[go: up one dir, main page]

CN117135365A - An anti-peeping method and device based on scrambled coding of image pixel values - Google Patents

An anti-peeping method and device based on scrambled coding of image pixel values Download PDF

Info

Publication number
CN117135365A
CN117135365A CN202311125375.6A CN202311125375A CN117135365A CN 117135365 A CN117135365 A CN 117135365A CN 202311125375 A CN202311125375 A CN 202311125375A CN 117135365 A CN117135365 A CN 117135365A
Authority
CN
China
Prior art keywords
image
image data
user
zero terminal
peeping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311125375.6A
Other languages
Chinese (zh)
Inventor
龙科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202311125375.6A priority Critical patent/CN117135365A/en
Publication of CN117135365A publication Critical patent/CN117135365A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/85Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
    • H04N19/88Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression involving rearrangement of data among different coding units, e.g. shuffling, interleaving, scrambling or permutation of pixel data or permutation of transform coefficient data among different blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

本公开是关于一种基于图像像素值乱序编码的防窥拍方法及装置。该方法包括:虚拟机与零终端建立连接;虚拟机接收零终端发送的使用用户图像数据,并根据使用用户图像数据判断是否出现窥拍事件;若出现窥拍事件,虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;虚拟机将图像数据发送至零终端。本公开零终端与虚拟端建立连接后,虚拟端正常编码桌面图像并发送至零终端,同时,零终端进行防窥拍监控;当发现有窥拍事件时,零终端对桌面图像进行乱序编码发送,零终端解码后得到乱码图像;当窥拍事件消除时,虚拟端重新正常编码发送桌面图像,零终端解码后得到正常桌面图像,从而防止了信息泄漏。

The present disclosure relates to an anti-peep photography method and device based on scrambled coding of image pixel values. The method includes: the virtual machine establishes a connection with the zero terminal; the virtual machine receives the user image data sent by the zero terminal, and determines whether a peeping event occurs based on the user image data; if a peeping event occurs, the virtual machine pixels the desktop image Values are shuffled to obtain image data; the virtual machine sends the image data to the zero terminal. After the zero terminal of the present disclosure establishes a connection with the virtual terminal, the virtual terminal encodes the desktop image normally and sends it to the zero terminal. At the same time, the zero terminal performs anti-peeping monitoring; when a spying event is discovered, the zero terminal encodes the desktop image out of order. After sending, the zero terminal decodes and obtains a garbled image; when the snooping event is eliminated, the virtual terminal re-encodes and sends the desktop image normally, and the zero terminal decodes and obtains a normal desktop image, thereby preventing information leakage.

Description

一种基于图像像素值乱序编码的防窥拍方法及装置An anti-peeping method and device based on scrambled coding of image pixel values

技术领域Technical field

本公开实施例涉及信息安全保护技术领域,尤其涉及一种基于图像像素值乱序编码的防窥拍方法及装置。Embodiments of the present disclosure relate to the technical field of information security protection, and in particular, to an anti-peeping method and device based on scrambled coding of image pixel values.

背景技术Background technique

在相关技术中,云办公零终端系统由于其较高的安全性,在高涉密的特种行业有了比较广泛的应用。其较高的安全性体现在:用户本地无数据存储,所有数据源和视频图像来源于云端的图像,并且可在云端给图像加上使用者的水印,从而保证了数据不能轻易泄漏。但是,这种方式仍不能解决在显示端由人为窥拍所造成的数据泄露。Among related technologies, the cloud office zero-terminal system has been widely used in special industries with high confidentiality due to its high security. Its high security is reflected in the fact that there is no local data storage for users, all data sources and video images come from images in the cloud, and users' watermarks can be added to images in the cloud, thus ensuring that data cannot be easily leaked. However, this method still cannot solve the data leakage caused by human peeping on the display end.

对于云桌面用户而言,即使自己可以做到不泄密,也无法避免他人通过网络进行数据截取,再次还原数据形成图像显示出来。For cloud desktop users, even if they can avoid leaking secrets, they cannot prevent others from intercepting data through the network and restoring the data to form an image for display.

因此,有必要提供一种新的技术方案改善上述方案中存在的一个或者多个问题。Therefore, it is necessary to provide a new technical solution to improve one or more problems existing in the above solution.

需要说明的是,在上述背景技术部分公开的信息仅用于加强对本公开的背景的理解,因此可以包括不构成对本领域普通技术人员已知的现有技术的信息。It should be noted that the information disclosed in the above background section is only used to enhance understanding of the background of the present disclosure, and therefore may include information that does not constitute prior art known to those of ordinary skill in the art.

发明内容Contents of the invention

本公开实施例的目的在于提供一种基于图像像素值乱序编码的防窥拍方法及装置,进而至少在一定程度上克服由于相关技术的限制和缺陷而导致的一个或者多个问题。The purpose of the embodiments of the present disclosure is to provide an anti-peep photography method and device based on out-of-order coding of image pixel values, thereby overcoming one or more problems caused by limitations and defects of related technologies, at least to a certain extent.

根据本公开实施例的第一方面,提供一种基于图像像素值乱序编码的防窥拍方法,该方法包括:According to a first aspect of an embodiment of the present disclosure, an anti-peeping method based on scrambled coding of image pixel values is provided. The method includes:

虚拟机与零终端建立连接;The virtual machine establishes a connection with the zero terminal;

所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;The virtual machine receives the user image data sent by the zero terminal, and determines whether a peeping event occurs based on the user image data;

若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;If the peeking event occurs, the virtual machine performs random encoding of pixel values on the desktop image to obtain image data;

所述虚拟机将所述图像数据发送至零终端。The virtual machine sends the image data to the zero terminal.

本公开的一实施例中,该方法还包括:In an embodiment of the present disclosure, the method further includes:

若未出现所述窥拍事件,所述虚拟机对桌面图像进行正常编码,以得到图像数据。If the peek event does not occur, the virtual machine encodes the desktop image normally to obtain image data.

本公开的一实施例中,所述根据所述使用用户图像数据判断是否出现窥拍事件的步骤,包括:In an embodiment of the present disclosure, the step of determining whether a spying event occurs based on the use of user image data includes:

所述零终端对所述使用用户图像数据进行识别,并判断识别出的当前使用用户的个数;The zero terminal identifies the user image data and determines the number of currently identified users;

若未检测到所述使用用户,则判断为出现窥拍事件;If the user is not detected, it is determined that a spying event has occurred;

若检测到一个或多个所述使用用户,则进行后续判断。If one or more users are detected, subsequent judgment will be made.

