[go: up one dir, main page]

WO2021232865A1 - Object recognition method and device, apparatus, and medium - Google Patents

Object recognition method and device, apparatus, and medium Download PDF

Info

Publication number
WO2021232865A1
WO2021232865A1 PCT/CN2021/076701 CN2021076701W WO2021232865A1 WO 2021232865 A1 WO2021232865 A1 WO 2021232865A1 CN 2021076701 W CN2021076701 W CN 2021076701W WO 2021232865 A1 WO2021232865 A1 WO 2021232865A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
target image
recognition system
sub
recognition
Prior art date
Application number
PCT/CN2021/076701
Other languages
French (fr)
Chinese (zh)
Inventor
朱启源
朱声高
于欣
叶奕斌
涂丹丹
鲍江宏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021232865A1 publication Critical patent/WO2021232865A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/10Terrestrial scenes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/24Aligning, centring, orientation detection or correction of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/764Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/19Recognition using electronic means
    • G06V30/191Design or setup of recognition systems or techniques; Extraction of features in feature space; Clustering techniques; Blind source separation

Definitions

  • This application relates to the field of computer vision, and in particular to an object recognition method, device, equipment and medium.
  • the embodiments of the present application provide an object recognition method to reduce the risk of leakage of sensitive information when recognizing an object in an image.
  • This application also provides corresponding devices, equipment, computer-readable storage media, and computer program products.
  • an embodiment of the present application provides an object recognition method, which can be executed by a first recognition system.
  • the first recognition system may obtain a target image including a plurality of objects, where the object in the target image may be, for example, a text or an object.
  • the first recognition system may determine multiple sub-images corresponding to the target image, and each sub-image may include at least one object. Then, the first recognition system may send multiple sub-images of the target image to the second recognition system through remote communication, So that the second recognition system can recognize the objects in the multiple sub-images.
  • the second recognition system recognizes based on the multiple sub-images
  • the information is usually only the parts of the sensitive information, and the combination of the parts of the sensitive information cannot be known. This makes when the parts of the sensitive information identified by the second identification system leak, because there are multiple parts between the parts. It is difficult to determine the sensitive information in the target image from a variety of information combinations, which is equivalent to that the sensitive information is not actually leaked, which can reduce the occurrence of sensitive information in the target image during the object recognition process. Risk of leakage.
  • the device for identifying objects in the sub-image can be a cloud data center with higher data processing capabilities instead of an edge data center. This not only makes the recognition accuracy and recognition efficiency of the object higher, but also does not require users to deploy high-performance servers on the edge side, which reduces the hardware cost requirements for users.
  • the first recognition system may obtain multiple sub-images corresponding to the target image by cropping the target image. Specifically, the first recognition system may obtain the pixel positions of multiple objects on the target image, and crop the target image according to the pixel positions of each object on the target image, so as to obtain multiple sub-images corresponding to the target image. Among them, the first recognition system may use its own object detection algorithm to detect multiple objects in the target image, and further obtain the pixel position of each object on the target image; or, the first recognition system may also use the first recognition system to detect multiple objects in the target image. The second recognition system recognizes multiple objects in the target image, and receives the pixel position of each object on the target image returned by the second recognition system.
  • the first recognition system when the first recognition system recognizes multiple objects in the target image through the second recognition system, the first recognition system may perform transformation processing on the target image.
  • the image content of the object is transformed into other image content.
  • the first recognition system can send the transformed image obtained after transformation processing to the second recognition system, and the second recognition system uses a high-precision deep learning algorithm or object detection model to detect multiple transformed images in the transformed image
  • the pixel position on the transformed image is returned to the first recognition system. In this way, the first recognition system can determine the pixel positions of the multiple objects on the target image according to the received pixel positions of the multiple transformed images.
  • the first recognition system can obtain a higher detection accuracy based on the pixel position returned by the second recognition system.
  • the risk of sensitive information in the target image being leaked is low.
  • the first recognition system may also receive a first recognition result for the plurality of sub-images returned by the second recognition system, and the first recognition result may be a result of the recognition results respectively corresponding to the multiple objects. gather. Then, the first recognition system may determine a second recognition result for the target image according to the first recognition result and the positional relationship of the objects in the multiple sub-images on the target image. The second recognition result may include the information of each object in the target image. The combination relationship, the combination relationship may be determined according to the position relationship of the object on the target image.
  • the first recognition result includes the recognition result "Zhang San” corresponding to object 1, the recognition result "XX city XX street XX community” corresponding to object 2, and the recognition result "Master” corresponding to object 3, so that according to the first According to the recognition result, the positional relationship between Object 1 and Object 2 in the target image, and the positional relationship between Object 1 and Object 3 in the target image, it is determined that the home address with the second recognition result of "Zhang San” is "XX City XX Street XX
  • the educational background of "Community” and "Zhang San” is "Master” and so on.
  • the first recognition system may send multiple sub-images to the second recognition system based on a preset sequence.
  • the preset sequence may be the sequence in which the multiple sub-images are cropped by the first recognition system, or it may be The cropping sequence is the order obtained after out-of-order adjustment, so that it is difficult for illegal users to obtain the target image based on the out-of-order adjusted sending order and multiple sub-image restoration, so that the sensitive information in the target image can be reduced by sending the sub-images out of order. Risk of leakage.
  • the second recognition system when the second recognition system returns the first recognition results for the multiple sub-images to the first recognition system, it may return the recognition results of the objects in each sub-image based on the preset order in order to facilitate the first recognition system According to the preset sequence, which recognition result corresponds to each sub-image is determined.
  • the second recognition system can also return the correspondence between each sub-image and its corresponding recognition result, so that the second recognition system is not required.
  • the recognition result of the object in each sub-image is returned in a specific order, and the first recognition system can determine which recognition result each sub-image corresponds to according to the received correspondence.
  • the target image may include one image or multiple images.
  • the target image includes multiple images, taking the target image including the first image and the second image as an example, the multiple sub-images corresponding to the target image may include at least one sub-image corresponding to the first image and at least one corresponding to the second image Sub-image.
  • the first image and the second image may both contain sensitive information, or any one of them may contain sensitive information, or both of them may not contain sensitive information.
  • the multiple sub-images corresponding to the target image sent by the first recognition system to the second recognition system can also be a mixture of sub-images of multiple images, which can increase
  • the complexity of combining sub-images can increase the difficulty of combining multiple sub-images to obtain sensitive information, and further reduce the risk of sensitive information being leaked.
  • the first identification system can be deployed in an edge data center, and the second identification system can be deployed in a cloud data center, so that the higher data processing performance of the cloud data center can be used to obtain higher-precision object recognition As a result, the risk of sensitive information being leaked can be reduced, and users are not required to deploy costly high-performance servers in edge data centers.
  • the multiple objects included in the target image may include multiple characters, such as Chinese, English, numbers, symbols and other characters. Of course, it can also be other types of objects, such as trademarks, components and other objects.
  • the first recognition system receives the target image uploaded by the user and the sensitive indication information of the target image, so that the first recognition system can determine that the target image is an image containing sensitive information according to the sensitive indication information.
  • the first recognition system can use any one of the possible implementations in the first aspect to complete object recognition on the target image containing sensitive information, and for the image that does not contain sensitive information, the first recognition system can send the image to The second recognition system performs object recognition.
  • the sensitive indication information may be, for example, a sensitive label added to the target image.
  • an embodiment of the present application provides an object recognition method, which may be executed by a second recognition system.
  • the second recognition system receives multiple sub-images corresponding to the target object from the first recognition system, where the target image may include multiple objects, and each sub-image of the target image may include at least one object. Then, the second recognition system may use a preset object recognition algorithm to recognize objects in each sub-image to obtain a first recognition result.
  • the first recognition result may be a set of recognition results corresponding to multiple objects.
  • the second recognition system performs object recognition on each sub-image of the target image, instead of directly performing object recognition on the entire target image, it is difficult for the second recognition system to know the combined relationship between multiple objects in the target image Therefore, even if the target image contains sensitive information and each part of the identified sensitive information leaks, it is difficult to determine the target image from a variety of information combinations due to the various possible information combinations between the various parts
  • the sensitive information in the target image is equivalent to that the sensitive information has not actually leaked, which can reduce the risk of leakage of the sensitive information in the target image during the object recognition process.
  • the second recognition system sends the first recognition results for the multiple sub-images to the first recognition system, so that the first recognition system can further determine the target based on the first recognition system of the multiple sub-images.
  • the second recognition result of the image is a possible implementation.
  • the second recognition system further receives a transformed image from the first recognition system.
  • the transformed image is an image obtained by performing transformation processing on the target image, wherein the object in the target image is undergoing transformation processing.
  • the resulting transformation object can be different in image content.
  • the second recognition system can detect multiple transformed objects in the transformed image to obtain the pixel positions of multiple transformed images in the transformed image, such as using high-precision object detection algorithms or object detection models for detection, etc.
  • the detected pixel position is returned to the first recognition system.
  • the information presented by the transformed object is not part of the sensitive information, which makes the second recognition system unable to obtain information based on the transformed image
  • the sensitive information contained in the target image can reduce the risk of sensitive information being leaked.
  • the second recognition system may return the recognition results of the objects in each sub-image to the first recognition system according to the order in which each sub-image of the target image is received, thereby completing the first recognition result. Feedback.
  • the first recognition system can determine which recognition result corresponds to each sub-image of the target image according to the order in which the second recognition system sends the recognition results corresponding to the respective sub-images.
  • the second recognition system may use multiple processes to recognize objects in multiple sub-images in parallel. Compared with recognizing objects in multiple sub-images serially, the object recognition efficiency can be obtained. Significantly increased.
  • the multiple processes can be located on the same device or on different devices. For example, multiple sub-images of the target image can be divided into multiple parts, and the objects in the sub-images can be identified on different devices. While improving the efficiency of object recognition, it can also further increase the risk of sensitive information being leaked.
  • the target image may include one image or multiple images.
  • the multiple sub-images corresponding to the target image may include at least one sub-image corresponding to the first image and at least one corresponding to the second image Sub-image.
  • the first image and the second image may both contain sensitive information, or any one of them may contain sensitive information, or both of them may not contain sensitive information.
  • the multiple sub-images corresponding to the target image received by the second recognition system can also be a mixture of sub-images of multiple images, thereby increasing the number of sub-images.
  • the complexity of the combination between multiple sub-images can increase the difficulty of combining multiple sub-images to obtain sensitive information, and further reduce the risk of sensitive information being leaked.
  • the first identification system can be deployed in an edge data center, and the second identification system can be deployed in a cloud data center, so that the higher data processing performance of the cloud data center can be used to obtain higher-precision object recognition As a result, the risk of sensitive information being leaked can be reduced, and users are not required to deploy costly high-performance servers in edge data centers.
  • the multiple objects included in the target image may include multiple characters, such as Chinese, English, numbers, symbols and other characters. Of course, it can also be other types of objects, such as trademarks, components and other objects.
  • the present application provides an object recognition device, which can be applied to the first recognition system.
  • the device includes: an acquisition module for acquiring a target image, the target image including a plurality of objects; and a determination module for Determine the multiple sub-images corresponding to the target image, each sub-image includes at least one object; a transmission module, configured to send the multiple sub-images to the second device, so that the second device can respond to the multiple sub-images Recognize objects in the middle.
  • the determining module is specifically configured to obtain the pixel positions of the multiple objects on the target image, and to determine the pixel positions of the objects on the target image.
  • the target image is cropped to obtain multiple sub-images corresponding to the target image.
  • the determining module is specifically configured to perform transformation processing on the target image to obtain a transformed image; the transmission module is further configured to send to the second recognition system The transformed image receives the pixel positions of multiple transformation objects in the transformed image returned by the second recognition system; the determining module is specifically configured to determine the pixel positions of the multiple transformation objects according to the pixel positions of the multiple transformation objects. The pixel positions of multiple objects on the target image.
  • the transmission module is further configured to receive the first recognition result for the multiple sub-images returned by the second recognition system; the determining module is further configured to According to the first recognition result and the positional relationship of the objects in the plurality of sub-images on the target image, a second recognition result for the target image is determined.
  • the transmission module is specifically configured to send the multiple sub-images to the second recognition system based on a preset sequence by the first recognition system, and receive the first recognition system.
  • the second recognition system returns a first recognition result for the plurality of sub-images based on the preset order.
  • the target image includes at least a first image and a second image
  • a plurality of sub-images corresponding to the target image includes at least a sub-image corresponding to the first image and the second image The corresponding sub-image.
  • the first identification system is deployed in an edge data center
  • the second identification system is deployed in a cloud data center.
  • the multiple objects included in the target image include multiple characters.
  • the transmission module is further configured to receive the target image uploaded by the user and the sensitive indication information of the target image; the determination module is further configured to determine that the target image contains Images of sensitive information.
  • the present application provides another object recognition device, which can be applied to a second recognition system.
  • the device may include: a transmission module for receiving multiple sub-objects corresponding to the target object sent by the first recognition system through remote communication.
  • An image the target image includes a plurality of objects, and each sub-image includes at least one object;
  • the recognition module is configured to perform object recognition on the plurality of sub-images to obtain a first recognition result for the plurality of sub-images, the The first recognition result includes the recognition result of the object in each sub-image.
  • the transmission module is further configured to send first recognition results for multiple sub-images to the first recognition system through remote communication.
  • the transmission module is further configured to receive a transformed image from the first recognition system, where the transformed image is an image obtained by transforming the target image; the device is also It includes: a detection module; the detection module is also used to detect multiple transformed objects in the transformed image to obtain the pixel positions of the multiple transformed objects in the transformed image; the transmission module is also used to Return the pixel positions of the plurality of transformed objects in the transformed image to the first recognition system.
  • the transmission module is specifically configured to sequentially return the recognition results of the objects in the respective sub-images to the first recognition system according to the receiving order of the respective sub-images of the target image .
  • the recognition module is specifically configured to use multiple processes to recognize images in the multiple sub-images in parallel.
  • the target image includes at least a first image and a second image
  • a plurality of sub-images corresponding to the target image includes at least a sub-image corresponding to the first image and the second image The corresponding sub-image.
  • the first identification system is deployed in an edge data center
  • the second identification system is deployed in a cloud data center.
  • the multiple objects included in the target image include multiple characters.
  • the present application provides a computing device, which includes a processor, a memory, and a display.
  • the processor and the memory communicate with each other.
  • the processor is configured to execute instructions stored in the memory, so that the computing device executes the object recognition method in the first aspect or any implementation manner of the first aspect.
  • the present application provides a computing device, which includes a processor, a memory, and a display.
  • the processor and the memory communicate with each other.
  • the processor is configured to execute instructions stored in the memory, so that the computing device executes the object recognition method in the second aspect or any implementation manner of the second aspect.
  • the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computing device, cause the computing device to execute any of the above-mentioned first aspect or any of the first aspects.
  • the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computing device, cause the computing device to execute any of the above-mentioned second aspect or any of the second aspects.
  • this application provides a computer program product containing instructions, which when run on a computing device, causes the computing device to execute the object recognition method described in the first aspect or any one of the implementations of the first aspect .
  • this application provides a computer program product containing instructions that, when run on a computing device, causes the computing device to execute the object recognition method described in the second aspect or any one of the implementations of the second aspect. .
  • Figure 1 is a schematic diagram of the architecture of an exemplary application scenario of this application.
  • FIG. 2 is a schematic flowchart of an object recognition method in an embodiment of this application.
  • FIG. 3 is a schematic diagram showing the coordinates of pixel positions in an embodiment of the application.
  • FIG. 4 is a schematic diagram of determining a second recognition result in an embodiment of this application.
  • FIG. 5 is a schematic diagram of interaction among users, edge data centers, and cloud data centers in an embodiment of the application
  • FIG. 6 is a schematic diagram of interaction among users, edge data centers, and cloud data centers in an embodiment of the application;
  • FIG. 7 is a schematic structural diagram of an object recognition device provided by an embodiment of the application.
  • FIG. 8 is a schematic structural diagram of yet another object recognition device provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of a computing device provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of another computing device provided by an embodiment of this application.
  • Object recognition technology usually refers to the use of computers and other equipment to process, analyze and understand images to identify various objects in the image.
  • the objects in the image may be texts, objects, etc., for example.
  • recognizing text in an image it may be recognizing text in an image provided by a user (through a user terminal) in the application scenario shown in FIG. 1.
  • the application scenario applicable to this application is not limited to the scenario example shown in FIG. 1, and may also be applied to other possible application scenarios.
  • users can provide images containing text to be recognized to an edge data center.
  • the edge data center can be a collection of devices such as servers deployed on the edge. Provide users with corresponding business services on the edge, such as providing users with text recognition services.
  • the edge data center represents the physical environment close to the user's device.
  • there is also a cloud data center which can be a collection of equipment such as servers deployed on the cloud side.
  • the cloud data center is usually farther from the user’s equipment than the edge data center.
  • the cloud data center is dedicated to multiple regions. Of users provide cloud services.
  • cloud data centers can have higher data processing performance (such as fast processing speed, high accuracy, etc.) than edge data centers, and can be used to provide better services than edge data centers For example, when the business service capabilities of the edge data center cannot meet the user's requirements, it can be handed over to the cloud data center for processing to meet the user's requirements. Or, the edge data center and the cloud data center can cooperate with each other to provide users with corresponding business services.
  • the edge data center can forward the image provided by the user to the cloud data through remote communication. Center, so that the cloud data center recognizes the text in the image based on the corresponding deep learning algorithm, and then the cloud data center transmits the recognition result to the user through the edge data center.
  • the cloud data center can identify the English content in the image, and pass the identified English content through the edge data The center delivers it to the user, who then uses the corresponding translation tool to translate the received English content into Chinese text.
  • sensitive information can refer to information that users are unwilling to leak, for example, it can be information that is improperly used or accessed or modified without authorization, which is not conducive to personal privacy rights enjoyed by individuals in accordance with the law.
  • edge data center In order to reduce the risk of sensitive information being leaked in the target image, some users choose to purchase and deploy high-performance servers in the edge data center, so that the edge data center has higher data processing capabilities, so that the image can be identified in the edge data center.
  • the accuracy and efficiency of object recognition can usually meet the requirements of users. At the same time, it can also avoid the risk of sensitive information leakage caused by object recognition in the cloud data center.
  • purchasing high-performance servers will dramatically increase user costs.
  • the edge data center with low data processing capability is used to identify objects in the image, the recognition speed is slow, the accuracy is low, and it is usually difficult to meet user requirements.
  • the embodiments of the present application provide an object recognition method, which can reduce the risk of leakage of sensitive information when recognizing objects in an image.
  • the edge data center may obtain a target image including multiple objects, and further determine multiple sub-images corresponding to the target image. For example, the edge data center may crop the target image into multiple sub-images, etc., where the determined Each sub-image of can include at least one object. Then, the edge data center can send multiple sub-images to the cloud data center through remote communication, and the cloud data center can identify the object in each sub-image, and obtain the recognition result corresponding to each sub-image. And send it to the edge data center, so that the edge data center obtains the recognition result for the target image based on the recognition result corresponding to each sub-image.
  • the edge data center sends multiple sub-images corresponding to the target image to the cloud data center, rather than the entire target image, even if the target image contains sensitive information
  • the cloud data center usually identifies information based on multiple sub-images. It is only the parts of sensitive information, and the combination of the parts of sensitive information cannot be known. This makes that when the parts of sensitive information identified by the cloud data center are leaked, there are multiple possible information between each part. Therefore, it is difficult to determine the sensitive information in the target image from a variety of information combinations, which is equivalent to that the sensitive information is not actually leaked, thereby reducing the risk of leakage of the sensitive information in the target image during the object recognition process.
  • the device that recognizes the object in the sub-image is a cloud data center with higher data processing capabilities, rather than an edge data center. This not only makes the recognition accuracy and recognition efficiency of the object higher, but also does not require users to deploy on the edge.
  • the high-performance server reduces the hardware cost requirements for users.
  • FIG. 2 is a schematic flowchart of an object recognition method in an embodiment of this application.
  • This method can be applied to the application scenario shown in FIG. 1, of course, it can also be applied to other application scenarios, which is not limited in this embodiment.
  • the first identification system in the embodiment shown in FIG. 2 may be deployed in the edge data center (or deployed in the edge data center and user terminal) in the above-mentioned FIG. 1, for example, it may be a server system in the edge data center.
  • the second identification system in the embodiment shown in Figure 2 can be deployed in the cloud data center shown in Figure 1, for example, It may be a server system in a cloud data center, or a software system, which is deployed in the form of software on devices in the cloud data center.
  • the object recognition method shown in FIG. 2 may specifically include:
  • the first recognition system acquires a target image, where the target image includes multiple objects.
  • the object recognition in this embodiment may refer to the process of recognizing the objects included in the target image based on the object recognition technology.
  • the object to be recognized can be the text in the target image, such as Chinese, English, numbers, symbols, formulas, etc.
  • the target image includes multiple objects, it can be that the target image contains multiple and multiple paragraphs.
  • the object to be recognized may also refer to objects in the target image, such as trademarks, components, etc., of course, it may also be other types of objects.
  • the information represented by the combination of multiple objects in the target image may be sensitive information.
  • the target image may contain information such as a person's name, home address, mobile phone number, and educational background, which are all personal privacy information, etc., as well as sensitive information in this embodiment.
  • the target image containing sensitive information may be difficult to complete object recognition in the first recognition system.
  • the load of the first recognition system is high, and it is difficult to provide users with object recognition services for the target image; for example, the data processing performance of the first recognition system may be lower than that of the second recognition system.
  • the second recognition system may perform object recognition on the target image.
  • the target image may contain sensitive information
  • the second recognition system will recognize the sensitive information on the target image, such as "Zhang San Sensitive information such as ""'s home address information, mobile phone number, and educational background may be leaked at the second identification system, thereby threatening "Zhang San"'s privacy.
  • the first recognition system may continue to perform step S202 and subsequent steps, so as to reduce the risk of leakage of sensitive information while completing object recognition. It should be noted that when the target image does not contain sensitive information, the technical solution of this embodiment may also be used for object recognition.
  • the first recognition system may determine whether the target image contains sensitive information based on the sensitive indication information. Specifically, the user can upload the target image to the first recognition system. At the same time, the user can also upload the sensitive indication information corresponding to the target image.
  • the sensitive indication information may be, for example, a sensitive label added to the target image, which can be used to indicate Whether the target image contains sensitive information, the first recognition system can determine that the target object contains sensitive information according to the received sensitive indication information, and perform subsequent processing on the target image.
  • the first recognition system can also provide users with object recognition services of two mechanisms, namely object recognition service 1 and object recognition service 2, where object recognition service 1 can be used to identify objects in images containing sensitive information. Objects, object recognition service 2 can be used to identify objects in images that do not contain sensitive information. In this way, the user can determine which object recognition service to choose on the first recognition system according to whether the image contains sensitive information.
  • object recognition service 1 can be used to identify objects in images containing sensitive information.
  • object recognition service 2 can be used to identify objects in images that do not contain sensitive information.
  • the user can determine which object recognition service to choose on the first recognition system according to whether the image contains sensitive information.
  • the first recognition system can use the object recognition process described in this embodiment to complete the recognition of objects in the image, and when the user selects object recognition service 2, the first recognition system can directly The image is sent to the second recognition system to complete object recognition.
  • the first recognition system may determine multiple sub-images corresponding to the target image, where each sub-image may include at least one object.
  • the first recognition system may further determine multiple sub-images corresponding to the target image.
  • Each sub-image can be a part of the target image, and each sub-image can include at least one object.
  • each component of the sensitive information can be located separately Different sub-images.
  • the first recognition system may first obtain the pixel positions of multiple objects on the target image on the target image, and compare the pixel positions of each object on the target image to the target image. By cropping, multiple sub-images can be obtained.
  • the pixel position of the object on the target image may be, for example, the coordinates of the center pixel point of the object on the target image, so that the first recognition system can determine a certain pixel range from the center pixel point according to the coordinates of the center pixel point.
  • the pixels within belong to the pixel points of the object on the target image, so that the pixel area of the image of the object on the target image can be obtained; or, the pixel position can also be the vertex of the image of the object on the target image Position, as shown in Figure 3, each row can represent the position of the rectangular frame of an object on the target image, which in turn represents the abscissa (32, 203, etc.
  • the first recognition system can crop the target image according to the pixel position of each object on the target image, so that multiple sub-images corresponding to the target image can be obtained.
  • the first recognition system may use an object detection algorithm configured on it to recognize the pixel position of each object on the target image.
  • the accuracy of the pixel positions detected by the first recognition system may be low.
  • the first recognition system when the first recognition system is deployed in an edge data center, due to the limitation of the data processing performance of the edge data center, the first recognition system It is difficult for the system to accurately and quickly detect the pixel position of the object in the target image, so when the first recognition system detects the object in the target image, there may be problems of low detection accuracy and slow detection speed.
  • the second recognition system with higher data processing performance may also detect the pixel position corresponding to each object, so as to improve the detection accuracy of the pixel position.
  • the first recognition system can send the target image to the second recognition system; and the second recognition system can have high data processing performance and can support the operation of high-precision object detection algorithms. Therefore, the second recognition system can quickly The pixel positions of multiple objects on the target image are detected, and the detection accuracy of the pixel positions is high, and then the second recognition system can feed it back to the first recognition system, so that the first recognition system can obtain high detection accuracy The pixel position.
  • the target image contains sensitive information
  • the sensitive information on the target image may be leaked on the second recognition system, for example, when an illegal user is in the second recognition system.
  • the sensitive information on the target image will be known by illegal users, which will cause the leakage of sensitive information.
  • leakage of sensitive information may easily occur.
  • the first recognition system may first perform transformation processing on the target image to obtain the transformed image.
  • the first recognition system can use a preset object detection algorithm or object detection model to detect multiple objects on the target image, and transform the detected objects, such as object replacement, encryption, and masking.
  • the object after the transformation processing can be called the transformation object
  • the target image after the transformation processing can be called the transformation image, so that the sensitive information composed of multiple objects can be changed according to the object. It is transformed into non-sensitive information, which can realize the desensitization of information.
  • the target image after the transformation process can not be displayed. Contains the sensitive information, therefore, the original sensitive information on the target image may not be known by illegal users.
  • the first recognition system can send the transformed image to the second recognition system.
  • the second recognition system may use a preset deep learning algorithm to perform object detection on the received transformed image, determine the pixel position of each transformed object on the transformed image, and return the pixel position to the edge data center. It is worth noting that after the target image is transformed, there is usually a difference in content between the object on the target image and the transformed object on the transformed image, but the pixel position of the transformed object on the transformed image can be the same as the object on the target image. The pixel positions of are the same, or there is a certain correspondence between the two pixel positions. In this way, based on the pixel position of the transformed object on the transformed image, the pixel position of each object in the target image on the target image can be determined.
  • the first recognition system determines the pixel position of the object in the target image on the target image, and crops the target image based on the pixel position to obtain multiple sub-images, it can continue to perform the subsequent step S203 and send the multiple sub-images to the second Recognition system to facilitate object recognition on the second recognition system.
  • the second recognition system can also detect the pixel position of the missing object on the transformed image.
  • the missing object can be the first recognition system based on its object detection algorithm Objects that cannot be detected due to the limitation of accuracy, so that the first recognition system can correct multiple objects contained in the target image according to the pixel positions returned by the second recognition system, and can obtain relatively high-precision objects in each object. The pixel location on the target image.
  • the first recognition system sends multiple sub-images corresponding to the target image to the second recognition system through remote communication.
  • the first recognition system can perform remote communication with the second recognition system, such as communication based on HyperText Transfer Protocol (HTTP), etc., and multiple sub-images corresponding to the target image based on a preset sequence Send to the second identification system, as shown in Figure 2.
  • HTTP HyperText Transfer Protocol
  • the first recognition system sends to the second recognition system is not the entire target image, but multiple sub-images of the target image, which makes the target image contain sensitive information and multiple sub-images of the target object are transmitted to the second recognition system
  • the process is stolen by illegal users. Because illegal users cannot know the combination relationship between each sub-image, it is also difficult for illegal users to combine the information on each sub-image into the sensitive information included in the target image, which can reduce the sensitive information. Risk of leakage during transmission to the second identification system.
  • the target image in this embodiment may be one image, and in some scenes, the target image may also include multiple images.
  • the target image at least including the first image and the second image as an example (the target image may also include three or more images)
  • the multiple sub-images corresponding to the target image may include at least one corresponding to the first image
  • the sub-image and at least one sub-image corresponding to the second image may both contain sensitive information, or one of the images may contain sensitive information while the other image does not contain sensitive information.
  • the sub-image of the first image and the sub-image of the second image are mixed and sent to the second recognition system, which can further increase the difficulty of obtaining sensitive information on each image based on the combination of sub-images of different images, and reduce the leakage of sensitive information. risk.
  • the first image nor the second image may contain sensitive information, which is not limited in this embodiment.
  • the second recognition system recognizes an object in each sub-image, and obtains a first recognition result for multiple sub-images, and the first recognition result includes recognition results of multiple objects.
  • the second recognition system can use high-precision object recognition algorithms or object recognition models to recognize objects in each sub-image. For example, when the object is specifically a text, the second recognition system can use High-precision long-short-term memory (LSTM) and other algorithms perform text recognition, etc., so that the recognition result of the object in each sub-image can be obtained, so that the first recognition result of multiple sub-images can be obtained.
  • the recognition result is the collection of the recognition results of the objects in each sub-image.
  • the second recognition system can support high-precision object recognition algorithms or object recognition models (for example, the second recognition result can be deployed in a cloud data center with high data processing performance, etc.), so that the second recognition system performs object recognition on multiple sub-images.
  • the first recognition result obtained by the recognition can usually achieve higher accuracy.
  • the second recognition system may use multiple processes on it to recognize objects in multiple sub-images in parallel, for example, use process 1 to recognize objects in sub-image 1, use process 2 to recognize objects in sub-image 2, etc. Compared with the implementation of serially recognizing objects in each sub-image, the object recognition efficiency can be effectively improved.
  • the first identification system can be deployed in one device or in multiple devices (device 1 and device 2 shown in FIG. 6).
  • the device can complete the detection of the pixel position of the transformed object in the transformed image and the identification of the object in the target image; and when the first identification system is deployed in multiple devices In the middle, it may be that the device 1 completes the detection of the pixel position of the transformed object in the transformed image, and the device 2 completes the identification of the object in the target image, which is not limited in this embodiment.
  • S205 The second recognition system returns the first recognition result to the first recognition system through remote communication.
  • the second recognition system may return the first recognition result obtained by the recognition to the first recognition system.
  • the first recognition system may send multiple sub-images to the second recognition system based on a preset sequence, and the second recognition system
  • the recognition system can record the receiving order of each sub-image when receiving multiple sub-images of the target image, and then return the recognition result corresponding to each sub-image in turn according to the receiving order of each sub-image.
  • the first recognition system can determine that the first received recognition result is the recognition result corresponding to the first sent sub-image, and the second received recognition result is the recognition corresponding to the second sent sub-image The result, and so on.
  • the first recognition system and the second recognition system can also negotiate other order correspondence rules.
  • the first recognition result received by the first recognition system is the recognition corresponding to the last sub-image sent by the second recognition system.
  • the second recognition result received by the first recognition system is the recognition result corresponding to the second-to-last sub-image sent by the second recognition system, etc.
  • the first recognition system may also assign an image identifier to each sub-image and send it together with the sub-image.
  • the second recognition system in this way, after the second recognition system determines the recognition result of the object in the sub-image, it can establish the corresponding relationship between the image identifier and the recognition result, so that the image identifier and the recognition result of each sub-image can be obtained.
  • the first recognition system determines a second recognition result for the target image according to the received first recognition result and the positional relationship of the objects in the multiple sub-images on the target image.
  • the first recognition system After receiving the first recognition result, the first recognition system can obtain the positional relationship of the objects in the multiple sub-images on the target image, and the positional relationship can reflect the combination relationship between different objects, and the first recognition system crops the target image It can be recorded locally, so that the first recognition system can combine the recognition results corresponding to each sub-image in the first recognition result according to the position relationship to obtain the second recognition result for the target image, as shown in Figure 2.
  • the second recognition result can reflect the information contained in the target image.
  • the first recognition system determines the second recognition result according to the position relationship of the objects in the multiple sub-images on the target image as shown on the left side of FIG.
  • the first recognition system may use a preset software development kit (SDK) to integrate the position of the object in each sub-image in the target image and the corresponding recognition result, and extract from the target image
  • SDK software development kit
  • the structured data is extracted, such as the structured data shown on the right side of Figure 4, etc.
  • the second recognition result for the target image is obtained on the first recognition system, even if the target image contains sensitive information, the sensitive information is also stored in the first recognition system, and it is difficult to leak at the second recognition system .
  • the complete sensitive information can only be on the customer edge side, but not on the cloud side.
  • the risk of sensitive information being leaked is relatively low.
  • the customer edge side can return the extracted sensitive information (such as structured data) to the user, as shown in Figure 3 and Figure 4, the user can only perceive the interaction with the customer edge side, and there is no need to interact with the cloud side. Interaction, for the user, is equivalent to completing the recognition of the object in the target image at the edge of the customer, and not only the recognition accuracy is high, but the risk of the sensitive information obtained by the recognition is also low.
  • the first recognition system can use multiple processes on it to process the object recognition process of multiple images in parallel.
  • the first recognition system can use process 1 to perform the object recognition process of the target image, which may include the above-mentioned target image recognition process.
  • the transformation processing, cropping, and structured data extraction, etc., use process 2 to perform the object recognition process of another image, including the transformation processing, cropping, and structured data extraction of the image using the above-mentioned similar implementation methods.
  • the efficiency of recognizing objects in multiple images can be improved on the first recognition system.
  • the technical solutions of the embodiments of the present application will be introduced below in conjunction with an example of a scene where the object is specifically a text.
  • the first identification system can be deployed in an edge data center
  • the second identification system can be deployed in a cloud data center.
  • FIG. 5 this is a schematic flowchart of an object recognition method combined with a specific scene in an embodiment of this application, and the method may specifically include:
  • S501 The user uploads a target image to the edge data center, and the target image contains multiple paragraphs of text.
  • the information obtained by combining multiple paragraphs of text in the target image may belong to the sensitive information described in the foregoing embodiment.
  • multiple paragraphs of text in the target image include "Zhang San” (name), "XX community, XX street, XX city” (home address), "135XXXXXXX” (mobile phone number), and "Master” (educational background).
  • the combination of "Zhang San” and "XX Community, XX Street, XX City” can characterize the specific home address information of the person named "Zhang San”; the combination of “Zhang San” and “135XXXXXXX” can characterize “Zhang San” Mobile phone number information; the combination of "Zhang San” and “Master” can characterize the academic information of "Zhang San", etc., and these information are all personal privacy information of "Zhang San” and also belong to the sensitive information in this embodiment.
  • multiple objects in the target image can also be divided into a more fine-grained manner.
  • the above-mentioned home address information can be split into multiple objects.
  • the multiple objects in the above-mentioned target image can also include "Zhang San”, “XX City”, “XX Street”, “XX Community”, “135XXXXXXX” (the phone number can also be split into multiple objects), and "Master”, etc.
  • the method for dividing objects in the target image is not limited in this embodiment.
  • the user may upload a target image to the edge data center through a user terminal or a client. Further, when uploading a target image, the user can also upload sensitive indication information corresponding to the target image, so that the edge data center can determine that the target image contains sensitive information according to the sensitive indication information.
  • the edge data center performs text replacement on multiple segments of text on the received target image to obtain pixel coordinates of the replacement text on the transformed image and the transformed image.
  • the edge data center can use preset text detection algorithms, such as the MSER (Maximally Stable Extremal Regions) algorithm, etc., to detect multiple segments of text on the target image.
  • the edge data center may also use other algorithms for text detection, which is not limited in this embodiment.
  • the edge data center can replace the detected text.
  • replacement refers to replacing the content on the target image with other content, such as replacing the mobile phone number shown in FIG. 4 from "123XXXX8901" to "00000000000", etc.
  • the new image obtained is the transformed image in step S502
  • the pixel position of the replaced text in the transformed image and the pixel position of the text before the replacement in the target image can be maintained Unanimous.
  • the pixel position of the replaced text in the transformed image can be expressed as the pixel coordinates of the text in the transformed image.
  • the edge data center when it transforms the target image, it can not only replace the text in the target image, but also encrypt and mask the text in the target image.
  • encryption refers to the use of corresponding encryption algorithms to encrypt the content on the target image.
  • the mobile phone number shown in Figure 4 can be encrypted from "123XXXX8901" to "234XXX90123”; mask refers to using a mask Mask part of the object information on the target image and retain the remaining information, while the length of the object information remains unchanged.
  • a mask can be used to mask the mobile phone number "123XXXX8901" as shown in Figure 4, and the masked mobile phone number is "123* *****01".
  • the transformation processing may also be other processing procedures, such as rearrangement (disrupting information in a certain order), etc., which is not limited in this embodiment.
  • the edge data center can also randomly replace the text on the target image through a random algorithm. For example, it can calculate the corresponding random probability for each text. When the random probability of the text is greater than a preset value, the text can be The text is replaced, otherwise it will not be replaced, which can increase the difficulty of restoring the desensitized image.
  • the text on the target image can also be replaced according to a certain rule, which is not limited in this embodiment. It is worth noting that the replaced text in this embodiment may refer to text that has not been replaced on the transformed image (for example, text with a random probability value less than a preset value) and replaced text.
  • S503 The edge data center sends the transformed image to the cloud data center through remote communication.
  • the edge data center can transform the target image, specifically replacing the text on the target image, and send the transformed image obtained by the transformation to the cloud data center, so that the cloud data center can determine the transformation The pixel position of each paragraph of text on the image.
  • the cloud data center can preprocess the transformed image, and use high-precision deep learning algorithms for text detection on the preprocessed transformed image, and obtain the multi-segment text on the transformed image on the preprocessed transformed image. Pixel position.
  • the cloud center After the cloud center receives the transformed image, it can preprocess the transformed image.
  • the preprocessing may be, for example, performing processing such as cropping or perspective correction on the transformed image.
  • the cloud data center After receiving the transformed image, the transformed image can be cropped to remove the blank area of the transformed image to obtain the cropped image; then, the cloud data center can use the preset deep learning algorithm to perform object detection on the cropped image , Determine the pixel position of the transformed object on the cropped image.
  • the pixel position can also be the pixel position of the transformed object on the transformed image, or the transformation can be calculated based on the pixel position of the transformed object on the cropped image. The pixel position of the object on the transformed image.
  • the cloud data center can use the high-precision psenet algorithm or retinanet algorithm to perform text detection on the transformed image, and determine the pixel position of each text on the transformed image.
  • the algorithm for character recognition in the cloud data center is not limited to the above examples, and other applicable high-precision algorithms can also be used.
  • the replaced text on the transformed image is not a front view (such as not directly facing the object to take a photo, etc.).
  • the cloud data center uses high-precision deep learning algorithms to detect the pixels of the transformed object. Before the position, perspective correction can be performed on the transformed image, for example, the transformed image can be rotated by a certain angle, and the characters in the front view after the rotation can be recognized.
  • the pixel position of the replaced text detected by the cloud data center using the deep learning algorithm is the pixel position of the replaced text on the transformed image after perspective correction processing.
  • S505 The cloud data center returns the pixel location and preprocessing information to the edge data center.
  • the cloud data center preprocesses the received transformed image, and the pixel position of the replaced text on the preprocessed transformed image may be different from the pixel position on the transformed image before the transformation process. Therefore, when the cloud data center returns the pixel position to the edge data center, it can also return preprocessing information, so that the edge data center can calculate the position of the replaced text on the transformed image before the preprocessing based on the preprocessing information. Pixel position.
  • the cloud data center can also calculate the pixel position of the replaced text on the transformed image before preprocessing based on the preprocessing information, and return the pixel position to the edge data center
  • the embodiment shown in FIG. 5 is only used as an exemplary description, and is not used for limitation.
  • the edge data center corrects the pixel positions of multiple replacement texts on the transformed image according to the received pixel positions and preprocessing information, and crops the target image according to the modified pixel positions to obtain a multi-sub image corresponding to the target image.
  • the edge data center After the edge data center receives the pixel position returned by the cloud data center, it can further determine the pixel position of the multiple replacement text in the transformed image on the transformed image based on the received pixel position. For example, the edge data center may use the pixel position of the transformed object on the transformed image as the pixel position of the corresponding object in the target image on the target image; or the edge data center may calculate based on the received pixel position and preprocessing information Find out the pixel position of the multi-segment replacement text in the transformed image in the transformed image, and use the calculated pixel position to correct the pixel position of the multi-segment text detected by the text detection algorithm in the previous edge data center, and the corrected pixel position It can be used as the pixel position of each paragraph of text on the target image in the target image.
  • the edge data The center can crop the target image according to the pixel position of the replacement text in the transformed image to obtain multiple sub-images, and each sub-image can contain at least one paragraph of text in the target image.
  • the target image includes the words "Zhang San”, “XX Street XX Community in XX City", “135XXXXXXX” and "Master”, by cropping the target image, at least 4 sub-images can be obtained, which can each contain The sub-images of "Zhang San”, the sub-images containing "XX City XX Street XX Community", the sub-images containing "135XXXXXXX” and the sub-images containing "Master”, etc.; of course, the object in the target image is more detailed In the granularity division, at least 6 sub-images can also be determined, which can be the sub-images containing "Zhang San", the sub-images containing "XX City", the sub-images containing "XX Street", and the sub-images containing "XX Community".
  • the edge data center sends the multiple sub-images obtained by cropping to the cloud data center.
  • the edge data center may adjust the sending order of each sub-image to the cloud data center. Specifically, the edge data center can cut out sub-images from the target image in a certain order according to the pixel positions of the text on the target image, such as cutting out the order of pixels on the target image from top to bottom (or from left to right) If the edge data center sends multiple sub-images to the cloud data center according to the order or reverse order of the cropped sub-images, illegal users may determine the combination of the sub-images according to the intercepted sub-image order, thereby increasing the target Risk of leakage of sensitive information on images.
  • the edge data center can adjust the sending order of each sub-image, so that illegal users based on the adjusted sending order of the sub-images, it is difficult to determine the combination relationship between the sub-images, and it is difficult to obtain the sensitive information in the target image. To a certain extent, it can reduce the risk of sensitive information being leaked.
  • the edge data center may also send multiple sub-images to the second recognition system in the order of cropping the sub-images, which is not limited in this embodiment.
  • the target image in this embodiment may be one image or may include multiple images.
  • the sub-images corresponding to the target image are a collection of sub-images respectively corresponding to the multiple images.
  • mixing and sending sub-images of multiple images to the second recognition system can further increase the difficulty of combining sub-images based on different images to obtain sensitive information on each image, and reduce the risk of sensitive information being leaked.
  • the cloud data center uses a high-precision deep learning algorithm to perform text recognition on each received sub-image, and obtain a recognition result of the text in each sub-image.
  • the cloud data center may use a high-precision LSTM algorithm to recognize characters in each sub-image. Because the cloud data center can have high data processing capabilities and can support high-precision deep learning algorithms, the accuracy and efficiency of the text results obtained by recognizing the text in the sub-image in the cloud data center are usually high.
  • the target image may contain sensitive information
  • the information carried on each sub-image is usually part of the sensitive information, and multiple sub-images are sent to the cloud data center.
  • S509 The cloud data center returns the recognition result of the text in each sub-image to the edge data center.
  • the cloud data center may record the receiving order of each sub-image when receiving each sub-image, and send the recognition results of the characters in each sub-image to the edge data center in turn according to the recorded receiving order of each sub-image, thereby
  • the edge data center can determine the recognition result corresponding to the text in which sub-image the recognition result is based on the order in which the recognition result is received.
  • the cloud data center when the cloud data center returns the recognition result, it can also return the corresponding relationship between the recognition result and the sub-image, so that the edge data center determines which recognition result corresponds to each sub-image according to the received correspondence Therefore, there is no need to require the cloud data center to send the corresponding sub-images in a certain order.
  • the cloud data center can also return the confidence level corresponding to the recognition result of the text in each sub-image to the edge data center.
  • the confidence level can be used to indicate the reliability of each recognition result. Degree of trust.
  • the edge data center determines that the confidence of the recognition result of the text in the sub-image is lower than the preset value, it can choose to abandon the recognition result for the text in each sub-image and re-recognize the text in the sub-image, and When it is determined that the confidence of the recognition result of the text in the sub-image is higher than the preset value, the text recognition result for the target image may be further determined based on the recognition result of the text in each sub-image.
  • the edge data center can also be based on user needs, regardless of whether the confidence of the recognition result of the text in the sub-image is higher than the preset value, the text recognition result for the target image is obtained according to the text recognition result of the sub-image, etc. This embodiment does not limit this.
  • the edge data center extracts structured data from the target image according to the received recognition result of the object in each sub-image.
  • the edge data center may use a preset SDK to integrate the position of the text in each sub-image in the target image and the corresponding recognition result, and extract structured data from the target image.
  • S511 The edge data center returns the extracted structured data to the user.
  • the detection process of the replacement text in the transformed image and the recognition process of the text in the sub-image are both performed by the same device on the cloud data center. In other possible implementation manners, it may also be performed by the same device on the cloud data center. Different devices in the cloud data center perform these two processes separately.
  • the cloud data center can include equipment 1 and equipment 2, where equipment 1 can perform a process of detecting the pixel position of the replacement text in the transformed image, and equipment 2 can perform a process of recognizing text in multiple sub-images .
  • the cloud data center can also include three or more devices, and all of them can participate in the above-mentioned text detection and text recognition process. For example, for multiple sub-images received by the cloud data center, multiple devices in the cloud data may simultaneously perform character recognition on different sub-images.
  • an embodiment of the present application also provides an object recognition device 700, which can be applied to the aforementioned first recognition system and execute the object recognition method executed by the aforementioned first recognition system.
  • the embodiment of the present application does not limit the division of functional modules in the device 700.
  • the following exemplarily provides a division of functional modules:
  • the obtaining module 701 is configured to obtain a target image, where the target image includes a plurality of objects;
  • the determining module 702 is configured to determine multiple sub-images corresponding to the target image, and each sub-image includes at least one object;
  • the transmission module 703 is configured to send the multiple sub-images to the second device, so that the second device can recognize objects in the multiple sub-images.
  • the determining module 702 is specifically configured to obtain the pixel positions of the multiple objects on the target image, and to determine the pixel positions of the objects on the target image.
  • the target image is cropped to obtain multiple sub-images corresponding to the target image.
  • the determining module 702 is specifically configured to perform transformation processing on the target image to obtain a transformed image
  • the transmission module 703 is further configured to send the transformed image to the second recognition system, and receive the pixel positions of multiple transformation objects on the transformed image returned by the second recognition system;
  • the determining module 702 is specifically configured to determine the pixel positions of the multiple objects on the target image according to the pixel positions of the multiple transformed objects.
  • the transmission module 703 is further configured to receive the first recognition result for the multiple sub-images returned by the second recognition system;
  • the determining module 703 is further configured to determine a second recognition result for the target image according to the first recognition result and the position relationship of the objects in the multiple sub-images on the target image.
  • the transmission module 703 is specifically used for the first recognition system to send the multiple sub-images to the second recognition system based on a preset sequence, and to receive the second recognition system The first recognition result for the multiple sub-images returned based on the preset order.
  • the target image includes at least a first image and a second image
  • the multiple sub-images corresponding to the target image include at least a sub-image corresponding to the first image and a sub-image corresponding to the second image.
  • the first identification system is deployed in an edge data center
  • the second identification system is deployed in a cloud data center.
  • the multiple objects included in the target image include multiple characters.
  • the transmission module 703 is further configured to receive the target image and the sensitive indication information of the target image uploaded by the user;
  • the determining module 702 is also used to determine that the target image is an image containing sensitive information.
  • the object recognition device 700 may correspond to the implementation of the object recognition method described in the embodiment of the present application, and the various modules and other operations and/or functions of the object recognition device 700 are designed to implement the first recognition system in FIG. 2 respectively.
  • the corresponding flow of each method executed will not be repeated here.
  • an embodiment of the present application also provides an object recognition device 800, which can be applied to the aforementioned second recognition system and execute the object recognition method executed by the aforementioned second recognition system.
  • the embodiment of the present application does not limit the division of functional modules in the device 800.
  • the following exemplarily provides a division of functional modules:
  • the transmission module 801 is configured to receive multiple sub-images corresponding to the target object sent by the first recognition system through remote communication, where the target image includes multiple objects, and each sub-image includes at least one object;
  • the recognition module 802 is configured to perform object recognition on the multiple sub-images to obtain a first recognition result for the multiple sub-images, where the first recognition result includes the recognition result of the object in each sub-image.
  • the transmission module 801 is further configured to send first recognition results for multiple sub-images to the first recognition system through remote communication.
  • the transmission module 801 is further configured to receive a transformed image from the first recognition system, where the transformed image is an image obtained by performing transformation processing on the target image;
  • the device also includes: a detection module 803;
  • the detection module 803 is further configured to detect multiple transformation objects in the transformation image to obtain pixel positions of the multiple transformation objects in the transformation image;
  • the transmission module 801 is further configured to return the pixel positions of the multiple transformed objects in the transformed image to the first recognition system.
  • the transmission module 801 is specifically configured to sequentially return to the first recognition system the recognition of the objects in the respective sub-images according to the receiving order of the respective sub-images of the target image. result.
  • the recognition module 802 is specifically configured to use multiple processes to recognize images in the multiple sub-images in parallel.
  • the target image includes at least a first image and a second image
  • the multiple sub-images corresponding to the target image include at least a sub-image corresponding to the first image and a sub-image corresponding to the second image.
  • the first identification system is deployed in an edge data center
  • the second identification system is deployed in a cloud data center.
  • the multiple objects included in the target image include multiple characters.
  • the object recognition device 800 can correspond to the implementation of the object recognition method described in the embodiment of the present application, and the various modules and other operations and/or functions of the object recognition device 800 are designed to implement the second recognition system in FIG. 2 respectively.
  • the corresponding flow of each method executed will not be repeated here.
  • the object recognition apparatus 700 and the object recognition apparatus 800 described above can be implemented by computing devices, respectively.
  • Figure 9 and Figure 10 respectively provide a computing device.
  • the computing device 900 may be specifically used to implement the function of the object recognition apparatus 700 in the embodiment shown in FIG. 7.
  • the computing device 900 includes a bus 901, a processor 902, and a memory 903.
  • the processor 902 and the memory 903 communicate through a bus 901.
  • the bus 901 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
  • the processor 902 may be a central processing unit (CPU), a graphics processing unit (GPU), a microprocessor (MP), or a digital signal processor (digital signal processor, DSP), etc. Any one or more of the devices.
  • CPU central processing unit
  • GPU graphics processing unit
  • MP microprocessor
  • DSP digital signal processor
  • the memory 903 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM).
  • volatile memory such as a random access memory (random access memory, RAM).
  • RAM random access memory
  • non-volatile memory non-volatile memory
  • ROM read-only memory
  • flash memory flash memory
  • HDD hard drive
  • solid state drive solid state drive
  • An executable program code is stored in the memory 903, and the processor 902 executes the executable program code to execute the object recognition method executed by the aforementioned first recognition system.
  • the computing device 1000 may be specifically used to implement the function of the object recognition apparatus 800 in the embodiment shown in FIG. 8 above.
  • the computing device 1000 includes a bus 1001, a processor 1002, and a memory 1003.
  • the processor 1002 and the memory 1003 communicate through a bus 1001.
  • the bus 1001 may be a PCI bus, an EISA bus, or the like.
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used to represent in FIG. 10, but it does not mean that there is only one bus or one type of bus.
  • the processor 1002 may be any one or more of processors such as CPU, GPU, MP, or DSP.
  • the memory 1003 may include a volatile memory (volatile memory), such as RAM.
  • the memory 1003 may also include a non-volatile memory (non-volatile memory), such as ROM, flash memory, HDD or SSD.
  • the memory 1003 stores executable program codes, and the processor 1002 executes the executable program codes to execute the object recognition method executed by the aforementioned first recognition system.
  • the embodiment of the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be stored by a computing device or a data storage device such as a data center containing one or more available media.
  • the usable medium may be a magnetic medium, (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk).
  • the computer-readable storage medium includes instructions that instruct the computing device to execute the object recognition method performed by the above-mentioned first recognition system.
  • the embodiment of the present application also provides another computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be stored by a computing device or a data storage device such as a data center containing one or more available media.
  • the usable medium may be a magnetic medium, (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk).
  • the computer-readable storage medium includes instructions that instruct the computing device to execute the object recognition method performed by the above-mentioned second recognition system.
  • the embodiment of the present application also provides a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computing device, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, a computer, or a data center through a cable (Such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer or data center.
  • a cable such as coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer program product may be a software installation package.
  • the computer program product may be downloaded and executed on a computing device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Image Analysis (AREA)

Abstract

An object recognition method and device, an apparatus, and a medium. A first recognition system acquires a target image containing multiple objects, and determines multiple sub-images corresponding to the target image. Each sub-image may contain at least one object. The first recognition system may then send the multiple sub-images of the target image to a second recognition system by means of remote communication, such that the second recognition system can perform recognition on the objects in the multiple sub-images. Since the first recognition system sends to the second recognition system the multiple sub-images corresponding to the target image rather than the whole target image, even if the target image contains sensitive information, respective portions of the sensitive information corresponding to the multiple sub-images are not sensitive, such that complete sensitive information cannot be determined easily, thereby reducing the risk of leaking the sensitive information.

Description

一种对象识别方法、装置、设备及介质Object recognition method, device, equipment and medium

本申请要求于2020年05月18日提交中国知识产权局、申请号为202010420378.2、申请名称为“边云结合的文字识别方法、装置及设备”的中国专利申请,以及于2020年06月24日提交中国知识产权局、申请号为202010588784.X、申请名称为“一种对象识别方法、装置、设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application requires a Chinese patent application filed with the China Intellectual Property Office with the application number of 202010420378.2 and the application titled "Border-cloud-combined text recognition method, device and equipment" on May 18, 2020, and on June 24, 2020 The priority of a Chinese patent application filed with the China Intellectual Property Office, the application number is 202010588784.X, and the application name is "an object recognition method, device, equipment and medium", the entire content of which is incorporated into this application by reference.

技术领域Technical field

本申请涉及计算机视觉领域,尤其涉及一种对象识别方法、装置、设备及介质。This application relates to the field of computer vision, and in particular to an object recognition method, device, equipment and medium.

背景技术Background technique

随着深度学习技术的发展,对象识别技术的识别精度越来越高,并且被广泛应用于各种行业中。通常情况下,识别图像中的对象(如文字、物体等),会对设备的数据处理能力具有较高的要求,比如,在一些对识别速度和/或识别精度具有较高要求的场景中,设备的数据处理能力不能过低。由此,一些企业会采用多个识别系统配合进行对象识别,例如,通过自身的边缘数据中心中的识别系统和与公有云服务提供商的云数据中心中的识别系统共同进行对象识别。With the development of deep learning technology, the recognition accuracy of object recognition technology is getting higher and higher, and it is widely used in various industries. Under normal circumstances, recognizing objects (such as text, objects, etc.) in an image will have higher requirements on the data processing capabilities of the device. For example, in some scenes that have higher requirements on recognition speed and/or recognition accuracy, The data processing capacity of the device cannot be too low. As a result, some companies use multiple recognition systems to perform object recognition, for example, through the recognition system in their own edge data center and the recognition system in the cloud data center of the public cloud service provider to perform object recognition.

但是,当待识别的图像中包含敏感信息时,在多个识别系统进行对象识别的应用场景中,发生敏感信息泄露的风险较高。However, when the image to be recognized contains sensitive information, in an application scenario where multiple recognition systems perform object recognition, the risk of leakage of sensitive information is high.

发明内容Summary of the invention

有鉴于此,本申请实施例提供了一种对象识别方法,以降低识别图像中对象时敏感信息发生泄露的风险。本申请还提供了对应的装置、设备、计算机可读存储介质以及计算机程序产品。In view of this, the embodiments of the present application provide an object recognition method to reduce the risk of leakage of sensitive information when recognizing an object in an image. This application also provides corresponding devices, equipment, computer-readable storage media, and computer program products.

第一方面,本申请实施例提供了一种对象识别方法,该方法可以由第一识别系统执行。第一识别系统可以获取包括多个对象的目标图像,其中,目标图像中的对象例如可以是文字或者物体等。第一识别系统可以确定该目标图像对应的多个子图像,并且,每个子图像可以包括至少一个对象,然后,第一识别系统可以通过远程通信向第二识别系统发送该目标图像的多个子图像,以使得第二识别系统可以对该多个子图像中的对象进行识别。In the first aspect, an embodiment of the present application provides an object recognition method, which can be executed by a first recognition system. The first recognition system may obtain a target image including a plurality of objects, where the object in the target image may be, for example, a text or an object. The first recognition system may determine multiple sub-images corresponding to the target image, and each sub-image may include at least one object. Then, the first recognition system may send multiple sub-images of the target image to the second recognition system through remote communication, So that the second recognition system can recognize the objects in the multiple sub-images.

由于第一识别系统向第二识别系统发送的是目标图像对应的多个子图像,而并非是整张目标图像,因此,即使目标图像中包含敏感信息,第二识别系统基于多个子图像所识别出的信息通常也只是敏感信息的各个部分,而无法获知敏感信息的各个部分的组合关系,这使得当第二识别系统所识别出的敏感信息的各个部分发生泄漏时,由于各个部分之间存在多种可能的信息组合,从而难以从多种信息组合中确定出目标图像中的敏感信息,这就相当于敏感信息实际上并没有发生泄漏,进而可以降低对象识别过程中目标图像中的敏感 信息发生泄漏的风险。Since the first recognition system sends multiple sub-images corresponding to the target image to the second recognition system, rather than the entire target image, even if the target image contains sensitive information, the second recognition system recognizes based on the multiple sub-images The information is usually only the parts of the sensitive information, and the combination of the parts of the sensitive information cannot be known. This makes when the parts of the sensitive information identified by the second identification system leak, because there are multiple parts between the parts. It is difficult to determine the sensitive information in the target image from a variety of information combinations, which is equivalent to that the sensitive information is not actually leaked, which can reduce the occurrence of sensitive information in the target image during the object recognition process. Risk of leakage.

另外,当第一识别系统部署于边缘数据中心,而第二识别系统部署于云数据中心时,识别子图像中对象的设备可以是数据处理能力较高的云数据中心,而不是边缘数据中心,这不仅可以使得对象的识别精度以及识别效率较高,而且,也无需要求用户在边缘侧部署高性能的服务器,降低了对于用户的硬件成本要求。In addition, when the first identification system is deployed in an edge data center and the second identification system is deployed in a cloud data center, the device for identifying objects in the sub-image can be a cloud data center with higher data processing capabilities instead of an edge data center. This not only makes the recognition accuracy and recognition efficiency of the object higher, but also does not require users to deploy high-performance servers on the edge side, which reduces the hardware cost requirements for users.

在一种可能的实施方式中,第一识别系统可以是通过裁剪目标图像得到目标图像对应的多个子图像。具体的,第一识别系统可以获取多个对象在目标图像上的像素位置,并根据各个对象在目标图像上的像素位置,对目标图像进行裁剪,以此得到该目标图像对应的多个子图像。其中,第一识别系统可以是利用自身配置的对象检测算法,检测出目标图像中的多个对象,并进一步获取各个对象在目标图像上的像素位置;或者,第一识别系统也可以是通过第二识别系统识别出目标图像中的多个对象,并接收第二识别系统返回的各个对象在目标图像上的像素位置。In a possible implementation manner, the first recognition system may obtain multiple sub-images corresponding to the target image by cropping the target image. Specifically, the first recognition system may obtain the pixel positions of multiple objects on the target image, and crop the target image according to the pixel positions of each object on the target image, so as to obtain multiple sub-images corresponding to the target image. Among them, the first recognition system may use its own object detection algorithm to detect multiple objects in the target image, and further obtain the pixel position of each object on the target image; or, the first recognition system may also use the first recognition system to detect multiple objects in the target image. The second recognition system recognizes multiple objects in the target image, and receives the pixel position of each object on the target image returned by the second recognition system.

在一种可能的实施方式中,当第一识别系统通过第二识别系统识别出目标图像中的多个对象时,第一识别系统可以对目标图像进行变换处理,具体可以是将目标图像中的对象的图像内容变换成其它图像内容,比如,当对象为文字时,可以将目标图像中的文字替换成其它文字。然后,第一识别系统可以将经过变换处理后得到的变换图像发送给第二识别系统,由第二识别系统采用高精度的深度学习算法或者对象检测模型,检测出变换图像中的多个变换图像在变换图像上的像素位置,并返回给第一识别系统。这样,第一识别系统可以根据接收到的多个变换图像的像素位置,确定多个对象在目标图像上的像素位置。由于通过具有高精度深度学习算法或者对象检测模型的第二识别系统检测出变换对象在变换图像上的像素位置,因此,第一识别系统根据第二识别系统所返回的像素位置可以得到检测精度较高的对象在目标图像中的像素位置;而且,在第一识别系统得到精度较高的像素位置的过程中,第一识别系统是将经过变换处理得到的变换图像发送给第二识别系统,而并非是目标图像,这使得即使目标图像包含敏感信息,但是基于该目标图像所得到的变换图像上并不包含该敏感信息,从而在变换图像向第二识别系统传输的过程中以及在第二识别系统上被进行对象检测的过程中,目标图像中的敏感信息被泄露的风险较低。In a possible implementation, when the first recognition system recognizes multiple objects in the target image through the second recognition system, the first recognition system may perform transformation processing on the target image. The image content of the object is transformed into other image content. For example, when the object is text, the text in the target image can be replaced with other text. Then, the first recognition system can send the transformed image obtained after transformation processing to the second recognition system, and the second recognition system uses a high-precision deep learning algorithm or object detection model to detect multiple transformed images in the transformed image The pixel position on the transformed image is returned to the first recognition system. In this way, the first recognition system can determine the pixel positions of the multiple objects on the target image according to the received pixel positions of the multiple transformed images. Since the second recognition system with a high-precision deep learning algorithm or object detection model detects the pixel position of the transformed object on the transformed image, the first recognition system can obtain a higher detection accuracy based on the pixel position returned by the second recognition system. The pixel position of the high object in the target image; and, in the process of obtaining the pixel position with higher accuracy by the first recognition system, the first recognition system sends the transformed image obtained through the transformation process to the second recognition system, and It is not the target image, which makes even the target image contains sensitive information, but the transformed image obtained based on the target image does not contain the sensitive information, so that the transformed image is transmitted to the second recognition system and in the second recognition system. In the process of object detection on the system, the risk of sensitive information in the target image being leaked is low.

在一种可能的实施方式中,第一识别系统还可以接收到第二识别系统返回的针对该多个子图像的第一识别结果,该第一识别结果可以是多个对象分别对应的识别结果的集合。然后,第一识别系统可以根据第一识别结果以及多个子图像中的对象在目标图像上的位置关系,确定针对目标图像的第二识别结果,该第二识别结果可以包括目标图像中各个对象的组合关系,该组合关系可以是根据对象在目标图像上的位置关系进行确定。比如,假设第一识别结果包括对象1对应的识别结果“张三”、对象2对应的识别结果“XX市XX街道XX小区”、以及对象3对应的识别结果“硕士”,从而根据该第一识别结果、对象1与对象2在目标图像中的位置关系、对象1与对象3在目标图像中的位置关系,确定出第二识别结果为“张三”的家庭住址为“XX市XX街道XX小区”、“张三”的学历为“硕士”等。In a possible implementation, the first recognition system may also receive a first recognition result for the plurality of sub-images returned by the second recognition system, and the first recognition result may be a result of the recognition results respectively corresponding to the multiple objects. gather. Then, the first recognition system may determine a second recognition result for the target image according to the first recognition result and the positional relationship of the objects in the multiple sub-images on the target image. The second recognition result may include the information of each object in the target image. The combination relationship, the combination relationship may be determined according to the position relationship of the object on the target image. For example, suppose that the first recognition result includes the recognition result "Zhang San" corresponding to object 1, the recognition result "XX city XX street XX community" corresponding to object 2, and the recognition result "Master" corresponding to object 3, so that according to the first According to the recognition result, the positional relationship between Object 1 and Object 2 in the target image, and the positional relationship between Object 1 and Object 3 in the target image, it is determined that the home address with the second recognition result of "Zhang San" is "XX City XX Street XX The educational background of "Community" and "Zhang San" is "Master" and so on.

在一种可能的实施方式中,第一识别系统可以基于预设顺序向第二识别系统发送多个子图像,该预设顺序可以是第一识别系统裁剪得到多个子图像的顺序,也可以是对裁剪顺序进行乱序调整后所得到的顺序,以使得非法用户难以根据乱序调整后的发送顺序以及多 个子图像还原得到目标图像,从而可以通过乱序发送子图像降低目标图像中的敏感信息被泄漏的风险。相应的,第二识别系统在向第一识别系统返回针对多个子图像的第一识别结果时,可以是基于该预设顺序依次返回各个子图像中的对象的识别结果,以便于第一识别系统根据该预设顺序确定每个子图像对应于哪个识别结果。In a possible implementation manner, the first recognition system may send multiple sub-images to the second recognition system based on a preset sequence. The preset sequence may be the sequence in which the multiple sub-images are cropped by the first recognition system, or it may be The cropping sequence is the order obtained after out-of-order adjustment, so that it is difficult for illegal users to obtain the target image based on the out-of-order adjusted sending order and multiple sub-image restoration, so that the sensitive information in the target image can be reduced by sending the sub-images out of order. Risk of leakage. Correspondingly, when the second recognition system returns the first recognition results for the multiple sub-images to the first recognition system, it may return the recognition results of the objects in each sub-image based on the preset order in order to facilitate the first recognition system According to the preset sequence, which recognition result corresponds to each sub-image is determined.

在一种可能的实施方式中,第二识别系统在返回多个子图像的第一识别结果的同时,还可以返回各个子图像与其对应的识别结果之间的对应关系,从而无需要求第二识别系统按照特定的顺序返回每个子图像中的对象的识别结果,而第一识别系统可以根据接收到的对应关系确定每个子图像对应于哪个识别结果。In a possible implementation manner, while returning the first recognition results of multiple sub-images, the second recognition system can also return the correspondence between each sub-image and its corresponding recognition result, so that the second recognition system is not required. The recognition result of the object in each sub-image is returned in a specific order, and the first recognition system can determine which recognition result each sub-image corresponds to according to the received correspondence.

在一种可能的实施方式中,目标图像可以包括一张图像,也可以是包括多张图像。当目标图像包括多张图像时,以目标图像包括第一图像以及第二图像为例,目标图像对应的多个子图像,可以包括第一图像对应的至少一个子图像以及第二图像对应的至少一个子图像。其中,第一图像与第二图像,可以均包含敏感信息,也可以是其中任意一个包含敏感信息,还可以是两张均不包含敏感信息。这样,当第一图像与第二图像中包含敏感信息时,第一识别系统向第二识别系统发送的目标图像对应的多个子图像,也可以是多张图像的子图像的混合,从而可以增加子图像之间的组合复杂度,也即可以增加组合多个子图像得到敏感信息的难度,进一步降低敏感信息被泄漏的风险。In a possible implementation manner, the target image may include one image or multiple images. When the target image includes multiple images, taking the target image including the first image and the second image as an example, the multiple sub-images corresponding to the target image may include at least one sub-image corresponding to the first image and at least one corresponding to the second image Sub-image. Wherein, the first image and the second image may both contain sensitive information, or any one of them may contain sensitive information, or both of them may not contain sensitive information. In this way, when the first image and the second image contain sensitive information, the multiple sub-images corresponding to the target image sent by the first recognition system to the second recognition system can also be a mixture of sub-images of multiple images, which can increase The complexity of combining sub-images can increase the difficulty of combining multiple sub-images to obtain sensitive information, and further reduce the risk of sensitive information being leaked.

在一种可能的实施方式中,第一识别系统可以部署边缘数据中心,第二识别系统可以部署在云数据中心,以此可以利用云数据中心较高的数据处理性能得到较高精度的对象识别结果,并可以降低敏感信息被泄露的风险,同时,也无需要求用户在边缘数据中心部署成本较高的具有高性能的服务器。In a possible implementation, the first identification system can be deployed in an edge data center, and the second identification system can be deployed in a cloud data center, so that the higher data processing performance of the cloud data center can be used to obtain higher-precision object recognition As a result, the risk of sensitive information being leaked can be reduced, and users are not required to deploy costly high-performance servers in edge data centers.

在一种可能的实施方式中,目标图像所包括的多个对象可以是包括多个文字,如中文、英文、数字、符号等文字。当然,也可以是其它类型的对象,如商标、元器件等物体。In a possible implementation manner, the multiple objects included in the target image may include multiple characters, such as Chinese, English, numbers, symbols and other characters. Of course, it can also be other types of objects, such as trademarks, components and other objects.

在一种可能的实施方式中,第一识别系统接收用户上传的目标图像与该目标图像的敏感指示信息,从而第一识别系统可以根据该敏感指示信息确定目标图像为包含敏感信息的图像。这样,第一识别系统可以将包含敏感信息的目标图像采用上述第一方面中任一种可能的实施方式完成对象识别,而对于不包含敏感信息的图像,第一识别系统可以将该图像发送给第二识别系统进行对象识别。示例性的,该敏感指示信息例如可以是为该目标图像添加的敏感标签等。In a possible implementation manner, the first recognition system receives the target image uploaded by the user and the sensitive indication information of the target image, so that the first recognition system can determine that the target image is an image containing sensitive information according to the sensitive indication information. In this way, the first recognition system can use any one of the possible implementations in the first aspect to complete object recognition on the target image containing sensitive information, and for the image that does not contain sensitive information, the first recognition system can send the image to The second recognition system performs object recognition. Exemplarily, the sensitive indication information may be, for example, a sensitive label added to the target image.

第二方面,本申请实施例提供了一种对象识别方法,该方法可以是由第二识别系统执行。第二识别系统接收来自第一识别系统的目标对象对应的多个子图像,其中,该目标图像可以包括多个对象,而目标图像的每个子图像中可以包括至少一个对象。然后,第二识别系统可以采用预设的对象识别算法,识别得到每个子图像中的对象,得到第一识别结果,该第一识别结果可以是多个对象分别对应的识别结果的集合。由于第二识别系统是对目标图像的各个子图像进行对象识别,而并非是直接对整张目标图像进行对象识别,这使得第二识别系统难以获知目标图像中的多个对象之间的组合关系,因此,即使目标图像中包含敏感信息,并且所识别出的敏感信息的各个部分发生泄漏时,由于各个部分之间存在多种可能的信息组合,从而难以从多种信息组合中确定出目标图像中的敏感信息,这就相当于敏感信息实际上并没有发生泄漏,进而可以降低对象识别过程中目标图像中的敏感信息发 生泄漏的风险。In the second aspect, an embodiment of the present application provides an object recognition method, which may be executed by a second recognition system. The second recognition system receives multiple sub-images corresponding to the target object from the first recognition system, where the target image may include multiple objects, and each sub-image of the target image may include at least one object. Then, the second recognition system may use a preset object recognition algorithm to recognize objects in each sub-image to obtain a first recognition result. The first recognition result may be a set of recognition results corresponding to multiple objects. Since the second recognition system performs object recognition on each sub-image of the target image, instead of directly performing object recognition on the entire target image, it is difficult for the second recognition system to know the combined relationship between multiple objects in the target image Therefore, even if the target image contains sensitive information and each part of the identified sensitive information leaks, it is difficult to determine the target image from a variety of information combinations due to the various possible information combinations between the various parts The sensitive information in the target image is equivalent to that the sensitive information has not actually leaked, which can reduce the risk of leakage of the sensitive information in the target image during the object recognition process.

在一种可能的实施方式中,第二识别系统向第一识别系统发送针对多个子图像的第一识别结果,以便于第一识别系统能够基于该多个子图像的第一识别系统进一步确定出目标图像的第二识别结果。In a possible implementation, the second recognition system sends the first recognition results for the multiple sub-images to the first recognition system, so that the first recognition system can further determine the target based on the first recognition system of the multiple sub-images. The second recognition result of the image.

在一种可能的实施方式中,第二识别系统还接收来自第一识别系统的变换图像,该变换图像是对目标图像进行变换处理所得到的图像,其中,目标图像中的对象在经过变换处理所得到的变换对象,在图像内容上可以不同。然后,第二识别系统可以对变换图像中的多个变换对象进行检测,得到多个变换图像在变换图像中的像素位置,如采用高精度的对象检测算法或者对象检测模型进行检测等,并将检测得到的像素位置返回给第一识别系统。由于目标图像中的对象在经过变换处理后所得到的变换对象在图像内容上已经发生变化,因此,变换对象所呈现的信息并非是敏感信息的一部分,这使得第二识别系统无法基于变换图像获得目标图像中所包含的敏感信息,从而可以降低敏感信息被泄露的风险。In a possible implementation manner, the second recognition system further receives a transformed image from the first recognition system. The transformed image is an image obtained by performing transformation processing on the target image, wherein the object in the target image is undergoing transformation processing. The resulting transformation object can be different in image content. Then, the second recognition system can detect multiple transformed objects in the transformed image to obtain the pixel positions of multiple transformed images in the transformed image, such as using high-precision object detection algorithms or object detection models for detection, etc. The detected pixel position is returned to the first recognition system. Since the object in the target image has changed in the content of the transformed object obtained after the transformation process, the information presented by the transformed object is not part of the sensitive information, which makes the second recognition system unable to obtain information based on the transformed image The sensitive information contained in the target image can reduce the risk of sensitive information being leaked.

在一种可能的实施方式中,第二识别系统可以是根据目标图像的各个子图像的接收顺序,向第一识别系统依次返回各个子图像中的对象的识别结果,从而完成第一识别结果的反馈。这样,第一识别系统可以根据第二识别系统发送各个子图像对应的识别结果的顺序,确定目标图像的每个子图像对应于哪个识别结果。In a possible implementation, the second recognition system may return the recognition results of the objects in each sub-image to the first recognition system according to the order in which each sub-image of the target image is received, thereby completing the first recognition result. Feedback. In this way, the first recognition system can determine which recognition result corresponds to each sub-image of the target image according to the order in which the second recognition system sends the recognition results corresponding to the respective sub-images.

在一种可能的实施方式中,第二识别系统可以是利用多个进程,并行识别多个子图像中的对象,这相比于串行识别多个子图像中的对象而言,对象识别效率可以得到显著提高。示例性的,该多个进程可以位于同一设备上,也可以是位于不同设备上,如可以将目标图像的多个子图像分别多个部分,分别在不同设备上完成子图像中对象的识别,这在提高对象识别效率的同时,还可以进一步增加敏感信息被泄漏的风险。In a possible implementation, the second recognition system may use multiple processes to recognize objects in multiple sub-images in parallel. Compared with recognizing objects in multiple sub-images serially, the object recognition efficiency can be obtained. Significantly increased. Exemplarily, the multiple processes can be located on the same device or on different devices. For example, multiple sub-images of the target image can be divided into multiple parts, and the objects in the sub-images can be identified on different devices. While improving the efficiency of object recognition, it can also further increase the risk of sensitive information being leaked.

在一种可能的实施方式中,目标图像可以包括一张图像,也可以是包括多张图像。当目标图像包括多张图像时,以目标图像包括第一图像以及第二图像为例,目标图像对应的多个子图像,可以包括第一图像对应的至少一个子图像以及第二图像对应的至少一个子图像。其中,第一图像与第二图像,可以均包含敏感信息,也可以是其中任意一个包含敏感信息,还可以是两张均不包含敏感信息。这样,当第一图像与第二图像中包含敏感信息时,第二识别系统所接收到的目标图像对应的多个子图像,也可以是多张图像的子图像的混合,从而可以增加子图像之间的组合复杂度,也即可以增加组合多个子图像得到敏感信息的难度,进一步降低敏感信息被泄漏的风险。In a possible implementation manner, the target image may include one image or multiple images. When the target image includes multiple images, taking the target image including the first image and the second image as an example, the multiple sub-images corresponding to the target image may include at least one sub-image corresponding to the first image and at least one corresponding to the second image Sub-image. Wherein, the first image and the second image may both contain sensitive information, or any one of them may contain sensitive information, or both of them may not contain sensitive information. In this way, when the first image and the second image contain sensitive information, the multiple sub-images corresponding to the target image received by the second recognition system can also be a mixture of sub-images of multiple images, thereby increasing the number of sub-images. The complexity of the combination between multiple sub-images can increase the difficulty of combining multiple sub-images to obtain sensitive information, and further reduce the risk of sensitive information being leaked.

在一种可能的实施方式中,第一识别系统可以部署边缘数据中心,第二识别系统可以部署在云数据中心,以此可以利用云数据中心较高的数据处理性能得到较高精度的对象识别结果,并可以降低敏感信息被泄露的风险,同时,也无需要求用户在边缘数据中心部署成本较高的具有高性能的服务器。In a possible implementation, the first identification system can be deployed in an edge data center, and the second identification system can be deployed in a cloud data center, so that the higher data processing performance of the cloud data center can be used to obtain higher-precision object recognition As a result, the risk of sensitive information being leaked can be reduced, and users are not required to deploy costly high-performance servers in edge data centers.

在一种可能的实施方式中,目标图像所包括的多个对象可以是包括多个文字,如中文、英文、数字、符号等文字。当然,也可以是其它类型的对象,如商标、元器件等物体。In a possible implementation manner, the multiple objects included in the target image may include multiple characters, such as Chinese, English, numbers, symbols and other characters. Of course, it can also be other types of objects, such as trademarks, components and other objects.

第三方面,本申请提供一种对象识别装置,该装置可以应用于第一识别系统,该装置包括:获取模块,用于获取目标图像,所述目标图像包括多个对象;确定模块,用于确定所述目标图像对应的多个子图像,每个子图像包括至少一个对象;传输模块,用于向所述 第二设备发送所述多个子图像,以使所述第二设备对所述多个子图像中对象进行识别。In a third aspect, the present application provides an object recognition device, which can be applied to the first recognition system. The device includes: an acquisition module for acquiring a target image, the target image including a plurality of objects; and a determination module for Determine the multiple sub-images corresponding to the target image, each sub-image includes at least one object; a transmission module, configured to send the multiple sub-images to the second device, so that the second device can respond to the multiple sub-images Recognize objects in the middle.

在一种可能的实施方式中,所述确定模块,具体用于获取所述多个对象在所述目标图像上的像素位置,并根据各个对象在所述目标图像上的像素位置,对所述目标图像进行裁剪,得到所述目标图像对应的多个子图像。In a possible implementation manner, the determining module is specifically configured to obtain the pixel positions of the multiple objects on the target image, and to determine the pixel positions of the objects on the target image. The target image is cropped to obtain multiple sub-images corresponding to the target image.

在一种可能的实施方式中,其特征在于,所述确定模块,具体用于对所述目标图像进行变换处理,得到变换图像;所述传输模块,还用于向所述第二识别系统发送所述变换图像,接收所述第二识别系统返回的所述变换图像上的多个变换对象的像素位置;所述确定模块,具体用于根据所述多个变换对象的像素位置,确定所述多个对象在所述目标图像上的像素位置。In a possible implementation manner, it is characterized in that the determining module is specifically configured to perform transformation processing on the target image to obtain a transformed image; the transmission module is further configured to send to the second recognition system The transformed image receives the pixel positions of multiple transformation objects in the transformed image returned by the second recognition system; the determining module is specifically configured to determine the pixel positions of the multiple transformation objects according to the pixel positions of the multiple transformation objects. The pixel positions of multiple objects on the target image.

在一种可能的实施方式中,其特征在于,所述传输模块,还用于接收所述第二识别系统返回的针对所述多个子图像的第一识别结果;所述确定模块,还用于根据所述第一识别结果以及所述多个子图像中的对象在所述目标图像上的位置关系,确定针对所述目标图像的第二识别结果。In a possible implementation manner, the transmission module is further configured to receive the first recognition result for the multiple sub-images returned by the second recognition system; the determining module is further configured to According to the first recognition result and the positional relationship of the objects in the plurality of sub-images on the target image, a second recognition result for the target image is determined.

在一种可能的实施方式中,其特征在于,所述传输模块,具体用于所述第一识别系统基于预设顺序向所述第二识别系统发送所述多个子图像,并接收所述第二识别系统基于所述预设顺序返回的针对所述多个子图像的第一识别结果。In a possible implementation manner, the transmission module is specifically configured to send the multiple sub-images to the second recognition system based on a preset sequence by the first recognition system, and receive the first recognition system. The second recognition system returns a first recognition result for the plurality of sub-images based on the preset order.

在一种可能的实施方式中,所述目标图像至少包括第一图像以及第二图像,所述目标图像对应的多个子图像,至少包括所述第一图像对应的子图像以及所述第二图像对应的子图像。In a possible implementation manner, the target image includes at least a first image and a second image, and a plurality of sub-images corresponding to the target image includes at least a sub-image corresponding to the first image and the second image The corresponding sub-image.

在一种可能的实施方式中,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。In a possible implementation manner, the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center.

在一种可能的实施方式中,所述目标图像包括的多个对象包括多个文字。In a possible implementation manner, the multiple objects included in the target image include multiple characters.

在一种可能的实施方式中,所述传输模块,还用于接收用户上传的所述目标图像和所述目标图像的敏感指示信息;所述确定模块,还用于确定所述目标图像为包含敏感信息的图像。In a possible implementation manner, the transmission module is further configured to receive the target image uploaded by the user and the sensitive indication information of the target image; the determination module is further configured to determine that the target image contains Images of sensitive information.

第四方面,本申请提供另一种对象识别装置,该装置可以应用于第二识别系统,该装置可以包括:传输模块,用于接收第一识别系统通过远程通信发送的目标对象对应的多个子图像,所述目标图像包括多个对象,每个子图像中包括至少一个对象;识别模块,用于对所述多个子图像进行对象识别,得到针对所述多个子图像的第一识别结果,所述第一识别结果包括每个子图像中的对象的识别结果。In a fourth aspect, the present application provides another object recognition device, which can be applied to a second recognition system. The device may include: a transmission module for receiving multiple sub-objects corresponding to the target object sent by the first recognition system through remote communication. An image, the target image includes a plurality of objects, and each sub-image includes at least one object; the recognition module is configured to perform object recognition on the plurality of sub-images to obtain a first recognition result for the plurality of sub-images, the The first recognition result includes the recognition result of the object in each sub-image.

在一种可能的实施方式中,所述传输模块,还用于通过远程通信向所述第一识别系统发送针对多个子图像的第一识别结果。In a possible implementation manner, the transmission module is further configured to send first recognition results for multiple sub-images to the first recognition system through remote communication.

在一种可能的实施方式中,所述传输模块,还用于接收来自第一识别系统的变换图像,所述变换图像是通过对所述目标图像进行变换处理所得到的图像;所述装置还包括:检测模块;所述检测模块,还用于对所述变换图像中的多个变换对象进行检测,得到所述多个变换对象在变换图像中的像素位置;所述传输模块,还用于向所述第一识别系统返回所述多个变换对象在变换图像中的像素位置。In a possible implementation manner, the transmission module is further configured to receive a transformed image from the first recognition system, where the transformed image is an image obtained by transforming the target image; the device is also It includes: a detection module; the detection module is also used to detect multiple transformed objects in the transformed image to obtain the pixel positions of the multiple transformed objects in the transformed image; the transmission module is also used to Return the pixel positions of the plurality of transformed objects in the transformed image to the first recognition system.

在一种可能的实施方式中,所述传输模块,具体用于根据所述目标图像的各个子图像 的接收顺序,向所述第一识别系统依次返回所述各个子图像中的对象的识别结果。In a possible implementation manner, the transmission module is specifically configured to sequentially return the recognition results of the objects in the respective sub-images to the first recognition system according to the receiving order of the respective sub-images of the target image .

在一种可能的实施方式中,所述识别模块,具体用于利用多个进程并行识别所述多个子图像中的图像。In a possible implementation manner, the recognition module is specifically configured to use multiple processes to recognize images in the multiple sub-images in parallel.

在一种可能的实施方式中,所述目标图像至少包括第一图像以及第二图像,所述目标图像对应的多个子图像,至少包括所述第一图像对应的子图像以及所述第二图像对应的子图像。In a possible implementation manner, the target image includes at least a first image and a second image, and a plurality of sub-images corresponding to the target image includes at least a sub-image corresponding to the first image and the second image The corresponding sub-image.

在一种可能的实施方式中,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。In a possible implementation manner, the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center.

在一种可能的实施方式中,所述目标图像包括的多个对象包括多个文字。In a possible implementation manner, the multiple objects included in the target image include multiple characters.

第五方面,本申请提供一种计算设备,所述计算设备包括处理器、存储器和显示器。所述处理器、所述存储器进行相互的通信。所述处理器用于执行存储器中存储的指令,以使得计算设备执行如第一方面或第一方面的任一种实现方式中的对象识别方法。In a fifth aspect, the present application provides a computing device, which includes a processor, a memory, and a display. The processor and the memory communicate with each other. The processor is configured to execute instructions stored in the memory, so that the computing device executes the object recognition method in the first aspect or any implementation manner of the first aspect.

第六方面,本申请提供一种计算设备,所述计算设备包括处理器、存储器和显示器。所述处理器、所述存储器进行相互的通信。所述处理器用于执行存储器中存储的指令,以使得计算设备执行如第二方面或第二方面的任一种实现方式中的对象识别方法。In a sixth aspect, the present application provides a computing device, which includes a processor, a memory, and a display. The processor and the memory communicate with each other. The processor is configured to execute instructions stored in the memory, so that the computing device executes the object recognition method in the second aspect or any implementation manner of the second aspect.

第七方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算设备上运行时,使得计算设备执行上述第一方面或第一方面的任一种实现方式所述的对象识别方法。In a seventh aspect, the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computing device, cause the computing device to execute any of the above-mentioned first aspect or any of the first aspects. An object recognition method described in an implementation mode.

第八方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算设备上运行时,使得计算设备执行上述第二方面或第二方面的任一种实现方式所述的对象识别方法。In an eighth aspect, the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computing device, cause the computing device to execute any of the above-mentioned second aspect or any of the second aspects. An object recognition method described in an implementation mode.

第九方面,本申请提供了一种包含指令的计算机程序产品,当其在计算设备上运行时,使得计算设备执行上述第一方面或第一方面的任一种实现方式所述的对象识别方法。In a ninth aspect, this application provides a computer program product containing instructions, which when run on a computing device, causes the computing device to execute the object recognition method described in the first aspect or any one of the implementations of the first aspect .

第十方面,本申请提供了一种包含指令的计算机程序产品,当其在计算设备上运行时,使得计算设备执行上述第二方面或第二方面的任一种实现方式所述的对象识别方法。In a tenth aspect, this application provides a computer program product containing instructions that, when run on a computing device, causes the computing device to execute the object recognition method described in the second aspect or any one of the implementations of the second aspect. .

本申请在上述各方面提供的实现方式的基础上,还可以进行进一步组合以提供更多实现方式。On the basis of the implementation manners provided by the above aspects, this application can be further combined to provide more implementation manners.

附图说明Description of the drawings

为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。In order to more clearly describe the technical solutions in the embodiments of the present application, the following will briefly introduce the drawings needed in the description of the embodiments. Obviously, the drawings in the following description are only some of the implementations recorded in the present application. For example, for those of ordinary skill in the art, other drawings can be obtained based on these drawings.

图1为本申请一示例性应用场景的架构示意图;Figure 1 is a schematic diagram of the architecture of an exemplary application scenario of this application;

图2为本申请实施例中一种对象识别方法的流程示意图;2 is a schematic flowchart of an object recognition method in an embodiment of this application;

图3为本申请实施例中表示像素位置的坐标示意图;3 is a schematic diagram showing the coordinates of pixel positions in an embodiment of the application;

图4为本申请实施例中确定第二识别结果示意图;FIG. 4 is a schematic diagram of determining a second recognition result in an embodiment of this application;

图5为本申请实施例中用户、边缘数据中心以及云数据中心的交互示意图;FIG. 5 is a schematic diagram of interaction among users, edge data centers, and cloud data centers in an embodiment of the application;

图6为本申请实施例中用户、边缘数据中心以及云数据中心的交互示意图;6 is a schematic diagram of interaction among users, edge data centers, and cloud data centers in an embodiment of the application;

图7为本申请实施例提供的一种对象识别装置的结构示意图;FIG. 7 is a schematic structural diagram of an object recognition device provided by an embodiment of the application;

图8为本申请实施例提供的又一种对象识别装置的结构示意图;FIG. 8 is a schematic structural diagram of yet another object recognition device provided by an embodiment of this application;

图9为本申请实施例提供的一种计算设备的结构示意图;FIG. 9 is a schematic structural diagram of a computing device provided by an embodiment of this application;

图10为本申请实施例提供的又一种计算设备的结构示意图。FIG. 10 is a schematic structural diagram of another computing device provided by an embodiment of this application.

具体实施方式Detailed ways

下面将结合本申请中的附图,对本申请实施例中的方案进行描述。The solutions in the embodiments of the present application will be described below in conjunction with the drawings in the present application.

本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,这仅仅是描述本申请的实施例中对相同属性的对象在描述时所采用的区分方式。The terms "first", "second", etc. in the description and claims of the application and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It should be understood that the terms used in this way can be interchanged under appropriate circumstances, and this is merely a way of distinguishing objects with the same attributes in the description of the embodiments of the present application.

对象识别技术,通常是指利用计算机等设备对图像进行处理、分析和理解,以识别图像中各种对象的技术。其中,图像中的对象,例如可以是文字、物体等。以识别图像中的文字为例,可以是在图1所示的应用场景中识别用户(通过用户终端)提供的图像中的文字。当然,本申请所适用的应用场景不局限于图1所示的场景示例,也可以应用于其它可能的应用场景中。Object recognition technology usually refers to the use of computers and other equipment to process, analyze and understand images to identify various objects in the image. Among them, the objects in the image may be texts, objects, etc., for example. Taking recognizing text in an image as an example, it may be recognizing text in an image provided by a user (through a user terminal) in the application scenario shown in FIG. 1. Of course, the application scenario applicable to this application is not limited to the scenario example shown in FIG. 1, and may also be applied to other possible application scenarios.

如图1所示,用户(可以是通过用户终端等设备)可以将包含待识别文字的图像提供给边缘数据中心,该边缘数据中心可以是包括部署在边缘侧的服务器等设备的集合,并可以在边缘侧为用户提供相应的业务服务,如为用户提供文字识别服务等。边缘数据中心表示距离用户的设备较近的物理环境。与之对应的,还有云数据中心,其可以是包括部署在云侧的服务器等设备的集合,云数据中心通常比边缘数据中心距用户的设备较远,云数据中心致力为多个不同地域的用户提供云服务,通常情况下,云数据中心相比于边缘数据中心可以具有更高的数据处理性能(如处理速度快、准确率高等),可以用于提供比边缘数据中心更优质的服务,比如,当边缘数据中心的业务服务能力无法满足用户的要求时,可以交由云数据中心进行处理,以满足用户的要求。或者,也可以是由边缘数据中心以及云数据中心相互配合,协同为用户提供相应的业务服务等。As shown in Figure 1, users (which can be through user terminals and other devices) can provide images containing text to be recognized to an edge data center. The edge data center can be a collection of devices such as servers deployed on the edge. Provide users with corresponding business services on the edge, such as providing users with text recognition services. The edge data center represents the physical environment close to the user's device. Correspondingly, there is also a cloud data center, which can be a collection of equipment such as servers deployed on the cloud side. The cloud data center is usually farther from the user’s equipment than the edge data center. The cloud data center is dedicated to multiple regions. Of users provide cloud services. Generally, cloud data centers can have higher data processing performance (such as fast processing speed, high accuracy, etc.) than edge data centers, and can be used to provide better services than edge data centers For example, when the business service capabilities of the edge data center cannot meet the user's requirements, it can be handed over to the cloud data center for processing to meet the user's requirements. Or, the edge data center and the cloud data center can cooperate with each other to provide users with corresponding business services.

由于边缘数据中心对于图像中的文字的识别能力通常难以满足用户对于图像中的对象的识别精度、识别速度等方面的要求,因此,边缘数据中心可以将用户提供的图像通过远程通信转发给云数据中心,以便由云数据中心基于相应的深度学习算法识别图像中的文字,然后,由云数据中心将识别结果通过边缘数据中心传递给用户。例如,在文本翻译场景中,用户可以将包含一段英文文本的图像通过边缘数据中心发送至云数据中心;云数据中心可以识别出图像中的英文内容,并将识别出的英文内容再通过边缘数据中心传递给用户,用户再利用相应的翻译工具将接收到的英文内容翻译成中文文本。Because the edge data center's ability to recognize the text in the image is usually difficult to meet the user's requirements for the recognition accuracy and recognition speed of the object in the image, the edge data center can forward the image provided by the user to the cloud data through remote communication. Center, so that the cloud data center recognizes the text in the image based on the corresponding deep learning algorithm, and then the cloud data center transmits the recognition result to the user through the edge data center. For example, in a text translation scenario, users can send an image containing a piece of English text to the cloud data center through the edge data center; the cloud data center can identify the English content in the image, and pass the identified English content through the edge data The center delivers it to the user, who then uses the corresponding translation tool to translate the received English content into Chinese text.

但是,当用户提供的图像中包含敏感信息时,比如,用户的工作经历、家庭住址等隐私信息,该图像中的敏感信息可能会在云数据中心上发生泄漏,比如,云数据中心所识别出的结果在云端被窃取等。其中,敏感信息,可以是指用户不愿意发生泄露的信息,例如:可以是不当使用或未经授权被人接触/修改会不利于个人依法享有的个人隐私权的信息。However, when the image provided by the user contains sensitive information, such as the user’s work history, home address and other private information, the sensitive information in the image may be leaked on the cloud data center, for example, as identified by the cloud data center The result is stolen in the cloud, etc. Among them, sensitive information can refer to information that users are unwilling to leak, for example, it can be information that is improperly used or accessed or modified without authorization, which is not conducive to personal privacy rights enjoyed by individuals in accordance with the law.

为了降低目标图像中敏感信息被泄露的风险,部分用户选择在边缘数据中心购买并部署高性能的服务器,以使得边缘数据中心具有较高数据处理能力,这样,在边缘数据中心 上可以识别图像中的对象,并且对象的识别精度和效率通常可以满足用户的要求,同时,还可以避免在云数据中心进行对象识别所带来的敏感信息泄漏的风险。但是,购买高性能服务器会急剧增加用户的成本。而若使用数据处理能力较低的边缘数据中心识别图像中的对象,识别的速度慢、精度低,又通常难以达到用户要求。In order to reduce the risk of sensitive information being leaked in the target image, some users choose to purchase and deploy high-performance servers in the edge data center, so that the edge data center has higher data processing capabilities, so that the image can be identified in the edge data center. The accuracy and efficiency of object recognition can usually meet the requirements of users. At the same time, it can also avoid the risk of sensitive information leakage caused by object recognition in the cloud data center. However, purchasing high-performance servers will dramatically increase user costs. However, if the edge data center with low data processing capability is used to identify objects in the image, the recognition speed is slow, the accuracy is low, and it is usually difficult to meet user requirements.

为此,本申请实施例提供了一种对象识别方法,可以降低识别图像中对象时敏感信息发生泄露的风险。具体的,边缘数据中心可以获取包括多个对象的目标图像,并进一步确定出该目标图像对应的多个子图像,例如,边缘数据中心可以将目标图像裁剪成多个子图像等,其中,所确定出的每个子图像可以包括至少一个对象,然后,边缘数据中心可以将多个子图像通过远程通信发送给云数据中心,由云数据中心识别每个子图像中的对象,得到每个子图像对应的识别结果,并将其发送给边缘数据中心,以使得边缘数据中心基于每个子图像对应的识别结果获得针对该目标图像的识别结果。To this end, the embodiments of the present application provide an object recognition method, which can reduce the risk of leakage of sensitive information when recognizing objects in an image. Specifically, the edge data center may obtain a target image including multiple objects, and further determine multiple sub-images corresponding to the target image. For example, the edge data center may crop the target image into multiple sub-images, etc., where the determined Each sub-image of can include at least one object. Then, the edge data center can send multiple sub-images to the cloud data center through remote communication, and the cloud data center can identify the object in each sub-image, and obtain the recognition result corresponding to each sub-image. And send it to the edge data center, so that the edge data center obtains the recognition result for the target image based on the recognition result corresponding to each sub-image.

由于边缘数据中心向云数据中心发送的是目标图像对应的多个子图像,而并非是整张目标图像,因此,即使目标图像中包含敏感信息,云数据中心基于多个子图像所识别出的信息通常也只是敏感信息的各个部分,而无法获知敏感信息的各个部分的组合关系,这使得当云数据中心所识别出的敏感信息的各个部分发生泄漏时,由于各个部分之间存在多种可能的信息组合,从而难以从多种信息组合中确定出目标图像中的敏感信息,这就相当于敏感信息实际上并没有发生泄漏,进而可以降低对象识别过程中目标图像中的敏感信息发生泄漏的风险。Since the edge data center sends multiple sub-images corresponding to the target image to the cloud data center, rather than the entire target image, even if the target image contains sensitive information, the cloud data center usually identifies information based on multiple sub-images. It is only the parts of sensitive information, and the combination of the parts of sensitive information cannot be known. This makes that when the parts of sensitive information identified by the cloud data center are leaked, there are multiple possible information between each part. Therefore, it is difficult to determine the sensitive information in the target image from a variety of information combinations, which is equivalent to that the sensitive information is not actually leaked, thereby reducing the risk of leakage of the sensitive information in the target image during the object recognition process.

同时,识别子图像中对象的设备为数据处理能力较高的云数据中心,而不是边缘数据中心,这不仅可以使得对象的识别精度以及识别效率较高,而且,也无需要求用户在边缘侧部署高性能的服务器,降低了对于用户的硬件成本要求。At the same time, the device that recognizes the object in the sub-image is a cloud data center with higher data processing capabilities, rather than an edge data center. This not only makes the recognition accuracy and recognition efficiency of the object higher, but also does not require users to deploy on the edge. The high-performance server reduces the hardware cost requirements for users.

接下来,对对象识别的各种非限定性的具体实施方式进行详细描述。Next, various non-limiting specific implementations of object recognition will be described in detail.

参阅图2,为本申请实施例中一种对象识别方法的流程示意图。该方法可以应用于上述图1所示的应用场景中,当然也可以是应用于其它应用场景中,本实施例对此并不进行限定。示例性的,图2所示实施例中的第一识别系统,可以部署于上述图1中的边缘数据中心(或者部署于边缘数据中心和用户终端),例如,可以是边缘数据中心的服务器系统,也可以是一个软件系统,其以软件的形式部署于该边缘数据中心中的设备;图2所示实施例中的第二识别系统,可以部署于图1所示的云数据中心,例如,可以是云数据中心的服务器系统,也可以是一个软件系统,其以软件的形式部署于该云数据中心中的设备。图2所示的对象识别方法具体可以包括:Refer to FIG. 2, which is a schematic flowchart of an object recognition method in an embodiment of this application. This method can be applied to the application scenario shown in FIG. 1, of course, it can also be applied to other application scenarios, which is not limited in this embodiment. Exemplarily, the first identification system in the embodiment shown in FIG. 2 may be deployed in the edge data center (or deployed in the edge data center and user terminal) in the above-mentioned FIG. 1, for example, it may be a server system in the edge data center. , It can also be a software system that is deployed in the form of software on the equipment in the edge data center; the second identification system in the embodiment shown in Figure 2 can be deployed in the cloud data center shown in Figure 1, for example, It may be a server system in a cloud data center, or a software system, which is deployed in the form of software on devices in the cloud data center. The object recognition method shown in FIG. 2 may specifically include:

S201:第一识别系统获取目标图像,该目标图像包括多个对象。S201: The first recognition system acquires a target image, where the target image includes multiple objects.

本实施例中的对象识别,可以是指基于对象识别技术对目标图像中所包括的对象进行识别的过程。其中,所要识别的对象,可以是目标图像中的文字,例如中文、英文、数字、符号、公式等,相应的,当目标图像包括多个对象时,可以是该目标图像中包含多个、多段或者多种文字内容。可选的,所要识别的对象,也可以是指目标图像中的物体,如商标、元器件等,当然,还可以是其它类型的对象。The object recognition in this embodiment may refer to the process of recognizing the objects included in the target image based on the object recognition technology. Among them, the object to be recognized can be the text in the target image, such as Chinese, English, numbers, symbols, formulas, etc. Correspondingly, when the target image includes multiple objects, it can be that the target image contains multiple and multiple paragraphs. Or a variety of text content. Optionally, the object to be recognized may also refer to objects in the target image, such as trademarks, components, etc., of course, it may also be other types of objects.

在一些场景中,目标图像中的多个对象进行组合所表征的信息,可能是敏感信息。比 如,目标图像中可能包含某个人的姓名、家庭住址、手机号码以及学历等信息,这些信息均属于个人隐私信息等,也属于本实施例中的敏感信息。In some scenarios, the information represented by the combination of multiple objects in the target image may be sensitive information. For example, the target image may contain information such as a person's name, home address, mobile phone number, and educational background, which are all personal privacy information, etc., as well as sensitive information in this embodiment.

本实施例中,包含敏感信息的目标图像可能难以在第一识别系统中完成对象识别。比如,第一识别系统的负载较高,难以为用户提供目标图像的对象识别服务;又比如,第一识别系统的数据处理性能可能低于第二识别系统,若基于第一识别系统对目标图像进行对象识别,可能识别的精度以及效率均较低。因此,可以是由第二识别系统对目标图像进行对象识别。但是,由于目标图像中可能包含敏感信息,这使得若第一识别系统直接将目标图像发送至第二识别系统,则第二识别系统在目标图像上识别得到的敏感信息,如识别得到“张三”的家庭住址信息、手机号码以及学历等敏感信息,可能会在第二识别系统处发生泄漏,从而威胁“张三”的隐私安全。In this embodiment, the target image containing sensitive information may be difficult to complete object recognition in the first recognition system. For example, the load of the first recognition system is high, and it is difficult to provide users with object recognition services for the target image; for example, the data processing performance of the first recognition system may be lower than that of the second recognition system. For object recognition, the accuracy and efficiency of possible recognition are low. Therefore, the second recognition system may perform object recognition on the target image. However, because the target image may contain sensitive information, if the first recognition system directly sends the target image to the second recognition system, the second recognition system will recognize the sensitive information on the target image, such as "Zhang San Sensitive information such as ""'s home address information, mobile phone number, and educational background may be leaked at the second identification system, thereby threatening "Zhang San"'s privacy.

为此,第一识别系统在获取到目标图像后,还可以继续执行步骤S202及其后续步骤,以实现在完成对象识别的同时,降低敏感信息发生泄漏的风险。需要说明的是,当目标图像不包含敏感信息时,也可以是采用本实施例的技术方案进行对象识别。For this reason, after acquiring the target image, the first recognition system may continue to perform step S202 and subsequent steps, so as to reduce the risk of leakage of sensitive information while completing object recognition. It should be noted that when the target image does not contain sensitive information, the technical solution of this embodiment may also be used for object recognition.

作为一种示例,第一识别系统可以是基于敏感指示信息确定目标图像是否包含敏感信息。具体的,用户可以向第一识别系统上传目标图像,同时,用户还可以上传该目标图像对应的敏感指示信息,该敏感指示信息例如可以是为该目标图像添加的敏感标签等,可以用于指示目标图像中是否包含敏感信息,从而第一识别系统可以根据接收到的敏感指示信息确定目标对象包含敏感信息,并针对该目标图像执行后续的处理过程。As an example, the first recognition system may determine whether the target image contains sensitive information based on the sensitive indication information. Specifically, the user can upload the target image to the first recognition system. At the same time, the user can also upload the sensitive indication information corresponding to the target image. The sensitive indication information may be, for example, a sensitive label added to the target image, which can be used to indicate Whether the target image contains sensitive information, the first recognition system can determine that the target object contains sensitive information according to the received sensitive indication information, and perform subsequent processing on the target image.

可选的,第一识别系统也可以为用户提供两种机制的对象识别服务,分别为对象识别服务1以及对象识别服务2,其中,对象识别服务1可以用于识别包含敏感信息的图像中的对象,对象识别服务2可以用于识别不包含敏感信息的图像中的对象。这样,用户可以根据图像中是否包含敏感信息确定在第一识别系统上选择哪种对象识别服务。当用户选择对象识别服务1时,第一识别系统可以采用本实施例中所述的对象识别过程完成对图像中对象的识别,而当用户选择对象识别服务2时,第一识别系统可以直接将图像发送至第二识别系统完成对象识别。Optionally, the first recognition system can also provide users with object recognition services of two mechanisms, namely object recognition service 1 and object recognition service 2, where object recognition service 1 can be used to identify objects in images containing sensitive information. Objects, object recognition service 2 can be used to identify objects in images that do not contain sensitive information. In this way, the user can determine which object recognition service to choose on the first recognition system according to whether the image contains sensitive information. When the user selects object recognition service 1, the first recognition system can use the object recognition process described in this embodiment to complete the recognition of objects in the image, and when the user selects object recognition service 2, the first recognition system can directly The image is sent to the second recognition system to complete object recognition.

S202:第一识别系统可以确定该目标图像对应的多个子图像,其中,每个子图像可以包括至少一个对象。S202: The first recognition system may determine multiple sub-images corresponding to the target image, where each sub-image may include at least one object.

第一识别系统在获得目标图像后,可以进一步确定出该目标图像对应的多个子图像。每个子图像可以是该目标图像的一部分,并且,每个子图像可以包括至少一个对象,相应的,当目标图像包含由多个对象所组成的敏感信息时,该敏感信息的各个组成部分可以分别位于不同的子图像中。After obtaining the target image, the first recognition system may further determine multiple sub-images corresponding to the target image. Each sub-image can be a part of the target image, and each sub-image can include at least one object. Correspondingly, when the target image contains sensitive information composed of multiple objects, each component of the sensitive information can be located separately Different sub-images.

在一种可能的实施方式中,第一识别系统可以先获取目标图像上的多个对象分别在目标图像上的像素位置,并根据每个对象各自对应的在目标图像上的像素位置对目标图像进行裁剪,以此可以得到多个子图像。示例性的,对象在目标图像上的像素位置,例如可以是该对象在目标图像上的中心像素点的坐标,从而第一识别系统根据该中心像素点的坐标可以确定距离中心像素点一定像素范围内的像素点均属于该对象在目标图像上的像素点,以此可以得到该对象在目标图像上的图像的像素区域;或者,该像素位置也可以是该对象在目标图像上的图像的顶点位置,如图3所示,每一行可以代表一个对象在目标图像上的图 像的矩形框位置,依次表示矩形框左上角的横坐标(如图3中的32、203等)、纵坐标(如图3中的162、124等),和右下角的横坐标(如图3中的165、379等)、纵坐标(如图3中的182、168等)。当然,像素位置也可以表现为其它形式,本实施例对此并不进行限定。然后,第一识别系统可以根据各个对象在目标图像上的像素位置,对目标图像进行裁剪,以此可以得到目标图像对应的多个子图像。In a possible implementation, the first recognition system may first obtain the pixel positions of multiple objects on the target image on the target image, and compare the pixel positions of each object on the target image to the target image. By cropping, multiple sub-images can be obtained. Exemplarily, the pixel position of the object on the target image may be, for example, the coordinates of the center pixel point of the object on the target image, so that the first recognition system can determine a certain pixel range from the center pixel point according to the coordinates of the center pixel point The pixels within belong to the pixel points of the object on the target image, so that the pixel area of the image of the object on the target image can be obtained; or, the pixel position can also be the vertex of the image of the object on the target image Position, as shown in Figure 3, each row can represent the position of the rectangular frame of an object on the target image, which in turn represents the abscissa (32, 203, etc. in Figure 3) and the ordinate (such as 162, 124, etc. in Fig. 3), and the abscissa (165, 379, etc. in Fig. 3) and ordinate (182, 168, etc. in Fig. 3) in the lower right corner. Of course, the pixel position can also be expressed in other forms, which is not limited in this embodiment. Then, the first recognition system can crop the target image according to the pixel position of each object on the target image, so that multiple sub-images corresponding to the target image can be obtained.

作为一种确定像素位置的示例,第一识别系统可以是利用在其上配置的对象检测算法识别得到各个对象在目标图像上的像素位置。但是,在一些场景中,第一识别系统检测到的像素位置的精度可能较低,如第一识别系统在被部署于边缘数据中心时,基于边缘数据中心的数据处理性能的限制,第一识别系统难以准确、快速的检测出对象在目标图像中的像素位置,从而第一识别系统对目标图像中的对象进行检测时,可能存在检测精度不高、检测速度较慢的问题。As an example of determining the pixel position, the first recognition system may use an object detection algorithm configured on it to recognize the pixel position of each object on the target image. However, in some scenarios, the accuracy of the pixel positions detected by the first recognition system may be low. For example, when the first recognition system is deployed in an edge data center, due to the limitation of the data processing performance of the edge data center, the first recognition system It is difficult for the system to accurately and quickly detect the pixel position of the object in the target image, so when the first recognition system detects the object in the target image, there may be problems of low detection accuracy and slow detection speed.

基于此,在另一种确定像素位置的示例中,也可以是由数据处理性能较高的第二识别系统检测出各个对象所对应的像素位置,以提高像素位置的检测精度。比如,第一识别系统可以将目标图像发送给第二识别系统;而第二识别系统可以具有较高的数据处理性能,能够支持精度较高的对象检测算法运行,因此,第二识别系统可以快速检测出多个对象在目标图像上的像素位置,并且像素位置的检测精度较高,然后,第二识别系统可以将其反馈给第一识别系统,以便于第一识别系统能够获得检测精度较高的像素位置。Based on this, in another example of determining the pixel position, the second recognition system with higher data processing performance may also detect the pixel position corresponding to each object, so as to improve the detection accuracy of the pixel position. For example, the first recognition system can send the target image to the second recognition system; and the second recognition system can have high data processing performance and can support the operation of high-precision object detection algorithms. Therefore, the second recognition system can quickly The pixel positions of multiple objects on the target image are detected, and the detection accuracy of the pixel positions is high, and then the second recognition system can feed it back to the first recognition system, so that the first recognition system can obtain high detection accuracy The pixel position.

但是,当目标图像上包含敏感信息时,若将该目标图像发送给第二识别系统,则该目标图像上的敏感信息可能会在第二识别系统上发生泄漏,比如,当非法用户在第二识别系统上窃取该目标图像后,该目标图像上的敏感信息会被非法用户获知,从而造成敏感信息的泄漏。或者,在第一识别系统将目标图像发送至第二识别系统的过程中(例如通信链路中)也容易发生敏感信息泄露。However, when the target image contains sensitive information, if the target image is sent to the second recognition system, the sensitive information on the target image may be leaked on the second recognition system, for example, when an illegal user is in the second recognition system. After the target image is stolen on the recognition system, the sensitive information on the target image will be known by illegal users, which will cause the leakage of sensitive information. Or, in the process of sending the target image by the first recognition system to the second recognition system (for example, in the communication link), leakage of sensitive information may easily occur.

因此,在又一种确定像素位置的示例中,第一识别系统可以是先对目标图像进行变换处理,得到变换图像。具体的,第一识别系统可以利用预设的对象检测算法或对象检测模型检测出目标图像上的多个对象,并对所检测出的对象进行变换,例如可以是对象进行替换、加密以及掩码等处理中的任意一种或多种,经过变换处理后的对象可以称之为变换对象,而经过变换处理后的目标图像可以称之为变换图像,从而多个对象组成的敏感信息可以因对象发生变换而变成非敏感信息,以此可以实现信息的脱敏,这样,即使非法用户窃取经过变换处理后的目标图像(也即为变换图像),由于经过变换处理后的目标图像上可以不包含该敏感信息,因此,目标图像上原有的敏感信息可以不会被非法用户所获知。Therefore, in yet another example of determining the pixel position, the first recognition system may first perform transformation processing on the target image to obtain the transformed image. Specifically, the first recognition system can use a preset object detection algorithm or object detection model to detect multiple objects on the target image, and transform the detected objects, such as object replacement, encryption, and masking. For any one or more of the processing, the object after the transformation processing can be called the transformation object, and the target image after the transformation processing can be called the transformation image, so that the sensitive information composed of multiple objects can be changed according to the object. It is transformed into non-sensitive information, which can realize the desensitization of information. In this way, even if an illegal user steals the target image (that is, the transformed image) after the transformation process, the target image after the transformation process can not be displayed. Contains the sensitive information, therefore, the original sensitive information on the target image may not be known by illegal users.

然后,第一识别系统可以向第二识别系统发送该变换图像。第二识别系统可以采用预设的深度学习算法对接收到的变换图像进行对象检测,确定各个变换对象在变换图像上的像素位置,并将该像素位置返回给边缘数据中心。值得注意的是,在对目标图像进行变换处理后,目标图像上的对象与变换图像上的变换对象通常在内容上存在差异,但是变换对象在变换图像上的像素位置可以与对象在目标图像上的像素位置相同,或者两个像素位置之间存在一定的对应关系。这样,基于变换对象在变换图像上的像素位置,可以确定出目标图像中各个对象在目标图像上的像素位置。Then, the first recognition system can send the transformed image to the second recognition system. The second recognition system may use a preset deep learning algorithm to perform object detection on the received transformed image, determine the pixel position of each transformed object on the transformed image, and return the pixel position to the edge data center. It is worth noting that after the target image is transformed, there is usually a difference in content between the object on the target image and the transformed object on the transformed image, but the pixel position of the transformed object on the transformed image can be the same as the object on the target image. The pixel positions of are the same, or there is a certain correspondence between the two pixel positions. In this way, based on the pixel position of the transformed object on the transformed image, the pixel position of each object in the target image on the target image can be determined.

第一识别系统在确定出目标图像中的对象在目标图像上的像素位置,并基于该像素位 置对目标图像裁剪得到多个子图像后,可以继续执行后续步骤S203,将多个子图像发送给第二识别系统,以便于在第二识别系统上进行对象识别。After the first recognition system determines the pixel position of the object in the target image on the target image, and crops the target image based on the pixel position to obtain multiple sub-images, it can continue to perform the subsequent step S203 and send the multiple sub-images to the second Recognition system to facilitate object recognition on the second recognition system.

值得注意的是,当第二识别系统的数据处理性能相对于第一识别系统的数据处理性能较高时,第二识别系统基于其上配置的高精度的深度学习算法所检测出的对象可以更加全面,即第二识别系统除了可以更为精确的检测出变换对象的像素位置以外,还可以检测出遗漏对象在变换图像上的像素位置,该遗漏对象可以为第一识别系统基于其对象检测算法精度的限制而未能检测出的对象,从而第一识别系统可以根据第二识别系统所返回的像素位置,校正目标图像中所包含的多个对象,并可以得到精度相对较高的各个对象在目标图像上的像素位置。It is worth noting that when the data processing performance of the second recognition system is higher than that of the first recognition system, the objects detected by the second recognition system based on the high-precision deep learning algorithm configured on it can be better. Comprehensive, that is, in addition to detecting the pixel position of the transformed object more accurately, the second recognition system can also detect the pixel position of the missing object on the transformed image. The missing object can be the first recognition system based on its object detection algorithm Objects that cannot be detected due to the limitation of accuracy, so that the first recognition system can correct multiple objects contained in the target image according to the pixel positions returned by the second recognition system, and can obtain relatively high-precision objects in each object. The pixel location on the target image.

S203:第一识别系统通过远程通信向第二识别系统发送目标图像对应的多个子图像。S203: The first recognition system sends multiple sub-images corresponding to the target image to the second recognition system through remote communication.

本实施例中,第一识别系统可以与第二识别系统进行远程通信,如基于超文本传输协议(Hyper Text Transfer Protocol,HTTP)进行通信等,并基于预设顺序将目标图像对应的多个子图像发送给第二识别系统,如图2所示。由于第一识别系统向第二识别系统发送的并非是整张目标图像,而是目标图像的多个子图像,这使得目标图像上即使包含敏感信息并且目标对象的多个子图像传输至第二识别系统的过程被非法用户窃取,由于非法用户并不能获知各个子图像之间的组合关系,因此,非法用户也难以将各个子图像上的信息组合成目标图像中包括的敏感信息,从而可以降低敏感信息在传输至第二识别系统的过程中被泄露的风险。In this embodiment, the first recognition system can perform remote communication with the second recognition system, such as communication based on HyperText Transfer Protocol (HTTP), etc., and multiple sub-images corresponding to the target image based on a preset sequence Send to the second identification system, as shown in Figure 2. Since what the first recognition system sends to the second recognition system is not the entire target image, but multiple sub-images of the target image, which makes the target image contain sensitive information and multiple sub-images of the target object are transmitted to the second recognition system The process is stolen by illegal users. Because illegal users cannot know the combination relationship between each sub-image, it is also difficult for illegal users to combine the information on each sub-image into the sensitive information included in the target image, which can reduce the sensitive information. Risk of leakage during transmission to the second identification system.

值得注意的是,本实施例中的目标图像,可以是一个图像,而在一些场景中,目标图像也可以包括多个图像。以目标图像至少包括第一图像以及第二图像为例(目标图像也可以包括三个或者三个以上的图像),此时,目标图像对应的多个子图像,可以包括第一图像对应的至少一个子图像以及第二图像对应的至少一个子图像。第一图像以及第二图像,可以均包含有敏感信息,也可以是其中一个图像包含敏感信息,而另一个图像不包含敏感信息。这样,将第一图像的子图像与第二图像的子图像混合发送给第二识别系统,可以进一步增加基于不同图像的子图像组合得到各个图像上的敏感信息的难度,降低敏感信息被泄露的风险。当然,第一图像与第二图像也可以均不包含敏感信息,本实施例对此并不进行限定。It is worth noting that the target image in this embodiment may be one image, and in some scenes, the target image may also include multiple images. Taking the target image at least including the first image and the second image as an example (the target image may also include three or more images), at this time, the multiple sub-images corresponding to the target image may include at least one corresponding to the first image The sub-image and at least one sub-image corresponding to the second image. The first image and the second image may both contain sensitive information, or one of the images may contain sensitive information while the other image does not contain sensitive information. In this way, the sub-image of the first image and the sub-image of the second image are mixed and sent to the second recognition system, which can further increase the difficulty of obtaining sensitive information on each image based on the combination of sub-images of different images, and reduce the leakage of sensitive information. risk. Of course, neither the first image nor the second image may contain sensitive information, which is not limited in this embodiment.

S204:第二识别系统识别每个子图像中的对象,得到针对多个子图像的第一识别结果,该第一识别结果中包括多个对象的识别结果。S204: The second recognition system recognizes an object in each sub-image, and obtains a first recognition result for multiple sub-images, and the first recognition result includes recognition results of multiple objects.

第二识别系统在接收到多个子图像后,可以利用高精度的对象识别算法或者对象识别模型,对每个子图像中的对象进行识别,例如,当对象具体为文字时,第二识别系统可以采用高精度的长短期记忆网络(long short term memory,LSTM)等算法进行文字识别等,以此可以得到每个子图像中对象的识别结果,从而可以得到多个子图像的第一识别结果,该第一识别结果即为各个子图像中对象的识别结果的集合。并且,第二识别系统可以支持高精度的对象识别算法或者对象识别模型(比如第二识别结果可以被部署于云数据中心,数据处理性能较高等),从而第二识别系统对多个子图像进行对象识别所得到的第一识别结果通常可以达到较高的精度。After receiving multiple sub-images, the second recognition system can use high-precision object recognition algorithms or object recognition models to recognize objects in each sub-image. For example, when the object is specifically a text, the second recognition system can use High-precision long-short-term memory (LSTM) and other algorithms perform text recognition, etc., so that the recognition result of the object in each sub-image can be obtained, so that the first recognition result of multiple sub-images can be obtained. The recognition result is the collection of the recognition results of the objects in each sub-image. In addition, the second recognition system can support high-precision object recognition algorithms or object recognition models (for example, the second recognition result can be deployed in a cloud data center with high data processing performance, etc.), so that the second recognition system performs object recognition on multiple sub-images. The first recognition result obtained by the recognition can usually achieve higher accuracy.

示例性的,第二识别系统可以利用其上的多个进程并行识别多个子图像中的对象,比 如,利用进程1识别子图像1中的对象,利用进程2识别子图像2中的对象等,这相比于串行识别各个子图像中对象的实施方式中,对象识别效率可以得到有效提高。Exemplarily, the second recognition system may use multiple processes on it to recognize objects in multiple sub-images in parallel, for example, use process 1 to recognize objects in sub-image 1, use process 2 to recognize objects in sub-image 2, etc. Compared with the implementation of serially recognizing objects in each sub-image, the object recognition efficiency can be effectively improved.

如图5以及图6所示,第一识别系统可以部署于一个设备中,也可以是部署于多个设备中(如图6所示的设备1以及设备2)。当第一识别系统部署于一个设备中时,可以是由该设备完成对变换对象在变换图像中的像素位置的检测以及目标图像中的对象的识别;而当第一识别系统部署于多个设备中时,可以是由设备1完成对变换对象在变换图像中的像素位置的检测,由设备2完成对目标图像中的对象的识别,本实施例对此并不进行限定。As shown in FIG. 5 and FIG. 6, the first identification system can be deployed in one device or in multiple devices (device 1 and device 2 shown in FIG. 6). When the first identification system is deployed in one device, the device can complete the detection of the pixel position of the transformed object in the transformed image and the identification of the object in the target image; and when the first identification system is deployed in multiple devices In the middle, it may be that the device 1 completes the detection of the pixel position of the transformed object in the transformed image, and the device 2 completes the identification of the object in the target image, which is not limited in this embodiment.

S205:第二识别系统通过远程通信将第一识别结果返回给第一识别系统。S205: The second recognition system returns the first recognition result to the first recognition system through remote communication.

如图2所示,第二识别系统可以将识别得到的第一识别结果返回给第一识别系统。As shown in FIG. 2, the second recognition system may return the first recognition result obtained by the recognition to the first recognition system.

在进一步可能的实施方式中,为便于第一识别系统确定目标图像的各个子图像分别对应于哪个识别结果,第一识别系统可以基于预设顺序向第二识别系统发送多个子图像,而第二识别系统在接收目标图像的多个子图像时可以记录各个子图像的接收顺序,然后按照各个子图像的接收顺序依次返回各个子图像对应的识别结果。这样,第一识别系统可以确定第一个接收到的识别结果为第一个发送的子图像所对应的识别结果,第二个接收到的识别结果为第二个发送的子图像所对应的识别结果,以此类推。当然,第一识别系统以及第二识别系统也可以是协商采用其它的顺序对应规则,如第一识别系统第一个接收到的识别结果为第二识别系统最后一个发送的子图像所对应的识别结果,第一识别系统第二个接收到的识别结果为第二识别系统倒数第二个发送的子图像所对应的识别结果等。In a further possible implementation, to facilitate the first recognition system to determine which recognition result each sub-image of the target image corresponds to, the first recognition system may send multiple sub-images to the second recognition system based on a preset sequence, and the second recognition system The recognition system can record the receiving order of each sub-image when receiving multiple sub-images of the target image, and then return the recognition result corresponding to each sub-image in turn according to the receiving order of each sub-image. In this way, the first recognition system can determine that the first received recognition result is the recognition result corresponding to the first sent sub-image, and the second received recognition result is the recognition corresponding to the second sent sub-image The result, and so on. Of course, the first recognition system and the second recognition system can also negotiate other order correspondence rules. For example, the first recognition result received by the first recognition system is the recognition corresponding to the last sub-image sent by the second recognition system. As a result, the second recognition result received by the first recognition system is the recognition result corresponding to the second-to-last sub-image sent by the second recognition system, etc.

除了通过子图像与识别结果的收发顺序来确定其对应关系以外,在其它可能的实施方式中,第一识别系统也可以是为每个子图像分配一个图像标识,并将其与子图像一并发送给第二识别系统,这样,第二识别系统在确定出子图像中的对象的识别结果后,可以建立该图像标识与识别结果之间的对应关系,以此可以得到每个子图像的图像标识与该子图像的识别结果之间的对应关系,从而可以将该对应关系与第一识别结果一并返回给第一识别系统,从而第一识别系统根据该对应关系,确定每个子图像对应于哪个识别结果,无需对第二识别系统发送识别结果的顺序做出要求。In addition to determining the corresponding relationship between the sub-images and the recognition results in the order of receiving and sending them, in other possible implementations, the first recognition system may also assign an image identifier to each sub-image and send it together with the sub-image. For the second recognition system, in this way, after the second recognition system determines the recognition result of the object in the sub-image, it can establish the corresponding relationship between the image identifier and the recognition result, so that the image identifier and the recognition result of each sub-image can be obtained. The corresponding relationship between the recognition results of the sub-images, so that the corresponding relationship and the first recognition result can be returned to the first recognition system together, so that the first recognition system determines which recognition each sub-image corresponds to according to the corresponding relationship As a result, there is no need to make requirements for the order in which the second recognition system sends the recognition results.

S206:第一识别系统根据接收到的第一识别结果以及多个子图像中的对象在目标图像上的位置关系,确定针对该目标图像的第二识别结果。S206: The first recognition system determines a second recognition result for the target image according to the received first recognition result and the positional relationship of the objects in the multiple sub-images on the target image.

第一识别系统在接收到第一识别结果后,可以获取多个子图像中的对象在目标图像上的位置关系,该位置关系可以反映不同对象之间的组合关系,并且第一识别系统裁剪目标图像时可以将其记录在本地,从而第一识别系统可以根据该位置关系对第一识别结果中各个子图像对应的识别结果进行组合,得到针对该目标图像的第二识别结果,如图2所示,该第二识别结果可以体现目标图像中所包含的信息。举例来说,假设第一识别系统所接收到的第一识别结果包括“张三”、“李四”、“硕士”、“博士”、“A街道”、“C街道”、“B小区”、“D小区”、“123XXXX8901”、“123XXXX1098”,则第一识别系统根据如图4左侧所示的多个子图像中的对象在目标图像上的位置关系,确定出的第二识别结果可以为“张三,学历为硕士,家庭住址为A街道B小区,电话号码为123XXXX8901”,以及“李四,学历为博士,家庭住址为C街道D小区,电话号码为123XXXX1098”,如图4右侧所示。After receiving the first recognition result, the first recognition system can obtain the positional relationship of the objects in the multiple sub-images on the target image, and the positional relationship can reflect the combination relationship between different objects, and the first recognition system crops the target image It can be recorded locally, so that the first recognition system can combine the recognition results corresponding to each sub-image in the first recognition result according to the position relationship to obtain the second recognition result for the target image, as shown in Figure 2. , The second recognition result can reflect the information contained in the target image. For example, suppose that the first recognition result received by the first recognition system includes "Zhang San", "Li Si", "Master", "Doctor", "A Street", "C Street", and "B Community" , "D cell", "123XXXX8901", "123XXXX1098", the first recognition system determines the second recognition result according to the position relationship of the objects in the multiple sub-images on the target image as shown on the left side of FIG. 4 It is "Zhang San, with a master's degree in education, and his home address is 123XXXX8901 in Sub-District B, and the phone number is 123XXXX8901", and "Li Si, with a Ph.D degree in his education, his home address is in Sub-District C, Street D, and his phone number is 123XXXX1098", as shown on the right in Figure 4 Side shown.

作为一种示例,第一识别系统可以是利用预设的软件开发工具包(software development kit,SDK)整合各个子图像中的对象在目标图像中的位置以及相应的识别结果,从目标图像中提取出结构化数据,如提取出如图4右侧所示的结构化数据等。As an example, the first recognition system may use a preset software development kit (SDK) to integrate the position of the object in each sub-image in the target image and the corresponding recognition result, and extract from the target image The structured data is extracted, such as the structured data shown on the right side of Figure 4, etc.

由于是在第一识别系统上得到针对目标图像的第二识别结果,因此,即使目标图像上包含敏感信息,该敏感信息也保存在第一识别系统中,而难以在第二识别系统处发生泄漏。例如,当第一识别系统部署于客户边缘侧的边缘数据中心,而第二识别系统部署于云侧的云数据中心时,完整的敏感信息可以仅在客户边缘侧,而不会出现在云侧,敏感信息被泄漏的风险相对较低。进一步的,客户边缘侧可以将提取的敏感信息(如结构化数据)返回给用户,如图3以及图4所示,用户可以只感知到与客户边缘侧之间的交互,无需与云侧进行交互,对于用户而言,相当于在客户边缘侧完成了对目标图像中对象的识别,而且,不仅识别的精度较高,而且,识别得到的敏感信息被泄露的风险也较低。Because the second recognition result for the target image is obtained on the first recognition system, even if the target image contains sensitive information, the sensitive information is also stored in the first recognition system, and it is difficult to leak at the second recognition system . For example, when the first identification system is deployed in the edge data center on the customer edge side, and the second identification system is deployed in the cloud data center on the cloud side, the complete sensitive information can only be on the customer edge side, but not on the cloud side. , The risk of sensitive information being leaked is relatively low. Further, the customer edge side can return the extracted sensitive information (such as structured data) to the user, as shown in Figure 3 and Figure 4, the user can only perceive the interaction with the customer edge side, and there is no need to interact with the cloud side. Interaction, for the user, is equivalent to completing the recognition of the object in the target image at the edge of the customer, and not only the recognition accuracy is high, but the risk of the sensitive information obtained by the recognition is also low.

另外,第一识别系统可以利用其上的多个进程,并行处理多个图像的对象识别过程,比如,第一识别系统可以利用进程1执行对目标图像的对象识别过程,可以包括上述对目标图像的变换处理、裁剪以及结构化数据的提取等,利用进程2执行对另一图像的对象识别过程,包括采用上述类似的实现方式对该图像进行变换处理、裁剪以及结构化数据提取等,以此可以在第一识别系统上提高识别多个图像中的对象的效率。In addition, the first recognition system can use multiple processes on it to process the object recognition process of multiple images in parallel. For example, the first recognition system can use process 1 to perform the object recognition process of the target image, which may include the above-mentioned target image recognition process. The transformation processing, cropping, and structured data extraction, etc., use process 2 to perform the object recognition process of another image, including the transformation processing, cropping, and structured data extraction of the image using the above-mentioned similar implementation methods. The efficiency of recognizing objects in multiple images can be improved on the first recognition system.

为便于理解,下面结合对象具体为文字的场景示例,对本申请实施例的技术方案进行介绍。并且,在该场景中,第一识别系统可以部署于边缘数据中心,第二识别系统可以部署于云数据中心。如图5所示,为本申请实施例中结合具体场景的对象识别方法的流程示意图,该方法具体可以包括:For ease of understanding, the technical solutions of the embodiments of the present application will be introduced below in conjunction with an example of a scene where the object is specifically a text. Moreover, in this scenario, the first identification system can be deployed in an edge data center, and the second identification system can be deployed in a cloud data center. As shown in FIG. 5, this is a schematic flowchart of an object recognition method combined with a specific scene in an embodiment of this application, and the method may specifically include:

S501:用户向边缘数据中心上传目标图像,该目标图像中包含多段文字。S501: The user uploads a target image to the edge data center, and the target image contains multiple paragraphs of text.

其中,目标图像中的多段文字进行组合所得到的信息,可以属于前述实施例所述的敏感信息。比如,当目标图像中的多段文字包括“张三”(姓名)、“XX市XX街道XX小区”(家庭住址)、“135XXXXXXXX”(手机号码)以及“硕士”(学历)这些文字内容时,“张三”与“XX市XX街道XX小区”进行组合,可以表征名为“张三”这个人的具体家庭住址信息;“张三”与“135XXXXXXXX”进行组合,可以表征“张三”的手机号码信息;“张三”与“硕士”进行组合,可以表征“张三”的学历信息等,而这些信息均为“张三”的个人隐私信息,也属于本实施例中的敏感信息。当然,目标图像中的多个对象,也可以是更细粒度的划分,比如,可以是将上述家庭住址信息拆分为多个对象等,则,上述目标图像中的多个对象也可以是包括“张三”、“XX市”、“XX街道”、“XX小区”、“135XXXXXXXX”(该手机号码也可以拆分为多个对象)以及“硕士”等。对于目标图像中对象的划分方式,本实施例并不进行限定。Wherein, the information obtained by combining multiple paragraphs of text in the target image may belong to the sensitive information described in the foregoing embodiment. For example, when multiple paragraphs of text in the target image include "Zhang San" (name), "XX community, XX street, XX city" (home address), "135XXXXXXXX" (mobile phone number), and "Master" (educational background). The combination of "Zhang San" and "XX Community, XX Street, XX City" can characterize the specific home address information of the person named "Zhang San"; the combination of "Zhang San" and "135XXXXXXXX" can characterize "Zhang San" Mobile phone number information; the combination of "Zhang San" and "Master" can characterize the academic information of "Zhang San", etc., and these information are all personal privacy information of "Zhang San" and also belong to the sensitive information in this embodiment. Of course, multiple objects in the target image can also be divided into a more fine-grained manner. For example, the above-mentioned home address information can be split into multiple objects. Then, the multiple objects in the above-mentioned target image can also include "Zhang San", "XX City", "XX Street", "XX Community", "135XXXXXXXX" (the phone number can also be split into multiple objects), and "Master", etc. The method for dividing objects in the target image is not limited in this embodiment.

示例性的,用户可以是通过用户终端或者客户端向边缘数据中心上传目标图像等。进一步的,用户在上传目标图像时,还可以上传该目标图像对应的敏感指示信息,从而边缘数据中心可以根据该敏感指示信息确定目标图像中包含敏感信息。Exemplarily, the user may upload a target image to the edge data center through a user terminal or a client. Further, when uploading a target image, the user can also upload sensitive indication information corresponding to the target image, so that the edge data center can determine that the target image contains sensitive information according to the sensitive indication information.

S502:边缘数据中心对接收到的目标图像上的多段文字进行文字替换,得到替换文字在变换图像上的像素坐标以及变换图像。S502: The edge data center performs text replacement on multiple segments of text on the received target image to obtain pixel coordinates of the replacement text on the transformed image and the transformed image.

具体实现时,边缘数据中心可以利用预设的文字检测算法,如MSER(Maximally Stable  Extremal Regions)算法等,对目标图像上的多段文字进行检测。当然,边缘数据中心也可以是采用其它算法进行文字检测,本实施例对此并不进行限定。然后,边缘数据中心可以对检测到的文字进行替换。其中,替换,是指将目标图像上的内容替换为其它内容,如可以是将如图4所示的手机号码由“123XXXX8901”替换成“00000000000”等。目标图像上的文字被替换后,所得到的新的图像为步骤S502的变换图像,而替换后的文字在变换图像中的像素位置,与替换之前的文字在目标图像中的像素位置,可以保持一致。本实施例中,替换后的文字在变换图像中的像素位置,可以表现为该文字在变换图像中的像素坐标。In specific implementation, the edge data center can use preset text detection algorithms, such as the MSER (Maximally Stable Extremal Regions) algorithm, etc., to detect multiple segments of text on the target image. Of course, the edge data center may also use other algorithms for text detection, which is not limited in this embodiment. Then, the edge data center can replace the detected text. Among them, replacement refers to replacing the content on the target image with other content, such as replacing the mobile phone number shown in FIG. 4 from "123XXXX8901" to "00000000000", etc. After the text on the target image is replaced, the new image obtained is the transformed image in step S502, and the pixel position of the replaced text in the transformed image and the pixel position of the text before the replacement in the target image can be maintained Unanimous. In this embodiment, the pixel position of the replaced text in the transformed image can be expressed as the pixel coordinates of the text in the transformed image.

值得注意的是,边缘数据中心对目标图像进行变换处理时,除了可以是对目标图像中的文字进行替换,也可以是对目标图像中的文字进行加密、掩码等处理。其中,加密,是指利用相应的加密算法对目标图像上的内容进行加密,如可以是将如图4所示的手机号码由“123XXXX8901”加密成“234XXXX90123”;掩码,是指使用掩码遮掩目标图像上对象的部分信息并保留剩余信息,同时对象信息的长度保持不变,如可以是使用掩码遮掩如图4所示的手机号码“123XXXX8901”,遮掩后的手机号码为“123******01”。当然,变换处理也可以是其它处理过程,如重排(按照一定的顺序打乱信息)等,本实施例对此并不进行限定。It is worth noting that when the edge data center transforms the target image, it can not only replace the text in the target image, but also encrypt and mask the text in the target image. Among them, encryption refers to the use of corresponding encryption algorithms to encrypt the content on the target image. For example, the mobile phone number shown in Figure 4 can be encrypted from "123XXXX8901" to "234XXXX90123"; mask refers to using a mask Mask part of the object information on the target image and retain the remaining information, while the length of the object information remains unchanged. For example, a mask can be used to mask the mobile phone number "123XXXX8901" as shown in Figure 4, and the masked mobile phone number is "123* *****01". Of course, the transformation processing may also be other processing procedures, such as rearrangement (disrupting information in a certain order), etc., which is not limited in this embodiment.

进一步的,边缘数据中心还可以通过随机算法对目标图像上的文字进行随机替换,例如可以是为每个文字计算其对应的随机概率,当该文字的随机概率大于预设值时,可以对该文字进行替换,否则不进行替换,以此可以增加脱敏图像的复原难度。当然,也可以按照一定的规律对目标图像上的文字进行替换,本实施例对此并不进行限定。值得注意的是,本实施例中所述的替换后的文字,可以是指变换图像上实际未被替换的文字(如随机概率值小于预设值的文字)以及被替换的文字。Further, the edge data center can also randomly replace the text on the target image through a random algorithm. For example, it can calculate the corresponding random probability for each text. When the random probability of the text is greater than a preset value, the text can be The text is replaced, otherwise it will not be replaced, which can increase the difficulty of restoring the desensitized image. Of course, the text on the target image can also be replaced according to a certain rule, which is not limited in this embodiment. It is worth noting that the replaced text in this embodiment may refer to text that has not been replaced on the transformed image (for example, text with a random probability value less than a preset value) and replaced text.

S503:边缘数据中心通过远程通信将变换图像发送给云数据中心。S503: The edge data center sends the transformed image to the cloud data center through remote communication.

当目标图像上包含敏感信息时,若边缘数据中心直接将该目标图像发送给云数据中心,则该敏感信息在目标图像的传输过程中以及在云数据中心上发生泄漏的风险较高。因此,本实施例中,边缘数据中心可以将目标图像进行变换处理,具体是对目标图像上的文字进行替换,并将变换处理得到的变换图像发送给云数据中心,以便云数据中心确定出变换图像上的各段文字的像素位置。When the target image contains sensitive information, if the edge data center directly sends the target image to the cloud data center, the risk of leakage of the sensitive information during the transmission of the target image and on the cloud data center is high. Therefore, in this embodiment, the edge data center can transform the target image, specifically replacing the text on the target image, and send the transformed image obtained by the transformation to the cloud data center, so that the cloud data center can determine the transformation The pixel position of each paragraph of text on the image.

S504:云数据中心可以对变换图像进行预处理,并对经过预处理后的变换图像采用高精度的深度学习算法进行文字检测,得到变换图像上的多段文字在经过预处理后的变换图像上的像素位置。S504: The cloud data center can preprocess the transformed image, and use high-precision deep learning algorithms for text detection on the preprocessed transformed image, and obtain the multi-segment text on the transformed image on the preprocessed transformed image. Pixel position.

云中心在接收到变换图像后,可以对该变换图像进行预处理。示例性的,该预处理例如可以是对该变换图像进行裁剪或者透视矫正等处理。After the cloud center receives the transformed image, it can preprocess the transformed image. Exemplarily, the preprocessing may be, for example, performing processing such as cropping or perspective correction on the transformed image.

比如,在一些场景中,变换图像中可能存在较多不包含变换对象的空白区域(如变换图像的背景等),而云数据中心也无需在该空白区域中进行对象检测,因此,云数据中心在接收到变换图像后,可以先对变换图像进行裁剪,以去除变换图像的空白区域,得到裁剪后的图像;然后,云数据中心可以利用预设的深度学习算法对裁剪后的图像进行对象检测,确定变换对象在裁剪后的图像上的像素位置,该像素位置也可以是变换对象在变换图像上的像素位置,或者,可以根据变换对象在裁剪后的图像上的像素位置,计算出该变换 对象在变换图像上的像素位置。其中,云数据中心可以采用高精度的psenet算法或者retinanet算法等算法对变换图像进行文字检测,确定出各文字在变换图像上的像素位置。当然,云数据中心对文字进行识别的算法不局限于上述示例,也可以是采用其它可适用的高精度算法等。For example, in some scenes, there may be many blank areas in the transformed image (such as the background of the transformed image) that do not contain the transformed image, and the cloud data center does not need to perform object detection in the blank area. Therefore, the cloud data center After receiving the transformed image, the transformed image can be cropped to remove the blank area of the transformed image to obtain the cropped image; then, the cloud data center can use the preset deep learning algorithm to perform object detection on the cropped image , Determine the pixel position of the transformed object on the cropped image. The pixel position can also be the pixel position of the transformed object on the transformed image, or the transformation can be calculated based on the pixel position of the transformed object on the cropped image. The pixel position of the object on the transformed image. Among them, the cloud data center can use the high-precision psenet algorithm or retinanet algorithm to perform text detection on the transformed image, and determine the pixel position of each text on the transformed image. Of course, the algorithm for character recognition in the cloud data center is not limited to the above examples, and other applicable high-precision algorithms can also be used.

又比如,在又一些场景中,替换后的文字在变换图像上的成像并非是正视图(如未正对着对象进行拍照等),云数据中心在利用高精度的深度学习算法检测变换对象的像素位置之前,可以对该变换图像进行透视矫正,例如可以是将该变换图像旋转一定角度,并对旋转后处于正视图的文字进行识别。相应的,云数据中心利用深度学习算法所检测出的替换后的文字的像素位置,为替换后的文字在经过透视矫正处理后的变换图像上的像素位置。For another example, in some scenes, the replaced text on the transformed image is not a front view (such as not directly facing the object to take a photo, etc.). The cloud data center uses high-precision deep learning algorithms to detect the pixels of the transformed object. Before the position, perspective correction can be performed on the transformed image, for example, the transformed image can be rotated by a certain angle, and the characters in the front view after the rotation can be recognized. Correspondingly, the pixel position of the replaced text detected by the cloud data center using the deep learning algorithm is the pixel position of the replaced text on the transformed image after perspective correction processing.

S505:云数据中心向边缘数据中心返回像素位置以及预处理信息。S505: The cloud data center returns the pixel location and preprocessing information to the edge data center.

由于云数据中心对接收到的变换图像进行了预处理,并且,替换后的文字在经过预处理后的变换图像上的像素位置与在经过变换处理前的变换图像上的像素位置可能存在差异,因此,云数据中心在向边缘数据中心返回像素位置的同时,还可以返回预处理信息,以便边缘数据中心可以根据该预处理信息,计算出替换后的文字在经过预处理之前的变换图像上的像素位置。当然,在其它可能的实施例中,也可以是云数据中心根据该预处理信息,计算出替换后的文字在经过预处理之前的变换图像上的像素位置,并且向边缘数据中心返回该像素位置,图5所示的实施方式仅作为一种示例性说明,并不用于限定。Because the cloud data center preprocesses the received transformed image, and the pixel position of the replaced text on the preprocessed transformed image may be different from the pixel position on the transformed image before the transformation process. Therefore, when the cloud data center returns the pixel position to the edge data center, it can also return preprocessing information, so that the edge data center can calculate the position of the replaced text on the transformed image before the preprocessing based on the preprocessing information. Pixel position. Of course, in other possible embodiments, the cloud data center can also calculate the pixel position of the replaced text on the transformed image before preprocessing based on the preprocessing information, and return the pixel position to the edge data center The embodiment shown in FIG. 5 is only used as an exemplary description, and is not used for limitation.

S506:边缘数据中心根据接收到的像素位置、预处理信息对变换图像上多段替换文字的像素位置进行修正,并根据修改后的像素位置对目标图像进行裁剪,得到目标图像对应的多子图像。S506: The edge data center corrects the pixel positions of multiple replacement texts on the transformed image according to the received pixel positions and preprocessing information, and crops the target image according to the modified pixel positions to obtain a multi-sub image corresponding to the target image.

边缘数据中心在接收到云数据中心返回的像素位置后,可以根据接收到的像素位置,可以进一步确定出变换图像中的多段替换文字在变换图像上的像素位置。比如,边缘数据中心可以是将变换对象在变换图像上的像素位置作为目标图像中的相应对象在目标图像上的像素位置;或者,边缘数据中心可以基于接收到的像素位置以及预处理信息,计算出变换图像中的多段替换文字在变换图像中的像素位置,并利用所计算出的像素位置对之前边缘数据中心利用文字检测算法所检测到的多段文字的像素位置进行修正,修正后的像素位置可以作为目标图像上各段文字在目标图像中的像素位置。After the edge data center receives the pixel position returned by the cloud data center, it can further determine the pixel position of the multiple replacement text in the transformed image on the transformed image based on the received pixel position. For example, the edge data center may use the pixel position of the transformed object on the transformed image as the pixel position of the corresponding object in the target image on the target image; or the edge data center may calculate based on the received pixel position and preprocessing information Find out the pixel position of the multi-segment replacement text in the transformed image in the transformed image, and use the calculated pixel position to correct the pixel position of the multi-segment text detected by the text detection algorithm in the previous edge data center, and the corrected pixel position It can be used as the pixel position of each paragraph of text on the target image in the target image.

在根据接收到的像素位置、预处理信息确定出多段替换文字在变换图像中的像素位置后,由于该像素位置与目标图像上的文字在目标图像中的像素位置通常保持一致,因此,边缘数据中心可以根据替换文字在变换图像中的像素位置对目标图像进行裁剪,得到多个子图像,每个子图像上可以包含目标图像中的至少一段文字。After the pixel position of the multiple replacement text in the transformed image is determined according to the received pixel position and preprocessing information, the pixel position is usually consistent with the pixel position of the text on the target image in the target image. Therefore, the edge data The center can crop the target image according to the pixel position of the replacement text in the transformed image to obtain multiple sub-images, and each sub-image can contain at least one paragraph of text in the target image.

比如,当目标图像中包括“张三”、“XX市XX街道XX小区”、“135XXXXXXXX”以及“硕士”这些文字时,通过对目标图像进行裁剪,可以得到至少4个子图像,分别可以是包含“张三”的子图像、包含“XX市XX街道XX小区”的子图像、包含“135XXXXXXXX”的子图像以及包含“硕士”的子图像等;当然,在对目标图像中的对象进行更细粒度的划分时,也可以确定出至少6个子图像,分别可以是包含“张三”的子图像、包含“XX市”的子图像、包含“XX街道”的子图像、包含“XX小区”的子图像、包含“135XXXXXXXX”的子图像以及包含“硕士”的子图像;当然,裁剪得到的子图像可以是其它数量以及包含 其它形式的文字内容,本实施例对此并不进行限定。For example, when the target image includes the words "Zhang San", "XX Street XX Community in XX City", "135XXXXXXXX" and "Master", by cropping the target image, at least 4 sub-images can be obtained, which can each contain The sub-images of "Zhang San", the sub-images containing "XX City XX Street XX Community", the sub-images containing "135XXXXXXXX" and the sub-images containing "Master", etc.; of course, the object in the target image is more detailed In the granularity division, at least 6 sub-images can also be determined, which can be the sub-images containing "Zhang San", the sub-images containing "XX City", the sub-images containing "XX Street", and the sub-images containing "XX Community". Sub-images, sub-images containing "135XXXXXXXX", and sub-images containing "Master"; of course, the sub-images obtained by cropping can be other numbers and contain other forms of text content, which is not limited in this embodiment.

S507:边缘数据中心将裁剪得到的多个子图像发送给云数据中心。S507: The edge data center sends the multiple sub-images obtained by cropping to the cloud data center.

在一些可能的实施方式中,边缘数据中心可以调整每个子图像向云数据中心的发送顺序。具体的,边缘数据中心可以根据文字在目标图像上的像素位置按照一定顺序从目标图像上裁剪出子图像,如按照目标图像上像素点从上到下(或从左到右)的顺序裁剪出子图像等,若边缘数据中心根据该裁剪子图像的顺序或者逆序向云数据中心发送多个子图像,则非法用户可能会根据截获的子图像顺序确定子图像之间的组合关系,从而增加了目标图像上的敏感信息泄漏的风险。因此,边缘数据中心可以调整各个子图像的发送顺序,以使得非法用户基于调整后的子图像的发送顺序,难以确定子图像之间的组合关系,也就难以获得目标图像中的敏感信息,从而在一定程度上可以降低敏感信息被泄露的风险。当然,边缘数据中心也可以是按照裁剪子图像的顺序向第二识别系统发送多个子图像,本实施例对此并不进行限定。In some possible implementations, the edge data center may adjust the sending order of each sub-image to the cloud data center. Specifically, the edge data center can cut out sub-images from the target image in a certain order according to the pixel positions of the text on the target image, such as cutting out the order of pixels on the target image from top to bottom (or from left to right) If the edge data center sends multiple sub-images to the cloud data center according to the order or reverse order of the cropped sub-images, illegal users may determine the combination of the sub-images according to the intercepted sub-image order, thereby increasing the target Risk of leakage of sensitive information on images. Therefore, the edge data center can adjust the sending order of each sub-image, so that illegal users based on the adjusted sending order of the sub-images, it is difficult to determine the combination relationship between the sub-images, and it is difficult to obtain the sensitive information in the target image. To a certain extent, it can reduce the risk of sensitive information being leaked. Of course, the edge data center may also send multiple sub-images to the second recognition system in the order of cropping the sub-images, which is not limited in this embodiment.

值得注意的是,本实施例中的目标图像,可以是一个图像,也可以包括多个图像。当目标图像包括多个图像时,目标图像对应的子图像即为多个图像分别对应的子图像的集合。这样,将多个图像的子图像混合发送给第二识别系统,可以进一步增加基于不同图像的子图像组合得到各个图像上的敏感信息的难度,降低敏感信息被泄露的风险。It is worth noting that the target image in this embodiment may be one image or may include multiple images. When the target image includes multiple images, the sub-images corresponding to the target image are a collection of sub-images respectively corresponding to the multiple images. In this way, mixing and sending sub-images of multiple images to the second recognition system can further increase the difficulty of combining sub-images based on different images to obtain sensitive information on each image, and reduce the risk of sensitive information being leaked.

S508:云数据中心采用高精度的深度学习算法对接收到的各个子图像进行文字识别,得到每个子图像中文字的识别结果。S508: The cloud data center uses a high-precision deep learning algorithm to perform text recognition on each received sub-image, and obtain a recognition result of the text in each sub-image.

示例性的,云数据中心可以采用高精度的LSTM算法对各个子图像中的文字进行识别等。由于云数据中心可以具有较高的数据处理能力,可以支持高精度的深度学习算法,因此,在云数据中心对子图像中的文字进行识别,所得到的文字结果的精度以及效率通常较高。Exemplarily, the cloud data center may use a high-precision LSTM algorithm to recognize characters in each sub-image. Because the cloud data center can have high data processing capabilities and can support high-precision deep learning algorithms, the accuracy and efficiency of the text results obtained by recognizing the text in the sub-image in the cloud data center are usually high.

同时,虽然目标图像上可能包含敏感信息,但是,敏感图像被裁剪成多个子图像后,各个子图像上所承载的信息,通常为敏感信息的一部分,而将多个子图像发送给云数据中心,即使在多个子图像在传输至云数据中心的过程中,或者在云数据中心上发生泄漏,由于无法获知多个子图像之间的组合关系,从而难以根据各个子图像上的信息组合得到目标图像中的敏感信息,以此可以降低敏感信息在被识别的过程中所存在的发生泄漏的风险。At the same time, although the target image may contain sensitive information, after the sensitive image is cropped into multiple sub-images, the information carried on each sub-image is usually part of the sensitive information, and multiple sub-images are sent to the cloud data center. Even when multiple sub-images are transmitted to the cloud data center or leaked in the cloud data center, it is difficult to obtain the target image based on the combination of the information on each sub-image because the combination relationship between the multiple sub-images cannot be known. In this way, the risk of leakage of sensitive information in the process of identification can be reduced.

S509:云数据中心将针对各个子图像中文字的识别结果返回给边缘数据中心。S509: The cloud data center returns the recognition result of the text in each sub-image to the edge data center.

示例性的,云数据中心在接收各个子图像时可以记录各个子图像的接收顺序,并根据所记录的各个子图像的接收顺序来向边缘数据中心依次发送各个子图像中文字的识别结果,从而边缘数据中心可以根据接收识别结果的顺序,确定该识别结果为哪个子图像中文字所对应的识别结果。Exemplarily, the cloud data center may record the receiving order of each sub-image when receiving each sub-image, and send the recognition results of the characters in each sub-image to the edge data center in turn according to the recorded receiving order of each sub-image, thereby The edge data center can determine the recognition result corresponding to the text in which sub-image the recognition result is based on the order in which the recognition result is received.

或者,在其它示例中,云数据中心在返回识别结果的同时,还可以返回识别结果与子图像之间对应关系,从而边缘数据中心根据接收到的对应关系,确定每个子图像对应的哪个识别结果,从而可以无需要求云数据中心按照一定次序发送相应的子图像。Or, in other examples, when the cloud data center returns the recognition result, it can also return the corresponding relationship between the recognition result and the sub-image, so that the edge data center determines which recognition result corresponds to each sub-image according to the received correspondence Therefore, there is no need to require the cloud data center to send the corresponding sub-images in a certain order.

进一步的,云数据中心在返回第一识别结果的同时,还可以向边缘数据中心返回该针对各个子图像中文字的识别结果所对应的置信度,该置信度可以用于指示各个识别结果的可信程度。这样,当边缘数据中心确定子图像中文字的识别结果的置信度低于预设值时, 可以选择放弃该针对各个子图像中文字的识别结果并重新对该子图像中的文字进行识别,而在确定子图像中文字的识别结果的置信度高于该预设值时,可以基于各个子图像中文字的识别结果进一步确定出针对目标图像的文字识别结果。当然,边缘数据中心也可以是根据用户的需求,无论子图像中文字的识别结果的置信度是否高于预设值,均根据该子图像的文字识别结果得到针对目标图像的文字识别结果等,本实施例对此并不进行限定。Further, while the cloud data center returns the first recognition result, it can also return the confidence level corresponding to the recognition result of the text in each sub-image to the edge data center. The confidence level can be used to indicate the reliability of each recognition result. Degree of trust. In this way, when the edge data center determines that the confidence of the recognition result of the text in the sub-image is lower than the preset value, it can choose to abandon the recognition result for the text in each sub-image and re-recognize the text in the sub-image, and When it is determined that the confidence of the recognition result of the text in the sub-image is higher than the preset value, the text recognition result for the target image may be further determined based on the recognition result of the text in each sub-image. Of course, the edge data center can also be based on user needs, regardless of whether the confidence of the recognition result of the text in the sub-image is higher than the preset value, the text recognition result for the target image is obtained according to the text recognition result of the sub-image, etc. This embodiment does not limit this.

S510:边缘数据中心根据接收到的各个子图像中对象的识别结果,从目标图像中提取结构化数据。S510: The edge data center extracts structured data from the target image according to the received recognition result of the object in each sub-image.

例如,边缘数据中心可以是利用预设的SDK整合各个子图像中的文字在目标图像中的位置以及相应的识别结果,从目标图像中提取出结构化数据。For example, the edge data center may use a preset SDK to integrate the position of the text in each sub-image in the target image and the corresponding recognition result, and extract structured data from the target image.

S511:边缘数据中心将提取出的结构化数据返回给用户。S511: The edge data center returns the extracted structured data to the user.

图5所示实施例中,对于变换图像中替换文字的检测过程以及子图像中文字的识别过程,均由云数据中心上的同一台设备执行,在其它可能的实施方式中,也可以是由云数据中心的不同设备分别执行这两个过程。如图6所示,云数据中心可以包括设备1以及设备2,其中,设备1可以执行对替换文字在变换图像中像素位置的检测过程,设备2可以执行对多个子图像中的文字的识别过程。当然,云数据中心也可以是包括三个或者三个以上的设备,并且可以均参与上述文字检测和文字识别过程。如,对于云数据中心接收到的多个子图像,可以是由云数据中的多台设备同时对不同子图像进行文字识别等。In the embodiment shown in FIG. 5, the detection process of the replacement text in the transformed image and the recognition process of the text in the sub-image are both performed by the same device on the cloud data center. In other possible implementation manners, it may also be performed by the same device on the cloud data center. Different devices in the cloud data center perform these two processes separately. As shown in Figure 6, the cloud data center can include equipment 1 and equipment 2, where equipment 1 can perform a process of detecting the pixel position of the replacement text in the transformed image, and equipment 2 can perform a process of recognizing text in multiple sub-images . Of course, the cloud data center can also include three or more devices, and all of them can participate in the above-mentioned text detection and text recognition process. For example, for multiple sub-images received by the cloud data center, multiple devices in the cloud data may simultaneously perform character recognition on different sub-images.

以上结合图1至图6对本申请实施例提供的对象识别方法进行介绍,接下来结合附图对本申请实施例提供的对象识别装置、以及用于实现对象识别装置功能的计算设备进行介绍。The object recognition method provided by the embodiment of the present application is described above with reference to FIGS. 1 to 6, and the object recognition apparatus provided by the embodiment of the present application and the computing device used to implement the function of the object recognition apparatus are described below with reference to the accompanying drawings.

如图7所示,本申请实施例还提供一种对象识别装置700,该装置700可以应用于前述的第一识别系统,并执行前述第一识别系统所执行的对象识别方法。本申请实施例对该装置700中的功能模块的划分不做限定,下面示例性地提供一种功能模块的划分:As shown in FIG. 7, an embodiment of the present application also provides an object recognition device 700, which can be applied to the aforementioned first recognition system and execute the object recognition method executed by the aforementioned first recognition system. The embodiment of the present application does not limit the division of functional modules in the device 700. The following exemplarily provides a division of functional modules:

获取模块701,用于获取目标图像,所述目标图像包括多个对象;The obtaining module 701 is configured to obtain a target image, where the target image includes a plurality of objects;

确定模块702,用于确定所述目标图像对应的多个子图像,每个子图像包括至少一个对象;The determining module 702 is configured to determine multiple sub-images corresponding to the target image, and each sub-image includes at least one object;

传输模块703,用于向所述第二设备发送所述多个子图像,以使所述第二设备对所述多个子图像中对象进行识别。The transmission module 703 is configured to send the multiple sub-images to the second device, so that the second device can recognize objects in the multiple sub-images.

在一种可能的实施方式中,所述确定模块702具体用于获取所述多个对象在所述目标图像上的像素位置,以及根据各个对象在所述目标图像上的像素位置,对所述目标图像进行裁剪,得到所述目标图像对应的多个子图像。In a possible implementation manner, the determining module 702 is specifically configured to obtain the pixel positions of the multiple objects on the target image, and to determine the pixel positions of the objects on the target image. The target image is cropped to obtain multiple sub-images corresponding to the target image.

在一种可能的实施方式中,所述确定模块702,具体用于对所述目标图像进行变换处理,得到变换图像;In a possible implementation manner, the determining module 702 is specifically configured to perform transformation processing on the target image to obtain a transformed image;

所述传输模块703,还用于向所述第二识别系统发送所述变换图像,接收所述第二识别系统返回的所述变换图像上的多个变换对象的像素位置;The transmission module 703 is further configured to send the transformed image to the second recognition system, and receive the pixel positions of multiple transformation objects on the transformed image returned by the second recognition system;

所述确定模块702,具体用于根据所述多个变换对象的像素位置,确定所述多个对象在所述目标图像上的像素位置。The determining module 702 is specifically configured to determine the pixel positions of the multiple objects on the target image according to the pixel positions of the multiple transformed objects.

在一种可能的实施方式中,所述传输模块703,还用于接收所述第二识别系统返回的针 对所述多个子图像的第一识别结果;In a possible implementation manner, the transmission module 703 is further configured to receive the first recognition result for the multiple sub-images returned by the second recognition system;

所述确定模块703,还用于根据所述第一识别结果以及所述多个子图像中的对象在所述目标图像上的位置关系,确定针对所述目标图像的第二识别结果。The determining module 703 is further configured to determine a second recognition result for the target image according to the first recognition result and the position relationship of the objects in the multiple sub-images on the target image.

在一种可能的实施方式中,所述传输模块703,具体用于所述第一识别系统基于预设顺序向所述第二识别系统发送所述多个子图像,并接收所述第二识别系统基于所述预设顺序返回的针对所述多个子图像的第一识别结果。In a possible implementation manner, the transmission module 703 is specifically used for the first recognition system to send the multiple sub-images to the second recognition system based on a preset sequence, and to receive the second recognition system The first recognition result for the multiple sub-images returned based on the preset order.

在一种可能的实施方式中,目标图像至少包括第一图像以及第二图像,所述目标图像对应的多个子图像,至少包括第一图像对应的子图像以及第二图像对应的子图像。In a possible implementation manner, the target image includes at least a first image and a second image, and the multiple sub-images corresponding to the target image include at least a sub-image corresponding to the first image and a sub-image corresponding to the second image.

在一种可能的实施方式中,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。In a possible implementation manner, the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center.

在一种可能的实施方式中,所述目标图像包括的多个对象包括多个文字。In a possible implementation manner, the multiple objects included in the target image include multiple characters.

在一种可能的实施方式中,所述传输模块703,还用于接收用户上传的所述目标图像和所述目标图像的敏感指示信息;In a possible implementation manner, the transmission module 703 is further configured to receive the target image and the sensitive indication information of the target image uploaded by the user;

所述确定模块702,还用于确定所述目标图像为包含敏感信息的图像。The determining module 702 is also used to determine that the target image is an image containing sensitive information.

根据本申请实施例对象识别装置700可对应于执行本申请实施例中描述的对象识别方法,并且对象识别装置700的各个模块和其它操作和/或功能分别为了实现图2中第一识别系统所执行的各个方法的相应流程,为了简洁,在此不再赘述。According to the embodiment of the present application, the object recognition device 700 may correspond to the implementation of the object recognition method described in the embodiment of the present application, and the various modules and other operations and/or functions of the object recognition device 700 are designed to implement the first recognition system in FIG. 2 respectively. For the sake of brevity, the corresponding flow of each method executed will not be repeated here.

另外,如图8所示,本申请实施例还提供一种对象识别装置800,该装置800可以应用于前述的第二识别系统,并执行前述第二识别系统所执行的对象识别方法。本申请实施例对该装置800中的功能模块的划分不做限定,下面示例性地提供一种功能模块的划分:In addition, as shown in FIG. 8, an embodiment of the present application also provides an object recognition device 800, which can be applied to the aforementioned second recognition system and execute the object recognition method executed by the aforementioned second recognition system. The embodiment of the present application does not limit the division of functional modules in the device 800. The following exemplarily provides a division of functional modules:

传输模块801,用于接收第一识别系统通过远程通信发送的目标对象对应的多个子图像,所述目标图像包括多个对象,每个子图像中包括至少一个对象;The transmission module 801 is configured to receive multiple sub-images corresponding to the target object sent by the first recognition system through remote communication, where the target image includes multiple objects, and each sub-image includes at least one object;

识别模块802,用于对所述多个子图像进行对象识别,得到针对所述多个子图像的第一识别结果,所述第一识别结果包括每个子图像中的对象的识别结果。The recognition module 802 is configured to perform object recognition on the multiple sub-images to obtain a first recognition result for the multiple sub-images, where the first recognition result includes the recognition result of the object in each sub-image.

在一种可能的实施方式中,所述传输模块801,还用于通过远程通信向所述第一识别系统发送针对多个子图像的第一识别结果。In a possible implementation manner, the transmission module 801 is further configured to send first recognition results for multiple sub-images to the first recognition system through remote communication.

在一种可能的实施方式中,所述传输模块801,还用于接收来自第一识别系统的变换图像,所述变换图像是通过对所述目标图像进行变换处理所得到的图像;In a possible implementation manner, the transmission module 801 is further configured to receive a transformed image from the first recognition system, where the transformed image is an image obtained by performing transformation processing on the target image;

所述装置还包括:检测模块803;The device also includes: a detection module 803;

所述检测模块803,还用于对所述变换图像中的多个变换对象进行检测,得到所述多个变换对象在变换图像中的像素位置;The detection module 803 is further configured to detect multiple transformation objects in the transformation image to obtain pixel positions of the multiple transformation objects in the transformation image;

所述传输模块801,还用于向所述第一识别系统返回所述多个变换对象在变换图像中的像素位置。The transmission module 801 is further configured to return the pixel positions of the multiple transformed objects in the transformed image to the first recognition system.

在一种可能的实施方式中,所述传输模块801,具体用于根据所述目标图像的各个子图像的接收顺序,向所述第一识别系统依次返回所述各个子图像中的对象的识别结果。In a possible implementation manner, the transmission module 801 is specifically configured to sequentially return to the first recognition system the recognition of the objects in the respective sub-images according to the receiving order of the respective sub-images of the target image. result.

在一种可能的实施方式中,所述识别模块802,具体用于利用多个进程并行识别所述多个子图像中的图像。In a possible implementation manner, the recognition module 802 is specifically configured to use multiple processes to recognize images in the multiple sub-images in parallel.

在一种可能的实施方式中,目标图像至少包括第一图像以及第二图像,所述目标图像 对应的多个子图像,至少包括第一图像对应的子图像以及第二图像对应的子图像。In a possible implementation manner, the target image includes at least a first image and a second image, and the multiple sub-images corresponding to the target image include at least a sub-image corresponding to the first image and a sub-image corresponding to the second image.

在一种可能的实施方式中,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。In a possible implementation manner, the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center.

在一种可能的实施方式中,所述目标图像包括的多个对象包括多个文字。In a possible implementation manner, the multiple objects included in the target image include multiple characters.

根据本申请实施例对象识别装置800可对应于执行本申请实施例中描述的对象识别方法,并且对象识别装置800的各个模块和其它操作和/或功能分别为了实现图2中第二识别系统所执行的各个方法的相应流程,为了简洁,在此不再赘述。According to the embodiment of the present application, the object recognition device 800 can correspond to the implementation of the object recognition method described in the embodiment of the present application, and the various modules and other operations and/or functions of the object recognition device 800 are designed to implement the second recognition system in FIG. 2 respectively. For the sake of brevity, the corresponding flow of each method executed will not be repeated here.

上述对象识别装置700以及对象识别装置800分别可以通过计算设备实现。图9以及图10分别提供了一种计算设备。The object recognition apparatus 700 and the object recognition apparatus 800 described above can be implemented by computing devices, respectively. Figure 9 and Figure 10 respectively provide a computing device.

如图9所示,计算设备900具体可以用于实现上述图7所示实施例中对象识别装置700的功能。As shown in FIG. 9, the computing device 900 may be specifically used to implement the function of the object recognition apparatus 700 in the embodiment shown in FIG. 7.

计算设备900包括总线901、处理器902和存储器903。处理器902、存储器903之间通过总线901通信。The computing device 900 includes a bus 901, a processor 902, and a memory 903. The processor 902 and the memory 903 communicate through a bus 901.

总线901可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 901 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.

处理器902可以为中央处理器(central processing unit,CPU)、图形处理器(graphics processing unit,GPU)、微处理器(micro processor,MP)或者数字信号处理器(digital signal processor,DSP)等处理器中的任意一种或多种。The processor 902 may be a central processing unit (CPU), a graphics processing unit (GPU), a microprocessor (MP), or a digital signal processor (digital signal processor, DSP), etc. Any one or more of the devices.

存储器903可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM)。存储器903还可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM),快闪存储器,机械硬盘(hard drive drive,HDD)或固态硬盘(solid state drive,SSD)。The memory 903 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM). The memory 903 may also include non-volatile memory (non-volatile memory), such as read-only memory (ROM), flash memory, hard drive (HDD) or solid state drive (solid state drive). , SSD).

存储器903中存储有可执行的程序代码,处理器902执行该可执行的程序代码以执行前述第一识别系统所执行的对象识别方法。An executable program code is stored in the memory 903, and the processor 902 executes the executable program code to execute the object recognition method executed by the aforementioned first recognition system.

如图10所示,计算设备1000具体可以用于实现上述图8所示实施例中对象识别装置800的功能。As shown in FIG. 10, the computing device 1000 may be specifically used to implement the function of the object recognition apparatus 800 in the embodiment shown in FIG. 8 above.

计算设备1000包括总线1001、处理器1002和存储器1003。处理器1002、存储器1003之间通过总线1001通信。The computing device 1000 includes a bus 1001, a processor 1002, and a memory 1003. The processor 1002 and the memory 1003 communicate through a bus 1001.

总线1001可以是PCI总线或EISA总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 1001 may be a PCI bus, an EISA bus, or the like. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used to represent in FIG. 10, but it does not mean that there is only one bus or one type of bus.

处理器1002可以为CPU、GPU、MP或者DSP等处理器中的任意一种或多种。The processor 1002 may be any one or more of processors such as CPU, GPU, MP, or DSP.

存储器1003可以包括易失性存储器(volatile memory),例如RAM。存储器1003还可以包括非易失性存储器(non-volatile memory),例如ROM,快闪存储器,HDD或SSD。The memory 1003 may include a volatile memory (volatile memory), such as RAM. The memory 1003 may also include a non-volatile memory (non-volatile memory), such as ROM, flash memory, HDD or SSD.

存储器1003中存储有可执行的程序代码,处理器1002执行该可执行的程序代码以执行 前述第一识别系统所执行的对象识别方法。The memory 1003 stores executable program codes, and the processor 1002 executes the executable program codes to execute the object recognition method executed by the aforementioned first recognition system.

本申请实施例还提供了一种计算机可读存储介质。所述计算机可读存储介质可以是计算设备能够存储的任何可用介质或者是包含一个或多个可用介质的数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘)等。该计算机可读存储介质包括指令,所述指令指示计算设备执行上述第一识别系统所执行的对象识别方法。The embodiment of the present application also provides a computer-readable storage medium. The computer-readable storage medium may be any available medium that can be stored by a computing device or a data storage device such as a data center containing one or more available media. The usable medium may be a magnetic medium, (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk). The computer-readable storage medium includes instructions that instruct the computing device to execute the object recognition method performed by the above-mentioned first recognition system.

本申请实施例还提供了另一种计算机可读存储介质。所述计算机可读存储介质可以是计算设备能够存储的任何可用介质或者是包含一个或多个可用介质的数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘)等。该计算机可读存储介质包括指令,所述指令指示计算设备执行上述第二识别系统所执行的对象识别方法。The embodiment of the present application also provides another computer-readable storage medium. The computer-readable storage medium may be any available medium that can be stored by a computing device or a data storage device such as a data center containing one or more available media. The usable medium may be a magnetic medium, (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk). The computer-readable storage medium includes instructions that instruct the computing device to execute the object recognition method performed by the above-mentioned second recognition system.

本申请实施例还提供了一种计算机程序产品。所述计算机程序产品包括一个或多个计算机指令。在计算设备上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。The embodiment of the present application also provides a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computing device, the processes or functions described in the embodiments of the present application are generated in whole or in part.

所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机或数据中心进行传输。The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, a computer, or a data center through a cable (Such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer or data center.

所述计算机程序产品可以为一个软件安装包,在需要使用前述对象识别方法的任一方法的情况下,可以下载该计算机程序产品并在计算设备上执行该计算机程序产品。The computer program product may be a software installation package. In the case where any of the aforementioned object recognition methods needs to be used, the computer program product may be downloaded and executed on a computing device.

上述各个附图对应的流程或结构的描述各有侧重,某个流程或结构中没有详述的部分,可以参见其他流程或结构的相关描述。The description of the process or structure corresponding to each of the above drawings has its own focus. For parts of a process or structure that are not described in detail, please refer to related descriptions of other processes or structures.

Claims (20)

一种对象识别方法,其特征在于,所述方法包括:An object recognition method, characterized in that the method includes: 第一识别系统获取目标图像,所述目标图像包括多个对象;The first recognition system acquires a target image, the target image including a plurality of objects; 所述第一识别系统确定所述目标图像对应的多个子图像,每个子图像包括至少一个对象;The first recognition system determines multiple sub-images corresponding to the target image, each sub-image includes at least one object; 所述第一识别系统通过远程通信向第二识别系统发送所述多个子图像,以使所述第二识别系统对所述多个子图像中的对象进行识别。The first recognition system sends the plurality of sub-images to the second recognition system through remote communication, so that the second recognition system can recognize objects in the plurality of sub-images. 根据权利要求1所述的方法,其特征在于,所述第一识别系统确定所述目标图像对应的多个子图像,包括:The method according to claim 1, wherein the first recognition system to determine multiple sub-images corresponding to the target image comprises: 所述第一识别系统获取所述多个对象在所述目标图像上的像素位置;Acquiring, by the first recognition system, the pixel positions of the multiple objects on the target image; 所述第一识别系统根据各个对象在所述目标图像上的像素位置,对所述目标图像进行裁剪,得到所述目标图像对应的多个子图像。The first recognition system crops the target image according to the pixel position of each object on the target image to obtain multiple sub-images corresponding to the target image. 根据权利要求2所述的方法,其特征在于,所述第一识别系统获取所述多个对象在所述目标图像上的像素位置,包括:The method according to claim 2, wherein the acquiring, by the first recognition system, the pixel positions of the multiple objects on the target image comprises: 所述第一识别系统对所述目标图像进行变换处理,得到变换图像;The first recognition system performs transformation processing on the target image to obtain a transformed image; 所述第一识别系统向所述第二识别系统发送所述变换图像;Sending the transformed image by the first recognition system to the second recognition system; 所述第一识别系统接收所述第二识别系统返回的所述变换图像上的多个变换对象的像素位置;Receiving, by the first recognition system, the pixel positions of the multiple conversion objects on the conversion image returned by the second recognition system; 所述第一识别系统根据所述多个变换对象的像素位置,确定所述多个对象在所述目标图像上的像素位置。The first recognition system determines the pixel positions of the multiple objects on the target image according to the pixel positions of the multiple transformed objects. 根据权利要求1至3任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, wherein the method further comprises: 所述第一识别系统接收所述第二识别系统返回的针对所述多个子图像的第一识别结果;Receiving, by the first recognition system, a first recognition result for the plurality of sub-images returned by the second recognition system; 所述第一识别系统根据所述第一识别结果以及所述多个子图像中的对象在所述目标图像上的位置关系,确定针对所述目标图像的第二识别结果。The first recognition system determines a second recognition result for the target image according to the first recognition result and the positional relationship of the objects in the plurality of sub-images on the target image. 根据权利要求1至4任一项所述的方法,其特征在于,The method according to any one of claims 1 to 4, characterized in that: 所述第一识别系统向所述第二识别系统发送所述多个子图像,包括:The sending of the plurality of sub-images by the first recognition system to the second recognition system includes: 所述第一识别系统基于预设顺序向所述第二识别系统发送所述多个子图像;Sending, by the first recognition system, the plurality of sub-images to the second recognition system based on a preset sequence; 所述第一识别系统接收所述第二识别系统返回的针对所述多个子图像的第一识别结果,包括:The receiving, by the first recognition system, the first recognition result for the multiple sub-images returned by the second recognition system includes: 所述第一识别系统接收所述第二识别系统基于所述预设顺序返回的针对所述多个子图像的第一识别结果。The first recognition system receives a first recognition result for the plurality of sub-images returned by the second recognition system based on the preset order. 根据权利要求1至5任一项所述的方法,其特征在于,所述目标图像至少包括第一图像和第二图像,所述目标图像对应的多个子图像至少包括所述第一图像对应的子图像以及所述第二图像对应的子图像。The method according to any one of claims 1 to 5, wherein the target image includes at least a first image and a second image, and the multiple sub-images corresponding to the target image at least include those corresponding to the first image. A sub-image and a sub-image corresponding to the second image. 根据权利要求1至6任一项所述的方法,其特征在于,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。The method according to any one of claims 1 to 6, wherein the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center. 根据权利要求1至7任一项所述的方法,其特征在于,所述目标图像包括的多个对象包括多个文字。The method according to any one of claims 1 to 7, wherein the multiple objects included in the target image include multiple texts. 根据权利要求1-8任一项所述的方法,其特征在于,在第一识别系统获取目标图像之前,所述方法还包括:The method according to any one of claims 1-8, wherein before the first recognition system acquires the target image, the method further comprises: 所述第一识别系统接收用户上传的所述目标图像和所述目标图像的敏感指示信息;Receiving, by the first recognition system, the target image and the sensitive indication information of the target image uploaded by the user; 所述第一识别系统确定所述目标图像为包含敏感信息的图像。The first recognition system determines that the target image is an image containing sensitive information. 一种对象识别装置,其特征在于,所述装置应用于第一识别系统,所述装置包括:An object recognition device, characterized in that the device is applied to a first recognition system, and the device includes: 获取模块,用于获取目标图像,所述目标图像包括多个对象;An acquisition module for acquiring a target image, the target image including a plurality of objects; 确定模块,用于确定所述目标图像对应的多个子图像,每个子图像包括至少一个对象;A determining module, configured to determine multiple sub-images corresponding to the target image, each of the sub-images includes at least one object; 传输模块,用于向所述第二设备发送所述多个子图像,以使所述第二设备对所述多个子图像中对象进行识别。The transmission module is configured to send the multiple sub-images to the second device, so that the second device can recognize objects in the multiple sub-images. 根据权利要求10所述的装置,其特征在于,所述确定模块,具体用于获取所述多个对象在所述目标图像上的像素位置,并根据各个对象在所述目标图像上的像素位置,对所述目标图像进行裁剪,得到所述目标图像对应的多个子图像。The device according to claim 10, wherein the determining module is specifically configured to obtain the pixel positions of the multiple objects on the target image, and according to the pixel positions of each object on the target image , Cutting the target image to obtain multiple sub-images corresponding to the target image. 根据权利要求11所述的装置,其特征在于,The device according to claim 11, wherein: 所述确定模块,具体用于对所述目标图像进行变换处理,得到变换图像;The determining module is specifically configured to perform transformation processing on the target image to obtain a transformed image; 所述传输模块还用于向所述第二识别系统发送所述变换图像,接收所述第二识别系统返回的所述变换图像上的多个变换对象的像素位置;The transmission module is further configured to send the transformed image to the second recognition system, and receive the pixel positions of multiple transformation objects on the transformed image returned by the second recognition system; 所述确定模块,具体用于根据所述多个变换对象的像素位置,确定所述多个对象在所述目标图像上的像素位置。The determining module is specifically configured to determine the pixel positions of the multiple objects on the target image according to the pixel positions of the multiple transformed objects. 根据权利要求10至12任一项所述的装置,其特征在于,The device according to any one of claims 10 to 12, characterized in that: 所述传输模块,还用于接收所述第二识别系统返回的针对所述多个子图像的第一识别结果;The transmission module is further configured to receive the first recognition result for the multiple sub-images returned by the second recognition system; 所述确定模块,还用于根据所述第一识别结果以及所述多个子图像中的对象在所述目标图像上的位置关系,确定针对所述目标图像的第二识别结果。The determining module is further configured to determine a second recognition result for the target image according to the first recognition result and the positional relationship of the objects in the multiple sub-images on the target image. 根据权利要求10至13任一项所述的装置,其特征在于,The device according to any one of claims 10 to 13, characterized in that: 所述传输模块,具体用于所述第一识别系统基于预设顺序向所述第二识别系统发送所述多个子图像,并接收所述第二识别系统基于所述预设顺序返回的针对所述多个子图像的第一识别结果。The transmission module is specifically used for the first recognition system to send the multiple sub-images to the second recognition system based on a preset order, and to receive the second recognition system's return based on the preset order for all sub-images. The first recognition result of the multiple sub-images. 根据权利要求10至14任一项所述的装置,其特征在于,所述目标图像至少包括第一图像以及第二图像,所述目标图像对应的多个子图像,至少包括所述第一图像对应的子图像以及所述第二图像对应的子图像。The device according to any one of claims 10 to 14, wherein the target image includes at least a first image and a second image, and the plurality of sub-images corresponding to the target image includes at least the first image corresponding to the The sub-image of and the sub-image corresponding to the second image. 根据权利要求10至15任一项所述的装置,其特征在于,所述第一识别系统部署在边缘数据中心,所述第二识别系统部署在云数据中心。The device according to any one of claims 10 to 15, wherein the first identification system is deployed in an edge data center, and the second identification system is deployed in a cloud data center. 根据权利要求10至16任一项所述的装置,其特征在于,所述目标图像包括的多个对象包括多个文字。The device according to any one of claims 10 to 16, wherein the multiple objects included in the target image include multiple characters. 根据权利要求10-17任一项所述的装置,其特征在于,所述传输模块,还用于接收用户上传的所述目标图像和所述目标图像的敏感指示信息;The device according to any one of claims 10-17, wherein the transmission module is further configured to receive the target image and the sensitive indication information of the target image uploaded by the user; 所述确定模块,还用于确定所述目标图像为包含敏感信息的图像。The determining module is also used to determine that the target image is an image containing sensitive information. 一种计算设备,其特征在于,包括处理器、存储器;A computing device, characterized by comprising a processor and a memory; 所述处理器用于执行所述存储器中存储的指令,以使所述计算设备执行如权利要求1至9任一项所述的方法。The processor is configured to execute instructions stored in the memory, so that the computing device executes the method according to any one of claims 1-9. 一种计算机可读存储介质,其特征在于,包括指令,当其在计算设备上运行时,使得所述计算设备执行如权利要求1至9中任一项所述的方法。A computer-readable storage medium, characterized by comprising instructions, which when run on a computing device, causes the computing device to execute the method according to any one of claims 1 to 9.
PCT/CN2021/076701 2020-05-18 2021-02-18 Object recognition method and device, apparatus, and medium WO2021232865A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202010420378 2020-05-18
CN202010420378.2 2020-05-18
CN202010588784.X 2020-06-24
CN202010588784.XA CN113688658B (en) 2020-05-18 2020-06-24 Object identification method, device, equipment and medium

Publications (1)

Publication Number Publication Date
WO2021232865A1 true WO2021232865A1 (en) 2021-11-25

Family

ID=78576040

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/076701 WO2021232865A1 (en) 2020-05-18 2021-02-18 Object recognition method and device, apparatus, and medium

Country Status (2)

Country Link
CN (2) CN118644780A (en)
WO (1) WO2021232865A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553499A (en) * 2022-01-28 2022-05-27 中国银联股份有限公司 Image encryption method, image processing method, device, equipment and medium
CN115563655A (en) * 2022-11-25 2023-01-03 承德石油高等专科学校 A method and system for identifying user dangerous behaviors for network security

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826734B (en) * 2022-04-25 2024-10-01 维沃移动通信有限公司 Text recognition method, device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109859183A (en) * 2019-01-29 2019-06-07 江河瑞通(北京)技术有限公司 More element integrated water body intelligent identification Methods and ecology station based on edge calculations
US20190258858A1 (en) * 2018-02-17 2019-08-22 Constru Ltd System and method for hybrid processing of construction site images
CN110348467A (en) * 2018-04-06 2019-10-18 埃莱克塔公共有限公司 The method, apparatus and computer-readable medium of object in image for identification

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235946A (en) * 2013-04-08 2013-08-07 上海合合信息科技发展有限公司 Divulgence-preventive processing method for artificially identifying information of business cards
JP2018072957A (en) * 2016-10-25 2018-05-10 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America Image processing method, image processing system and program
WO2019169532A1 (en) * 2018-03-05 2019-09-12 深圳前海达闼云端智能科技有限公司 License plate recognition method and cloud system
CN109493285A (en) * 2018-09-18 2019-03-19 阿里巴巴集团控股有限公司 Image processing method, device, server and storage medium based on crowdsourcing
CN109872284A (en) * 2019-01-18 2019-06-11 平安普惠企业管理有限公司 Image information desensitization method, device, computer equipment and storage medium
CN109981755A (en) * 2019-03-12 2019-07-05 深圳灵图慧视科技有限公司 Image-recognizing method, device and electronic equipment
CN110930410B (en) * 2019-10-28 2023-06-23 维沃移动通信有限公司 An image processing method, server and terminal equipment
CN111062389B (en) * 2019-12-10 2025-03-28 腾讯科技(深圳)有限公司 Text recognition method, device, computer readable medium and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190258858A1 (en) * 2018-02-17 2019-08-22 Constru Ltd System and method for hybrid processing of construction site images
CN110348467A (en) * 2018-04-06 2019-10-18 埃莱克塔公共有限公司 The method, apparatus and computer-readable medium of object in image for identification
CN109859183A (en) * 2019-01-29 2019-06-07 江河瑞通(北京)技术有限公司 More element integrated water body intelligent identification Methods and ecology station based on edge calculations

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553499A (en) * 2022-01-28 2022-05-27 中国银联股份有限公司 Image encryption method, image processing method, device, equipment and medium
CN114553499B (en) * 2022-01-28 2024-02-13 中国银联股份有限公司 Image encryption and image processing method, device, equipment and medium
US12322062B2 (en) 2022-01-28 2025-06-03 China Unionpay Co., Ltd. Image encryption method and apparatus, image processing method and apparatus, and device and medium
CN115563655A (en) * 2022-11-25 2023-01-03 承德石油高等专科学校 A method and system for identifying user dangerous behaviors for network security
CN115563655B (en) * 2022-11-25 2023-03-21 承德石油高等专科学校 User dangerous behavior identification method and system for network security

Also Published As

Publication number Publication date
CN113688658A (en) 2021-11-23
CN113688658B (en) 2024-06-28
CN118644780A (en) 2024-09-13

Similar Documents

Publication Publication Date Title
JP6099793B2 (en) Method and system for automatic selection of one or more image processing algorithms
WO2021232865A1 (en) Object recognition method and device, apparatus, and medium
US10438086B2 (en) Image information recognition processing method and device, and computer storage medium
CN106203242B (en) Similar image identification method and equipment
CN113259721B (en) Video data sending method and electronic equipment
US20200175700A1 (en) Joint Training Technique for Depth Map Generation
WO2020082731A1 (en) Electronic device, credential recognition method and storage medium
CN106557770B (en) Identifying shapes in images by comparing bezier curves
CN109033935B (en) Head-up line detection method and device
CN111325107B (en) Detection model training method, device, electronic equipment and readable storage medium
CN112837202B (en) Watermark image generation and attack tracing method and device based on privacy protection
US10631050B2 (en) Determining and correlating visual context on a user device with user behavior using digital content on the user device
US20130182943A1 (en) Systems and methods for depth map generation
WO2024169397A1 (en) Seal recognition method and apparatus, electronic device, and storage medium
WO2021139169A1 (en) Method and apparatus for card recognition, device, and storage medium
JP6365117B2 (en) Information processing apparatus, image determination method, and program
WO2021051580A1 (en) Grouping batch-based picture detection method and apparatus, and storage medium
CN112102145B (en) Image processing method and device
KR102524163B1 (en) Method and apparatus for detecting identity card
WO2020000966A1 (en) Method for generating wireless access point information, device, and computer readable medium
WO2022068551A1 (en) Video cropping method and apparatus, and device and storage medium
CN114329030A (en) Information processing method and device, computer equipment and storage medium
JP2015118644A (en) Information processing apparatus, image search method, and program
CN114116512A (en) Test methods, apparatus, electronic equipment and storage media
CN114359007A (en) Image traceability method, device, equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21807611

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21807611

Country of ref document: EP

Kind code of ref document: A1