Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An image privacy protection method and system

A privacy protection and privacy technology, applied in the computer field, can solve problems such as affecting information transmission, unauthorized users cannot view non-private parts of images, increase storage space and transmission bandwidth, etc., to reduce manual labor, save storage space and transmission The effect of bandwidth and flexibility

Active Publication Date: 2016-03-30
TSINGHUA UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the current method is used to operate, although the protection of privacy is realized, the storage space and transmission bandwidth required for the image are increased due to the encryption of the entire image, and the encryption of the entire image will also lead to unauthorized access. Users cannot see the non-private parts of the image, which affects the transmission of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image privacy protection method and system
  • An image privacy protection method and system
  • An image privacy protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The embodiment of the present invention proposes an image privacy protection method, such as figure 1 As shown, the method includes the following steps:

[0045] Step 101: Define the privacy area of ​​the source image.

[0046] Step 102: Mark the privacy area of ​​the source image.

[0047] Step 103: Perform blurring processing on the private area of ​​the source image to obtain a public image of the source image.

[0048] Step 104: Subtracting the blurred privacy area from the privacy area of ​​the source image to obtain a differential privacy image of the source image.

[0049] Step 105: Encrypt the differential private image of the source image to obtain an encrypted differential private image.

[0050] Step 106: After obtaining the public image of the source image and the encrypted differential private image, the unauthorized user checks the content of the public image of the source image.

[0051] It can be seen that in the embodiment of the present invention, ...

Embodiment 2

[0056] The implementation process of a preferred embodiment of the present invention will be described in more detail below through a specific example. see figure 2 , including the following steps:

[0057]Step 201: Define the privacy area of ​​the source image.

[0058] In this step, the owner of the source image can define one or more specific entities in the source image and / or one or more types of entities in the source image as privacy areas. For example, define a certain person's face and / or a certain person's name as a privacy area, or define all people's faces and / or all texts as a privacy area, and define a certain person's face and all texts as a privacy area.

[0059] Step 202: Mark out the privacy area according to the defined privacy area.

[0060] In this step, according to the defined privacy area, the corresponding image recognition technology is used to automatically mark the privacy area, or according to the defined privacy area, the privacy area is manua...

Embodiment 3

[0071] The embodiment of the present invention proposes an image privacy protection system, such as image 3 As shown, the system includes:

[0072] The privacy definition module 301 is used to define the privacy area of ​​the source image, and send the defined privacy area of ​​the source image to the privacy marking module 302;

[0073] The privacy marking module 302 is used to mark the privacy area of ​​the source image, and send the marked privacy area of ​​the source image to the privacy elimination module 303;

[0074] The privacy elimination module 303 is used to blur the privacy area of ​​the source image, obtain the public image of the source image, and send it to the unauthorized user module 306 and the authorized user module 307;

[0075] The privacy preservation module 304 is used to subtract the privacy area of ​​the fuzzy processing from the privacy area of ​​the source image to obtain a difference value privacy image of the source image, and send the difference...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for protecting privacy of images. The method includes steps of defining privacy zones of the source images; calibrating the privacy zones of the source images; blurring the privacy zones of the source images to obtain public images of the source images; subtracting the privacy zones of the source images from the blurred privacy zones to obtain difference privacy images of the source images; encrypting the difference privacy images of the source images to obtain encrypted difference privacy images; allowing unauthorized users to check contents of the public images of the source images after the unauthorized users acquire the public images of the source images and the encrypted difference privacy images. The method and the system have the advantage that the unauthorized users can check non-privacy contents of the images by the aid of the method and the system.

Description

technical field [0001] The invention belongs to the field of computers, in particular to an image privacy protection method and system. Background technique [0002] In recent years, cloud-based image storage and sharing systems have been welcomed by people. Users upload photos they take to cloud space for storage and share them with friends. On the one hand, these applications are convenient for users, but on the other hand, they also have great hidden dangers. The photos contain a lot of private information, such as who is where, who they are with, what they are doing, and so on. Once the private information is leaked to malicious users, it may pose a great threat to the spirit, property, and even personal safety of the photo owner. [0003] At present, the method of protecting the privacy of uploaded and shared pictures is: encrypt the entire image, and those who have the key can browse the content of the image, and those who do not have the key cannot see the content of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/6209G06F2221/2125
Inventor 张兰李向阳苗欣刘云浩
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products