本公开的一实施例中,所述若检测到一个或多个所述使用用户,则进行后续判断的步骤,包括:In an embodiment of the present disclosure, if one or more users are detected, the step of making subsequent judgments includes:

若检测到一个所述使用用户,则根据合法用户图像数据判断所述使用用户是否为合法用户;If one of the users is detected, determine whether the user is a legal user based on the legal user image data;

若不是,则判断为出现窥拍事件;If not, it is judged that a voyeurism event has occurred;

若是,则继续判断所述合法用户的动作是否可疑,若可疑,则判断为出现窥拍事件。If so, continue to determine whether the legitimate user's actions are suspicious. If so, it is determined that a spying event has occurred.

本公开的一实施例中,所述若检测到一个或多个所述使用用户,则进行后续判断的步骤,还包括:In an embodiment of the present disclosure, if one or more users are detected, the step of making subsequent judgments also includes:

若检测到多个所述使用用户,则判断多个所述使用用户中,是否包含所述合法用户;If multiple users are detected, determine whether the legal users are included among the multiple users;

若不包含,则判断为出现窥拍事件;If it is not included, it is judged that a peeping incident has occurred;

若包含,则继续判断所述合法用户和其余的所述使用用户的动作是否可疑,若可疑,则判断为出现窥拍事件。If included, continue to determine whether the actions of the legitimate user and the remaining users are suspicious. If they are suspicious, it is determined that a spying event has occurred.

本公开的一实施例中,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据的步骤,包括:In an embodiment of the present disclosure, the virtual machine performs random encoding of pixel values on the desktop image to obtain the image data, including:

根据所述桌面图像的像素矩阵建立一个新的像素矩阵;Create a new pixel matrix based on the pixel matrix of the desktop image;

将所述桌面图像的像素值进行标记,并将所述桌面图像的像素值次序打乱保存到所述新的像素矩阵中,以完成像素值乱序编码。The pixel values of the desktop image are marked, and the order of the pixel values of the desktop image is scrambled and stored in the new pixel matrix to complete the pixel value scrambled encoding.

根据本公开实施例的第二方面,提供一种基于图像像素值乱序编码的防窥拍方法,该方法包括:According to a second aspect of the embodiment of the present disclosure, a method for preventing privacy shots based on scrambled coding of image pixel values is provided. The method includes:

零终端与虚拟机建立连接;Zero terminal establishes connection with virtual machine;

所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;The zero terminal collects the user image data of the current user and sends it to the virtual terminal;

所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。The zero terminal receives image data and parses the image data to display a desktop image.

根据本公开实施例的第三方面,提供一种基于图像像素值乱序编码的防窥拍装置,该装置包括:According to a third aspect of the embodiment of the present disclosure, an anti-peeping device based on scrambled coding of image pixel values is provided. The device includes:

第一连接模块,用于虚拟机与零终端建立连接;The first connection module is used to establish a connection between the virtual machine and the zero terminal;

判断模块,用于所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;A judgment module, configured for the virtual machine to receive the user image data sent by the zero terminal, and determine whether a peeping event occurs based on the user image data;

第一编码模块,用于若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;The first encoding module is used to, if the peek event occurs, the virtual machine performs random encoding of pixel values on the desktop image to obtain image data;

发送模块,用于所述所述虚拟机将所述图像数据发送至零终端。A sending module, configured for the virtual machine to send the image data to a zero terminal.

本公开的一实施例中,该装置还包括:In an embodiment of the present disclosure, the device further includes:

第二编码模块,用于若未出现所述窥拍事件,所述虚拟机对桌面图像进行正常编码,以得到图像数据。The second encoding module is used to perform normal encoding on the desktop image by the virtual machine to obtain image data if the peeking event does not occur.

根据本公开实施例的第四方面,提供一种基于图像像素值乱序编码的防窥拍装置,该装置包括:According to a fourth aspect of the embodiment of the present disclosure, an anti-peeping device based on scrambled coding of image pixel values is provided. The device includes:

第二连接模块,用于零终端与虚拟机建立连接;The second connection module is used to establish a connection between the zero terminal and the virtual machine;

用户图像采集模块,用于所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;The user image collection module is used by the zero terminal to collect the user image data of the current user and send it to the virtual terminal;

解析模块,用于所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。A parsing module is used for the zero terminal to receive image data and parse the image data to display a desktop image.

本公开的实施例提供的技术方案可以包括以下有益效果:The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:

本公开的实施例中,通过上述基于图像像素值乱序编码的防窥拍方法及装置,零终端与虚拟端建立连接后,虚拟端正常编码桌面图像并发送至零终端,同时,零终端进行防窥拍监控;当发现有窥拍事件时,零终端对桌面图像进行乱序编码发送,零终端解码后得到乱码图像;当窥拍事件消除时,虚拟端重新正常编码发送桌面图像,零终端解码后得到正常桌面图像,从而防止了信息泄漏。In embodiments of the present disclosure, through the above-mentioned anti-peep shooting method and device based on scrambled encoding of image pixel values, after the zero terminal establishes a connection with the virtual terminal, the virtual terminal encodes the desktop image normally and sends it to the zero terminal. At the same time, the zero terminal performs Anti-peeping monitoring; when a peeping incident is discovered, the zero terminal encodes and sends the desktop image out of order, and the zero terminal decodes it to obtain the garbled image; when the peeping incident is eliminated, the virtual terminal re-encodes and sends the desktop image normally, and the zero terminal After decoding, a normal desktop image is obtained, thereby preventing information leakage.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only, and do not limit the present disclosure.

附图说明Description of the drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. Obviously, the drawings in the following description are only some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without exerting creative efforts.

图1示出本公开示例性实施例中一种基于图像像素值乱序编码的防窥拍方法的步骤图;Figure 1 shows a step diagram of an anti-peeping method based on scrambled coding of image pixel values in an exemplary embodiment of the present disclosure;

图2示出本公开示例性实施例中判断是否出现窥拍事件的方法的流程图;Figure 2 shows a flowchart of a method for determining whether a spying event occurs in an exemplary embodiment of the present disclosure;

图3示意性示出本公开示例性实施例中另一种基于图像像素值乱序编码的防窥拍方法的步骤图;Figure 3 schematically shows a step diagram of another anti-peeping method based on scrambled encoding of image pixel values in an exemplary embodiment of the present disclosure;

图4示意性示出本公开示例性实施例中基于视频图像乱序编码的防窥拍方法的流程图;Figure 4 schematically illustrates a flow chart of an anti-peeping method based on video image out-of-order coding in an exemplary embodiment of the present disclosure;

图5示意性示出本公开示例性实施例中一种基于图像像素值乱序编码的防窥拍的示意图;Figure 5 schematically shows a schematic diagram of an anti-peep shot based on scrambled encoding of image pixel values in an exemplary embodiment of the present disclosure;

图6示意性示出本公开示例性实施例中另一种基于图像像素值乱序编码的防窥拍的示意图;Figure 6 schematically illustrates another schematic diagram of anti-peep photography based on scrambled encoding of image pixel values in an exemplary embodiment of the present disclosure;

图7示意性示出本公开示例性实施例中一种程序产品的示意图;Figure 7 schematically shows a schematic diagram of a program product in an exemplary embodiment of the present disclosure;

图8示意性示出本公开示例性实施例中一种电子设备的示意图。FIG. 8 schematically shows a schematic diagram of an electronic device in an exemplary embodiment of the present disclosure.

