[go: up one dir, main page]

CN112272159B - Image processing method and device - Google Patents

Image processing method and device Download PDF

Info

Publication number
CN112272159B
CN112272159B CN202010985712.9A CN202010985712A CN112272159B CN 112272159 B CN112272159 B CN 112272159B CN 202010985712 A CN202010985712 A CN 202010985712A CN 112272159 B CN112272159 B CN 112272159B
Authority
CN
China
Prior art keywords
image
desktop image
security level
abnormal
blurring degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010985712.9A
Other languages
Chinese (zh)
Other versions
CN112272159A (en
Inventor
王知明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202010985712.9A priority Critical patent/CN112272159B/en
Publication of CN112272159A publication Critical patent/CN112272159A/en
Application granted granted Critical
Publication of CN112272159B publication Critical patent/CN112272159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/12Selection from among a plurality of transforms or standards, e.g. selection between discrete cosine transform [DCT] and sub-band transform or selection between H.263 and H.264

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Discrete Mathematics (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)
  • Image Processing (AREA)

Abstract

The disclosure provides an image processing method and device, relates to the field of image processing, and can solve the contradiction between safety and user experience. The specific technical scheme is as follows: under the condition that the environment safety condition of the terminal equipment is abnormal, determining a first abnormal type corresponding to a first security level of an original desktop image, wherein different security levels correspond to different abnormal types; and sending the display image of the first abnormal type to the terminal equipment. The invention is used for improving the user experience while ensuring the system safety.

Description

Image processing method and device
Technical Field
The present disclosure relates to the field of image processing, and in particular, to an image processing method and apparatus.
Background
In a Desktop virtualization infrastructure (vdi), a server needs to encode a Virtual Desktop image and then send the encoded Virtual Desktop image to a remote client through a network, and the remote client decodes and displays the corresponding Virtual Desktop image.
The user does not have data storage locally, all data sources and video images are sourced from the cloud, so that the VDI architecture has higher safety and is widely applied to the high-security special industry.
When the environment safety condition of the remote client is abnormal, the remote client can stop displaying the virtual desktop image, so that the safety of the virtual desktop image transmission system can be improved, but the user experience is poor.
Disclosure of Invention
The embodiment of the disclosure provides an image processing method and device, which can solve the problem that the environment safety condition of a remote client is abnormal. The technical scheme is as follows:
According to a first aspect of embodiments of the present disclosure, there is provided an image processing method, the method including: under the condition that the environment safety condition of the terminal equipment is abnormal, determining a first abnormal type corresponding to a first security level of an original desktop image, wherein different security levels correspond to different abnormal types; and sending the display image of the first abnormal type to the terminal equipment.
When the environment safety of the terminal equipment is abnormal, sending an abnormal display image corresponding to the safety level of the desktop image to the terminal equipment, and improving the user experience while ensuring the system safety.
In one embodiment, the different anomaly types include multiple degrees of ambiguity; the display image of the first anomaly type is a first desktop image of a first degree of blur.
When the environment safety of the terminal equipment is abnormal, sending the desktop image with the fuzzy degree corresponding to the safety level of the desktop image to the terminal equipment, and improving the user experience while ensuring the safety of the system.
In one embodiment, the method further comprises: performing joint image expert group JPEG coding on the original desktop image to obtain a desktop image with the first blurring degree; the desktop image of the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a discrete cosine transform DCT result of the original desktop image.
With JPEG encoding, as the amount of encoded data increases in the DCT result, the degree of blurring of the encoded image decreases. The influence of the blurring degree adjustment on the coding mode can be reduced through JPEG coding, and the image processing efficiency is improved.
In particular, when it is determined that the environmental security of the terminal device is abnormal, and the like, the desktop image blurring degree needs to be adjusted, JPEG encoding is adopted, and the influence of image blurring degree adjustment on the encoding process is small.
In one embodiment, the method further comprises: acquiring indication information, wherein the indication information is used for modifying the blurring degree corresponding to the first blurring degree into a second blurring degree; the display image of the first anomaly type is a desktop image of the second blur degree.
By acquiring the instruction information, the flexibility of the desktop image transmitted to the terminal device can be adjusted in an improved manner.
In one embodiment, the method further comprises: and determining the first security level according to the security level with the highest security level of at least one opened file displayed in the original desktop image.
When the original desktop image comprises a plurality of opened files, the security level of the original desktop image is determined according to the file with the highest security level in the files, so that the security of image processing is improved.
According to a second aspect of the embodiments of the present disclosure, there is provided an image processing apparatus including: the processing module and the sending module; the processing module is used for determining a first abnormal type corresponding to a first security level of the original desktop image under the condition that the environment security condition of the terminal equipment is abnormal, wherein different security levels correspond to different abnormal types; the sending module is used for sending the display image of the first abnormal type to the terminal equipment.
When the environment safety of the terminal equipment is abnormal, sending an abnormal display image corresponding to the safety level of the desktop image to the terminal equipment, and improving the user experience while ensuring the system safety. In one embodiment, the different anomaly types include multiple degrees of ambiguity; the display image of the first anomaly type is a first desktop image of a first degree of blur.
When the environment safety of the terminal equipment is abnormal, sending the desktop image with the fuzzy degree corresponding to the safety level of the desktop image to the terminal equipment, and improving the user experience while ensuring the safety of the system.
In one embodiment, the processing module is further configured to perform joint photographic experts group JPEG encoding on the original desktop image to obtain the first blurry desktop image; the desktop image of the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a discrete cosine transform DCT result of the original desktop image.
With JPEG encoding, as the amount of encoded data increases in the DCT result, the degree of blurring of the encoded image decreases. The influence of the blurring degree adjustment on the coding mode can be reduced through JPEG coding, and the image processing efficiency is improved.
In particular, when it is determined that the environmental security of the terminal device is abnormal, and the like, the desktop image blurring degree needs to be adjusted, JPEG encoding is adopted, and the influence of image blurring degree adjustment on the encoding process is small.
In one embodiment, the apparatus further includes an obtaining module, where the obtaining module is configured to obtain indication information, where the indication information is used to modify a blur level corresponding to the first security level to a second blur level; the display image of the first anomaly type is a desktop image of the second blur degree.
By acquiring the instruction information, the flexibility of the desktop image transmitted to the terminal device can be adjusted in an improved manner.
In one embodiment, the processing module is further configured to determine the first security level according to a security level with a highest security level of at least one open file displayed in the original desktop image.
When the original desktop image comprises a plurality of opened files, the security level of the original desktop image is determined according to the file with the highest security level in the files, so that the security of image processing is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic diagram of a virtual desktop image transmission system according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of an image processing method provided by an embodiment of the present disclosure;
FIG. 3 is an interaction diagram of another image processing method provided by an embodiment of the present disclosure;
FIG. 4 is a diagram of quantization results in a JPEG encoding process according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an image processing apparatus provided in an embodiment of the present disclosure;
fig. 6 is a block diagram of an image processing apparatus provided in an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
To facilitate understanding of the embodiments of the present disclosure, a virtual desktop image transmission system suitable for use in the embodiments of the present disclosure will be described in detail first with reference to the virtual desktop image transmission system shown in fig. 1 as an example. Fig. 1 is a schematic diagram of a virtual desktop image transmission system provided in an embodiment of the present disclosure.
The virtual desktop image transmission system shown in fig. 1 includes a terminal device 11 and a server 12, where the terminal device 11 corresponds to a user, that is, the user may perform a corresponding operation on the terminal device 11. The terminal device 11 may be, for example, a virtual desktop infrastructure (Virtual Desktop Infrastructure, VDI) device such as a computer, a mobile phone, a tablet computer, a notebook computer, a television set-top box, etc. The number of terminal devices 11 included in the image transmission system is not limited in the embodiment of the present disclosure, and may be 1, 2, or more, for example. The server 12 may be a single server or a cluster of servers. The terminal device 11 may also be referred to as a virtual image transmission protocol (virtual graph transmission protocol, VGTP) receiver. The server 12 may also be referred to as a virtual desktop server (virtual desktop server). The data transmission between the terminal device 11 and the server 12 may be based on a local area network or a wide area network or the like.
The terminal device 11 establishes a remote desktop connection with the server 12, and the terminal device 11 receives a user's corresponding operation (e.g., input through a keyboard or a mouse) and transmits operation information to the server 12. The server 12 processes the received operation information to obtain a corresponding virtual desktop image, encodes the virtual desktop image, and transmits the virtual desktop image to the terminal device 11 through a network. The terminal device 11 decodes and restores the encoded virtual desktop image, and then displays the decoded virtual desktop image.
The user does not have data storage locally, all data sources and video images are sourced from the cloud, so that the virtual desktop image transmission system has higher safety and is widely applied to the high-security special industry.
When it is determined that the environmental security condition of the terminal device 11 is abnormal, for example, when an artificial peeping event occurs, the terminal device may stop displaying the virtual desktop image, for example, may display a preset image to replace the virtual desktop image, thereby improving the security of the virtual desktop image transmission system.
Once the environment safety condition of the terminal device 11 is abnormal, the display is uniformly interrupted, so that the user experience is poor.
An embodiment of the present disclosure provides an image processing method, as shown in fig. 2. The image processing method 200 may be performed by the server 12.
The image processing method 200 includes the steps of:
210. And under the condition that the environment safety condition of the terminal equipment is abnormal, determining a first abnormal type corresponding to the first security level of the original desktop image, wherein different security levels correspond to different abnormal types.
The environmental security condition of the terminal device can be determined according to the environmental image of the terminal device.
The environmental image of the terminal device may be an image acquired by the image acquisition device from the environment around the terminal device. The image acquisition device may be located in the terminal device or may be a device other than the terminal device.
The environment image of the terminal device may for example comprise the user. It may be determined whether the user in the environment image of the terminal device is a legitimate user. When the environment image of the terminal equipment does not comprise legal users, determining that the environment safety condition of the terminal equipment is abnormal. For example, feature extraction may be performed on a user in an environment image of the terminal device, and whether the user is a legitimate user may be determined according to the features of the user. Whether the user is a legal user or not can be judged according to the stored image of the legal user or the characteristics of the legal user.
Of course, it is also possible to determine whether the environmental safety condition of the terminal device is abnormal according to the body posture of the user, the number of users, and whether the image acquisition device is present in the environmental image of the terminal device. In the environment image of the terminal device, the user does not watch the terminal device, the number of users in the environment image of the terminal device is greater than a preset value (for example, may be 1), the image acquisition device exists in the environment image of the terminal device, and the like, it may be determined that the environment safety condition of the terminal device is abnormal.
The original desktop image may be understood as a virtual desktop image. Normally, the server sends the virtual desktop image to the terminal device. The terminal device receives and displays the virtual desktop image.
The security level of the original desktop image may also be understood as the security level of the original desktop image. The security level may include impersonation, confidentiality, privacy, non-confidentiality, etc. Or the security level may be divided in other ways.
The first security level of the original desktop image may be determined based on the security level of one or more of the at least one open file displayed in the original desktop image.
The security level of the file may be preset.
For example, the highest security level corresponding to the at least one opened file may be taken as the first security level of the original desktop image.
When the original desktop image comprises a plurality of opened files, the security level of the original desktop image is determined according to the file with the highest security level in the files, so that the security of image processing is improved.
220. Transmitting the display image of the first anomaly type to the display device
Different anomaly types may include multiple degrees of ambiguity; the display image of the first anomaly type is a first desktop image of a first degree of blur.
Prior to step 220, correspondence information may be obtained, where the correspondence information is used to indicate a one-to-one correspondence between multiple security levels and multiple degrees of ambiguity.
Indication information can be obtained, and the indication information is used for modifying the blurring degree corresponding to the first blurring degree into a second blurring degree. After the indication information is acquired, it may be determined that the display image of the first abnormality type is a desktop image of the second degree of blurring.
By acquiring the instruction information, the flexibility of the desktop image transmitted to the terminal device can be adjusted in an improved manner.
A joint image experts group (joint photographic experts group, JPEG) encoding may be performed on the original desktop image to obtain the first blurriness desktop image.
The desktop image of the first degree of blurring may comprise data of a frequency component corresponding to the first degree of blurring in a discrete cosine transform (discrete cosine transform, DCT) result of the original desktop image.
With JPEG encoding, as the amount of encoded data increases in the DCT result, the degree of blurring of the encoded image decreases. The influence of the blurring degree adjustment on the coding mode can be reduced through JPEG coding, and the image processing efficiency is improved.
In particular, when it is determined that the environmental security of the terminal device is abnormal, and the like, the desktop image blurring degree needs to be adjusted, JPEG encoding is adopted, and the influence of image blurring degree adjustment on the encoding process is small.
The manner of JPEG encoding can be seen in particular from the description of fig. 3.
According to the image processing method provided by the embodiment of the disclosure, through steps 210 to 220, when the environmental security of the terminal equipment is abnormal, the display image of the abnormal type corresponding to the security level of the desktop image is sent to the terminal equipment, so that the user experience can be improved while the system security is ensured.
Based on the image processing method provided in the embodiment corresponding to fig. 2, another embodiment of the present disclosure provides an image processing method, which may be applied to a virtual image transmission system. Referring to fig. 3, the image processing method provided in this embodiment includes the following steps:
301. the user logs in.
The user can log in the virtual cloud desktop through the terminal equipment.
In some embodiments, if the login is successful, it may be determined that the user is legitimate. In order to ensure that the user using the virtual image transmission system is a legal user, in step 301, the validity of the user may be verified by other authentication methods.
In other embodiments, the process of verifying the validity of the user by the authentication manner may also be performed after the user logs in, which is not limited by the embodiment of the present application.
302. The terminal equipment collects legal use images of legal users and transmits the legal use images to the server.
The terminal device may comprise an image acquisition device such as a camera or the like. The image acquisition device is used for acquiring images.
When a legal user logs in the virtual cloud desktop, the image acquisition equipment acquires an image of the legal user and takes the image as a legal use image. The legally used image can be used as a reference image for comparison with other images.
Specifically, the server may perform feature extraction on the legitimate use image to determine features of the legitimate user and store the features of the legitimate user.
303. The server determines a first privacy level for the virtual desktop image.
The first security level of the virtual desktop image may be determined based on the security level of at least one of the opened files displayed in the virtual desktop image. Typically, the highest security level in the at least one open file is determined to be the first security level.
The first privacy level of the virtual desktop image may be updated as each file is displayed or stopped. The file stop display may be, for example, a window that minimizes the file, or may be closing or stopping the file. The file display may be a minimization of stopping the file at the time the file is run, or may be an opening or starting of the file.
When it is determined that the first security level of the virtual desktop image is the lowest security level, that is, the content displayed by the virtual desktop image is not related to security, 304 is performed. Upon determining that the first security level of the virtual desktop image is not the lowest security level, i.e., the content displayed by the virtual desktop image is secret, 305 is performed.
304. The server transmits the display image to the terminal device.
When it is determined that the first security level of the virtual desktop image is the lowest security level, that is, the content displayed by the virtual desktop image is not related to security, the display image may be the virtual desktop image.
When the display image is a virtual desktop image, the server encodes the obtained virtual desktop image and transmits the encoded data to the terminal device.
The terminal device decodes the received data to obtain a display image. The terminal device may display the display image. Or the terminal device may send the decoding result to a display, through which the display image is displayed.
In general, the virtual desktop images correspond to the terminal devices one by one.
After determining that the first security level of the virtual desktop image is not the lowest security level, step 305 is performed.
305. And acquiring a current environment image of the terminal equipment to determine whether the terminal equipment is safe or not.
Specifically, the current environmental image of the terminal device may be acquired by the image acquisition device.
It can be determined whether a legitimate user is present in the current ambient image of the terminal device. When no legal user exists in the current environment image of the terminal equipment, the unsafe condition can be determined. The terminal device does not have a legal user in the current environment image, and the legal user possibly leaves the seat.
It may be determined whether a user other than a legitimate user is present in the current environmental image of the terminal device. When there are other targets in the current environment image of the terminal device, it may be determined that it is unsafe. The current environment image of the terminal equipment contains users except legal users, and the users except legal users possibly peep the current screen.
It can be determined whether an image acquisition device is present in the current environmental image of the terminal device. When an image acquisition device exists in the current environment image of the terminal equipment, the unsafe condition can be determined. An image acquisition device exists in the current environment image of the terminal equipment, and the user can take the images by hand.
When the unsafe condition does not occur, the safety is determined.
The embodiment of the application is only exemplary, and the server can detect one or more of whether a legal user exists in the current environment image of the terminal equipment, whether a user except the legal user exists, whether an image acquisition device exists or not, and the like.
In the case where security is determined, 304 is performed.
In the case where security is determined, the display image is a virtual desktop image.
In the event that an unsafe condition is determined, 306 is performed.
It should be understood that the order of steps provided by the embodiments of the present application is merely exemplary, and the order of steps may be modified. For example, 305 may follow step 302, 304 in the event that security is determined; and under the condition that the unsafe condition is determined, determining at least one opened file displayed in the virtual desktop image, and determining the confidentiality grade corresponding to each file in the at least one opened file, thereby determining the first confidentiality grade.
306. The server generates a display image.
The display image of the highest security level may be a preset image.
The other display images of the respective security levels may be blurred virtual desktop images. The higher the security level, the higher the degree of blurring of the displayed image.
Or the display image of each security level may be a blurred virtual desktop image, except for the lowest security level (i.e., not related to the corresponding security level).
The virtual desktop image may be encoded by a joint image experts group (joint photographic experts group, JPEG) encoding to obtain a display image of a degree of blur corresponding to the first level of privacy.
Specifically, the virtual desktop image may be divided into small blocks of size 8×8. In the subsequent processing, each small block is processed individually.
The format of the virtual desktop image may be data in Red Green Blue (RGB) space, or may be data in international commission on illumination (commission internationale de L' Eclairage, CIE) XYZ space. The CIE XYZ space may also be referred to as YCbCr space, Y being the luminance (luminance) component of the color, and CB and CR being the concentration offset components of blue and red.
If the format of the virtual desktop image is RGB space data or other format data, the virtual desktop image may be converted into YCbCr space data.
Discrete cosine transform (discrete cosine transform, DCT) may be performed with each block in the virtual desktop image in YCbCr space to obtain a DCT result for each block. Discrete cosine transform belongs to one form of fourier transform. The DCT result for each block may be represented as an 8x 8 square matrix, each value in the square matrix being understood as a DCT coefficient.
Thereafter, the DCT result may be quantized to obtain a quantized result as shown in fig. 4. For example, the quantization may be performed using a round function round.
And then, encoding the quantized result to obtain an encoded display image.
The DCT result can be understood as a distribution of pixels in the frequency domain. In the DCT result, the upper left side is low frequency data, and the lower right side is high frequency data. The human eye is more sensitive to low frequency data.
The 8×8 square matrix is converted into an array in the order of the sequence numbers from small to large in the square matrix as shown in fig. 4. The array is encoded to obtain an encoded virtual desktop image.
When encoding, all of the values in the array may be encoded. Alternatively, the values in the array may be encoded by selecting a portion of the values in the array in a front-to-back order (i.e., the order of the numbers in the square matrix shown in fig. 4 is from small to large).
As the number of values selected decreases, the degree of blurring of the encoded virtual desktop image increases.
In encoding the virtual desktop image, different security levels may correspond to different numbers of values. As the security level increases, the number of selected values in the array decreases when encoding the quantization result.
For example, the quantization results as shown in fig. 4 may be layered. The sequence numbers between two adjacent layers are continuous. Illustratively, the first layer may include values corresponding to sequence number 0, the second layer may include values corresponding to sequence numbers 1, 2, the third layer may include values corresponding to sequence numbers 3-6, the fourth layer may include values corresponding to sequence numbers 7-14, the fifth layer may include values corresponding to sequence numbers 15-30, the sixth layer may include values corresponding to sequence numbers 31-46, and the seventh layer may include values corresponding to sequence numbers 47-63.
When the quantization result is encoded, as the security level increases, the maximum value of the sequence numbers of layers included in data required for encoding decreases.
That is, when encoding the quantization result, the lower the number of layers included in the data required for encoding, the more blurred the picture, and the higher the number of layers, the more clear.
For example, aiming at a virtual desktop image with an absolute secret level, setting a corresponding coding level as 1 level, and coding a first layer in a quantization result to obtain a coded display image; aiming at a target secret related document with a confidential level, setting a corresponding coding level as 2 levels, and coding a first layer and a second layer in a quantization result to obtain a coded display image; aiming at the target secret related file of the secret level, setting the corresponding coding level as 3 levels, and coding the first layer to the third layer in the quantization result to obtain a coded display image.
It should be appreciated that in the case where the security level is determined, or where the first security level is the lowest security level, all layers in the quantized result may be encoded to obtain an encoded display image.
After the display image is generated, step 304 is performed.
The terminal device receives the encoded display image and decodes the received data. The terminal equipment can carry out zero padding on the position where the data is not received in the simulation of the quantization result, so as to decode the received data, obtain a decoded display image, and further realize the display of the display image.
Through the steps, when files with different security levels are displayed in the virtual desktop image, anti-peeping processing can be immediately carried out, and the current virtual desktop image is encoded according to the set encoding level, so that the display image received by the terminal equipment becomes fuzzy, and the purpose of peeping is achieved. The blurring degree is different for files with different security levels, and the main principle is that the higher the security level is, the higher the picture blurring degree is.
Preferably, the corresponding relation between the coding level and the security level can be adjusted as required, so that the control picture is clearer or more blurred. Specifically, the user can send an adjustment instruction to the server side in a reverse control mode, and the server adjusts the corresponding relation between the coding level and the security level after receiving the corresponding instruction.
For example, if the user wants the picture to be clearer, the subsequent layers are sequentially overlapped on the basis of the current transmission, for example, the current coding only adopts the first layer of the quantization result, and when the user wants to be clearer, an adjustment instruction can be sent to the server through the terminal equipment, so that the number of coding layers corresponding to the current security level is increased. Or the user can input the adjustment instruction on the server.
When receiving the adjustment instruction, the server may increase or decrease the number of layers corresponding to the current security level one layer at a time. Or when the server receives the adjustment instruction, the number of layers corresponding to the current security level can be adjusted to the number of layers indicated by the adjustment instruction.
The image processing method provided by the embodiment of the disclosure can improve user experience while ensuring system safety.
Based on the image processing methods described in the above-described embodiments corresponding to fig. 2 to 4, the following are embodiments of the apparatus of the present disclosure, which may be used to execute the embodiments of the method of the present disclosure.
An embodiment of the present disclosure provides an image processing apparatus, as shown in fig. 5, the image processing apparatus 500 includes: a processing module 501 and a transmitting module 502.
The processing module 501 is configured to determine, in a case where an environment security condition of the terminal device is abnormal, a first abnormality type corresponding to a first security level of an original desktop image, where different security levels correspond to different abnormality types.
The sending module 502 is configured to send the display image of the first anomaly type to the terminal device.
Optionally, the different anomaly types include multiple degrees of ambiguity; the display image of the first anomaly type is a first desktop image of a first degree of blur.
Optionally, the processing module is further configured to perform joint photographic experts group JPEG encoding on the original desktop image to obtain the desktop image with the first degree of blurring; the desktop image of the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a discrete cosine transform DCT result of the original desktop image.
Optionally, the apparatus 500 further includes an obtaining module, where the obtaining module is configured to obtain indication information, where the indication information is used to modify the blur level corresponding to the first security level to a second blur level; the display image of the first anomaly type is a desktop image of the second blur degree.
Optionally, the processing module 501 is further configured to determine the first security level according to a security level with a highest security level of at least one open file displayed in the original desktop image.
The image processing device provided by the embodiment of the disclosure can improve user experience while ensuring system safety.
Based on the image processing method described in the above-described embodiments corresponding to fig. 2 to 4, the embodiment of the present disclosure further provides an image processing apparatus, as shown in fig. 6.
The image processing apparatus 600 includes a memory 601 and a processor 602.
The memory 601 is used to store program instructions.
When the program instructions are run in the processor 602, the processor 602 is configured to:
Under the condition that the environment safety condition of the terminal equipment is abnormal, determining a first abnormal type corresponding to a first security level of an original desktop image, wherein different security levels correspond to different abnormal types;
And sending the display image of the first abnormal type to the terminal equipment.
Optionally, the different anomaly types include multiple degrees of ambiguity; the display image of the first anomaly type is a first desktop image of a first degree of blur.
Optionally, the processor 602 is further configured to perform joint photographic experts group JPEG encoding on the original desktop image to obtain the desktop image with the first degree of blur; the desktop image of the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a discrete cosine transform DCT result of the original desktop image.
Optionally, the processor 602 is further configured to obtain indication information, where the indication information is used to modify the blur degree corresponding to the first security level to a second blur degree; the display image of the first anomaly type is a desktop image of the second blur degree.
Optionally, the processor 602 is further configured to determine the first security level according to a security level with a highest security level of at least one open file displayed in the original desktop image.
Based on the image processing method described in the above-described embodiments corresponding to fig. 2 to 4, the embodiments of the present disclosure also provide a computer-readable storage medium, for example, a non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, or the like. The storage medium stores computer instructions for executing the image processing method described in the embodiments corresponding to fig. 1 and fig. 3, which are not described herein.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (2)

1. An image processing method, the method comprising:
Under the condition that the environment safety condition of the terminal equipment is abnormal, determining a first abnormal type corresponding to a first security level of an original desktop image, wherein different security levels correspond to different abnormal types;
Transmitting the display image of the first anomaly type to the terminal equipment;
the method further comprises the steps of:
determining the first security level according to the highest security level of the security levels of at least one opened file displayed in the original desktop image;
The different anomaly types include multiple degrees of ambiguity; the display image of the first abnormal type is a first desktop image with a first blurring degree;
The method further comprises the steps of: performing joint image expert group JPEG coding on the original desktop image to obtain a desktop image with the first blurring degree; the desktop image with the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a Discrete Cosine Transform (DCT) result of the original desktop image;
the method further comprises the steps of:
Acquiring indication information, wherein the indication information is used for modifying the blurring degree corresponding to the first blurring degree into a second blurring degree; the display image of the first anomaly type is a desktop image of the second blur degree.
2. An image processing device is characterized by comprising a processing module and a sending module;
The processing module is used for determining a first abnormal type corresponding to a first security level of the original desktop image under the condition that the environment security condition of the terminal equipment is abnormal, wherein different security levels correspond to different abnormal types;
the sending module is used for sending the display image of the first abnormal type to the terminal equipment;
The processing module is further configured to determine the first security level according to a security level with a highest security level of at least one opened file displayed in the original desktop image;
The different anomaly types include multiple degrees of ambiguity; the display image of the first abnormal type is a first desktop image with a first blurring degree;
The processing module is further used for carrying out joint image expert group JPEG encoding on the original desktop image so as to obtain the desktop image with the first blurring degree; the desktop image with the first blurring degree comprises data of a frequency component corresponding to the first blurring degree in a Discrete Cosine Transform (DCT) result of the original desktop image;
The device also comprises an acquisition module, wherein the acquisition module is used for acquiring indication information, and the indication information is used for modifying the blurring degree corresponding to the first blurring degree into a second blurring degree; the display image of the first anomaly type is a desktop image of the second blur degree.
CN202010985712.9A 2020-09-18 2020-09-18 Image processing method and device Active CN112272159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010985712.9A CN112272159B (en) 2020-09-18 2020-09-18 Image processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010985712.9A CN112272159B (en) 2020-09-18 2020-09-18 Image processing method and device

Publications (2)

Publication Number Publication Date
CN112272159A CN112272159A (en) 2021-01-26
CN112272159B true CN112272159B (en) 2024-10-22

Family

ID=74349663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010985712.9A Active CN112272159B (en) 2020-09-18 2020-09-18 Image processing method and device

Country Status (1)

Country Link
CN (1) CN112272159B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475779A (en) * 2020-05-19 2020-07-31 上海闻泰电子科技有限公司 Image processing method, device, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8655939B2 (en) * 2007-01-05 2014-02-18 Digital Doors, Inc. Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
JP5803290B2 (en) * 2011-06-01 2015-11-04 株式会社リコー Data processing apparatus and program
JP6547356B2 (en) * 2015-03-20 2019-07-24 富士ゼロックス株式会社 Information processing apparatus and program
CN108416301A (en) * 2018-03-09 2018-08-17 司马大大(北京)智能系统有限公司 Video analysis processing method and processing device
CN110955395A (en) * 2019-12-17 2020-04-03 珠海格力电器股份有限公司 Risk assessment method and device for printing system and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475779A (en) * 2020-05-19 2020-07-31 上海闻泰电子科技有限公司 Image processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112272159A (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN112087625B (en) Image processing method, device, server and storage medium
Cedillo-Hernández et al. Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification
CN112257123B (en) Image processing method and system
CN105830134A (en) Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium
Li et al. Anti-compression JPEG steganography over repetitive compression networks
KR101805550B1 (en) Image data encoding method for presentation virtualization and server therefor
CN111050021A (en) Image privacy protection method based on two-dimensional code and reversible visual watermarking
CN112270647A (en) Image processing method and system
US20180268150A1 (en) Secure distribution of an image
CN105933710A (en) Information transmission method and information transmission system
US12137167B2 (en) Watermarking in a virtual desktop infrastructure environment
CN112272159B (en) Image processing method and device
Amsden et al. Transmitting hidden information using steganography via Facebook
CN111325652A (en) Information embedding method, information extracting method, information embedding device, information extracting device, information embedding equipment and computer readable storage medium
CN117061581A (en) Remote control method, remote control device, electronic apparatus, storage medium, and program product
Jung Adaptive post-filtering of JPEG compressed images considering compressed domain lossless data hiding
EP3985989A1 (en) Detection of modification of an item of content
Zhu et al. Invertible image decolorization with CFEH and reversible data hiding
CN117857762B (en) Image processing method and device of display module, chip and storage medium
CN110278438A (en) Method and device for embedding hidden coding in video
EP4498316A1 (en) Embedding information in an image
CN112399148B (en) Virtual monitoring method and device based on virtual three-dimensional scene
US20250211748A1 (en) Time-limit interpolation
WO2024143565A1 (en) Method and device for compressing and transmitting video for telemedicine system
WO2024143823A1 (en) Video compression and transmission device and method for remote medical system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant