Picture hiding method for protecting personal privacy, restoration method and picture hiding system
A personal privacy and image technology, applied in transmission system, image data processing, image data processing, etc., can solve the problem of low image processing efficiency and achieve the effect of avoiding encryption and high image processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example
[0111] Example: A picture hiding method used to protect personal privacy, the process of processing the original picture: Due to space limitations, only the process of processing the original picture is demonstrated; first prepare two pictures and one for the picture to be encrypted. figure 1 As shown, its size is 58.5KB, and the other is a display picture, which does not involve private information, such as figure 2 As shown, its size is 2.43KB. It includes the following steps:
[0112] Step 1 Scan the storage byte corresponding to the key tag in the original picture (source.jpg) according to Table 1, and record the storage byte corresponding to the key tag and its location information, and get: the SOI position of the key tag is 0, the storage word The section is 0xFFC0, the APP1 position is 2, and the storage byte is 0x FFE1. . . . . . The last one is the EOI position is 85297, and the storage byte is 0xFFD9. Collect storage bytes and locations to generate a list ;
[0...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com