Significance area protection method based on encryption image with visual meaning

A technology for encrypted image and area protection, applied in digital image processing and information security intersection, multimedia field, can solve the problems of encrypted image attacker attack, information leakage, feature encryption algorithm can not effectively protect the image salient area, etc., to achieve key data protective effect

Inactive Publication Date: 2016-09-21
温文媖
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the existing encryption algorithms convert the original image into a texture-like image or a noise image, which can be easily distinguished from ordinary images.
An image with similar texture or noise characteristics will inevitably attract the attention of attackers, so it is easy to cause information leaka...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Significance area protection method based on encryption image with visual meaning
  • Significance area protection method based on encryption image with visual meaning
  • Significance area protection method based on encryption image with visual meaning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] Embodiment 1: The salient regions mentioned in the present invention can be obtained in the compressed domain or in the uncompressed domain. like figure 1 As shown, the salient region of the image is first extracted, and the underlying features of the image are extracted according to the characteristics of the underlying features of human visual perception, such as color, texture, brightness, shape features, etc., and the feature fusion algorithm is constructed using image processing techniques to obtain salient area of ​​sexuality. Let's take the method of extracting salient regions in the compressed domain as an example, for the original image: figure 2 (a), figure 2 (b), figure 2 (c), first calculate the feature difference between DCT blocks Where k=1,2,3 represent brightness and color features, Ω k ={I,C rg ,C by}; Then calculate the texture difference between block i and block j where 4 represents the texture feature, T i and T j , denote the texture...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a significance area protection method based on an encryption image with visual meaning. The method is characterized in that a significance area is extracted via low-level feature of an image; a proper encryption scheme, which is designed by utilizing a chaotic encryption technology and/or an optical encryption technology, is used to preprocess the extracted significance area; and a random natural image is selected as a reference image, and the pre-encrypted image is converted into the encryption image with visual meaning. Key data of the image can be protected effectively.

Description

technical field [0001] The invention relates to a method for protecting a salient area of ​​an encrypted image based on visual meaning, which belongs to the field of multimedia technology, and specifically belongs to the cross field of digital image processing and information security. With this scheme, the key data of the image is effectively protected. Background technique [0002] With the rapid development of computer and communication technology, various Internet-based multimedia technologies have achieved unprecedented development. Users can transmit the captured images to the network through mobile devices. However, with the rapid development and popularization of network technology, image transmission and access have exposed related security issues. How to securely transmit image data in an open network has become an urgent problem to be solved. Cryptography is the most direct and basic method to protect the security of digital image information, and then image en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06N3/04
CPCG06N3/0418G06T1/00
Inventor 温文媖张玉书方玉明方志军杨勇袁飞牛杨寿渊
Owner 温文媖
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products