具体实施方式Detailed ways

现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些实施方式使得本公开将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施方式中。Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concepts of the example embodiments. To those skilled in the art. The described features, structures or characteristics may be combined in any suitable manner in one or more embodiments.

此外,附图仅为本公开的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings represent the same or similar parts, and thus their repeated description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software form, or implemented in one or more hardware modules or integrated circuits, or implemented in different networks and/or processor devices and/or microcontroller devices.

本示例实施方式中首先提供了一种基于图像像素值乱序编码的防窥拍方法,该方法可以应用于一具备显示屏幕的终端设备,例如可以是手机、个人数字助理、笔记本电脑、平板电脑、智能手表等移动终端,也可以是台式电脑、智能电视等非移动终端。参考图1中所示,该方法可以包括:步骤S101~步骤S104。This example implementation first provides an anti-peeping method based on scrambled coding of image pixel values. This method can be applied to a terminal device with a display screen, such as a mobile phone, personal digital assistant, notebook computer, or tablet computer. , mobile terminals such as smart watches, or non-mobile terminals such as desktop computers and smart TVs. Referring to what is shown in Figure 1, the method may include: steps S101 to S104.

步骤S101:虚拟机与零终端建立连接;Step S101: The virtual machine establishes a connection with the zero terminal;

步骤S102:所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;Step S102: The virtual machine receives the user image data sent by the zero terminal, and determines whether a spying event occurs based on the user image data;

步骤S103:若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;Step S103: If the peeking event occurs, the virtual machine performs random encoding of pixel values on the desktop image to obtain image data;

步骤S104:所述虚拟机将所述图像数据发送至零终端。Step S104: The virtual machine sends the image data to the zero terminal.

通过上述基于图像像素值乱序编码的防窥拍方法,零终端与虚拟端建立连接后,虚拟端正常编码桌面图像并发送至零终端,同时,零终端进行防窥拍监控;当发现有窥拍事件时,零终端对桌面图像进行乱序编码发送,零终端解码后得到乱码图像;当窥拍事件消除时,虚拟端重新正常编码发送桌面图像,零终端解码后得到正常桌面图像,从而防止了信息泄漏。Through the above-mentioned anti-peeping method based on scrambled encoding of image pixel values, after the zero terminal establishes a connection with the virtual terminal, the virtual terminal encodes the desktop image normally and sends it to the zero terminal. At the same time, the zero terminal performs anti-peeping monitoring; when a spy is found When the shooting event occurs, the zero terminal encodes and sends the desktop image out of sequence, and the zero terminal decodes it and obtains the garbled image; when the spying event is eliminated, the virtual terminal re-encodes and sends the desktop image normally, and the zero terminal decodes it and obtains the normal desktop image, thus preventing information leaked.

下面,将参考图1至图2对本示例实施方式中的上述方法的各个步骤进行更详细的说明。Each step of the above method in this exemplary embodiment will be described in more detail below with reference to FIGS. 1 to 2 .

在步骤S101中,零终端通过正确的账号及密码登录至虚拟机,以此来建立虚拟机与零终端之间的连接。In step S101, the zero terminal logs in to the virtual machine with the correct account and password to establish a connection between the virtual machine and the zero terminal.

在步骤S102中,虚拟机和零终端建立连接后,需要将当前使用的使用用户图像数据与合法用户图像数据进行对比,以保证当前使用的使用用户为合法用户。In step S102, after the virtual machine and the zero terminal establish a connection, the currently used user image data needs to be compared with the legal user image data to ensure that the currently used user is a legal user.

在合法用户使用智能终端(零终端)之前,摄像头首先对合法用户在使用零终端时坐在屏幕前的图像进行采集,所采集的图像作为后续图像比对的参照图像;一方面,可以将从当前的使用用户图像数据中识别出得到人脸,作为后续人脸识别中的参照人脸,另一方面,可以在后续将实时使用用户图像数据跟合法用户的图像数据进行比对,从而判断用户使用状态是否发生改变。Before a legitimate user uses a smart terminal (zero terminal), the camera first collects the image of the legitimate user sitting in front of the screen when using the zero terminal. The collected image is used as a reference image for subsequent image comparison; on the one hand, it can be The face identified in the current user image data is used as a reference face in subsequent face recognition. On the other hand, the real-time user image data can be compared with the image data of legitimate users in the future to determine the user. Whether the usage status has changed.

为了保证该步骤中所采集到的用户使用图像中的用户是当前智能零终端的合法用户,在采集图像之前,还需要通过其它鉴权方式对当前用户的合法性进行验证。In order to ensure that the user in the user usage image collected in this step is a legal user of the current smart zero terminal, before collecting the image, the legitimacy of the current user needs to be verified through other authentication methods.

在步骤S103和步骤S104中,在用户使用智能零终端的过程中,摄像头按照预设周期不断采集用户使用图像,该周期可以根据实际需要进行设置,具体在此不做限制。In steps S103 and S104, while the user is using the smart zero terminal, the camera continuously collects images of the user according to a preset cycle. This cycle can be set according to actual needs, and is not limited here.

另外,判断是否出现可疑使用状况包括但不限于:判断使用人员是否为合法用户、合法用户是否离开座位、是否有合法用户之外的人观看屏幕图像、是否有其他人员偷拍等等。In addition, determining whether suspicious usage occurs includes but is not limited to: determining whether the user is a legitimate user, whether the legitimate user leaves the seat, whether anyone other than the legitimate user is watching the screen image, whether other people are taking photos secretly, etc.

上述对是否出现可以窥屏事件的判断由AI(Artificial Intelligence,人工智能)模块实现,AI模块的判断结果将作为是否启动反窥拍事件的判断条件。实际实现时,AI模块可以通过多种方式进行是否出现可疑窥拍事件的判断。其中,AI模块不是本申请的重点,且AI模块的工作原理为现有技术,其具体原理不在此进行赘述。The above-mentioned judgment of whether a screen snooping event occurs is implemented by the AI (Artificial Intelligence, artificial intelligence) module, and the judgment result of the AI module will be used as a judgment condition for whether to initiate an anti-peeping event. In actual implementation, the AI module can use a variety of methods to determine whether suspicious spying events have occurred. Among them, the AI module is not the focus of this application, and the working principle of the AI module is an existing technology, and its specific principles will not be described in detail here.

当VGTP-R端(零终端)的AI识别模块检测到可疑窥拍事件时,直接启动反窥拍流程,包括:对从VGTP-S端接收到的乱序编码后的各图像宏块解码后,直接按照解码的先后顺序进行排列得到最终显示图像。这样,通过不对乱序排列后的宏块进行顺序恢复,使得所得到的整帧图像中的各宏块按照打乱后的顺序进行排布,也就是说,对于这样处理得到的图像帧来说,整帧中信息是混乱的,由此,即便可疑窥拍用户成功实施了窥拍行为也无法获取到有效的信息,从而保证了用户信息的安全性。When the AI recognition module of the VGTP-R end (zero terminal) detects a suspicious snooping event, it directly starts the anti-snooping process, including: decoding the out-of-order encoded image macroblocks received from the VGTP-S end. , arrange directly according to the decoding order to obtain the final display image. In this way, by not restoring the order of the scrambled macroblocks, the macroblocks in the obtained whole frame image are arranged in the scrambled order. That is to say, for the image frame obtained in this way, , the information in the entire frame is chaotic. Therefore, even if the suspected peeping user successfully implements the peeping behavior, effective information cannot be obtained, thereby ensuring the security of user information.

在一个实施例中,该方法还包括:若未出现所述窥拍事件,所述虚拟机对桌面图像进行正常编码,以得到图像数据。In one embodiment, the method further includes: if the peek event does not occur, the virtual machine performs normal encoding on the desktop image to obtain image data.

具体的,VGTP-R智能终端接收编码图像,通过解码来还原原始视频图像,并将解码得到的源视频图像显示在屏幕上。具体包括以下步骤:Specifically, the VGTP-R smart terminal receives the encoded image, restores the original video image through decoding, and displays the decoded source video image on the screen. Specifically, it includes the following steps:

接收端(零终端)收到传输的乱码图像数据后,先对图像数据进行解析得到图像数据,即可得到桌面图像。After the receiving end (zero terminal) receives the transmitted garbled image data, it first analyzes the image data to obtain the image data, and then obtains the desktop image.

可以理解的是,为了更好地保护隐私安全,可以考虑在解码过程中添加鉴权机制、数字水印等技术。It is understandable that in order to better protect privacy security, you can consider adding authentication mechanisms, digital watermarks and other technologies during the decoding process.

在一个实施例中,所述根据所述使用用户图像数据判断是否出现窥拍事件的步骤,包括:所述零终端对所述使用用户图像数据进行识别,并判断识别出的当前使用用户的个数;若未检测到所述使用用户,则判断为出现窥拍事件;若检测到一个或多个所述使用用户,则进行后续判断。In one embodiment, the step of determining whether a peeping event occurs based on the user image data includes: the zero terminal identifies the user image data, and determines the identity of the identified current user. number; if the user is not detected, it is determined that a spying event occurs; if one or more users are detected, subsequent determination is made.

具体的,AI模块接收到当前的使用用户的使用图像时,对当前的使用用户的使用图像进行人脸识别;将识别到的人脸图像与系统中预存储的合法用户的人脸图像进行比对,判断是否出现可疑窥拍事件。AI模块对当前接收到的使用用户的使用图像进行人脸识别;AI模块判断识别出的人脸个数;且根据识别结果来进行后续判断,从而确定是否出现可疑窥拍事件。其中,如果未检测到人脸,则认为合法用户离开座位,此时,直接启动反窥拍事件(即判断为出现窥拍事件)。Specifically, when the AI module receives the current user's usage image, it performs face recognition on the current user's usage image; compares the recognized face image with the legal user's face image pre-stored in the system. Yes, determine whether there is a suspicious spying incident. The AI module performs face recognition on the currently received user images; the AI module determines the number of recognized faces; and makes subsequent judgments based on the recognition results to determine whether there is a suspicious peeping incident. Among them, if no face is detected, it is considered that the legitimate user has left the seat. At this time, the anti-peeping event is directly initiated (that is, it is determined that a peeping event has occurred).

在一个实施例中,所述若检测到一个或多个所述使用用户,则进行后续判断的步骤,包括:若检测到一个所述使用用户,则根据合法用户图像数据判断所述使用用户是否为合法用户;若不是,则判断为出现窥拍事件;若是,则继续判断所述合法用户的动作是否可疑,若可疑,则判断为出现窥拍事件。In one embodiment, if one or more users are detected, the step of making subsequent judgments includes: if one user is detected, judging whether the user is based on legal user image data. is a legitimate user; if not, it is determined that a spying event has occurred; if yes, it is continued to determine whether the legitimate user's action is suspicious; if it is suspicious, it is determined that a spying event has occurred.

若检测到多个所述使用用户,则判断多个所述使用用户中,是否包含所述合法用户;若不包含,则判断为出现窥拍事件;若包含,则继续判断所述合法用户和其余的所述使用用户的动作是否可疑,若可疑,则判断为出现窥拍事件。If multiple users are detected, it is determined whether the legal user is included among the multiple users; if not, it is determined that a spying event has occurred; if it is included, it is continued to determine whether the legal user and Are the actions of the remaining users suspicious? If so, it is determined that a spying incident has occurred.

具体的,如图2所示,如果检测到一个人脸,则首先将该人脸与本地存储的合法用户的人脸进行比对,如果不相同,则确定当前的使用用户不是合法用户,直接启动反窥拍流程,如果相同,则继续判断当前的使用用户是否有类似拍照的可疑动作,如果有,则启动反窥拍流程;否则,不进行任何处理,继续后续的判别流程。Specifically, as shown in Figure 2, if a face is detected, the face is first compared with the locally stored face of a legal user. If they are not the same, it is determined that the current user is not a legal user, and the user is directly Start the anti-peeping process. If they are the same, continue to determine whether the current user has suspicious actions similar to taking pictures. If so, start the anti-peeping process; otherwise, no processing is performed and the subsequent identification process continues.

如果检测到多个人脸,则首先判断其中是否包括合法用户的人脸,如果没有,则直接启动反窥拍流程,如果有,则继续判断当前的使用用户的使用图像中出现的所有人中是否有人出现类似拍照的可疑动作,如果有,则启动反窥拍流程;如果没有,则不进行任何处理,继续后续的判别流程。If multiple faces are detected, first determine whether they include the face of a legitimate user. If not, directly start the anti-peeping process. If so, continue to determine whether any of the people appearing in the current user's image are Someone has made suspicious actions similar to taking pictures. If so, the anti-peeping process will be started; if not, no processing will be performed and the subsequent identification process will continue.

在一个实施例中,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据的步骤,包括:根据所述桌面图像的像素矩阵建立一个新的像素矩阵;将所述桌面图像的像素值进行标记,并将所述桌面图像的像素值次序打乱保存到所述新的像素矩阵中,以完成像素值乱序编码。In one embodiment, the step of the virtual machine encoding the pixel values of the desktop image out of order to obtain the image data includes: establishing a new pixel matrix according to the pixel matrix of the desktop image; The pixel values are marked, and the order of the pixel values of the desktop image is scrambled and saved into the new pixel matrix, so as to complete the scrambled encoding of the pixel values.

具体的,像素值乱序算法流程为:VGTP-S端借助数学或者其他领域的技术,对图像做变换,使之变成一幅杂乱无章的图像用于传输。就是将图像的像素值次序打乱,先根据采集到的图像的像素矩阵新建一个空的像素矩阵,然后把采集到的图像的每个像素值进行标记,根据a像素的坐标确定其他像素的坐标,然后把a像素移动到b像素位置上,b像素移动到c像素位置上,……,以此类推,保存到新建的像素矩阵中,一次像素乱序就此结束。Specifically, the pixel value disordering algorithm process is as follows: The VGTP-S side uses mathematics or other fields of technology to transform the image and turn it into a messy image for transmission. It is to disrupt the order of the pixel values of the image. First, create an empty pixel matrix based on the pixel matrix of the collected image, then mark each pixel value of the collected image, and determine the coordinates of other pixels based on the coordinates of the a pixel. , then move the a pixel to the b pixel position, move the b pixel to the c pixel position,..., and so on, save it to the newly created pixel matrix, and the pixel reordering ends.

a像素和b像素的坐标关系可以有以下几种:The coordinate relationship between a pixel and b pixel can be as follows:

1)a像素和b像素是左右相邻的两个像素;1) The a pixel and the b pixel are two adjacent pixels on the left and right;

2)a像素和b像素是左右间隔(1个或多个)的两个像素;2) The a pixel and the b pixel are two pixels spaced left and right (one or more);

3)a像素和b像素是上下相邻的两个像素;3) The a pixel and the b pixel are two adjacent pixels above and below;

4)a像素和b像素是上下间隔(1个或多个)的两个像素;4) The a pixel and the b pixel are two pixels spaced up and down (one or more);

5)a像素和b像素是斜向相邻的两个像素;5) Pixel a and pixel b are two diagonally adjacent pixels;

6)a像素和b像素是斜向间隔(1个或多个)的两个像素;6) The a pixel and the b pixel are two pixels spaced diagonally (one or more);

7)a像素和b像素是图像中随机的两个像素;7) The a pixel and the b pixel are two random pixels in the image;

边缘像素移动方式可以有以下几种:The edge pixel movement methods can be as follows:

1)以行进行移动,该行最后一个移动到下一行的第一个;1) Move by row, the last one in the row is moved to the first one in the next row;

2)以列进行移动,该列最后一个移动到下一列的第一个;2) Move by column, the last one in the column is moved to the first one in the next column;

3)以斜向进行移动,该斜向最后一个移动到下一斜向的第一个;3) Move in a diagonal direction, the last one in this diagonal direction moves to the first one in the next diagonal direction;

4)随机移动不涉及边缘像素,最后一个像素移动到a像素的位置上;4) Random movement does not involve edge pixels, and the last pixel moves to the position of a pixel;

多次重复相同或不同的乱序方式,使其变换成杂乱无章难以辨认的图片,再传输到VGTP-R端进行解码。在图像传输过程中,通过对图像像素矩阵的重排,破坏了图像矩阵的相关性,使非法截获者无法从杂乱无章的图像中获得原图像信息,以此实现信息的加密。The same or different out-of-order methods are repeated multiple times to transform them into messy and difficult-to-recognize pictures, which are then transmitted to the VGTP-R end for decoding. During the image transmission process, the correlation of the image matrix is destroyed by rearranging the image pixel matrix, making it impossible for illegal interceptors to obtain the original image information from the messy image, thereby achieving information encryption.

显示像素值乱序编码后的图像,也就是VGTP-S端对图像像素值进行乱序编码后,发送到VGTP-R端正常解码后显示的乱序图像,对于这样处理得到的图像来说,像素信息是混乱的,画面是模糊没有规律的,由此,即便可疑窥拍用户成功实施了窥拍行为也无法获取到有效的信息,从而保证了用户信息的安全性。Displays the image after the pixel values are scrambled and encoded, that is, the VGTP-S end encodes the image pixel values out of sequence and sends it to the VGTP-R end for normal decoding and displays the scrambled image. For the image processed in this way, The pixel information is chaotic and the picture is blurry and irregular. Therefore, even if the suspected peeping user successfully implements the peeping behavior, effective information cannot be obtained, thereby ensuring the security of user information.

需要说明的是,尽管在附图中以特定顺序描述了本公开中方法的各个步骤,但是,这并非要求或者暗示必须按照该特定顺序来执行这些步骤,或是必须执行全部所示的步骤才能实现期望的结果。附加的或备选的,可以省略某些步骤,将多个步骤合并为一个步骤执行,以及/或者将一个步骤分解为多个步骤执行等。另外,也易于理解的是,这些步骤可以是例如在多个模块/进程/线程中同步或异步执行。It should be noted that although the various steps of the method in the present disclosure are described in a specific order in the drawings, this does not require or imply that these steps must be performed in this specific order, or that all of the steps shown must be performed. Achieve desired results. Additionally or alternatively, certain steps may be omitted, multiple steps may be combined into one step for execution, and/or one step may be decomposed into multiple steps for execution, etc. Additionally, it is also readily understood that these steps may be performed synchronously or asynchronously, for example, in multiple modules/processes/threads.

进一步的,本示例实施方式中,还提供了另一种基于图像像素值乱序编码的防窥拍方法。参考图3中所示,该方法可以包括。其中:步骤S201~步骤S203。Furthermore, in this exemplary embodiment, another anti-peeping method based on scrambled coding of image pixel values is also provided. Referring to what is shown in Figure 3, the method may include. Among them: step S201 to step S203.

步骤S201:零终端与虚拟机建立连接;Step S201: Establish a connection between the zero terminal and the virtual machine;

步骤S202:所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;Step S202: The zero terminal collects the user image data of the current user and sends it to the virtual terminal;

步骤S203:所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。Step S203: The zero terminal receives image data and parses the image data to display a desktop image.

具体的,如图4所示,零终端与虚拟端建立连接后,虚拟端正常编码桌面图像并发送至零终端,同时,零终端进行防窥拍监控;当发现有窥拍事件时,虚拟端对桌面图像进行乱序编码发送,零终端解码后得到乱码图像;当窥拍事件消除时,虚拟端重新正常编码发送桌面图像,零终端解码后得到正常桌面图像,从而防止了信息泄漏。Specifically, as shown in Figure 4, after the zero terminal establishes a connection with the virtual terminal, the virtual terminal encodes the desktop image normally and sends it to the zero terminal. At the same time, the zero terminal performs anti-peeping monitoring; when a spying event is discovered, the virtual terminal The desktop image is encoded and sent out of order, and the zero terminal decodes it to obtain the garbled image; when the snooping event is eliminated, the virtual terminal re-encodes and sends the desktop image normally, and the zero terminal decodes it and obtains the normal desktop image, thereby preventing information leakage.

进一步的,本示例实施方式中,还提供了一种基于图像像素值乱序编码的防窥拍装置。参考图5中所示,该装置100包括:第一连接模块101、判断模块102、第一编码模块103和发送模块104。其中,第一连接模块101,用于虚拟机与零终端建立连接;判断模块102,用于所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;第一编码模块103,用于若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;发送模块104,用于所述所述虚拟机将所述图像数据发送至零终端。Furthermore, in this exemplary embodiment, an anti-peeping device based on scrambled coding of image pixel values is also provided. Referring to what is shown in FIG. 5 , the device 100 includes: a first connection module 101 , a judgment module 102 , a first encoding module 103 and a sending module 104 . Among them, the first connection module 101 is used to establish a connection between the virtual machine and the zero terminal; the judgment module 102 is used for the virtual machine to receive the user image data sent by the zero terminal, and determine whether to use the user image data based on the user image data. A peeking event occurs; the first encoding module 103 is used to, if the peeking event occurs, the virtual machine performs pixel value coding on the desktop image out of order to obtain image data; the sending module 104 is used for the The virtual machine sends the image data to the zero terminal.

进一步的,本示例实施方式中,还提供了另一种基于图像像素值乱序编码的防窥拍装置。参考图6中所示,该装置200包括:第二连接模块201、用户图像采集模块202和解析模块203。其中,第二连接模块201,用于零终端与虚拟机建立连接;用户图像采集模块202,用于所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;解析模块203,用于所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。Furthermore, in this exemplary embodiment, another anti-peeping device based on scrambled coding of image pixel values is also provided. Referring to FIG. 6 , the device 200 includes: a second connection module 201 , a user image acquisition module 202 and an analysis module 203 . Among them, the second connection module 201 is used to establish a connection between the zero terminal and the virtual machine; the user image collection module 202 is used for the zero terminal to collect the user image data of the current user and send it to the virtual terminal; the analysis module 203 , used for the zero terminal to receive image data and parse the image data to display a desktop image.

通过上述基于图像像素值乱序编码的防窥拍方法及装置,零终端与虚拟端建立连接后,虚拟端正常编码桌面图像并发送至零终端,同时,零终端进行防窥拍监控;当发现有窥拍事件时,零终端对桌面图像进行乱序编码发送,零终端解码后得到乱码图像;当窥拍事件消除时,虚拟端重新正常编码发送桌面图像,零终端解码后得到正常桌面图像,从而防止了信息泄漏。Through the above-mentioned anti-peeping method and device based on scrambled encoding of image pixel values, after the zero terminal establishes a connection with the virtual terminal, the virtual terminal encodes the desktop image normally and sends it to the zero terminal. At the same time, the zero terminal performs anti-peeping monitoring; when it is discovered When there is a snooping event, the zero terminal encodes and sends the desktop image out of order, and the zero terminal decodes it and obtains the garbled image; when the snooping event is eliminated, the virtual terminal re-encodes and sends the desktop image normally, and the zero terminal decodes it and obtains a normal desktop image. This prevents information leakage.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the devices in the above embodiments, the specific manner in which each module performs operations has been described in detail in the embodiments related to the method, and will not be described in detail here.

应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本公开的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。作为模块或单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。It should be noted that although several modules or units of equipment for action execution are mentioned in the above detailed description, this division is not mandatory. In fact, according to embodiments of the present disclosure, the features and functions of two or more modules or units described above may be embodied in one module or unit. Conversely, the features and functions of one module or unit described above may be further divided into being embodied by multiple modules or units. Components shown as modules or units may or may not be physical units, that is, they may be located in one place, or they may be distributed over multiple network units. You can select some or all of the modules according to actual needs to achieve the purpose of the solution. Persons of ordinary skill in the art can understand and implement the method without any creative effort.

在本公开的示例性实施例中,还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被列入处理器执行时可以实现上述任意一个实施例中所述基于图像像素值乱序编码的防窥拍方法的步骤。在一些可能的实施方式中,本发明的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当所述程序产品在终端设备上运行时,所述程序代码用于使所述终端设备执行本说明书上述基于图像像素值乱序编码的防窥拍方法部分中描述的根据本发明各种示例性实施方式的步骤。In an exemplary embodiment of the present disclosure, a computer-readable storage medium is also provided, with a computer program stored thereon. When the program is included in the processor and executed, it can implement the image pixel-based method described in any of the above embodiments. Steps for anti-peeping method of value shuffle encoding. In some possible implementations, various aspects of the present invention can also be implemented in the form of a program product, which includes program code. When the program product is run on a terminal device, the program code is used to cause the The terminal device performs the steps according to various exemplary embodiments of the present invention described in the above-mentioned anti-peeping method based on scrambled coding of image pixel values in this specification.

参考图7所示,描述了根据本发明的实施方式的用于实现上述方法的程序产品300,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本发明的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。Referring to FIG. 7 , a program product 300 for implementing the above method according to an embodiment of the present invention is described, which can adopt a portable compact disk read-only memory (CD-ROM) and include program code, and can be used on a terminal device, For example, run on a personal computer. However, the program product of the present invention is not limited thereto. In this document, a readable storage medium may be any tangible medium containing or storing a program that may be used by or in combination with an instruction execution system, apparatus or device.

所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件或者上述的任意合适的组合。The program product may take the form of any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.

所述计算机可读存储介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读存储介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。可读存储介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。The computer-readable storage medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. A readable storage medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device. Program code contained on a readable storage medium may be transmitted using any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the above.

可以以一种或多种程序设计语言的任意组合来编写用于执行本发明操作的程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。Program code for performing the operations of the present invention may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., as well as conventional procedural Programming language—such as "C" or a similar programming language. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device or entirely on the remote computing device or server implement. In situations involving remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device, such as provided by an Internet service. (business comes via Internet connection).

在本公开的示例性实施例中,还提供一种电子设备,该电子设备可以包括处理器,以及用于存储所述处理器的可执行指令的存储器。其中,所述处理器配置为经由执行所述可执行指令来执行上述任意一个实施例中所述基于图像像素值乱序编码的防窥拍方法的步骤。In an exemplary embodiment of the present disclosure, an electronic device is also provided, and the electronic device may include a processor, and a memory for storing executable instructions of the processor. Wherein, the processor is configured to execute the steps of the anti-peeping method based on image pixel value scrambled encoding in any of the above embodiments by executing the executable instructions.

所属技术领域的技术人员能够理解,本发明的各个方面可以实现为系统、方法或程序产品。因此,本发明的各个方面可以具体实现为以下形式,即:完全的硬件实施方式、完全的软件实施方式(包括固件、微代码等),或硬件和软件方面结合的实施方式,这里可以统称为“电路”、“模块”或“系统”。Those skilled in the art will understand that various aspects of the present invention may be implemented as systems, methods or program products. Therefore, various aspects of the present invention can be implemented in the following forms, namely: a complete hardware implementation, a complete software implementation (including firmware, microcode, etc.), or a combination of hardware and software implementations, which may be collectively referred to herein as "Circuit", "Module" or "System".

下面参照图8来描述根据本发明的这种实施方式的电子设备600。图8显示的电子设备600仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。An electronic device 600 according to this embodiment of the invention is described below with reference to FIG. 8 . The electronic device 600 shown in FIG. 8 is only an example and should not bring any limitations to the functions and scope of use of the embodiments of the present invention.

如图8所示,电子设备600以通用计算设备的形式表现。电子设备600的组件可以包括但不限于:至少一个处理单元610、至少一个存储单元620、连接不同系统组件(包括存储单元620和处理单元610)的总线630、显示单元640等。As shown in Figure 8, electronic device 600 is embodied in the form of a general computing device. The components of the electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one storage unit 620, a bus 630 connecting different system components (including the storage unit 620 and the processing unit 610), a display unit 640, and the like.

其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理单元610执行,使得所述处理单元610执行本说明书上述基于图像像素值乱序编码的防窥拍方法部分中描述的根据本发明各种示例性实施方式的步骤。例如,所述处理单元610可以执行如图1中所示的步骤。Wherein, the storage unit stores program code, and the program code can be executed by the processing unit 610, so that the processing unit 610 performs the anti-peeping method described in the above-mentioned anti-peeping method based on image pixel value scrambled encoding in this specification. Steps in accordance with various exemplary embodiments of the invention. For example, the processing unit 610 may perform steps as shown in FIG. 1 .

所述存储单元620可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)6201和/或高速缓存存储单元6202,还可以进一步包括只读存储单元(ROM)6203。The storage unit 620 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 6201 and/or a cache storage unit 6202, and may further include a read-only storage unit (ROM) 6203.

所述存储单元620还可以包括具有一组(至少一个)程序模块6205的程序/实用工具6204,这样的程序模块6205包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。The storage unit 620 may also include a program/utility 6204 having a set of (at least one) program modules 6205 including, but not limited to: an operating system, one or more applications, other program modules, and programs. Data, each of these examples or some combination may include an implementation of a network environment.

总线630可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。Bus 630 may be a local area representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. bus.

电子设备600也可以与一个或多个外部设备700(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备600交互的设备通信,和/或与使得该电子设备600能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口650进行。并且,电子设备600还可以通过网络适配器660与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。网络适配器660可以通过总线630与电子设备600的其它模块通信。应当明白,尽管图中未示出,可以结合电子设备600使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。Electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, Bluetooth device, etc.), may also communicate with one or more devices that enable a user to interact with electronic device 600, and/or with Any device (eg, router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. This communication may occur through input/output (I/O) interface 650. Furthermore, the electronic device 600 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 660. Network adapter 660 may communicate with other modules of electronic device 600 via bus 630. It should be understood that, although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.

通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器或者网络设备等)执行根据本公开实施方式的上述基于图像像素值乱序编码的防窥拍方法。Through the above description of the embodiments, those skilled in the art can easily understand that the example embodiments described here can be implemented by software, or can be implemented by software combined with necessary hardware. Therefore, the technical solution according to the embodiment of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to cause a computing device (which can be a personal computer, a server or a network device, etc.) to execute the above anti-peeping method based on image pixel value scrambled encoding according to an embodiment of the present disclosure.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由所附的权利要求指出。Other embodiments of the disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure that follow the general principles of the disclosure and include common knowledge or customary technical means in the technical field that are not disclosed in the disclosure. . It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1.一种基于图像像素值乱序编码的防窥拍方法,其特征在于,该方法包括:1. An anti-peeping method based on scrambled coding of image pixel values, characterized in that the method includes: 虚拟机与零终端建立连接;The virtual machine establishes a connection with the zero terminal; 所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;The virtual machine receives the user image data sent by the zero terminal, and determines whether a peeping event occurs based on the user image data; 若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;If the peeking event occurs, the virtual machine performs random encoding of pixel values on the desktop image to obtain image data; 所述虚拟机将所述图像数据发送至零终端。The virtual machine sends the image data to the zero terminal. 2.根据权利要求1所述基于图像像素值乱序编码的防窥拍方法,其特征在于,该方法还包括:2. The anti-peeping method based on scrambled coding of image pixel values according to claim 1, characterized in that the method further includes: 若未出现所述窥拍事件,所述虚拟机对桌面图像进行正常编码,以得到图像数据。If the peek event does not occur, the virtual machine encodes the desktop image normally to obtain image data. 3.根据权利要求1所述基于图像像素值乱序编码的防窥拍方法,其特征在于,所述根据所述使用用户图像数据判断是否出现窥拍事件的步骤,包括:3. The anti-peeping method based on scrambled encoding of image pixel values according to claim 1, wherein the step of determining whether a peeping event occurs based on the use of user image data includes: 所述零终端对所述使用用户图像数据进行识别,并判断识别出的当前使用用户的个数;The zero terminal identifies the user image data and determines the number of currently identified users; 若未检测到所述使用用户,则判断为出现窥拍事件;If the user is not detected, it is determined that a spying event has occurred; 若检测到一个或多个所述使用用户,则进行后续判断。If one or more users are detected, subsequent judgment will be made. 4.根据权利要求3所述基于图像像素值乱序编码的防窥拍方法,其特征在于,所述若检测到一个或多个所述使用用户,则进行后续判断的步骤,包括:4. The anti-peeping method based on scrambled encoding of image pixel values according to claim 3, characterized in that if one or more users are detected, the step of making subsequent judgments includes: 若检测到一个所述使用用户,则根据合法用户图像数据判断所述使用用户是否为合法用户;If one of the users is detected, determine whether the user is a legal user based on the legal user image data; 若不是,则判断为出现窥拍事件;If not, it is judged that a voyeurism event has occurred; 若是,则继续判断所述合法用户的动作是否可疑,若可疑,则判断为出现窥拍事件。If so, continue to determine whether the legitimate user's actions are suspicious. If so, it is determined that a spying event has occurred. 5.根据权利要求4所述基于图像像素值乱序编码的防窥拍方法,其特征在于,所述若检测到一个或多个所述使用用户,则进行后续判断的步骤,还包括:5. The anti-peeping method based on scrambled coding of image pixel values according to claim 4, characterized in that if one or more users are detected, the step of making subsequent judgments further includes: 若检测到多个所述使用用户,则判断多个所述使用用户中,是否包含所述合法用户;If multiple users are detected, determine whether the legal users are included among the multiple users; 若不包含,则判断为出现窥拍事件;If it is not included, it is judged that a peeping incident has occurred; 若包含,则继续判断所述合法用户和其余的所述使用用户的动作是否可疑,若可疑,则判断为出现窥拍事件。If included, continue to determine whether the actions of the legitimate user and the remaining users are suspicious. If they are suspicious, it is determined that a spying event has occurred. 6.根据权利要求1所述基于图像像素值乱序编码的防窥拍方法,其特征在于,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据的步骤,包括:6. The anti-peeping method based on scrambled encoding of image pixel values according to claim 1, characterized in that the step of the virtual machine performing scrambled encoding of pixel values on the desktop image to obtain the image data includes: 根据所述桌面图像的像素矩阵建立一个新的像素矩阵;Create a new pixel matrix based on the pixel matrix of the desktop image; 将所述桌面图像的像素值进行标记,并将所述桌面图像的像素值次序打乱保存到所述新的像素矩阵中,以完成像素值乱序编码。The pixel values of the desktop image are marked, and the order of the pixel values of the desktop image is scrambled and stored in the new pixel matrix to complete the pixel value scrambled encoding. 7.一种基于图像像素值乱序编码的防窥拍方法,其特征在于,该方法包括:7. An anti-peeping method based on scrambled coding of image pixel values, characterized in that the method includes: 零终端与虚拟机建立连接;Zero terminal establishes connection with virtual machine; 所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;The zero terminal collects the user image data of the current user and sends it to the virtual terminal; 所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。The zero terminal receives image data and parses the image data to display a desktop image. 8.一种基于图像像素值乱序编码的防窥拍装置,其特征在于,该装置包括:8. An anti-peeping device based on scrambled coding of image pixel values, characterized in that the device includes: 第一连接模块,用于虚拟机与零终端建立连接;The first connection module is used to establish a connection between the virtual machine and the zero terminal; 判断模块,用于所述虚拟机接收所述零终端发送的使用用户图像数据,并根据所述使用用户图像数据判断是否出现窥拍事件;A judgment module, configured for the virtual machine to receive the user image data sent by the zero terminal, and determine whether a peeping event occurs based on the user image data; 第一编码模块,用于若出现所述窥拍事件,所述虚拟机对桌面图像进行像素值乱序编码,以得到图像数据;The first encoding module is used to, if the peek event occurs, the virtual machine performs random encoding of pixel values on the desktop image to obtain image data; 发送模块,用于所述所述虚拟机将所述图像数据发送至零终端。A sending module, configured for the virtual machine to send the image data to a zero terminal. 9.根据权利要求8所述基于图像像素值乱序编码的防窥拍装置,其特征在于,该装置还包括:9. The anti-peeping device based on scrambled coding of image pixel values according to claim 8, characterized in that the device further includes: 第二编码模块,用于若未出现所述窥拍事件,所述虚拟机对桌面图像进行正常编码,以得到图像数据。The second encoding module is used to perform normal encoding on the desktop image by the virtual machine to obtain image data if the peeking event does not occur. 10.一种基于图像像素值乱序编码的防窥拍装置,其特征在于,该装置包括:10. An anti-peeping device based on scrambled coding of image pixel values, characterized in that the device includes: 第二连接模块,用于零终端与虚拟机建立连接;The second connection module is used to establish a connection between the zero terminal and the virtual machine; 用户图像采集模块,用于所述零终端采集当前的使用用户的使用用户图像数据,并发送至虚拟端;The user image collection module is used by the zero terminal to collect the user image data of the current user and send it to the virtual terminal; 解析模块,用于所述零终端接收图像数据,并对所述图像数据进行解析以显示桌面图像。A parsing module is used for the zero terminal to receive image data and parse the image data to display a desktop image.
CN202311125375.6A 2023-09-01 2023-09-01 An anti-peeping method and device based on scrambled coding of image pixel values Pending CN117135365A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311125375.6A CN117135365A (en) 2023-09-01 2023-09-01 An anti-peeping method and device based on scrambled coding of image pixel values

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311125375.6A CN117135365A (en) 2023-09-01 2023-09-01 An anti-peeping method and device based on scrambled coding of image pixel values

Publications (1)

Publication Number Publication Date
CN117135365A true CN117135365A (en) 2023-11-28

Family

ID=88858074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311125375.6A Pending CN117135365A (en) 2023-09-01 2023-09-01 An anti-peeping method and device based on scrambled coding of image pixel values

Country Status (1)

Country Link
CN (1) CN117135365A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180174414A1 (en) * 2016-12-20 2018-06-21 Axis Ab Method of encoding an image including a privacy mask
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 An image encryption storage method and device
CN115967805A (en) * 2022-12-28 2023-04-14 杭州海康威视数字技术股份有限公司 Encryption coding and decoding method and device
CN116471363A (en) * 2023-04-06 2023-07-21 西安万像电子科技有限公司 Peep-proof shooting method based on video image out-of-order coding

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180174414A1 (en) * 2016-12-20 2018-06-21 Axis Ab Method of encoding an image including a privacy mask
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 An image encryption storage method and device
CN115967805A (en) * 2022-12-28 2023-04-14 杭州海康威视数字技术股份有限公司 Encryption coding and decoding method and device
CN116471363A (en) * 2023-04-06 2023-07-21 西安万像电子科技有限公司 Peep-proof shooting method based on video image out-of-order coding

Similar Documents

Publication Publication Date Title
CN110073642B (en) Encoding optimization for obfuscated media
CN111711794A (en) Anti-candid image processing method and device, terminal and storage medium
CN112087625B (en) Image processing method, device, server and storage medium
CN110688286B (en) Application program operation information transmission method and device, storage medium and electronic equipment
CN112257124A (en) Image processing method and device
Soualmi et al. A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence
JPWO2020049958A1 (en) Information processing system, information processing method, terminal device and information processing device
JP2009211381A (en) User authentication system, user authentication method and user authentication program
US20150150143A1 (en) System and method for providing virtual desktop infrastructure (vdi) service
CN111432242B (en) Encrypted video call method, device, equipment and storage medium
CN115484086A (en) Cloud phone screen sharing method, electronic device, and computer-readable storage medium
KR20140051483A (en) Method and apparatus for selectively providing protection of screen information data
CN110492935B (en) Data processing system, method and device and terminal equipment
CN113672954A (en) Feature extraction method and device and electronic equipment
CN117135365A (en) An anti-peeping method and device based on scrambled coding of image pixel values
CN116471363A (en) Peep-proof shooting method based on video image out-of-order coding
CN116756750A (en) Medical sensitive data acquisition desensitization method
CN118018673A (en) Video data transmission method, device, equipment and medium
CN111967001B (en) Decoding and encoding safety isolation method based on double containers
CN112181556B (en) Terminal control processing method and device, electronic equipment and storage medium
CN116051348A (en) Watermark adding method and device, storage medium and electronic equipment
CN111475779B (en) Image processing method, device, equipment and storage medium
Tang et al. Privacy-preserving multimedia mobile cloud computing using protective perturbation
CN112637635A (en) File security method and system, computer readable storage medium and processor
CN115701017A (en) Image processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination