Image privacy protection processing technology

A privacy protection, image technology, applied in the direction of image data processing, image data processing, instruments, etc., can solve the problems of privacy leakage, image file outflow, etc.

Inactive Publication Date: 2012-07-11
无锡智科传感网技术股份有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the image is not blurred and encrypted, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0006] This specific embodiment adopts the following technical solutions: 1. Characterize the picture, analyze the range of the image, and select part or all of the range; 2. Apply an encryption algorithm to encrypt the pixel value of the original image, and generate an ID and encryption key , The generated ID value is kept in the image file; 3. The encrypted image and the image feature description are combined into a picture, which has visibility and can protect the privacy of the picture (change the original image screen content); 4. Reading the original image requires the user to perform identity authentication with the central authorization system to obtain the key; 5. Read the image key through the central authorization system, decrypt the encrypted image pixel value, and obtain the original image.

[0007] This specific embodiment enables the image to not only protect privacy and visibility, but also to display the decrypted original image when authorized.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image privacy protection processing technology, relating to a technical method capable of encrypting/decrypting a pixel value of a local or entire range in an image. The image privacy protection processing technology comprises the steps of: 1, carrying out feature description on the image and selecting a local or entire range of the image; 2, encrypting the pixel value of the original image by using an encryption algorithm, generating an ID and an encryption key, and maintaining the generated ID in an image file; 3, combining the encrypted image with the image feature description to a picture, wherein the picture has visibility and can protect privacy in the image; 4, reading the original image by carrying out identity authentication to a central authentication system by a user, and obtaining a secret key; and 5, reading the secret key of the image through the central authentication system, decrypting the pixel value of the encrypted image, and obtaining the original image. According to the image privacy protection processing technology, the decrypted original image can be displayed under the conditions of protecting the privacy and being authorized.

Description

Technical field: [0001] The invention relates to an image privacy protection processing technology, in particular to a technical method capable of encrypting / decrypting pixel values ​​in a partial or entire range in an image. Background technique: [0002] The monitoring equipment on urban roads, such as checkpoints, adopts advanced technology to monitor the monitoring section in real time around the clock and record relevant image data. The high-definition checkpoint can clearly display all the detailed information of the vehicle and the facial features of the driver on a single photo. Provide important information and evidence for the timely detection of traffic violation investigations, escapes in traffic accidents, and theft of motor vehicles. Since the image is not blurred and encrypted, the image file will be in a state of leaking privacy. In order to protect privacy and prevent images from being published by interested parties, a technology is needed to protect the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00H04N7/18
Inventor 周凡张超孟祥燕
Owner 无锡智科传感网技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products