Image privacy protection processing technology
A privacy protection, image technology, applied in the direction of image data processing, image data processing, instruments, etc., can solve the problems of privacy leakage, image file outflow, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0006] This specific embodiment adopts the following technical solutions: 1. Carry out feature description to the picture, analyze the scope of the image, and select a part or all of it; 2. Apply an encryption algorithm to encrypt the pixel value of the original image to generate an ID and an encryption key , the generated ID value remains in the image file; 3, the encrypted image and the image feature description synthesize a picture, which has visibility and can protect the privacy in the picture (change the original image screen content); 4, To read the original image, the user needs to authenticate to the central authorization system to obtain the key; 5. Read the image key through the central authorization system, decrypt the encrypted image pixel value, and obtain the original image.
[0007] This specific implementation mode can make the image not only protect privacy and visibility, but also display the decrypted original image under authorized conditions.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com