-
公开(公告)号:US10354353B2
公开(公告)日:2019-07-16
申请号:US15571857
申请日:2016-07-13
Applicant: SHENZHEN UNIVERSITY
Inventor: Dongning Zhao , Yong Zhang , Shengli Zhang , Yong Xu , Jianyong Chen , Yanshan Li
IPC: G06K9/00 , G06T1/00 , H04N21/8358
Abstract: The disclosure provides a digital video content security authentication method, wherein the method comprises: a secret information embedding step of selectively modifying a pixel grayscale value for each frame image in a digital video so as to complete the embedding of 1-bit secret information; and a secret information extraction and video authentication step of carrying out secret information extraction from the digital video in which the secret information is embedded according to a key so as to realize the security authentication of the digital video content. The disclosure also provides a digital video content security authentication system. According to the technical scheme provided by the disclosure, the authentication security is improved on the basis of not influencing user experience.
-
2.
公开(公告)号:US20180114073A1
公开(公告)日:2018-04-26
申请号:US15687422
申请日:2017-08-25
Applicant: SHENZHEN UNIVERSITY
Inventor: Yong Zhang , Lei Liu , Zehong Chen , Dongning Zhao , Jianyong Chen , Yanshan Li
CPC classification number: G06K9/00778 , G06K9/00369 , G06T7/11 , G06T7/12 , G06T7/181 , G06T7/187 , G06T7/194 , G06T2207/10028 , G06T2207/20156 , G06T2207/20168 , G06T2207/30196 , G06T2207/30232 , G06T2207/30242
Abstract: The present disclosure provides a method and device for counting pedestrians. The method comprises: reading a pedestrian depth image, and comparing the pedestrian depth image and a pre-acquired environmental mean image to acquire a foreground image; dividing the foreground image into a plurality of regions, detecting whether or not there is a step in an edge pixel point of each region, and detecting whether or not the region surface formed in each region coincides with the curved surface of the head top; determining that the currently detected region is the region of the head top when there is a step in the point and when the region surface coincides with the curved surface; and counting and outputting the number of pedestrians according to the region of the head top determined from the pedestrian depth image and the region of the head top determined from an adjacent pedestrian depth image.
-
公开(公告)号:US20170286780A1
公开(公告)日:2017-10-05
申请号:US15628605
申请日:2017-06-20
Applicant: SHENZHEN UNIVERSITY
Inventor: Yong Zhang , Lei Liu , Dongning Zhao , Yanshan Li , Jianyong Chen
CPC classification number: G06K9/00778 , G06K9/00624 , G06K9/00832 , G06K9/4614 , G06K9/4652 , G06K9/6257 , G06K2009/3291 , G06T7/215 , G06T2207/30201 , G06T2207/30242 , G06T2207/30252
Abstract: The disclosure provides a method for calculating a passenger crowdedness degree, comprising: establishing a video data collection environment and starting collecting video data of passengers getting on and off; reading the collected video data of passengers getting on and off and pre-processing a plurality of successive image frames of the video data; identifying a human head according to the pre-processing result and taking the detected human head as a target object to be tracked by mean-shift; and judging the behaviours of getting on and off of a passenger in the area where the target object is positioned and determining the crowdedness degree of passengers inside a vehicle according to the numbers of the passengers getting on and off. The disclosure also provides a system for calculating a passenger crowdedness degree. The disclosure can effectively reduce the false detection, leak detection and error detection of the head top.
-
公开(公告)号:US20170169736A1
公开(公告)日:2017-06-15
申请号:US15444308
申请日:2017-02-27
Applicant: SHENZHEN UNIVERSITY
Inventor: Dongning Zhao , Yong Zhang , Weixin Xie , Yanshan Li , Jianping Yu , Jianyong Chen
IPC: G09C1/00
CPC classification number: G09C1/00 , G09C5/00 , H04L2209/16
Abstract: The invention relates to the technical field of data hiding, in particular to a data hiding method and a data hiding system. An image is used as a data carrier; after secret data is converted into a bit sequence by a sending end, the values of each bit in the bit sequence are hidden in the image; the image hidden with the secret data is obtained and is sent to a receiving end; and the receiving end can extract the hidden secret data from the image according to a corresponding secret key. During data hiding, each square image block can hide two-bit data through inverse number odd-even properties of a pixel gray value sequence of two diagonal lines of each square image block, so that the volume of data hidden in the image is twice of the number of the image blocks split by the image.
-
公开(公告)号:US10223597B2
公开(公告)日:2019-03-05
申请号:US15628605
申请日:2017-06-20
Applicant: SHENZHEN UNIVERSITY
Inventor: Yong Zhang , Lei Liu , Dongning Zhao , Yanshan Li , Jianyong Chen
Abstract: The disclosure provides a method for calculating a passenger crowdedness degree, comprising: establishing a video data collection environment and starting collecting video data of passengers getting on and off; reading the collected video data of passengers getting on and off and pre-processing a plurality of successive image frames of the video data; identifying a human head according to the pre-processing result and taking the detected human head as a target object to be tracked by mean-shift; and judging the behaviors of getting on and off of a passenger in the area where the target object is positioned and determining the crowdedness degree of passengers inside a vehicle according to the numbers of the passengers getting on and off. The disclosure also provides a system for calculating a passenger crowdedness degree. The disclosure can effectively reduce the false detection, leak detection and error detection of the head top.
-
6.
公开(公告)号:US20180324212A1
公开(公告)日:2018-11-08
申请号:US15922902
申请日:2018-03-15
Applicant: SHENZHEN UNIVERSITY
Inventor: Qiao Yan , Qingxiang Gong , Jianyong Chen
CPC classification number: H04L63/1458 , G06F17/5009 , H04L63/1425 , H04L63/1433
Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.
-
公开(公告)号:US10050968B2
公开(公告)日:2018-08-14
申请号:US15024379
申请日:2014-12-31
Applicant: SHENZHEN UNIVERSITY
Inventor: Bo Wang , Jianyong Chen , Jianping Yu
Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.
-
公开(公告)号:US09384782B2
公开(公告)日:2016-07-05
申请号:US14432411
申请日:2014-04-02
Applicant: SHENZHEN UNIVERSITY
Inventor: Shumin Cai , Zhuolin Yang , Jianyong Chen , Dan Xiao
IPC: G06F17/00 , G11B27/036 , G11B27/10 , G11B27/031 , G11B27/28 , G11B27/034
CPC classification number: G11B27/036 , G11B27/031 , G11B27/034 , G11B27/10 , G11B27/28
Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point. According to the present invention, a problem that inconsecutive edited document files and audio are not synchronized during playback can be effectively resolved.
Abstract translation: 本发明适用于多媒体技术领域,提供了一种记录文件编辑方法和系统,其方法包括:在音频文件上执行碎片以获取多个音频片段; 对多个获取的音频片段执行片段切割; 将片段时间段,音频片段数量,片段剪切时间点和音频片段编号存储在片段裁剪时间点的预设记录文件中; 从片段切割时间点的记录文件中读取每个片段裁剪时间点,对片段裁剪时间点执行时间映射,并且以阵列的形式存储在映射之后获得的新片段裁剪时间点; 并且读取文档和音频之间的预先存储的交互映射文件,并且根据新的片断切割时间点在文档和音频之间的交互映射文件的时间点上执行调整。 根据本发明,可以有效地解决在重放期间不连续编辑的文档文件和音频不同步的问题。
-
9.
公开(公告)号:US10650249B2
公开(公告)日:2020-05-12
申请号:US15687422
申请日:2017-08-25
Applicant: SHENZHEN UNIVERSITY
Inventor: Yong Zhang , Lei Liu , Zehong Chen , Dongning Zhao , Jianyong Chen , Yanshan Li
Abstract: The present disclosure provides a method and device for counting pedestrians. The method comprises: reading a pedestrian depth image, and comparing the pedestrian depth image and a pre-acquired environmental mean image to acquire a foreground image; dividing the foreground image into a plurality of regions, detecting whether or not there is a step in an edge pixel point of each region, and detecting whether or not the region surface formed in each region coincides with the curved surface of the head top; determining that the currently detected region is the region of the head top when there is a step in the point and when the region surface coincides with the curved surface; and counting and outputting the number of pedestrians according to the region of the head top determined from the pedestrian depth image and the region of the head top determined from an adjacent pedestrian depth image.
-
10.
公开(公告)号:US10536480B2
公开(公告)日:2020-01-14
申请号:US15922902
申请日:2018-03-15
Applicant: SHENZHEN UNIVERSITY
Inventor: Qiao Yan , Qingxiang Gong , Jianyong Chen
Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.
-
-
-
-
-
-
-
-
-