary enhancement information.
  • the difference analysis result should be decoded in a manner corresponding to the compression coding of the difference analysis result.
  • step S100 to the step S600 are executed by the sending end, and the step S700 is executed by the receiving end.
  • the sending end and the receiving end may be different electronic devices, or the same electronic device.
  • the scrambled transmission of the initial image is realized. Even if the image or video is intercepted during transmission, the interceptor cannot obtain the complete content of the initial image, thereby protecting the privacy of the user.
  • the original image can be recovered according to the scrambled image and the encryption result, which realizes the transmission of the original image under the premise of protecting user privacy.
  • FIG. 10 is a schematic diagram of the hardware structure of an electronic device provided in this article. As shown in FIG. 10, the electronic device includes one or more processors 110 and a memory 120. A processor 110 is taken as an example in FIG. 10.
  • the electronic device may further include: an input device 130 and an output device 140.
  • the processor 110, the memory 120, the input device 130, and the output device 140 in the electronic device may be connected through a bus or other methods.
  • the connection through a bus is taken as an example.
  • the memory 120 can be configured to store software programs, computer-executable programs, and modules.
  • the processor 110 executes various functional applications and data processing by running software programs, instructions, and modules stored in the memory 120 to implement any one of the methods in the foregoing embodiments.
  • the memory 120 may include a program storage area and a data storage area.
  • the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to the use of the electronic device, and the like.
  • the memory may include volatile memory such as random access memory (RAM), and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage devices.
  • RAM random access memory
  • the memory 120 may be a non-transitory computer storage medium or a transitory computer storage medium.
  • the non-transitory computer storage medium for example, at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
  • the memory 120 may optionally include a memory remotely provided with respect to the processor 110, and these remote memories may be connected to the electronic device through a network. Examples of the above-mentioned network may include the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the input device 130 may be configured to receive input digital or character information, and to generate key signal input related to user settings and function control of the electronic device.
  • the output device 140 may include a display device such as a display screen.
  • This embodiment also provides a computer-readable storage medium that stores computer-executable instructions, and the computer-executable instructions are used to execute the foregoing method.
  • All or part of the processes in the methods of the above-mentioned embodiments may be implemented by a computer program that executes the relevant hardware.
  • the program may be stored in a non-transitory computer-readable storage medium. When the program is executed, it may include the methods described above.
  • the non-transitory computer-readable storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a RAM.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)

Abstract

一种发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质。所述方法包括:获取初始图像(S1);获取所述初始图像中的待加扰区域(S2);根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息(S3);加密所述备份信息,得到加密结果(S4);发送所述加扰图像和所述加密结果(S5)。

Description

发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质 技术领域
本文涉及隐私保护技术领域,尤其涉及一种发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质。
背景技术
随着监控技术、视频聊天等技术的普及,由于视频、图像等可能在传输过程中被截获,用户的隐私变得容易被侵犯。如何在有限的资源下,建立视频、图像的保护方案,以避免用户的隐私被侵犯,显得尤为重要。
发明内容
本文提出了一种发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质,能够保护图像和视频传输过程中的用户隐私。
本文提出了一种发送端的隐私保护方法,所述方法包括:
获取初始图像;
获取所述初始图像中的待加扰区域;
根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息;
加密所述备份信息,得到加密结果;
发送所述加扰图像和所述加密结果。
本文还提出了一种接收端的隐私保护方法,所述方法包括:
接收所述加扰图像和所述加密结果;
对所述加密结果进行解密处理,得到所述备份信息;
根据所述加扰图像和所述备份信息,生成所述初始图像。
本文还提出了一种电子设备,包括:
至少一个处理器;
存储器,设置为存储至少一个程序,
当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现如上所述的方法。
本文还提出了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于执行如上所述的方法。
附图说明
图1是本文提供的发送端的隐私保护方法的第一实施例的流程图;
图2是本文提供的发送端的隐私保护方法的第二实施例的流程图;
图3是本文提供的发送端的隐私保护方法的第二实施例的一变例的流程图;
图4是本文提供的发送端的隐私保护方法的第三实施例的流程图;
图5是本文提供的发送端的隐私保护方法的第四实施例的流程图;
图6是本文提供的发送端的隐私保护方法的第五实施例的流程图;
图7是本文提供的发送端的隐私保护方法的第六实施例的流程图;
图8是本文提供的接收端的隐私保护方法的第一实施例的流程图;
图9是本文提供的发送端和接收端的隐私保护方法的一实施例的整体流程图;
图10是本文提供的电子设备的一实施例结构示意图。
具体实施方式
本文实施例提供了一种发送端的隐私保护方法,所述发送端的隐私保护方法由发送端执行,所述发送端具体可以为监控视频、监控图像等的发送端。参照图1,图1为本文发送端的隐私保护方法第一实施例的流程示意图。
本实施例中,所述发送端的隐私保护方法包括以下步骤:
步骤S1:获取初始图像;
需要说明的是,所述初始图像为需要进行隐私保护的图像,所述初始图像可以为由监控设备等拍摄得到的图像。所述初始图像还可以为通过截取需要隐私保护的视频(比如:监控视频等)中的一帧得到,也即,所述步骤S1可以包括步骤:提取初始视频中的一帧图像作为初始图像。其中,所述初始视频为需要进行隐私保护的视频。
步骤S2:获取所述初始图像中的待加扰区域;
需要说明的是,所述待加扰区域是指,需要进行加扰,以保护用户隐私的区域。在具体实现中,所述待加扰区域可以为用户指定的任意区域,所述待加 扰区域也可以为特征区域(比如:人脸区域),所述待加扰区域还可以为运动区域(即图像内具有运动物体的区域)。本实施例中,所述步骤S2可以包括如下步骤:步骤S21、根据预设规则,提取所述初始图像中的待选区域;步骤S22、根据由用户进行的区域选择设置,从提取的所述待选择区域中选取用户选择区域,将所述用户选择区域作为待加扰区域。其中,所述预设规则可以为将运动区域作为待选区域,也可以为将特征区域作为待选区域,还可以为将用户设置的任意区域作为待选区域。
步骤S3:根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息;
需要说明的是,本步骤中,可以通过先对所述待加扰区域进行备份,再对所述待加扰区域进行加扰,以得到加扰图像和备份信息。本步骤中,也可以先对所述待加扰区域进行备份,对所述待加扰区域进行加扰,再根据对所述待加扰区域进行加扰的结果生成所述备份信息(请参见下文中的第二实施例)。本步骤中,在对初始图像进行加扰处理后,可以将所述加扰图像重新作为新的初始图像进行处理,从而得到新的加扰图像和新的备份信息。由此可见,本步骤中也可以包括多个备份处理和多个加扰处理的过程,所述多个备份处理和所述多个加扰处理的过程相间设置。对初始图像进行多次备份处理和多次加扰处理,使得在加扰图像和备份信息被截获的情况下,截获者根据加扰图像和备份信息还原得到初始图像的难度被提高,利于保护图像和视频传输过程中的用户隐私。
本步骤可以为对整个所述初始图像进行备份处理。本步骤也可以为只对所述初始图像中的所述待加扰区域进行备份处理,也即,本步骤具体可以为:对所述初始图像中的所述待加扰区域进行备份和加扰处理,得到加扰图像和备份信息。这样只对所述待加扰区域进行了备份处理,利于减小所述备份信息的数据量。
在具体实现中,本步骤可以包括如下步骤:步骤S34、根据所述待加扰区域,提取所述初始图像中的待加扰数据;步骤S35、根据所述待加扰数据,生成备份信息;步骤S36、对所述初始图像中的所述待加扰数据进行篡改处理,生成加扰图像。其中,所述待加扰数据为所述初始图像中与所述待加扰区域对应的数据。
在一实施例中,所述待加扰数据可以为所述待加扰区域的量化参数(Quantizer Parameter,QP)矩阵,所述量化参数矩阵由多个量化参数值(即QP值)组成,通过对所述量化参数矩阵中的量化参数值进行随机虚拟值处理(即 将所述量化参数矩阵中的量化参数值随机改为0~51整数),能够使所述待加扰区域被篡改为马赛克,从而实现对所述待加扰区域的加扰。在一实施例中,如果篡改后的量化参数值与篡改前的量化参数值差别较小,可以将所述量化参数矩阵中的量化参数值在一定范围内进行重新进行随机虚拟值处理,这样可以利于确保对初始图片的加扰效果。
在一实施例中,所述初始图像为初始视频中的一帧图像,可以利用初始视频中,位于所述初始图像之前的帧,对所述初始图像中的待加扰区域进行篡改。具体地,可以将所述初始图像之前的帧中的静止区域的像素替换成为所述待加扰区域中的像素,从而实现使初始图像中的待加扰区域中的物体消失的技术效果。需要说明的是,可以通过对所述初始视频中的每个帧进行运动检测,来区分所述初始视频中的每个帧中的运动区域和静止区域。本实施例在具体实现中,对于关键帧(所述关键帧具体可以为相关视频标准中的I帧),直接采用之前备份过的其他帧的静止区域的数据进行替换。对于预测帧(所述预测帧具体可以为相关视频标准中的P帧),则直接通过P-SKIP操作对所述待加扰区域进行数据替换。
步骤S4:加密所述备份信息,得到加密结果;
需要说明的是,本实施例中,为采用高级加密标准(Advanced Encryption Standard,AES)和/或数据加密标准(Data Encryption Standard,DES),对所述备份信息进行加密。
步骤S5:发送所述加扰图像和所述加密结果。
需要说明的是,所述加密结果可以随所述加扰图像传送,也可以与所述加扰图像分开传送。在本实施例中,所述加密结果为通过用的私有数据通路进行传送。
在本实施例中,通过获取初始图像;获取所述初始图像中的待加扰区域;根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息;加密所述备份信息,得到加密结果;发送所述加扰图像和所述加密结果,使得即使在图像或视频在传输的过程中被截获,截获者无法获取原始图像的完整内容,从而保护了用户的隐私。而通过解密,则可以根据所述加扰图像和所述加密结果,恢复得到初始图像,从而在保护用户隐私的前提下实现了初始图像的传输。
可理解的是,本实施例中主要说明了对初始图像的隐私保护过程,在需要 对视频文件(即初始视频)进行隐私保护的情况下,可以对初始视频中的每帧图像均采用上述发送端的隐私保护方法进行处理,以实现对初始视频的隐私保护。
参考图2,图2为本文发送端的隐私保护方法第二实施例的流程示意图。
基于上述第一实施例,在本实施例中,所述步骤S3包括以下步骤:
步骤S31:根据所述初始图像中的所述待加扰区域,生成备份区域图像;
需要说明的是,所述备份区域图像可以与所述待加扰区域的每个对应像素的像素值均一致,所述备份区域图像也可以为通过对所述待加扰区域按照特定过程处理而生成(请参见第三实施例)。
步骤S32:对所述初始图像中的所述待加扰区域进行加扰处理,得到加扰图像;
需要说明的是,本步骤可以通过如下过程进行:将所述待加扰区域分割为N×N个区域(其中,N>8且N/8>4,如不能满足N>8且N/8>4的条件,N值可以取4),获取每个分割得到的区域中所有像素的中值(即将所有像素按像素值依次排列,位于排列结果的中间位置的值),或者计算每个分割得到的区域中所有像素的均值,任一分割得到的区域中,均使用所述中值或者所述均值替换该分割得到的区域中的每个像素的像素值。
步骤S33:根据所述备份区域图像,生成备份信息。
在具体实现中,可以将所述备份区域图像直接作为备份信息,也可以对所述备份区域图像进行处理,以生成备份信息。图3为本实施例的一变例,在图3所示的实施例中,所述步骤S33包括:步骤S331、分析所述加扰图像和所述备份区域图像之间的差异,得到差异分析结果;步骤S332、将所述差异分析结果作为备份信息。其中,所述差异分析结果可以通过对所述加扰图像和所述备份区域图像中的每个位置相同的像素求差而得到。
需要说明的是,所述备份信息中可以包括待加扰区域位置信息,所述待加扰区域位置信息是指用于记录所述待加扰区域在所述初始图像中的位置的信息,所述待加扰区域位置信息可以为在获取所述初始图像中的待加扰区域时获取。所述备份信息中也可以不包括所述待加扰区域位置信息,所述待加扰区域位置信息可以未经加密或者在加密后,与所述备份信息相互独立地传输。
本实施例中,通过先对所述初始图像中的所述待加扰区域进行备份,再对所述初始图像中的所述待加扰区域进行加扰,使得通过所述备份信息和所述加 扰图像可以恢复得到所述初始图像,实现了可恢复的加扰处理。
参考图4,图4为本文发送端的隐私保护方法第三实施例的流程示意图。
基于上述如图3所示的第二实施例的变例,在本实施例中,所述步骤S331包括以下步骤:
步骤S3311:将所述加扰图像和所述备份区域图像进行比较分析,得到比较结果图像;
需要说明的是,所述比较结果图像是指,能够反映所述加扰图像和所述备份区域图像之间的差异的图像,根据所述比较结果图像和所述加扰图像,能够得到所述备份区域图像。
在具体实现中,可以对所述加扰图像和所述备份区域图像中的每个位置相同的像素进行求差,将求差得到的值作为所述比较结果图像中对应位置像素的像素值。这样,根据所述比较结果图像和所述加扰图像,能够得到所述备份区域图像。
步骤S3312:对所述比较结果图像进行压缩编码,得到压缩比较结果数据;
需要说明的是,本步骤中,可以将所述比较结果图像按照JPEG、H264、H265等格式压缩。
可理解的是,本步骤中,通过对比较结果图像进行压缩编码,能够使比较结果图像的数据量被压缩,从而利于减小需要传输的备份信息的数据量,从而利于减小网络传输压力。
步骤S3313:根据所述压缩比较结果数据,生成差异分析结果。
在具体实现中,本实施例中,可以直接将所述压缩比较结果数据作为差异分析结果。
在本实施例中,通过对所述比较结果图像进行压缩编码,得到压缩比较结果数据;根据所述压缩比较结果数据,生成差异分析结果;将所述差异分析结果作为备份信息,利于减小需要传输的备份信息的数据量,从而利于减小网络传输压力。
作为所述第三实施例的一变例,所述初始图像为初始视频中的一帧图像,所述步骤S3313可以包括如下步骤:步骤S33131、根据预先检测到的所述初始图像中的运动区域范围,提取所述压缩比较结果数据中的运动区域数据;步骤S33132、将所述压缩比较结果数据的运动区域数据作为差异分析结果。其中,所述初始图像中的运动区域范围可以通过对所述初始图像进行运动检测得到。 值得注意的是,在视频文件中,非运动区域的图像可以通过所述初始视频中位于所述初始图像前的帧进行恢复,故所述压缩比较结果数据中的非运动区域在舍弃后可以被恢复。所述压缩比较结果数据中的运动区域和非运动区域,具体可以通过私有编码表等方式进行记录,从而使压缩比较结果数据中的运动区域数据能够被提取,所述私有编码表可以为如下表1所示的形式:
表1私有编码表的一实施例
1 1 0 0
1 1 0 0
1 1 0 0
1 1 0 0
在表1中,与1对应的区域为运动区域,与0对应的区域为非运动区域。
通过设置步骤S33131和步骤S33132,能够实现对所述压缩比较结果数据中的非运动区域的数据进行舍弃,从而只传输所述压缩比较结果数据中运动区域数据,从而利于减小需要传输的备份信息的数据量,从而利于减小网络传输压力。
作为所述第三实施例的另一变例,所述初始图像可以为初始视频中的一帧图像。步骤S3313可以包括如下步骤:步骤S33133、判断所述初始图像是否为关键帧(即判断所述初始图像是否为所述初始视频中的关键帧);步骤S33134、基于所述初始图像不为关键帧的判断结果,将所述压缩比较结果数据中的真实量化数据作为差异分析结果;步骤S33135、基于所述初始图像为关键帧的判断结果,将所述压缩比较结果数据中的码流头和真实量化数据均作为差异分析结果。其中,所述码流头是指在JPEG格式等图像中用于存放标准化量化表(所述标准化量化表通常用于记录图像压缩损失状况)的数据;所述真实量化数据包括私有信息和编码数据信息,所述私有信息用于存放特征区域的位置信息、运动区域的位置信息、私有编码表等。
通过设置步骤S33133、步骤S33134、步骤S33135,可以实现在所述差异分析结果中保留关键帧的码流头,不保留非关键帧的码流头,这样利于减小需 要传输的备份信息的数据量,从而利于减小网络传输压力。
参考图5,图5为本文发送端的隐私保护方法第四实施例的流程示意图。
基于上述第三实施例,在本实施例中,所述步骤S5之前,所述方法还包括以下步骤:
步骤S45:对所述加扰图像进行压缩编码处理,得到加扰编码数据;
需要说明的是,可以将所述加扰图像按照JPEG、H264、H265等格式压缩。
可理解的是,本步骤中,通过对加扰图像进行压缩编码,能够使加扰图像的数据量被压缩,从而利于减小传输加扰图像过程中的网络传输压力。
并且,所述步骤S5包括:
步骤S51:根据所述加扰编码数据和所述加密结果,生成加扰编码信息;
需要说明的是,可以将所述加扰编码数据和所述加密结果中的数据进行合并,以得到所述加扰编码信息。
在所述第四实施例的一变例中,所述初始图像为初始视频中的一帧图像,所述步骤S51可以包括:步骤S511、将所述加密结果存储于所述加扰编码数据的补充增强信息(Supplemental Enhancement Information,SEI)中,生成加扰编码信息。在其他实施例中,可以将所述加密结果作为附加信息,并采用其他方式对所述附加信息进行传输。
步骤S52:发送所述加扰编码信息。
本实施例中,通过对所述加扰图像进行压缩编码处理,得到加扰编码数据;根据所述加扰编码数据和所述加密结果,生成加扰编码信息;并发送所述加扰编码信息,使得需要发送的加扰编码信息的数据量得到压缩减少,从而利于减小传输加扰图像过程中的网络传输压力。
参考图6,图6为本文发送端的隐私保护方法第五实施例的流程示意图。
基于上述第四实施例,在本实施例中,所述步骤S45包括以下步骤:
步骤S451:将所述加扰图像作为待重复加扰图像;
需要说明的是,本实施例与所述第四实施例的区别在于,本实施例中,在对加扰图像进行压缩编码的过程中,进行了对所述加扰图像进行了重复加扰。在执行本步骤之前,可以根据所述发送端的CPU、协处理器及编码器的中至少之一的能力,或者根据所述发送端中芯片是否支持对熵解码进行前数据处理,判断是否能够执行步骤S451。具体地,可以通过如下过程判断是否能够执行所述步骤S451:获取所述发送端的CPU、协处理器以及编码器中至少之一的能力, 这样能够区分编码器是否具备处理量化后数据(即压缩编码后的数据)的能力,或者能够判断CPU/协处理器是否可以支撑相关业务的开展;根据获取的所述发送端的CPU、协处理器以及编码器中至少之一的能力,提供用户可以选择的进行重复加扰的加扰效果(比如:使待加扰区域呈马赛克显示,使待加扰区域中的物体消失)。
步骤S452:根据所述待加扰区域,提取所述待重复加扰图像中的待篡改数据;
需要说明的是,所述待篡改数据为所述待重复加扰图像中与所述待加扰区域对应的数据。
步骤S453:根据所述待篡改数据,生成备份数据;
在具体实现中,可以将复制所述待篡改数据,以得到所述备份数据。
步骤S454:根据所述备份数据和所述加密结果,生成新的加密结果;
在具体实现中,可以对所述备份数据进行加密,并将加密后的所述备份数据和所述步骤S4中得到的加密结果,共同作为新的加密结果。
步骤S455:对所述待重复加扰图像中的待篡改数据进行篡改处理,生成重复加扰图像;
在一实施例中,所述待篡改数据可以为,所述待重复加扰图像中的与所述待加扰区域相对应的区域的量化参数(Quantizer Parameter,QP)矩阵,所述量化参数矩阵由多个量化参数值(即QP值)组成,通过对所述量化参数矩阵中的量化参数值进行随机虚拟值处理(即将所述量化参数矩阵中的量化参数值随机改为0~51整数),能够使所述待重复加扰图像中与所述待加扰区域相对应的区域被篡改为马赛克,从而实现对所述待重复加扰图像的加扰。在一实施例中,如果篡改后的量化参数值与篡改前的量化参数值差别较小,可以将所述量化参数矩阵中的量化参数值在一定范围内进行重新进行随机虚拟值处理,这样可以利于确保对所述待重复加扰图像的重复加扰效果。
在一实施例中,所述初始图像为初始视频中的一帧图像,可以利用初始视频中,位于所述初始图像之前的帧,对所述待重复加扰图像中的与待加扰区域对应的区域进行篡改。具体地,可以将所述初始图像之前的帧中的静止区域的像素替换成为所述待加扰区域中的像素,从而实现使初始图像中一个或多个运动物体消失的技术效果。需要说明的是,可以通过对所述初始视频中的每个帧进行运动检测,来区分所述初始视频中的每个帧中的运动区域和静止区域。
步骤S456:将所述重复加扰图像作为加扰编码数据。
需要说明的是,本步骤实现了将经重复加扰后的图像(即重复加扰图像)作为加扰编码数据。
本实施例中,通过在压缩编码的过程中对所述加扰图像进行重复加扰,从而增强了对所述初始图片的加扰效果,使用户的隐私安全得到了进一步地提高。
参考图7,图7为本文发送端的隐私保护方法第六实施例的流程示意图。
基于上述第五实施例,在本实施例中,所述步骤S456之前,所述方法还包括以下步骤:
步骤S4551:获取当前重复加扰次数;
需要说明的是,所述当前重复加扰次数用于对重复加扰的次数进行计数。在具体实现中,所述当前重复加扰次数可以存储于所述发送端,每完成一次重复加扰,就对所述当前重复加扰次数进行增加。
步骤S4552:比较所述当前重复加扰次数和预设重复加扰次数;
需要说明的是,所述预设重复加扰次数可以由用户自行设置,也可以为根据所述发送端的CPU、协处理器和编码器中至少之一的能力进行设置。在具体实现中,可以根据所述发送端的CPU、协处理器和编码器中至少之一的能力,获取推荐重复加扰次数,再由用户设置一个不大于所述推荐重复加扰次数的数值作为预设重复加扰次数。在一实施例中,所述预设重复加扰次数可以设置为1,并且在每次重复加扰完成后,根据所述发送端的CPU、协处理器以及编码器中至少之一的能力,使用户选择是否再次进行重复加扰。
步骤S4553:基于所述当前重复加扰次数不大于所述预设重复加扰次数的判断结果,将所述重复加扰图像作为新的待重复加扰图像,并返回根据所述待加扰区域,提取所述待重复加扰图像中的待篡改数据的步骤(即返回所述步骤S452)。
需要说明的是,本步骤中返回所述步骤S452,使得重复加扰的过程被再一次地执行,这样利于通过多次的重复加扰,增强对所述初始图片的加扰效果,使用户的隐私安全得到了进一步地提高。可理解的是,在加扰图像和备份信息被截获的情况下,截获者根据加扰图像和备份信息还原得到初始图像的难度被提高,利于保护图像和视频传输过程中的用户隐私。
本文实施例还提供了一种接收端的隐私保护方法,参照图8,图8为本文接收端的隐私保护方法第一实施例的流程示意图。所述接收端的隐私保护方法由 接收端执行,所述接收端具体可以为监控视频、监控图像等的接收端。
本实施例中,所述接收端的隐私保护方法包括以下步骤:
步骤S6:接收加扰图像和加密结果;
需要说明的是,所述加扰图像和所述加密结果为按照如上所述的任一实施例中的发送端的隐私保护方法发送。所述加密结果可以与所述加扰图像同时被接收,也可以与所述加扰图像分开被接收。在本实施例中,所述加密结果为通过用户的私有数据通路进行传送。
步骤S7:对所述加密结果进行解密处理,得到所述备份信息;
需要说明的是,本步骤中所采用的解密算法应为与所述步骤S4中采用的加密算法相对应的算法。本实施例中,为采用高级加密标准(Advanced Encryption Standard,AES)和/或数据加密标准(Data Encryption Standard,DES),对所述加密结果进行解密。
步骤S8:根据所述加扰图像和所述备份信息,生成所述初始图像。
需要说明的是,由于所述加扰图像和所述备份信息为通过对所述初始图像进行备份和加扰处理而得到,因而,采用与所述步骤S3中备份和加扰处理的逆过程,可以由所述加扰图像和所述备份信息生成所述初始图像。
本实施例的技术方案中,通过接收加扰图像和加密结果;对所述加密结果进行解密处理,得到所述备份信息;根据所述加扰图像和所述备份信息,生成所述初始图像,实现了根据加扰图像和加密结果对所述初始图像的恢复。即使在图像或视频在传输的过程中被截获,截获者无法获取原始图像的完整内容,从而保护了用户的隐私。通过解密,则可以根据所述加扰图像和所述加密结果,恢复得到初始图像,从而在保护用户隐私的前提下实现了初始图像的传输。
图9为本文提供的发送端和接收端的隐私保护方法的一实施例的整体流程图。该流程包括如下步骤:
步骤S100:向用户提供对初始视频进行加扰的选项,以供用户通过对所述选项进行选择,从而指定所述初始视频中的每帧图像的待加扰区域。
在具体实现中,用户可以通过对所述选项进行选择,将初始视频中的每帧图像的特定区域指定为待选择区域。所述特定区域可以为满足任意条件的区域,也可以为通过运动检测得到的运动区域,还可以为通过特征区域检测得到的特征区域等。
步骤S200:获取所述初始视频中的一帧图像作为初始图像,并对所述初始 图像进行运动检测以及特征区域检测,得到所述初始图像中的运动区域和特征区域。
需要说明的是,运动检测可以通过将所述初始图像,与所述初始视频中的邻近所述初始图像的帧进行比较来实现。所述特征区域可以为人脸区域,所述特征区域检测,具体可以为人脸区域检测。所述人脸区域检测具体可以通过将像素色彩与人脸肤色进行比较等方式实现。
步骤S300:对所述待加扰区域进行备份处理,得到备份区域图像,并按照N×N的宏块对所述待加扰区域进行强力滤波处理,得到加扰图像。
所述强力滤波处理可以通过如下过程进行:将所述待加扰区域分割为N×N个区域(其中,N>8且N/8>4,如不能满足N>8且N/8>4的条件,N值可以取4),获取每个分割得到的区域中所有像素的中值(即将所有像素按像素值依次排列,位于排列结果的中间位置的值),或者计算每个分割得到的区域中所有像素的均值,任一分割得到的区域中,均使用所述中值或者所述均值替换该分割得到的区域中的每个像素的像素值。
步骤S400:将备份区域图像与所述初始图像的待加扰区域进行差值计算(即进行比较分析),得到差值图像(即为比较结果图像),对所述差值图像按照JPEG格式进行压缩编码,得到压缩差值数据(即为压缩比较结果数据),提取所述压缩差值数据中的运动区域数据作为差异分析结果。
需要说明的是,所述步骤S400中,为先对差值图像进行压缩编码,得到压缩差值数据,再提取压缩差值数据中的运动区域数据,以得到差异分析结果。在其他实施例中,也可以先提取所述差值图像中的运动区域,再对提取所述差值图像的运动区域进行压缩编码,以得到差异分析结果。
步骤S500:所述加扰图像送入发送端的视频编码器编码,得到加扰视频。
可理解的是,将初始视频中的每帧图像依次作为初始图像,进行加扰处理,以得到多个加扰图像,再将得到的多个加扰图像送入视频编码器编码,能够得到经过加扰的初始视频(即为加扰视频)。
在具体实现中,在对所述加扰图像进行编码的过程中,还可以对所述加扰图像进行重复加扰处理。所述重复加扰处理可以包括如下步骤:获取CPU/协处理器以及编码器能力,这样可以区分编码器是否具备处理量化后数据的能力或者CPU/协处理器是否可以支撑相关业务的开展;根据获取的CPU/协处理器以及编码器能力,向用户提供选项,使用户选择加马赛克的加扰效果,或者使物 体消失的加扰效果;获取压缩编码前加扰的用户区域,即所述加扰图像中与所述待加扰区域对应的区域;对所述加扰图像中与所述待加扰区域对应的区域进行备份;将对所述加扰图像中与所述待加扰区域对应的区域进行备份得到的数据进行打包处理,并进行传送至所述接收端。
步骤S600:对差异分析结果进行加密,将加密之后的差异分析结果存储入所述加扰视频中所述加扰图像的补充增强信息。
需要说明的是,本步骤中,可以为采用高级加密标准(Advanced Encryption Standard,AES)和/或数据加密标准(Data Encryption Standard,DES),对所述备份信息进行加密。
步骤S700:对接收到的视频数据进行解码,并解密所述补充增强信息,获取所述差异分析结果,并对所述差异分析结果进行解码,得到所述差值图像中的运动区域,根据所述差值图像中的运动区域生成所述初始图像。
需要说明的是,本步骤中接收到的视频数据中包含有补充增强信息。本步骤中,应采用与对所述差异分析结果进行压缩编码相对应的方式对所述差异分析结果进行解码。
在上述流程中,所述步骤S100至所述步骤S600为由发送端执行,所述步骤S700位由接收端执行。所述发送端和所述接收端可以为不同的电子设备,也可以为同一电子设备。
通过以上流程,实现了对所述初始图像进行有加扰的传输,即使在图像或视频在传输的过程中被截获,截获者无法获取初始图像的完整内容,从而保护了用户的隐私。通过解密,则可以根据所述加扰图像和所述加密结果,从而恢复得到初始图像,实现了在保护用户隐私的前提下,进行初始图像的传输。
本文还提出一种电子设备,图10是本文提供的一种电子设备的硬件结构示意图,如图10所示,该电子设备包括:一个或多个处理器110和存储器120。图10中以一个处理器110为例。
所述电子设备还可以包括:输入装置130和输出装置140。
所述电子设备中的处理器110、存储器120、输入装置130和输出装置140可以通过总线或者其他方式连接,图10中以通过总线连接为例。
存储器120作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块。处理器110通过运行存储在存储器120中的软件程序、 指令以及模块,从而执行多种功能应用以及数据处理,以实现上述实施例中的任意一种方法。
存储器120可以包括存储程序区和存储数据区,其中,存储程序区可存储操作***、至少一个功能所需要的应用程序;存储数据区可存储根据电子设备的使用所创建的数据等。此外,存储器可以包括随机存取存储器(Random Access Memory,RAM)等易失性存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件或者其他非暂态固态存储器件。
存储器120可以是非暂态计算机存储介质或暂态计算机存储介质。该非暂态计算机存储介质,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实施例中,存储器120可选包括相对于处理器110远程设置的存储器,这些远程存储器可以通过网络连接至电子设备。上述网络的实例可以包括互联网、企业内部网、局域网、移动通信网及其组合。
输入装置130可设置为接收输入的数字或字符信息,以及产生与电子设备的用户设置以及功能控制有关的键信号输入。输出装置140可包括显示屏等显示设备。
本实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述方法。
上述实施例方法中的全部或部分流程可以通过计算机程序来执行相关的硬件来完成的,该程序可存储于一个非暂态计算机可读存储介质中,该程序在执行时,可包括如上述方法的实施例的流程,其中,该非暂态计算机可读存储介质可以为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或RAM等。

Claims (15)

  1. 一种发送端的隐私保护方法,所述方法包括:
    获取初始图像;
    获取所述初始图像中的待加扰区域;
    根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息;
    加密所述备份信息,得到加密结果;
    发送所述加扰图像和所述加密结果。
  2. 如权利要求1所述的方法,其中,根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息的步骤,包括:
    根据所述初始图像中的所述待加扰区域,生成备份区域图像;
    对所述初始图像中的所述待加扰区域进行加扰处理,得到加扰图像;
    根据所述备份区域图像,生成备份信息。
  3. 如权利要求2所述的方法,其中,根据所述备份区域图像,生成备份信息的步骤,包括:
    分析所述加扰图像和所述备份区域图像之间的差异,得到差异分析结果;
    将所述差异分析结果作为备份信息。
  4. 如权利要求3所述的方法,其中,分析所述加扰图像和所述备份区域图像之间的差异,得到差异分析结果的步骤,包括:
    将所述加扰图像和所述备份区域图像进行比较分析,得到比较结果图像;
    对所述比较结果图像进行压缩编码,得到压缩比较结果数据;
    根据所述压缩比较结果数据,生成差异分析结果。
  5. 如权利要求4所述的方法,其中,所述初始图像为初始视频中的一帧图像;
    根据所述压缩比较结果数据,生成差异分析结果的步骤,包括:
    根据预先检测到的所述初始图像中的运动区域范围,提取所述压缩比较结果数据中的运动区域数据;
    将所述压缩比较结果数据的运动区域数据作为差异分析结果。
  6. 如权利要求4所述的方法,其中,所述初始图像为初始视频中的一帧图像;
    根据所述压缩比较结果数据,生成差异分析结果的步骤,包括:
    判断所述初始图像是否为关键帧;
    基于所述初始图像不为关键帧的判断结果,将所述压缩比较结果数据中的真实量化数据作为差异分析结果;
    基于所述初始图像为关键帧的判断结果,将所述压缩比较结果数据中的码流头和真实量化数据均作为差异分析结果。
  7. 如权利要求1所述的方法,其中,获取所述初始图像中的待加扰区域的步骤,包括:
    根据预设规则,提取所述初始图像中的待选区域;
    根据由用户进行的区域选择设置,从提取的所述待选择区域中选取用户选择区域,将所述用户选择区域作为待加扰区域。
  8. 如权利要求1所述的方法,其中,发送所述加扰图像和所述加密结果的步骤之前,所述方法还包括:
    对所述加扰图像进行压缩编码处理,得到加扰编码数据;
    发送所述加扰图像和所述加密结果的步骤,包括:
    根据所述加扰编码数据和所述加密结果,生成加扰编码信息;
    发送所述加扰编码信息。
  9. 如权利要求8所述的方法,其中,所述初始图像为初始视频中的一帧图像;
    根据所述加扰编码数据和所述加密结果,生成加扰编码信息的步骤,包括:
    将所述加密结果存储于所述加扰编码数据的补充增强信息中,生成加扰编码信息。
  10. 如权利要求8所述的方法,其中,对所述加扰图像进行压缩编码处理,得到加扰编码数据的步骤,包括:
    将所述加扰图像作为待重复加扰图像;
    根据所述待加扰区域,提取所述待重复加扰图像中的待篡改数据;
    根据所述待篡改数据,生成备份数据;
    根据所述备份数据和所述加密结果,生成新的加密结果;
    对所述待重复加扰图像中的待篡改数据进行篡改处理,生成重复加扰图像;
    将所述重复加扰图像作为加扰编码数据。
  11. 如权利要求10所述的方法,其中,将所述重复加扰图像作为加扰编码数据的步骤之前,所述方法还包括:
    获取当前重复加扰次数;
    比较所述当前重复加扰次数和预设重复加扰次数;
    基于所述当前重复加扰次数不大于所述预设重复加扰次数的判断结果,将所述重复加扰图像作为新的待重复加扰图像,并返回根据所述待加扰区域,提 取所述待重复加扰图像中的待篡改数据的步骤。
  12. 如权利要求1所述的方法,其中,根据所述待加扰区域,对所述初始图像进行备份和加扰处理,得到加扰图像和备份信息的步骤,具体包括:
    根据所述待加扰区域,提取所述初始图像中的待加扰数据;
    根据所述待加扰数据,生成备份信息;
    对所述初始图像中的所述待加扰数据进行篡改处理,生成加扰图像。
  13. 一种接收端的隐私保护方法,所述方法包括:
    接收加扰图像和加密结果,所述加扰图像和所述加密结果为按照如权利要求1-12任一项所述的方法发送;
    对所述加密结果进行解密处理,得到所述备份信息;
    根据所述加扰图像和所述备份信息,生成所述初始图像。
  14. 一种电子设备,包括:
    至少一个处理器;
    存储器,设置为存储至少一个程序,
    当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现如权利要求1-12中任一所述的方法。
  15. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行如权利要求1-12任一所述的方法。
PCT/CN2019/085552 2019-05-05 2019-05-05 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质 WO2020223858A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP19927810.2A EP3968264A4 (en) 2019-05-05 2019-05-05 END OF TRANSMISSION AND END OF RECEIVE PRIVACY PROTECTION METHOD, ELECTRONIC DEVICE AND COMPUTER READABLE DATA MEDIA
PCT/CN2019/085552 WO2020223858A1 (zh) 2019-05-05 2019-05-05 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质
US17/608,964 US20220215071A1 (en) 2019-05-05 2019-05-05 Privacy protection method for transmitting end and receiving end, electronic device and computer readable storage medium
CN201980095987.0A CN113795861A (zh) 2019-05-05 2019-05-05 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/085552 WO2020223858A1 (zh) 2019-05-05 2019-05-05 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2020223858A1 true WO2020223858A1 (zh) 2020-11-12

Family

ID=73050925

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/085552 WO2020223858A1 (zh) 2019-05-05 2019-05-05 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质

Country Status (4)

Country Link
US (1) US20220215071A1 (zh)
EP (1) EP3968264A4 (zh)
CN (1) CN113795861A (zh)
WO (1) WO2020223858A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550328A (zh) * 2022-11-29 2022-12-30 中京天裕科技(杭州)有限公司 一种基于h.264视频码流辅助增强信息的数字版权保护方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614634A (zh) * 2004-12-06 2005-05-11 西南交通大学 图像篡改内容可恢复的定位型认证水印的生成与认证方法
US20110150327A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Method and apparatus for masking privacy area of image
CN102349288A (zh) * 2009-03-19 2012-02-08 富士通株式会社 标记生成程序、复原程序、标记生成装置、复原装置以及标记生成方法
CN106296559A (zh) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 图像处理方法及装置
CN106971114A (zh) * 2017-03-31 2017-07-21 联想(北京)有限公司 一种图像保密的方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6298145B1 (en) * 1999-01-19 2001-10-02 Hewlett-Packard Company Extracting image frames suitable for printing and visual presentation from the compressed image data
US8824553B2 (en) * 2003-05-12 2014-09-02 Google Inc. Video compression method
KR20150021280A (ko) * 2013-08-20 2015-03-02 한국전자통신연구원 영상 처리 장치 및 그 동작방법
US20160294781A1 (en) * 2015-01-25 2016-10-06 Jennifer Kate Ninan Partial or complete image obfuscation and recovery for privacy protection
WO2016147066A1 (en) * 2015-03-19 2016-09-22 Yuga Computing Solutions Inc. Method and apparatus for image privacy protection
JP6723909B2 (ja) * 2016-12-09 2020-07-15 キヤノン株式会社 画像処理方法、画像処理装置、及びプログラム
US10037413B2 (en) * 2016-12-31 2018-07-31 Entefy Inc. System and method of applying multiple adaptive privacy control layers to encoded media file types
CN108965982B (zh) * 2018-08-28 2020-01-31 百度在线网络技术(北京)有限公司 视频录制方法、装置、电子设备和可读存储介质
CN109640067A (zh) * 2018-12-10 2019-04-16 Oppo广东移动通信有限公司 图像传输方法和装置、***、电子设备、可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614634A (zh) * 2004-12-06 2005-05-11 西南交通大学 图像篡改内容可恢复的定位型认证水印的生成与认证方法
CN102349288A (zh) * 2009-03-19 2012-02-08 富士通株式会社 标记生成程序、复原程序、标记生成装置、复原装置以及标记生成方法
US20110150327A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Method and apparatus for masking privacy area of image
CN106296559A (zh) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 图像处理方法及装置
CN106971114A (zh) * 2017-03-31 2017-07-21 联想(北京)有限公司 一种图像保密的方法及装置

Also Published As

Publication number Publication date
CN113795861A (zh) 2021-12-14
EP3968264A1 (en) 2022-03-16
US20220215071A1 (en) 2022-07-07
EP3968264A4 (en) 2022-12-14

Similar Documents

Publication Publication Date Title
Long et al. Separable reversible data hiding and encryption for HEVC video
Itier et al. Recompression of JPEG crypto-compressed images without a key
JP6964647B2 (ja) オブジェクトのプライバシが保護されるイメージフレームのシーケンスをエンコーディング及びデコーディングする方法及びデバイス
CN1852443B (zh) 数据处理装置
Dalal et al. A survey on information hiding using video steganography
CN115002293B (zh) 基于缩略图格式保留的隐私保密方法、***及存储介质
Tew et al. Separable authentication in encrypted hevc video
Taneja et al. Chaos based partial encryption of spiht compressed images
EP2984849A1 (en) Communication system, communication apparatus and communication method
Choudry et al. A survey paper on video steganography
CN111050021A (zh) 基于二维码和可逆可视水印的图像隐私保护方法
KR101707663B1 (ko) Cctv 카메라를 이용한 영상 이미지 퍼즐 보안 전송 시스템 및 그 제어방법
CN112351275A (zh) 一种基于原始图像的特征区域隐私保护的方法及装置
WO2021196960A1 (zh) 加密视频通话方法、装置、设备和存储介质
Xu et al. A content security protection scheme in JPEG compressed domain
WO2020223858A1 (zh) 发送端和接收端的隐私保护方法、电子设备、以及计算机可读存储介质
Mstafa et al. An ECC/DCT-based robust video steganography algorithm for secure data communication
Hegde et al. An optimal modified matrix encoding technique for secret writing in MPEG video using ECC
Pal et al. Reversible digital image watermarking scheme using bit replacement and majority algorithm technique
KR20180102455A (ko) 고효율비디오코딩 파일 영상내 개인정보 보호 방법
Haddad et al. A new joint watermarking-encryption-JPEG-LS compression method for a priori & a posteriori image protection
KR101930676B1 (ko) Cctv 영상 암호화 방법
CN111585744A (zh) 一种基于硬件编解码器的视频传输方法和***
KR100836671B1 (ko) 영상 데이터 암호화 방법 및 장치
Rohara et al. Using Codeword Substitution to Hide Data in Encrypted MPEG-4 Videos

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19927810

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019927810

Country of ref document: EP

Effective date: 20211206