Random encryption and double-blind confidential matching method for images

A random encryption and matching method technology, which is applied in image enhancement, image analysis, image data processing, etc., can solve the problems of strong random noise, difficult to identify images, etc., and achieve the effect of high accuracy and good confidentiality

Active Publication Date: 2015-04-29
WUHAN INST OF PHYSICS & MATHEMATICS CHINESE ACADEMY OF SCI
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Mainly add strong random noise to the image data, making the image illegible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random encryption and double-blind confidential matching method for images
  • Random encryption and double-blind confidential matching method for images
  • Random encryption and double-blind confidential matching method for images

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] An image random encryption double-blind confidential matching method, the method includes the following steps:

[0041] (1) In the terminal A, the target image matrix Y to be matched is added to the random noise matrix N for encryption to obtain the encrypted target image matrix Y*=Y+N to be matched; the encryption effect is as follows figure 1 Shown: figure 1 (a) is the original image, figure 1 (b) is the image corresponding to the noise, figure 1 (c) for figure 1 (a) plus figure 1 (b) the resulting encrypted image;

[0042] (2) set up a database with M floating image matrices in terminal B, for the ith floating image matrix X i , adding random noise matrix N i , perform random encryption to get the encrypted floating image matrix X 0 i =X i +N i , i=1, 2, ..., M, forming an encrypted floating image matrix database;

[0043] (3) The encrypted target image matrix Y to be matched in terminal A * send to terminal B;

[0044] (4) In terminal B, the encrypted t...

Embodiment 2

[0049] An image random encryption double-blind confidential matching method, the method includes the following steps:

[0050] (1) Establish a database with 20 floating image matrices in terminal B, for the ith floating image matrix X i , adding Gauss noise N with mean value 0 and variance σ2=3002 i , perform random encryption to get the encrypted floating image matrix X 0 i =X i +N i , i=1, 2, ..., 20, after all 20 floating image matrices are encrypted, an encrypted floating image matrix database can be obtained;

[0051] (2) In terminal A, add the target image matrix Y to be matched with a mean value of 0 and a variance of σ 2=300 2 The Gauss noise N of N is randomly encrypted to obtain the encrypted target image matrix Y to be matched;

[0052] (3) Send the encrypted target image matrix Y in the terminal A to the terminal B;

[0053] (4) In terminal B, the encrypted target image matrix Y to be matched and the encrypted floating image matrix X in the image database ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a random encryption and double-blind confidential matching method for images, and relates to a non-stationary data measurement and image matching technologies. According to the method, the characteristic that a non-stationary measurement method is not affected by disturbance data distribution is used, and confidential matching of a target image with all floating images hidden by noises is realized, that is, image matching is performed under the condition that the target image and the floating images are encrypted. The method has the advantages as follows: the image matching precision is high; the encrypted target image cannot be intercepted and leaked during transmission; an image database is good in confidentiality; a to-be-matched object is encrypted, an operator cannot know information of the to-be-matched object, and even an encryption person cannot decrypt the to-be-matched object. The method has the broad application prospect in information security fields of identity authentication and the like.

Description

technical field [0001] The invention relates to data non-stability measurement and image matching technology, in particular to a non-stationary measurement-based image random encryption double-blind confidential matching technology. This technology has broad application prospects in the fields of identity authentication, pattern recognition and information security. Background technique [0002] Image matching is an important research branch in the field of image processing. In recent years, under the background of big data conditions and the rapid development of the Internet of Things, image matching technology has received extensive attention and attention. Based on the research results at home and abroad, image matching and recognition methods can be mainly divided into three categories: (1) The first category is the matching and recognition method based on feature points: Peng Jinye et al. In the data domain of wavelet decomposition, realize the method of multi-scale sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/00G06K9/64
CPCG06F21/16G06T1/00G06T5/50
Inventor 丁义明曾志高谭秋衡
Owner WUHAN INST OF PHYSICS & MATHEMATICS CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products