CN111881425B - Picture copyright authentication method, device and storage medium - Google Patents
Picture copyright authentication method, device and storage medium Download PDFInfo
- Publication number
- CN111881425B CN111881425B CN202010737237.3A CN202010737237A CN111881425B CN 111881425 B CN111881425 B CN 111881425B CN 202010737237 A CN202010737237 A CN 202010737237A CN 111881425 B CN111881425 B CN 111881425B
- Authority
- CN
- China
- Prior art keywords
- picture
- authentication
- information
- original
- fingerprint information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention relates to the field of image processing and artificial intelligence technologies, and in particular, to a method and apparatus for authenticating copyright of an image, and a storage medium. The picture copyright authentication method, the device and the storage medium of the invention create a unique user identification code for each authenticated user, encode the identification information of the original picture to obtain the hash value of the identification information, encode the key information character string of the picture formed by combining the user identification code and the hash value to obtain the fingerprint information of the original picture, embed the fingerprint information into the original picture to form the authenticated picture and store the authenticated picture.
Description
[ Field of technology ]
The invention relates to the technical field of picture processing, and also relates to the field of artificial intelligence, in particular to a picture copyright authentication method, a picture copyright authentication device and a storage medium.
[ Background Art ]
As pictures spread more widely and more quickly over the internet, pictures have become the primary means of people-to-people communication. Aesthetic photos can be used for commercial purposes, with a classical photo example being the default background desktop of windows xp. Since pictures are commercially valuable, it is necessary to solve the copyright attribution problem of the pictures. In the prior art, if a client needs to maintain own picture copyrights, the client needs to prove the source of the picture, but due to the problem of storage duration, an original file which is too long may be lost or tampered. In this case, how to prove originality of the document becomes an problematic issue.
Therefore, it is necessary to provide a picture copyright authentication method.
[ Invention ]
The invention aims to provide a picture copyright authentication method, a picture copyright authentication device and a storage medium, which solve the technical problems that fingerprint information is easy to tamper and copyright proof is difficult in the prior art.
The technical scheme of the invention is as follows: provided is a picture copyright authentication method, comprising:
Acquiring a user identification code based on the received picture authentication request;
Receiving an original picture uploaded by a user, and acquiring identification information of the original picture;
obtaining a hash value of the identification information by using a secure hash algorithm;
Combining the user identification code and the hash value to form a picture key information character string, and carrying out coding processing on the picture key information character string by using an erasure code EC algorithm to obtain fingerprint information of the original picture, wherein the fingerprint information comprises fingerprint data and verification data for verifying the fingerprint data;
Embedding the fingerprint information into the original picture, forming an authentication picture comprising the fingerprint information, and storing the authentication picture.
Preferably, the receiving the original picture uploaded by the user, and obtaining the identification information of the original picture includes:
receiving an original picture uploaded by a user;
Extracting picture information of the original picture, wherein the picture information comprises one or more of picture size, resolution, shooting time, shooting place, shutter speed, aperture size, exposure and white balance;
processing the original picture to obtain a picture abstract of the original picture;
and storing the picture abstract and the picture information into the identification information of the original picture.
Preferably, the processing the original picture to obtain a picture summary of the original picture includes:
reducing the size of the original picture, and converting the reduced original picture into a corresponding gray picture;
performing discrete cosine transform on the gray level picture to obtain a first DCT matrix;
performing reduction processing on the first DCT matrix to obtain a second DCT matrix;
and calculating the average value of the second DCT matrix, and determining the picture abstract of the original picture according to the average value.
Preferably, the encoding processing is performed on the key information string of the picture by using an erasure code EC algorithm to obtain fingerprint information of the original picture, including:
splitting the picture key information character string into a first preset number of data blocks;
encoding the first preset number of data blocks by using an Erasure Code (EC) algorithm to generate a second preset number of check blocks;
the first preset number of data blocks forms the fingerprint data, and the second preset number of check blocks forms check data.
Preferably, the embedding the fingerprint information into the original picture, forming an authentication picture including the fingerprint information and storing the authentication picture includes:
Extracting a preset third number of pixel points from all pixel points of the original picture, wherein the preset third number is the same as the number of characters contained in the fingerprint information;
Respectively replacing the extracted pixel points with the characters of the fingerprint information to embed the fingerprint information into the original picture to obtain an authentication picture;
And storing the authentication picture and recording the storage time of the authentication picture.
Preferably, the acquiring the user identification code based on the received picture authentication request includes:
receiving a picture authentication request sent by a current user, and judging whether the current user has a user identification code or not based on user information carried in the picture authentication request to obtain a first judgment result;
When the first judgment result is yes, acquiring the user identification code;
And when the first judgment result is negative, creating a user identification code for the current user.
Preferably, before the embedding the fingerprint information into the original picture to form an authentication picture including the fingerprint information and store the authentication picture, the method further includes:
Judging whether the original picture is stored in the authentication picture database according to the fingerprint information of the original picture to obtain a second judging result;
if the second judgment result is negative, embedding the fingerprint information into the original picture;
And rejecting the picture authentication request of the current user when the second judgment result is yes.
Preferably, after the embedding the fingerprint information into the original picture to form an authentication picture including the fingerprint information and storing the authentication picture, the method further includes:
Crawling and downloading network pictures from a network by adopting a picture crawler tool;
When the embedded fingerprint information is acquired from the network picture, generating a corresponding picture key information character string according to the fingerprint information;
acquiring the user identification code pointing to the original creator according to the picture key information character string;
or, after the fingerprint information is embedded into the original picture to form an authentication picture including the fingerprint information and the authentication picture is stored, the method further includes:
Crawling and downloading network pictures from a network by adopting a picture crawler tool;
when the embedded fingerprint information cannot be obtained from the network picture, obtaining the identification information of the network picture;
obtaining a hash value of the identification information by using a secure hash algorithm;
Judging whether the network picture is stored in the authentication picture database according to the hash value of the network picture to obtain a third judging result;
when the third judgment result is yes, acquiring the user identification code pointing to the original person according to the fingerprint information embedded in the corresponding authentication picture stored in the authentication picture database;
Or, the picture copyright authentication method further comprises the following steps:
and uploading the fingerprint information to a blockchain so that the blockchain stores the fingerprint information in an encrypted mode.
The other technical scheme of the invention is as follows: providing a picture copyright authentication device, wherein the device comprises a processor and a memory coupled with the processor, and the memory stores program instructions for realizing the picture copyright authentication method; the processor is used for executing the program instructions stored in the memory to perform picture copyright authentication.
The other technical scheme of the invention is as follows: there is provided a storage medium having stored therein program instructions capable of implementing the above-described picture copyright authentication method.
The invention has the beneficial effects that: the picture copyright authentication method, the device and the storage medium of the invention create a unique user identification code for each authenticated user, encode the identification information of the original picture to obtain the hash value of the identification information, encode the key information character string of the picture formed by combining the user identification code and the hash value to obtain the fingerprint information of the original picture, embed the fingerprint information into the original picture to form the authenticated picture and store the authenticated picture.
[ Description of the drawings ]
Fig. 1 is a flowchart of a picture copyright authentication method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a picture copyright authentication method according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a structure of a picture copyright authentication device according to a third embodiment of the present invention;
fig. 4 is a schematic diagram of a structure of a picture copyright authentication apparatus according to a fourth embodiment of the present invention;
Fig. 5 is a schematic structural view of a storage medium according to a fifth embodiment of the present invention.
[ Detailed description ] of the invention
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first," "second," "third," and the like in this disclosure are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first", "a second", and "a third" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise. All directional indications (such as up, down, left, right, front, back … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular gesture (as shown in the drawings), and if the particular gesture changes, the directional indication changes accordingly. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Fig. 1 is a flowchart of a picture copyright authentication method according to a first embodiment of the present invention. It should be noted that, if there are substantially the same results, the method of the present invention is not limited to the flow sequence shown in fig. 1. As shown in fig. 1, the picture copyright authentication method includes the steps of:
S101, acquiring a user identification code based on the received picture authentication request.
In the embodiment of the invention, a unique user identification code UID is created for each user to carry out identity identification, and the creator of the picture can be determined through the user identification code UID, and specifically, the length of the user identification code UID can be set to 64 characters. In step S101, when a user needs to upload a picture for authentication, a picture authentication request is sent, wherein the picture authentication request carries user information, and after receiving the picture authentication request sent by the current user, the user authentication request obtains a user identification code UID based on the user information carried by the authentication request; when the user identification code UID cannot be acquired, the current user is indicated to be a new user, and the user identification code UID is created for the current user. In an alternative embodiment, the user identification code UID is a string of characters that can be identified and calculated, and may be created as follows: s1011, acquiring registration information filled in when a user registers an account, wherein the registration information comprises a name, a birth date, a certificate number (such as an identity card number, a passport number, a driving license number and the like) and an account name; s1012, selecting a set plurality of types of information from the registration information according to a set rule by adopting a preset encryption algorithm, and carrying out combination calculation to obtain a unique user identification code UID. Further, in step S1012, the registration information may be arranged according to the order of name-account name-identification card number to form an input value, and the input value is processed by using a hashing algorithm to obtain the user identification code UID.
S102, receiving an original picture uploaded by a user, and acquiring identification information of the original picture.
In step S102, the identification information of the original picture includes two parts, the first part being the picture itself of the original picture and the second part being various parameters of the original picture. Specifically, firstly, receiving an original picture uploaded by a user; then, extracting picture information of the original picture, wherein the picture information comprises one or more of picture size, resolution, shooting time, shooting place, shutter speed, aperture size, exposure and white balance; then, processing the original picture to obtain a picture abstract of the original picture; and finally, storing the picture abstract and the picture information into the identification information of the original picture. More specifically, in the picture information, contents such as shooting location, shutter speed, aperture size, exposure, white balance, etc. are manually adjustable, and the source of the picture cannot be uniquely identified; because the size of the digital picture is difficult to forge, the sizes of two pictures are generally difficult to be identical, and the size of the picture is a relatively unique parameter, so that the source of the picture can be identified to a certain extent.
In an alternative embodiment, the picture summary representing the picture itself may be extracted by: s1021, reducing the size of the original picture, and converting the reduced original picture into a corresponding gray picture; s1022, performing discrete cosine transform on the gray level picture to obtain a first DCT matrix; s1023, performing reduction processing on the first DCT matrix to obtain a second DCT matrix; s1024, calculating the mean value of the second DCT matrix, and determining the picture abstract of the original picture according to the mean value. The original picture can be simplified by reducing the size and converting the size into the gray-scale picture in step S1021, which is beneficial to improving the calculation efficiency of DCT (discrete cosine transform) discrete cosine transform in the subsequent process. Furthermore, before the size reduction and gray conversion, white balance processing and denoising processing can be performed on the original picture so as to remove noise in the original picture and reduce the influence on the extraction process of the image abstract. In step S1022, the size of the first DCT matrix may be 32×32; in step S1023, the first DCT matrix is scaled down to a second DCT matrix of 8×8; in step S1024, after the mean value of the second DCT matrix is calculated, the element greater than or equal to the mean value in the second DCT matrix is set to 1, the element less than the mean value is set to 0, and then the picture summary composed of 64-bit Hash values is obtained according to the modified element in the second DCT matrix.
It should be understood by those skilled in the art that, in other embodiments, the picture summary may not be used to represent the picture itself, and the feature value of the original picture may be extracted and used together with the picture information as the identification information of the original picture.
S103, obtaining the hash value of the identification information by using a secure hash algorithm.
In this embodiment, the secure hash algorithm (Secure Hash Algorithm) may be, in particular, SHA-224, SHA-256, SHA-384, SHA-512/224, and SHA-512/256. The hash function compresses the identification information of the original picture into a digest, so that the data size becomes smaller, and the format of the data is fixed. The function mixes the data scrambling and recreates a fingerprint called a hash value (or hash value). The hash value is typically represented by a short string of random letters and numbers.
Specifically, the embodiment adopts the SHA-256 algorithm, and the SHA-256 algorithm generates a hash value TID of 64 characters no matter how large the picture size of the original picture is. The maximum length of the input identification information of the SHA-256 algorithm is not more than 2-64 bits, the input is processed according to 512-bit packets, and the generated output is a 256-bit hash value. The algorithm processing comprises the following steps: in the first step, padding bits are added, the identification information is padded so that the length is congruent with 448 modulo 512 (length=448mod 512), the number of bits padded ranges from 1 to 512, the most significant bit of the padding bit string is 1, and the remaining bits are 0. In the second step, a length value is added, and the bit length of the initial identification information (before padding) indicated by 64-bits is added after the result of the first step (low-order byte first). Third, initialize the cache, use a 256-bit cache to store the intermediate and final results of the hash function. For example, the buffering may be denoted A=0x6A09E667,B=0xBB67AE85,C=0x3C6EF372,D=0xA54FF53A,E=0x510E527F,F=0x9B05688C,G=0x1F83D9AB,H=0x5BE0CD19. fourth step, processing a 512-bit (16 words) information packet sequence. The algorithm uses six basic logic functions, and consists of 64 steps of iterative operations. Each step takes a 256-bit cache value ABCDEFGH as input and then updates the cache contents. A constant value Kt of 32-bits and a constant value of 32-bitWt are used per step.
S104, combining the user identification code and the hash value to form a picture key information character string, and carrying out coding processing on the picture key information character string by using an erasure code EC algorithm to obtain fingerprint information of the original picture, wherein the fingerprint information comprises fingerprint data and verification data for verifying the fingerprint data.
In this embodiment, the hash values TID of the user identification code UID and the identification information each include 64 characters, which are combined to form a character string containing 128 characters, that is, a picture key information character string of the original picture. In this embodiment, the EC algorithm: namely, (EraseCode, erasure Code) algorithm, EC coding is a data redundancy technology, which can split a picture key information character string with length L into N data blocks, then calculate M check blocks according to the N data blocks, and finally store the data of the N+M data blocks, and the EC coding algorithm can ensure that the whole data is still complete as long as the lost number is not more than M in the N+M blocks. Specifically, splitting the picture key information character string into a first preset number of data blocks; encoding the data blocks with the first preset number N by using an erasure code EC algorithm to generate check blocks with the second preset number M; the first preset number N of data blocks forms the fingerprint data, and the second preset number M of check blocks forms check data. For example: n=4, m=3, it can be ensured that in case of a loss of at most 3 data blocks, the data thus stored can still be complete, and thus, in this embodiment, each data block comprises 32 characters, each check block comprises 32 characters, and the fingerprint information comprises 224 characters.
In this embodiment, the fingerprint information of the original picture includes not only the coding information pointing to the picture itself, but also the coding information pointing to the user identity, and the user identity can be directly determined according to the picture fingerprint information.
S105, embedding the fingerprint information into the original picture, forming an authentication picture comprising the fingerprint information, and storing the authentication picture.
In step S105, the fingerprint information is directly embedded into the original picture to form a corresponding authentication picture, then the authentication picture is stored, when the fingerprint information is needed to be used, the fingerprint information is directly read from the authentication picture without being stored separately, and in the using process, the user can use the authentication picture embedded with the fingerprint information without using the original picture, when the authentication picture is used by other people, the fingerprint information embedded in the authentication picture can be directly extracted from the picture uploaded by other people, so that the workload of investigation is reduced.
In an optional implementation manner, first, a preset third number of pixels is extracted from all pixels of the original picture, where the preset third number is the same as the number of characters contained in the fingerprint information; then, respectively replacing the extracted pixel points with the characters of the fingerprint information to embed the fingerprint information into the original picture to obtain an authentication picture; and finally, storing the authentication picture and recording the storage time of the authentication picture. Specifically, each picture has its own horizontal axis and vertical axis, each pixel has its own relative position (pixel position) according to the origin (0, 0) coordinates of the upper left corner, and according to the size of the original picture, the original picture is split into pixels according to the horizontal axis and the vertical axis, for example, an original picture with 1024×768 resolution can be split into 1024×768= 786432 pixels, and each pixel is converted into hexadecimal when the picture is stored. And the 224 characters contained in the fingerprint information are themselves a combination of english and numerals. The pixels are numbered sequentially (1, 2,3, … …, 786432), and the pixels numbered as multiples of 10, e.g., 10, 20, 30..1280, are replaced with 224 characters in the fingerprint information. Of the hundreds of thousands of points, 224 points were replaced, with a scale of 224/786432=0.028, and no picture difference was perceived at all.
Fig. 2 is a flowchart of a picture copyright authentication method according to a second embodiment of the present invention. It should be noted that, if there are substantially the same results, the method of the present invention is not limited to the flow sequence shown in fig. 2. As shown in fig. 2, the picture copyright authentication method includes the steps of:
S201, receiving a picture authentication request sent by a current user, and judging whether the current user has a user identification code or not based on user information carried in the picture authentication request to obtain a first judgment result.
S202, when the first judgment result is yes, the user identification code is obtained.
And S203, when the first judgment result is negative, creating a user identification code for the current user.
S204, extracting fingerprint information of the original picture by utilizing a fingerprint algorithm.
In step S204, an original picture uploaded by a user is received, identification information of the original picture is obtained, a hash value of the identification information is obtained by using a secure hash algorithm, the user identification code and the hash value are combined to form a picture key information character string, the picture key information character string is encoded by using an erasure code EC algorithm, fingerprint information of the original picture is obtained, and the fingerprint information comprises fingerprint data and verification data for verifying the fingerprint data. Step S204 may be specifically referred to the description of the first embodiment, and will not be described in detail herein.
And S205, judging whether the original picture is stored in the authentication picture database according to the fingerprint information of the original picture, and obtaining a second judging result.
S206, rejecting the picture authentication request of the current user when the second judgment result is yes.
And S207, when the second judging result is negative, embedding the fingerprint information into the original picture, forming an authentication picture comprising the fingerprint information, and storing the authentication picture.
After step S207, the method further includes the steps of:
And S208, crawling and downloading the network pictures from the network by adopting a picture crawler tool.
S209, when the embedded fingerprint information is obtained from the network picture, generating a corresponding picture key information character string according to the fingerprint information, and obtaining the user identification code pointing to the original creator according to the picture key information character string.
S210, when the embedded fingerprint information cannot be obtained from the network picture, obtaining the identification information of the network picture; obtaining a hash value of the identification information by using a secure hash algorithm; judging whether the network picture is stored in the authentication picture database according to the hash value of the network picture to obtain a third judging result; and when the third judgment result is yes, acquiring the user identification code pointing to the original person according to the fingerprint information embedded in the corresponding authentication picture stored in the authentication picture database.
S211, uploading the fingerprint information to a blockchain so that the blockchain stores the fingerprint information in an encrypted mode.
In step S209, the user identification code of the original is directly obtained based on the fingerprint information embedded in the serious picture, which is used by the infringer as the authentication picture; in step S210, the infringer does not use the authentication picture, and needs to re-extract the hash value of the picture, compare the hash value with the fingerprint information embedded in the authentication picture database, obtain the fingerprint information matched with the hash value, and obtain the user identification code from the fingerprint information. After the user identification code of the original creator is acquired, information of the infringing network picture can be sent to the original creator by the infringing event.
In step S211, corresponding digest information is obtained based on the fingerprint information, specifically, the digest information is obtained by hashing the fingerprint information, for example, by using the sha256S algorithm. Uploading summary information to the blockchain can ensure its security and fair transparency to the user. The user device may download the digest information from the blockchain to verify that the fingerprint information has been tampered with. The blockchain referred to in this example is a novel mode of application for computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains information from a batch of network transactions for verifying the validity (anti-counterfeit) of its information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
Fig. 3 is a schematic diagram of a picture copyright authentication device according to a third embodiment of the present invention. As shown in fig. 3, the apparatus 30 includes: the device comprises a user identification module 31, a picture information extraction module 32, a first coding module 33, a second coding module 34 and an authentication storage module 35, wherein the user identification module 31 is used for acquiring a user identification code based on a received picture authentication request; the picture information extraction module 32 is configured to receive an original picture uploaded by a user, and obtain identification information of the original picture; the first encoding module 33 is configured to obtain a hash value of the identification information by using a secure hash algorithm; the second encoding module 34 is configured to combine the user identification code and the hash value to form a picture key information string, and encode the picture key information string by using an erasure code EC algorithm to obtain fingerprint information of the original picture, where the fingerprint information includes fingerprint data and verification data for verifying the fingerprint data; the authentication storage module 35 is configured to embed the fingerprint information into the original picture, form an authentication picture including the fingerprint information, and store the authentication picture.
Fig. 4 is a schematic structural view of an electronic device according to a fourth embodiment of the present invention. As shown in fig. 4, the electronic device 40 includes a processor 41 and a memory 42 coupled to the processor 41.
The memory 42 stores program instructions for implementing the picture copyright authentication method of any of the embodiments described above.
The processor 41 is configured to execute program instructions stored in the memory 42 for picture copyright authentication.
The processor 41 may also be referred to as a CPU (Central Processing Unit ). The processor 41 may be an integrated circuit chip with signal processing capabilities. Processor 41 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a storage medium according to a fifth embodiment of the present invention. The storage medium according to the embodiment of the present invention stores the program instructions 51 capable of implementing the above-mentioned all-picture copyright authentication method, where the program instructions 51 may be stored in the storage medium in the form of a software product, and include several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the method according to the embodiments of the present invention. The aforementioned storage device includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes, or a terminal device such as a computer, a server, a mobile phone, a tablet, or the like.
In the several embodiments provided in the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units. The foregoing is only the embodiments of the present invention, and the patent scope of the invention is not limited thereto, but is also covered by the patent protection scope of the invention, as long as the equivalent structures or equivalent processes of the present invention and the contents of the accompanying drawings are changed, or the present invention is directly or indirectly applied to other related technical fields.
While the invention has been described with respect to the above embodiments, it should be noted that modifications can be made by those skilled in the art without departing from the inventive concept, and these are all within the scope of the invention.
Claims (8)
1. A picture copyright authentication method, characterized by comprising:
Acquiring a user identification code based on the received picture authentication request;
Receiving an original picture uploaded by a user, and acquiring identification information of the original picture; the method comprises the steps that an original picture uploaded by a user is received, and identification information of the original picture is obtained, wherein the original picture uploaded by the user is received; extracting picture information of the original picture, wherein the picture information comprises one or more of picture size, resolution, shooting time, shooting place, shutter speed, aperture size, exposure and white balance; processing the original picture to obtain a picture abstract of the original picture; storing the picture abstract and the picture information into the identification information of the original picture;
obtaining a hash value of the identification information by using a secure hash algorithm;
Combining the user identification code and the hash value to form a picture key information character string, and carrying out coding processing on the picture key information character string by using an erasure code EC algorithm to obtain fingerprint information of the original picture, wherein the fingerprint information comprises fingerprint data and verification data for verifying the fingerprint data;
Embedding the fingerprint information into the original picture, forming an authentication picture comprising the fingerprint information and storing the authentication picture; the step of embedding the fingerprint information into the original picture to form an authentication picture comprising the fingerprint information and storing the authentication picture, wherein the step of extracting a preset third number of pixel points from all pixel points of the original picture, and the preset third number is the same as the number of characters contained in the fingerprint information; respectively replacing the extracted pixel points with the characters of the fingerprint information to embed the fingerprint information into the original picture to obtain an authentication picture; and storing the authentication picture and recording the storage time of the authentication picture.
2. The picture copyright authentication method according to claim 1, wherein the processing the original picture to obtain a picture digest of the original picture includes:
reducing the size of the original picture, and converting the reduced original picture into a corresponding gray picture;
performing discrete cosine transform on the gray level picture to obtain a first DCT matrix;
performing reduction processing on the first DCT matrix to obtain a second DCT matrix;
and calculating the average value of the second DCT matrix, and determining the picture abstract of the original picture according to the average value.
3. The picture copyright authentication method according to claim 1, wherein the encoding the picture key information string by using an erasure code EC algorithm to obtain fingerprint information of the original picture includes:
splitting the picture key information character string into a first preset number of data blocks;
encoding the first preset number of data blocks by using an Erasure Code (EC) algorithm to generate a second preset number of check blocks;
the first preset number of data blocks forms the fingerprint data, and the second preset number of check blocks forms check data.
4. The picture copyright authentication method as claimed in claim 1, wherein the acquiring the user identification code based on the received picture authentication request comprises:
receiving a picture authentication request sent by a current user, and judging whether the current user has a user identification code or not based on user information carried in the picture authentication request to obtain a first judgment result;
When the first judgment result is yes, acquiring the user identification code;
And when the first judgment result is negative, creating a user identification code for the current user.
5. The picture copyright authentication method according to claim 4, wherein before embedding the fingerprint information into the original picture to form an authentication picture including the fingerprint information and storing the authentication picture, further comprising:
Judging whether the original picture is stored in the authentication picture database according to the fingerprint information of the original picture to obtain a second judging result;
if the second judgment result is negative, embedding the fingerprint information into the original picture;
And rejecting the picture authentication request of the current user when the second judgment result is yes.
6. The picture copyright authentication method according to claim 1, wherein after the fingerprint information is embedded into the original picture to form an authentication picture including the fingerprint information and the authentication picture is stored, further comprising:
Crawling and downloading network pictures from a network by adopting a picture crawler tool;
When the embedded fingerprint information is acquired from the network picture, generating a corresponding picture key information character string according to the fingerprint information;
acquiring the user identification code pointing to the original creator according to the picture key information character string;
or, after the fingerprint information is embedded into the original picture to form an authentication picture including the fingerprint information and the authentication picture is stored, the method further includes:
Crawling and downloading network pictures from a network by adopting a picture crawler tool;
when the embedded fingerprint information cannot be obtained from the network picture, obtaining the identification information of the network picture;
obtaining a hash value of the identification information by using a secure hash algorithm;
Judging whether the network picture is stored in the authentication picture database according to the hash value of the network picture to obtain a third judging result;
when the third judgment result is yes, acquiring the user identification code pointing to the original person according to the fingerprint information embedded in the corresponding authentication picture stored in the authentication picture database;
Or, the picture copyright authentication method further comprises the following steps:
and uploading the fingerprint information to a blockchain so that the blockchain stores the fingerprint information in an encrypted mode.
7. A picture rights authentication device, characterized in that the device comprises a processor, and a memory coupled to the processor, the memory storing program instructions for implementing the picture rights authentication method according to any one of claims 1-6; the processor is used for executing the program instructions stored in the memory to perform picture copyright authentication.
8. A storage medium having stored therein program instructions capable of implementing the picture copyright authentication method according to any one of claims 1 to 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010737237.3A CN111881425B (en) | 2020-07-28 | 2020-07-28 | Picture copyright authentication method, device and storage medium |
PCT/CN2020/118500 WO2021120781A1 (en) | 2020-07-28 | 2020-09-28 | Picture copyright authentication method and device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010737237.3A CN111881425B (en) | 2020-07-28 | 2020-07-28 | Picture copyright authentication method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111881425A CN111881425A (en) | 2020-11-03 |
CN111881425B true CN111881425B (en) | 2024-09-24 |
Family
ID=73200382
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010737237.3A Active CN111881425B (en) | 2020-07-28 | 2020-07-28 | Picture copyright authentication method, device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111881425B (en) |
WO (1) | WO2021120781A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113255008B (en) * | 2021-07-01 | 2021-10-22 | 支付宝(杭州)信息技术有限公司 | Method and system for outputting multimedia file |
CN113722680B (en) * | 2021-08-27 | 2023-07-25 | 苏州浪潮智能科技有限公司 | A picture copyright protection method, device, equipment and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013058030A1 (en) * | 2011-10-21 | 2013-04-25 | 株式会社コナミデジタルエンタテインメント | Management device, management method and storage medium |
CN103177111A (en) * | 2013-03-29 | 2013-06-26 | 西安理工大学 | System and method for deleting repeating data |
CN106709963A (en) * | 2016-12-28 | 2017-05-24 | 平安科技(深圳)有限公司 | Method and apparatus for verifying authenticity of image |
CN109740317A (en) * | 2018-12-29 | 2019-05-10 | 北京奇虎科技有限公司 | A blockchain-based digital fingerprint storage method and device |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279909A (en) * | 2010-06-08 | 2011-12-14 | 阿里巴巴集团控股有限公司 | Method and device for authenticating attribute right of picture |
US10592639B2 (en) * | 2016-09-06 | 2020-03-17 | Intel Corporation | Blockchain-based shadow images to facilitate copyright protection of digital content |
CN109376504B (en) * | 2018-09-26 | 2022-04-12 | 福州大学 | Picture privacy protection method based on block chain technology |
CN109409030A (en) * | 2018-10-19 | 2019-03-01 | 微梦创科网络科技(中国)有限公司 | A digital copyright generation method and device |
CN109727134B (en) * | 2018-12-29 | 2024-04-05 | 三六零科技集团有限公司 | Picture copyright trading method and device |
WO2019141296A2 (en) * | 2019-05-20 | 2019-07-25 | Alibaba Group Holding Limited | Copyright protection based on hidden copyright information |
WO2019141294A2 (en) * | 2019-05-20 | 2019-07-25 | Alibaba Group Holding Limited | Identifying copyrighted material using copyright information embedded in tables |
CN110580405B (en) * | 2019-08-16 | 2022-07-05 | 湖北工业大学 | Picture copyright protection system and method based on social network |
CN110533572A (en) * | 2019-08-29 | 2019-12-03 | 哈尔滨工业大学(深圳) | A kind of watermark embedding method, system and relevant apparatus |
-
2020
- 2020-07-28 CN CN202010737237.3A patent/CN111881425B/en active Active
- 2020-09-28 WO PCT/CN2020/118500 patent/WO2021120781A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013058030A1 (en) * | 2011-10-21 | 2013-04-25 | 株式会社コナミデジタルエンタテインメント | Management device, management method and storage medium |
CN103177111A (en) * | 2013-03-29 | 2013-06-26 | 西安理工大学 | System and method for deleting repeating data |
CN106709963A (en) * | 2016-12-28 | 2017-05-24 | 平安科技(深圳)有限公司 | Method and apparatus for verifying authenticity of image |
CN109740317A (en) * | 2018-12-29 | 2019-05-10 | 北京奇虎科技有限公司 | A blockchain-based digital fingerprint storage method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2021120781A1 (en) | 2021-06-24 |
CN111881425A (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dhawan et al. | Analysis of various data security techniques of steganography: A survey | |
US20230360165A1 (en) | Method and apparatus for protecting digital photos from alteration | |
CN103605950B (en) | Method and system for hiding signature in credible two-dimensional code | |
JP2003309559A (en) | Device and method for performing delivery and authentication of data set, using watermark | |
JP2002542523A (en) | Method and apparatus for inserting a digital signature into digital data and authenticating the digital signature in the digital data | |
JP2008536371A (en) | Digital image watermark method and related apparatus and digital camera capable of adding watermark | |
CN112434319B (en) | Data encryption method and device for electronic file | |
EP4024372A1 (en) | Information processing device, information processing method, and program | |
JP4625841B2 (en) | System and method for digital content security | |
CN111460398B (en) | Watermark adding method, device, equipment and storage medium | |
CN111881425B (en) | Picture copyright authentication method, device and storage medium | |
CN111177666A (en) | Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark | |
Lin et al. | A copyright protection scheme based on PDF | |
JP5913041B2 (en) | Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program | |
Arulananth et al. | Automatic Certificate Generation and Security Implementation Using LSB and Hybrid Watermarking Techniques | |
CN113379583B (en) | Image signature method, device, computing equipment and storage medium | |
Agarwal et al. | Encrypted transfer of confidential information using steganography and identity verification using face data | |
Priya et al. | Protection of health imagery by region based lossless reversible watermarking scheme | |
Nath et al. | Image steganography using encrypted message | |
CN115526282A (en) | Watermark encryption method, watermark extraction method, device and storage medium | |
Choche et al. | A methodology to conceal QR codes for security applications | |
Badshah et al. | Secured telemedicine using whole image as watermark with tamper localization and recovery capabilities | |
US12118638B1 (en) | Anti-leak digital document marking system and method using distributed ledger | |
RU2829566C1 (en) | Method and system for protecting authenticity of images generated by machine learning model | |
Araujo et al. | Improving Steganographic capacity using distributed steganography over BMP |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |