Extraction and identification technology of infringement picture content by deep learning and hash coding

A hash coding and deep learning technology, which is applied in character and pattern recognition, instruments, biological neural network models, etc., can solve the problems of automatic judgment, webpage content cannot be monitored, and detection business is passive, etc.

Inactive Publication Date: 2018-06-15
北京非斗数据科技发展有限公司
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The limitations are reflected in the way of webpage text crawling, searching webpages according to keywords, and unable to monitor the content of webpages, and cannot automatically judge when the title and content do not match; the self-developed feature value extract

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extraction and identification technology of infringement picture content by deep learning and hash coding
  • Extraction and identification technology of infringement picture content by deep learning and hash coding
  • Extraction and identification technology of infringement picture content by deep learning and hash coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] This example implements the identification technology of infringing content, which consists of three parts:

[0025] Step 1. Acquisition of image resources. Search for resources with a high matching degree on the website according to image keywords, search scope, and upload time of search resources. Before searching for content involving image copyright infringement, in the face of massive image information on the Internet, searching without purpose is like finding a needle in a haystack. Therefore, in order to achieve this goal, it is first necessary to filter the content of the retrieved pictures. The screening conditions include keywords related to the content of the pictures, resource retrieval (crawling) scope limitation, resource upload time and other key screening conditions. The main objects of resource retrieval are large and medium-sized portal websites. Crawler technology is used to crawl resources with high matching degree involving image copyright infringe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of the method for realizing infringement resource extraction and identification comparison by using technical ways to prevent infringement copying and diffusion of picture contents, especially to a method involved in copyright protection of the picture content. The technical method is implemented as follows: step one, carrying out picture resource crawling; step two, carrying out picture feature extraction by using deep learning and coding the picture by using hash coding; and step three, carrying out picture code comparison by using a two-level hash code positioning technology to identify whether the content is an infringement content.

Description

technical field [0001] The invention relates to the technical field of a method specially suitable for realizing the extraction, identification and comparison of infringing resources by means of technical means, and preventing the infringing copying and diffusion of picture content, in particular to a method for protecting the copyright of picture content. Background technique [0002] With the enhancement of people's awareness of the materialization of picture rights and interests, copyright disputes have emerged one after another. The 2015 Annual Report on China's Online Copyright Protection released by the National Copyright Administration pointed out that: my country's copyright ownership and cross-licensing methods are chaotic, and copyright disputes among power makers are becoming more and more frequent. All kinds of chaos urgently need industry regulation. According to statistics, in 2015, in the special action of intellectual property protection carried out by the go...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06N3/04
CPCG06N3/045G06F18/213G06F18/22
Inventor 沈家云王松吴泽锋
Owner 北京非斗数据科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products