Network picture infringement monitoring and automatic evidence obtaining method

A picture and network technology, applied in the direction of network data retrieval, network data indexing, image enhancement, etc., can solve the problems of limited coverage, poor timeliness, high cost, etc., and achieve a large amount of data, convenient evidence collection and storage, and wide coverage Effect

Active Publication Date: 2021-01-05
浙江数秦科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, copyright monitoring is mostly manual, which not only has limited coverage but also high cost, and cannot detect infringements in time, and the timeliness is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network picture infringement monitoring and automatic evidence obtaining method
  • Network picture infringement monitoring and automatic evidence obtaining method
  • Network picture infringement monitoring and automatic evidence obtaining method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Such as figure 1 As shown, a network image infringement monitoring and automatic evidence collection system includes the following steps:

[0067] Step A): Obtain the network picture, save the network picture and the URL of the webpage where the network picture is located.

[0068] Create a crawler to crawl webpages on the network, save the URL and code of the webpage, obtain the domain name of the webpage from the URL of the webpage, and include webpages with the same domain name into the same website.

[0069] Classify websites according to their priority. For websites with high average daily visits, websites with high historical infringements, and websites that allow users to upload and display pictures and have high average daily visits as high-priority websites, the crawler crawls and obtains Priority crawling of network pictures. Prioritize sites based on their traffic, history of infringement, and type of interaction:

[0070] Divide the priority into high pri...

Embodiment 2

[0096] Such as figure 2 As shown, a network picture infringement monitoring and automatic evidence collection system, step A) and step C) are the same as the first embodiment, and step B) includes the following steps.

[0097] Step B1): Scale the network picture.

[0098] Step B11): preset several preset sizes, and save the copyrighted images registered by the user after being scaled according to the preset sizes.

[0099] Step B12): Read the size of the network picture, and scale the network picture to a preset size closest to its size.

[0100] Step B2): extract the histogram of the network picture, if the similarity between the histogram of the copyright picture and the zoomed network picture histogram is greater than the first set threshold, then determine that the network picture is a suspected infringement picture, and enter step B3), Otherwise, select the next network picture and return to step B1) for execution.

[0101]Calculate the histogram of the copyright imag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network picture infringement monitoring and automatic evidence obtaining method, which comprises the following steps: A) obtaining a network picture, and storing the networkpicture and a URL (Uniform Resource Locator) of a webpage where the network picture is located; B) comparing the copyright picture registered by the user with the network picture, if the similarity exceeds a set threshold, judging that the network picture infringement exists, and entering the step C) to obtain evidence, otherwise, comparing the next network picture; and C) submitting the URL of the webpage where the infringement network picture is located to an evidence obtaining node, performing webpage data evidence obtaining by the evidence obtaining node, and signing evidence obtaining data as evidence obtaining data. The invention has the substantive effects that the web pictures on all the web pages are captured through crawlers, the coverage range is wide, and the number of data islarge; by comparing the similarity between the true value image and the grey-scale image, the infringement image with high similarity with the copyright image can be screened out more quickly; and rapid and convenient evidence obtaining and evidence storage of the webpage data can be realized by utilizing a block chain technology.

Description

technical field [0001] This patent relates to the technical field of picture copyright protection, in particular to a network picture infringement monitoring and automatic evidence collection method. Background technique [0002] Pictures are one of the objects protected by copyright law. Pictures disseminated through information networks are network pictures. Network pictures are also protected objects of copyright law, and they also belong to the category of network copyright objects. As a typical representative of network copyright infringement, the situation of network picture infringement is mainly manifested as unauthorized reprinting. At present, copyright monitoring is mostly manual, which not only has limited coverage but also high cost, and cannot detect infringements in time, and the timeliness is poor. As an emerging data storage structure, blockchain technology has the characteristics of unforgeable, traceable, traceable, open and transparent, and collective ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/951G06F16/955G06T3/40G06T7/44G06F16/27G06F21/64G06Q50/18
CPCG06F16/951G06F16/955G06T3/40G06T7/44G06F16/27G06F21/64G06Q50/184G06T2207/10004Y02D10/00
Inventor 张金琳孙宽慰高航俞学劢
Owner 浙江数秦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products