Nothing Special   »   [go: up one dir, main page]

CN117135446A - Remote photographing and uploading management system based on hidden camera - Google Patents

Remote photographing and uploading management system based on hidden camera Download PDF

Info

Publication number
CN117135446A
CN117135446A CN202311015096.4A CN202311015096A CN117135446A CN 117135446 A CN117135446 A CN 117135446A CN 202311015096 A CN202311015096 A CN 202311015096A CN 117135446 A CN117135446 A CN 117135446A
Authority
CN
China
Prior art keywords
data
management
camera
subsystem
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311015096.4A
Other languages
Chinese (zh)
Inventor
刘学亮
辛政华
汤振
张志伟
张道明
张胜
黄燕
俞雷
张晓梅
陈虹
吴学斌
周怡
金飒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Bochuang Information Technology Co ltd
Suzhou University
Original Assignee
Anhui Bochuang Information Technology Co ltd
Suzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Bochuang Information Technology Co ltd, Suzhou University filed Critical Anhui Bochuang Information Technology Co ltd
Priority to CN202311015096.4A priority Critical patent/CN117135446A/en
Publication of CN117135446A publication Critical patent/CN117135446A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • H04N23/661Transmitting camera control signals through networks, e.g. control via the Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The application discloses a remote photographing and uploading management system based on a hidden camera, which relates to the technical field of safety monitoring, and comprises a picture processing and storing subsystem, a processing and storing subsystem and a processing and storing subsystem, wherein the picture processing and storing subsystem is used for processing real-time image data transmitted from the hidden camera control subsystem, the processing method of the image data comprises a JPEG compression method for compressing and storing images, and an RSA encryption method for protecting the safety of the images; the database management subsystem is used for carrying out backup and recovery processing on data when the data information shot by the hidden camera is transmitted to the database for storage through the picture processing subsystem, and supporting data inquiry, analysis and management; the security management subsystem comprises user identity verification, authority management and security management of the hidden camera equipment. The multifunctional anti-theft protection curtain has the characteristics of good concealment, powerful functions, safety and reliability, and is suitable for various occasions such as personal users, commercial users and the like.

Description

Remote photographing and uploading management system based on hidden camera
Technical Field
The application relates to the field of safety monitoring, in particular to a remote photographing and uploading management system based on a hidden camera.
Background
With the development of society and the progress of technology, hidden cameras play an increasingly important role in the fields of monitoring and security. Enterprises and institutions need to monitor and protect their own interests, as well as protect the privacy of employees and customers. The safe, reliable and stable concealed camera remote photographing uploading management system is established, and the problems can be effectively solved.
On one hand, the system can improve the monitoring efficiency, upload and transmit real-time monitoring data, and strengthen and improve the safety and monitoring capability of enterprises. On the other hand, the system can protect the privacy of staff and clients, classify and manage shot data, and reduce the risk of privacy disclosure. In addition, the system can realize remote control and management of the hidden camera, and improves the flexibility of use and the convenience of operation. Through cloud data storage and backup, the reliability and the safety of data can be ensured, and a more perfect solution is provided for monitoring and security work of enterprises. Therefore, it is very necessary and important to build a hidden camera remote photographing upload management system.
Patent CN110460748A discloses a camera and a monitoring system, the camera comprises a tele lens motor driving chip, a tele lens driving motor set, a tele lens, a wide lens motor driving chip, a wide lens driving motor set and a wide lens; the optical axis of the tele lens is parallel to the optical axis of the wide-angle lens, and the overlapping area of the shooting range of the tele lens and the shooting range of the wide-angle lens is larger than a preset threshold; the driving signal output end of the long-focus lens motor driving chip is connected with a long-focus lens driving motor group, and the long-focus lens driving motor group is in driving connection with the long-focus lens to drive the long-focus lens to move in the shooting direction; the driving signal output end of the wide-angle lens motor driving chip is connected with a wide-angle lens driving motor group, and the wide-angle lens driving motor group is connected with the wide-angle lens in a driving way to drive the wide-angle lens to move in the shooting direction. However, the application has the problems of certain bone exposure, poor flexibility, complex system, limited data sharing and transmission and remote management realized by the cooperation of safety monitoring and the Internet.
However, in the process of implementing the technical scheme of the embodiment of the application, the inventor discovers that the above technology has at least the following technical problems:
the conventional monitoring camera can only capture a specific area and cannot monitor in all directions. Conventional monitoring systems typically require human duty to implement real-time monitoring, and this mode consumes a significant amount of human and material resources. And the traditional camera is insufficient in data processing capability and poor in concealment, and the appearance of the traditional camera is mostly obvious and is very easy to be found and damaged by people.
Disclosure of Invention
In order to solve the problems in the prior art, a remote photographing and uploading management system based on a hidden camera is provided
Technical proposal
In order to achieve the above purpose, the application is realized by the following technical scheme: a remote photographing and uploading management system based on a hidden camera comprises a hidden camera control subsystem, wherein the hidden camera control subsystem is used for controlling and managing a camera, monitoring the surrounding environment by using a sensor, triggering the camera to photograph when the sensor detects activity, acquiring and storing picture information, establishing connection with a management system, and accessing an image in an identity verification mode; further, the hidden camera control subsystem specifically includes: the device management module is used for managing all camera devices in the system, including the operations of adding, deleting, modifying and inquiring the devices and the state monitoring of the devices; the recording management module is used for controlling the recording behavior of the camera, supporting different recording modes and setting recording resolution, recording time and recording frequency parameters; the storage management module is used for managing the data recorded by the camera, including storage positions, storage capacity and backup operation of video and picture files, and the transmission and sharing functions of the data; and a camera preview module: the camera is used for previewing the camera in real time by a user, and the user observes the condition of the monitored area through the module and grasps the condition in the monitoring range in real time; alarm management module: the system is used for setting abnormal alarm conditions, including that when a moving object is detected and sounds, the system can send alarm information to inform related personnel in a mail and short message mode.
The application is realized by the following technical scheme: a remote photographing and uploading management system based on a hidden camera comprises a hidden camera control subsystem, wherein the hidden camera control subsystem is used for controlling and managing a camera, monitoring the surrounding environment by using a sensor, triggering the camera to photograph when the sensor detects activity, acquiring and storing picture information, establishing connection with a management system, and accessing an image in an identity verification mode;
further, the hidden camera control subsystem specifically includes: the device management module is used for managing all camera devices in the system, including the operations of adding, deleting, modifying and inquiring the devices and the state monitoring of the devices; the recording management module is used for controlling the recording behaviors of the camera recording resolution, the recording time and the recording frequency parameters and supporting different recording modes; the storage management module is used for managing the data recorded by the camera, including storage positions, storage capacity and backup operation of video and picture files, and the transmission and sharing functions of the data; and a camera preview module: the real-time preview module is used for previewing the camera in real time, observing the condition of the monitored area through the module and grasping the condition in the monitoring range in real time; alarm management module: the system is used for setting abnormal alarm conditions, including that when a moving object is detected and sounds, the system can send alarm information to inform related personnel in a mail and short message mode.
The image processing and storing subsystem is used for processing the real-time image data transmitted from the hidden camera control subsystem, and the image data processing method comprises the steps of compressing and storing images by a JPEG (joint photographic experts group) compression method and protecting the safety of the images by an RSA (RSA encryption) method;
further, the picture processing and storage subsystem includes: and a data compression module: the method is used for compressing the original data, so that the occupied amount of data transmission and storage space is reduced; and a picture classification module: dividing the pictures into different categories according to the actual meaning and the functions of the pictures by adopting a picture classification technology, and ensuring the safety and the integrity of stored data; and a data encryption module: the uploaded photos can be encrypted by using a data encryption technology to ensure privacy and safety and prevent unauthorized access and use; and a storage management module: the method is used for carrying out distributed storage on the uploaded data to realize redundant backup and high availability of the data.
Further, the RSA encryption method uses the difference between two large primes to encrypt and decrypt, so as to ensure the security in the transmission process, and the specific analysis includes: selecting one of 1 to 1Integer numberAs a public key index e, the modulo-inverse element of e is calculated as d, so that +.>According to the formula
Wherein the method comprises the steps ofThe Euler function of n, p and q are two different prime numbers, n is the product of the two prime numbers p and q, the public key is (n, e), the private key is (n, d), and the specific encryption and decryption processes are as follows: converting the plaintext M into a digital M, obtaining a ciphertext C by using a formula M & ltm & gt emodn, and restoring the C into the original plaintext M by using a formula C & ltm & gt emodn.
Further, in the specific JPEG compression method, the acquired picture is compressed into a smaller storage space by the JPEG compression method, and the algorithm parsing process includes: compressing the preprocessed image by using a JPEG compression method, and dividing the image into a plurality of 8X8 pixel blocks, wherein each pixel block can be represented as X (i, j), and 0< =i, j < =7; performing discrete cosine transform on each pixel block to obtain a frequency coefficient C (u, v) of the pixel block, wherein 0< = u, v < = 7, and the transformation formula is as follows:
wherein alpha (u) is a normalized coefficient of a u-th basis function in the discrete cosine transform, alpha (v) is a normalized coefficient of a v-th basis function in the discrete cosine transform, x, y represents a coordinate position of a certain numerical value in the image data matrix, f (x, y) represents a plurality of numerical values in the image data matrix, and u, v represents a coordinate position of a certain numerical value in the matrix after the discrete cosine transform;
the frequency coefficient C (u, v) is quantized to obtain a quantized coefficient Q (u, v), and a quantization formula is as follows:
wherein D (u, v) is a corresponding quantization factor in a quantization table, and the quantization table generally adopts a fixed standard table, and the quantization coefficient Q (u, v) is encoded to obtain a compressed data stream after entropy encoding.
And the database management subsystem is used for storing the data information into the database through the picture processing and storage subsystem, carrying out backup and recovery processing when the data is stored, and supporting data query, analysis and management.
Further, the database management subsystem includes: and (3) data acquisition: the database management subsystem periodically collects data from the hidden camera device, and the obtained data is stored in a database in a specific format and structure; and (3) data storage: the database management subsystem stores the acquired data in a database according to a specified storage structure; for different types of data, different storage strategies are adopted; and (3) data management: the database management subsystem can manage data, including data adding, modifying and deleting operations, and can back up and restore the data in the database, so that the data is prevented from being lost and misplaced; and (3) data retrieval: the database management subsystem processes the inquiry request of the user, and retrieves and returns the data meeting the conditions; data analysis: the database management subsystem outputs various statistical reports of the system through statistics and analysis of the data, so that a system manager can make analysis and decision on the running condition of the system. The security management subsystem comprises user identity verification, authority management and security management of the hidden camera equipment, wherein the user identity verification and the authority management are used for preventing illegal users from accessing the system; the security management of the hidden camera device is used to ensure the security of the camera device and prevent illegal intrusion; the front-end page and the mobile application system comprise a front-end interface and a data interaction function, and are used for the interaction between a user and the hidden camera and the remote photographing uploading management system thereof; the front-end page is used for providing a main inlet and an operation interface of the system, and the mobile application system is used for providing an operation interface of the mobile terminal.
Further, the security management subsystem specifically includes: user authentication verification and rights management: the security management subsystem is used for verifying the identity of a user by setting up a security authentication mode of an account number and a password, ensuring that only an authorized user can remotely log in, operating the management system, distributing and managing the authority, and endowing different authorities to users with different levels so as to ensure that sensitive information cannot be accessed, modified or deleted by unauthorized users; data encryption and transmission security: for the data shot by the hidden camera, the security management subsystem needs to encrypt the data so as to ensure that the data cannot be illegally acquired by a third party in the transmission and storage processes; the SSL protocol and the VPN secure communication protocol are used for protecting internet transmission, so that data leakage or tampering is avoided; security alarms and event management: the abnormality detection and processing system regularly monitors the state of the equipment and analyzes the state, finds the abnormal behavior of the equipment, and immediately informs an administrator and executes an early warning processing program to audit and monitor.
The front-end page and the mobile application system comprise a front-end interface and a data interaction function, and are used for the interaction between a user and the hidden camera and the remote photographing uploading management system thereof; the front page is used for providing a main inlet and an operation interface of the system; the mobile application system is used for providing an operation interface of the mobile terminal.
Further, the front-end page and the mobile application system specifically include: front page: an entry for a user to access the system through a browser; and the real-time monitoring module is used for: the method is used for monitoring pictures of the connected hidden cameras in real time and acquiring conditions of a target area in real time; remote photographing and uploading module: the hidden camera is used for selecting a connected hidden camera from a front-end page and a mobile application program, and uploading a shot photo to a cloud server; and the data query and management module: the method is used for inquiring and managing the data stored in the system in front-end pages and mobile application systems, and is convenient for the system to monitor and manage the target area in an omnibearing way.
Further, the front-end page and the mobile application system specifically include: a user login verification module: the user name and password login method is used for detecting whether the user name and password login provided by a user is correct or not; the equipment state inquiry module: the monitoring device is used for checking the states of all monitoring devices, including an online state and a video recording state; and a device remote control function module: the system is used for the mobile application system to remotely control the remote equipment, scale, rotate and adjust the equipment, and is convenient for a user to monitor in real time; the user communicates with the administrator module: the system is used for users to communicate with an administrator, propose advice and feedback information, and improve the usability and user experience of the system.
Further, the SSL protocol and VPN secure communication protocol protect internet transmission, including: the SSL protocol can be used for carrying out security encryption on the data, so that the security in the data transmission process from the hidden camera to the receiving end is ensured; the use of VPN secure communication protocols may secure the data transmission path between the hidden camera and the receiving end.
Compared with the prior art, the application has the following beneficial effects:
(1) According to the image processing and storing subsystem, the shot image data is compressed through the data compression module, so that the bandwidth and the transmission time required by data transmission are reduced, and the instantaneity and the efficiency of the system are improved. Different pictures are placed in different folders or databases through the picture classification module, so that the management and the use are convenient, and the availability of picture data is improved. And the data encryption module is used for encrypting the compressed picture data to ensure confidentiality and security of the data. Only authorized personnel can decrypt and view the picture data, and sensitive information is prevented from being revealed. And the storage management module is used for managing the compressed and encrypted picture data and comprises the operations of data storage, backup and recovery. The integrity and the safety of the data can be ensured, and the data is prevented from being lost or damaged. The image data processing method comprises a JPEG compression method for reasonably compressing the stored image, and an RSA encryption method is used for protecting the safety of the image data.
(2) The hidden camera control subsystem controls and manages shooting behaviors of the hidden camera through the camera control module so as to realize reliable and stable quality of shot videos and pictures; the alarm management module can detect abnormal conditions and send out an alarm so as to remind a user of making corresponding response measures; the camera preview module can monitor in real time, so that bad or suspicious activities are prevented from happening, and the safety of the system is improved.
(3) The database management subsystem stores the collected picture data, various parameter settings and system log information through the data storage module, and provides reliable data storage guarantee for the system. The data analysis module is used for classifying the collected picture data and detecting special targets so as to help a user to better understand and utilize the picture data.
Of course, it is not necessary for any one product to practice the application to achieve all of the advantages set forth above at the same time.
Drawings
FIG. 1 is a schematic diagram of the connection of subsystems of the system of the present application;
fig. 2 is a schematic diagram of connection of a hidden camera control subsystem according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present application, it should be understood that the terms "open," "upper," "lower," "thickness," "top," "middle," "length," "inner," "peripheral," and the like indicate orientation or positional relationships, merely for convenience in describing the present application and to simplify the description, and do not indicate or imply that the components or elements referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present application.
Referring to fig. 1, the embodiment of the application provides a technical scheme: a remote photographing and uploading management system based on a hidden camera comprises a hidden camera control subsystem, a picture processing and storage subsystem, a database management subsystem, a security management subsystem, a front-end page and mobile application system, wherein the front-end page and mobile application system and the picture processing and storage subsystem are connected with the database management subsystem.
In this embodiment, the hidden camera control subsystem is configured to control and manage a camera, monitor a surrounding environment with a sensor, trigger the camera to take a picture when the sensor detects activity, acquire and store picture information, and establish a connection with a management system to access an image in an identity verification manner; the hidden camera control subsystem specifically comprises: the device management module is used for managing all camera devices in the system, including the operations of adding, deleting, modifying and inquiring the devices and the state monitoring of the devices; the recording management module is used for controlling the recording behavior of the camera, supporting different recording modes and setting recording resolution, recording time and recording frequency parameters; the storage management module is used for managing the data recorded by the camera, including storage positions, storage capacity and backup operation of video and picture files, and the transmission and sharing functions of the data; and a camera preview module: the camera is used for previewing the camera in real time by a user, and the user observes the condition of the monitored area through the module and grasps the condition in the monitoring range in real time; alarm management module: the system is used for setting abnormal alarm conditions, including that when a moving object is detected and sounds, the system can send alarm information to inform related personnel in a mail and short message mode.
Specifically, the hidden camera control subsystem includes the deployment and configuration of hidden cameras: the appropriate microprocessor, camera, memory device are selected for manufacture and assembly in the design and manufacture of the concealed camera. Special care is required in the process to be taken to be covert and miniaturised, to ensure that it can be installed in the supervised area covertly and to ensure that it is connected to the network, connected to the power supply and in communication with the upload management system. And sending configuration commands to adjust the parameters of the visual field, the direction, the brightness and the contrast of the camera by different modes such as a control center, a WEB page or a mobile application program.
In this embodiment, the image processing and storing subsystem is used for processing the real-time image data transmitted from the hidden camera control subsystem, the image data processing method includes compressing and storing the image by a JPEG compression method, and protecting the safety of the image by an RSA encryption method; and a data compression module: the method is used for compressing the original data, so that the occupied amount of data transmission and storage space is reduced; and a picture classification module: dividing the pictures into different categories according to the actual meaning and the functions of the pictures by adopting a picture classification technology, and ensuring the safety and the integrity of stored data; and a data encryption module: the uploaded photos can be encrypted by using a data encryption technology to ensure privacy and safety and prevent unauthorized access and use; and a storage management module: the method is used for carrying out distributed storage on the uploaded data to realize redundant backup and high availability of the data.
The method comprises the steps of registering camera equipment in a remote uploading management system, inputting camera information, equipment ID, serial numbers and passwords into the system, creating monitoring packets in the system, and adding hidden camera equipment into the corresponding monitoring packets; and calling a management system monitoring window, acquiring the camera picture in real time, recording data and uploading the recorded data to a cloud or a server for storage. And meanwhile, analyzing and mining the acquired data. And the collected image data is analyzed, so that the information of the target object can be obtained, and the use efficiency and the value of the data are effectively improved.
In the embodiment, the picture processing and storing subsystem, specifically, the RSA method in the picture processing and storing subsystem encrypts and decrypts by utilizing the difference between two large prime numbers, so as to ensure the security in the transmission process; the specific analysis process comprises the following steps:
selecting two different prime numbers p and q, and recording the product of the two prime numbers p and q as n according to the formula
Wherein the method comprises the steps ofFor the Euler function of n, a1 to +.>The integer is denoted as e as the public key exponent and the modulo-inverse element of e is denoted as d, so that +.>When uploading data, generating a digital signature, wherein the public key is (n, e), the private key is (n, d), and the specific encryption and decryption processes are as follows: converting the plaintext M into a digital M, and obtaining a ciphertext C by using a formula M; and obtaining a plaintext m by using the formula C dm odn from the ciphertext C.
In this embodiment, the image processing and storing subsystem uses a JPEG compression method for compressing the preprocessed image. Illustratively, the specific parsing process includes: a1, dividing the image into a plurality of 8X8 pixel blocks, wherein the pixel value in each small block is represented as 8 bit bytes and each pixel block can be represented as X (i, j), wherein 0< =i, j < =7; a2, discrete cosine transform is carried out on each pixel block, and the discrete cosine transform is converted into coefficients in a frequency domain. The step is to convert the image in the spatial domain to the frequency domain, so that redundant information can be removed to finally obtain the frequency coefficient C (u, v) of the pixel block, wherein 0< = u, v < = 7, and the transformation formula is as follows:
wherein alpha (u) is a normalized coefficient of a u-th basis function in the discrete cosine transform, alpha (v) is a normalized coefficient of a v-th basis function in the discrete cosine transform, x, y represents a coordinate position of a certain numerical value in the image data matrix, f (x, y) represents a plurality of numerical values in the image data matrix, and u, v represents a coordinate position of a certain numerical value in the matrix after the discrete cosine transform;
a3, quantizing the frequency coefficient C (u, v) to obtain a quantized coefficient Q (u, v), wherein a quantization formula is as follows:
wherein D (u, v) is a corresponding quantization factor in a quantization table, and the quantization table generally adopts a fixed standard table, and the quantization coefficient Q (u, v) is encoded to obtain a compressed data stream after entropy encoding.
And A4, entropy coding is carried out on the quantized coefficients, and the quantized coefficients are converted into binary data and compressed. The JPEG standard uses a huffman coding based method that uses fewer bits to encode with higher frequency coefficients and more bits to encode with lower frequency coefficients.
A5, restoring all the entropy coded coefficients into an image.
A6, storing the binary data after entropy coding in a file to form a JPEG image.
Further, the front-end page and the mobile application system comprise a real-time monitoring module: the method comprises the steps of monitoring pictures of a connected hidden camera in real time, and acquiring conditions of a target area at the first time; remote photographing and uploading module: the hidden camera is used for correspondingly connecting the front-end page and the mobile application system, storing the shot photo data of the hidden camera in the cloud end, and extracting alarm logs, abnormal flow and user access records by utilizing a data analysis technology; the hidden camera is accessed remotely, monitored and operated to ensure normal operation of the device and to efficiently respond to abnormal conditions. Remote control and data viewing: on a monitoring page of the cloud platform, a user can view and manage the monitoring page in real time and process an online camera. In addition, the administrator sets corresponding user rights according to the authorization rights, and modifies the authorization rules and corresponding data analysis standards. In addition, remote control and data viewing can be performed through the APP terminal equipment, so that more convenient and instant monitoring can be performed. And the data query and management module: the method is used for inquiring and managing the picture and video data stored in the system in front-end pages and mobile application systems, and is convenient for the user to monitor and manage the target area in an omnibearing manner.
In this embodiment, the security management subsystem includes user authentication and rights management for preventing illegal users from accessing the system and unauthorized operation of the data, and security management of the hidden camera device; security management of concealed camera devices is used to ensure security of the camera devices and to prevent illegal intrusion.
Specifically, user authentication and rights management: the security management subsystem can distribute different authorities to different types of users before the system operates by setting up an account password security authentication mode, so that only authorized users can log in remotely, the management system is operated, meanwhile, authority distribution and management can be carried out, and different authorities are given to different levels of users so as to ensure that sensitive information cannot be accessed, modified or deleted by unauthorized users. Data encryption and transmission security: for the data shot by the hidden camera, the security management subsystem needs to encrypt the data so as to ensure that the data cannot be illegally acquired by a third party in the transmission and storage processes, and an SSL protocol and a VPN security communication protocol are used for protecting internet transmission so as to avoid data leakage or tampering.
In this embodiment, the database management subsystem is configured to perform backup and recovery processing on data when data information captured by the hidden camera is transmitted to the database for storage through the picture processing subsystem, and support data query, analysis and management; the system comprises data acquisition: the database management subsystem periodically collects data from the hidden camera device, and the obtained data is stored in a database in a specific format and structure; and (3) data storage: the database management subsystem stores the acquired data in a database according to a specified storage structure; for different types of data, different storage strategies may be employed; and (3) data management: the database management subsystem can manage data, including data adding, modifying and deleting operations, and can back up and restore the data in the database, so that the data is prevented from being lost and misplaced; and (3) data retrieval: the database management subsystem processes the inquiry request of the user, and retrieves and returns the data meeting the conditions; data analysis: the database management subsystem outputs various statistical reports of the system through statistics and analysis of the data, so that a system manager can make analysis and decision on the running condition of the system.
Specifically, image data shot by the hidden camera is managed and processed, and the image data shot by the hidden camera is collected, integrated, stored and backed up; the database management subsystem performs planning and management on a storage mode, a storage period and permission management of a visitor, and marks and classifies important image data; the user can search, retrieve and screen the image data through the database management subsystem;
referring to fig. 2, the embodiment of the application provides a technical scheme: a remote photographing and uploading management system based on a hidden camera comprises a device management module, a recording management module, a storage management module, a camera preview module and an alarm management module.
Specifically, the device management module is responsible for managing and controlling the monitoring of the connection and state of the hardware devices of the computer and the camera, and displaying the device information in a list form. The recording management module is connected to the video input hardware and the storage medium and is used for controlling recording parameters and storage positions, setting a video recording plan, recording videos or pictures and managing recorded files, such as checking and deleting. The storage management module is connected to the recording management module and the remote access control module and is responsible for managing storage equipment and file systems, including retrieval, backup and archiving operations, and managing the positions and sizes of stored video and picture data and the use condition of storage space. The camera preview module is connected to the video input device, previews the monitoring picture in real time and displays the data shot by the camera on the monitoring system in real time, and can realize multi-picture preview and also can interactively cooperate with the storage management module and the alarm management module. The alarm management module is connected to the whole subsystem and comprises a monitoring camera, a storage medium and remote access control, and is used for detecting and responding to abnormal events in real time, and timely notifying a system manager of camera related information indicating alarm and triggering corresponding alarm processing through the alarm module when the abnormal condition occurs in the monitoring system.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The preferred embodiments of the application disclosed above are intended only to assist in the explanation of the application. The preferred embodiments are not intended to be exhaustive or to limit the application to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the application and the practical application, to thereby enable others skilled in the art to best understand and utilize the application. The application is limited only by the claims and the full scope and equivalents thereof.

Claims (10)

1. Remote photographing and uploading management system based on hidden camera, which is characterized in that the system comprises:
the hidden camera control subsystem is used for controlling and managing the camera, monitoring the surrounding environment by using a sensor, triggering the camera to take a picture when the sensor detects activity, acquiring and storing picture information, establishing connection with a management system, and accessing an image in an identity verification mode;
the image processing and storing subsystem is used for processing the real-time image data transmitted from the hidden camera control subsystem, and the image data processing method comprises the steps of compressing and storing images by a JPEG (joint photographic experts group) compression method and protecting the safety of the images by an RSA (RSA encryption) method;
the database management subsystem is used for storing the data information into the database through the picture processing and storing subsystem, carrying out backup and recovery processing when the data is stored, and supporting data query, analysis and management;
the security management subsystem comprises user identity verification, authority management and security management of the hidden camera equipment, wherein the user identity verification and the authority management are used for preventing illegal users from accessing the system; the security management of the hidden camera device is used to ensure the security of the camera device and prevent illegal intrusion;
the front-end page and the mobile application system comprise a front-end interface and a data interaction function, and are used for the interaction between a user and the hidden camera and the remote photographing uploading management system thereof; the front-end page is used for providing a main inlet and an operation interface of the system, and the mobile application system is used for providing an operation interface of the mobile terminal.
2. The remote photographing and uploading management system based on the hidden camera as claimed in claim 1, wherein the hidden camera control subsystem specifically comprises:
the device management module is used for managing all camera devices in the system, including the operations of adding, deleting, modifying and inquiring the devices and the state monitoring of the devices;
the recording management module is used for controlling the recording behaviors of the camera recording resolution, the recording time and the recording frequency parameters and supporting different recording modes;
the storage management module is used for managing the data recorded by the camera, including storage positions, storage capacity and backup operation of video and picture files, and the transmission and sharing functions of the data;
and a camera preview module: the real-time preview module is used for previewing the camera in real time, observing the condition of the monitored area through the module and grasping the condition in the monitoring range in real time;
alarm management module: the system is used for setting abnormal alarm conditions, including that when a moving object is detected and sounds, the system can send alarm information to inform related personnel in a mail and short message mode.
3. The concealed camera based remote photographing upload management system of claim 1, wherein the picture processing and storage subsystem comprises:
and a data compression module: the method is used for compressing the original data, so that the occupied amount of data transmission and storage space is reduced;
and a picture classification module: dividing the pictures into different categories according to the actual meaning and the functions of the pictures by adopting a picture classification technology, and ensuring the safety and the integrity of stored data;
and a data encryption module: the uploaded photos can be encrypted by using a data encryption technology to ensure privacy and safety and prevent unauthorized access and use;
and a storage management module: the method is used for carrying out distributed storage on the uploaded data to realize redundant backup and high availability of the data.
4. The remote photographing and uploading management system based on a hidden camera as claimed in claim 1, wherein the RSA encryption method uses the difference between two large primes to encrypt and decrypt, ensures the security in the transmission process, and the specific analysis includes:
selecting one of 1 to 1The integer is denoted as e as the public key exponent and the modulo-inverse element of e is denoted as d, such thatAccording to the formula
Wherein the method comprises the steps ofThe Euler function of n, p and q are two different prime numbers, n is the product of the two prime numbers p and q, the public key is (n, e), the private key is (n, d), and the specific encryption and decryption processes are as follows: the plaintext M is converted into a digital M, a ciphertext C is obtained by using a formula M-d-mod n, and the original plaintext M is restored by using the formula C-d-mod n.
5. The concealed camera based remote photographing upload management system of claim 1 wherein said picture processing subsystem comprises: compressing the acquired picture into a smaller storage space by a JPEG compression method, wherein the analysis process of the specific JPEG compression method comprises the following steps:
compressing the preprocessed image by using a JPEG compression method, and dividing the image into a plurality of 8X8 pixel blocks, wherein each pixel block can be represented as X (i, j), and 0< =i, j < =7; performing discrete cosine transform on each pixel block to obtain a frequency coefficient C (u, v) of the pixel block, wherein 0< = u, v < = 7, and the transformation formula is as follows:
wherein alpha (u) is a normalized coefficient of a u-th basis function in the discrete cosine transform, alpha (v) is a normalized coefficient of a v-th basis function in the discrete cosine transform, x, y represents a coordinate position of a certain numerical value in the image data matrix, f (x, y) represents a plurality of numerical values in the image data matrix, and u, v represents a coordinate position of a certain numerical value in the matrix after the discrete cosine transform;
the frequency coefficient C (u, v) is quantized to obtain a quantized coefficient Q (u, v), and a quantization formula is as follows:
wherein D (u, v) is a corresponding quantization factor in a quantization table, and the quantization table generally adopts a fixed standard table, and the quantization coefficient Q (u, v) is encoded to obtain a compressed data stream after entropy encoding.
6. The concealed camera based remote photographing upload management system of claim 1 wherein said database management subsystem comprises:
and (3) data acquisition: the database management subsystem periodically collects data from the hidden camera device, and the obtained data is stored in a database in a specific format and structure;
and (3) data storage: the database management subsystem stores the acquired data in a database according to a specified storage structure; for different types of data, different storage strategies are adopted;
and (3) data management: the database management subsystem can manage data, including data adding, modifying and deleting operations, and can back up and restore the data in the database, so that the data is prevented from being lost and misplaced;
and (3) data retrieval: the database management subsystem processes the inquiry request of the user, and retrieves and returns the data meeting the conditions;
data analysis: the database management subsystem outputs various statistical reports of the system through statistics and analysis of the data, so that a system manager can make analysis and decision on the running condition of the system.
7. The remote photographing and uploading management system based on the hidden camera as claimed in claim 1, wherein the security management subsystem specifically comprises:
user authentication verification and rights management: the security management subsystem is used for verifying the identity of the user by setting up a security authentication mode of an account number and a password, ensuring that only authorized users can remotely log in, operating the management system, distributing and managing the authorities, endowing different authorities to users with different levels, and ensuring that sensitive information cannot be accessed, modified or deleted by unauthorized users;
data encryption and transmission security: for the data shot by the hidden camera, the security management subsystem needs to encrypt the data, so that the data cannot be illegally acquired by a third party in the transmission and storage processes; the SSL protocol and the VPN secure communication protocol are used for protecting internet transmission, so that data leakage or tampering is avoided;
security alarms and event management: the abnormality detection and processing system regularly monitors the state of the equipment and analyzes the state, finds the abnormal behavior of the equipment, and immediately informs an administrator and executes an early warning processing program to audit and monitor.
8. The remote photographing and uploading management system based on the hidden camera as claimed in claim 1, wherein the front-end page and the mobile application system specifically comprise:
front page: an entry for a user to access the system through a browser;
and the real-time monitoring module is used for: the method is used for monitoring pictures of the connected hidden cameras in real time and acquiring conditions of a target area in real time;
remote photographing and uploading module: the hidden camera is used for selecting a connected hidden camera from a front-end page and a mobile application program, and uploading a shot photo to a cloud server;
and the data query and management module: the method is used for inquiring and managing the data stored in the system in front-end pages and mobile application systems, and is convenient for the system to monitor and manage the target area in an omnibearing way.
9. The remote photographing and uploading management system based on the hidden camera as claimed in claim 1, wherein the front-end page and the mobile application system specifically comprise:
a user login verification module: the user name and password login method is used for detecting whether the user name and password login provided by a user is correct or not;
the equipment state inquiry module: the monitoring device is used for checking the states of all monitoring devices, including an online state and a video recording state;
and a device remote control function module: the system is used for the mobile application system to remotely control the remote equipment, scale, rotate and adjust the equipment, and is convenient for a user to monitor in real time;
the user communicates with the administrator module: the system is used for users to communicate with an administrator, propose advice and feedback information, and improve the usability and user experience of the system.
10. The remote photographing and uploading management system based on a hidden camera as claimed in claim 7, wherein the SSL protocol, VPN security communication protocol protect internet transmission, comprising: the SSL protocol can be used for carrying out security encryption on the data, so that the security in the data transmission process from the hidden camera to the receiving end is ensured; the use of VPN secure communication protocols may secure the data transmission path between the hidden camera and the receiving end.
CN202311015096.4A 2023-08-14 2023-08-14 Remote photographing and uploading management system based on hidden camera Pending CN117135446A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311015096.4A CN117135446A (en) 2023-08-14 2023-08-14 Remote photographing and uploading management system based on hidden camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311015096.4A CN117135446A (en) 2023-08-14 2023-08-14 Remote photographing and uploading management system based on hidden camera

Publications (1)

Publication Number Publication Date
CN117135446A true CN117135446A (en) 2023-11-28

Family

ID=88862098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311015096.4A Pending CN117135446A (en) 2023-08-14 2023-08-14 Remote photographing and uploading management system based on hidden camera

Country Status (1)

Country Link
CN (1) CN117135446A (en)

Similar Documents

Publication Publication Date Title
CN111447414B (en) Video monitoring system and method convenient to dispatch and monitor
US8872917B1 (en) Tamper-resistant video surveillance network
US20070296817A1 (en) Smart Video Surveillance System Ensuring Privacy
US20060010199A1 (en) Method and system for providing information to remote clients
CN104867217A (en) Community monitoring and management system
Rajpoot et al. Security and privacy in video surveillance: requirements and challenges
KR20120035299A (en) Image protection processing apparatus for privacy protection, and image security system and method using the same
EP2654308B1 (en) System for monitoring the misuse of image information
CN101005611B (en) Net bar video frequency monitor and real name shooting method, system and device
KR102150001B1 (en) Method and apparatus for integrally menaging multiple closed-circuit television
CN101600097B (en) Method and system for security protection monitoring for mobile multimedia
JP2016184917A (en) Monitoring system and reproduction device
US20040250288A1 (en) Method and apparatus for storing surveillance films
CA2228679A1 (en) Surveillance systems
CN112966042A (en) Law enforcement recorder information processing method and system based on block chain
CN113962577A (en) Multi-system intelligent park platform
KR20170131785A (en) Method for privacy object masking and key management for user authentication in video surveillance system and video surveillance system using the same
CN117135446A (en) Remote photographing and uploading management system based on hidden camera
EP3282695A1 (en) Video surveillance system
JP2005094642A (en) Surveillance camera system
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
Matusek et al. Nivss: a nearly indestructible video surveillance system
CN112995220A (en) Security data security system for computer network
CN118158356A (en) Medicine field electronic monitoring system
Zhang et al. Research on remote monitoring video encryption technology based on chaos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination