Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Picture hiding method for protecting personal privacy, restoration method and picture hiding system

A personal privacy and image technology, applied in transmission system, image data processing, image data processing, etc., can solve the problem of low image processing efficiency and achieve the effect of avoiding encryption and high image processing efficiency

Active Publication Date: 2017-12-15
ENJOYOR COMPANY LIMITED
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the shortcomings of the existing image encryption method that the image processing efficiency is low when processing a large number of images, the present invention provides a method for hiding images and restoring personal privacy that has high image processing efficiency when processing a large number of images. Method and picture hiding system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture hiding method for protecting personal privacy, restoration method and picture hiding system
  • Picture hiding method for protecting personal privacy, restoration method and picture hiding system
  • Picture hiding method for protecting personal privacy, restoration method and picture hiding system

Examples

Experimental program
Comparison scheme
Effect test

example

[0111] Example: A picture hiding method used to protect personal privacy, the process of processing the original picture: Due to space limitations, only the process of processing the original picture is demonstrated; first prepare two pictures and one for the picture to be encrypted. figure 1 As shown, its size is 58.5KB, and the other is a display picture, which does not involve private information, such as figure 2 As shown, its size is 2.43KB. It includes the following steps:

[0112] Step 1 Scan the storage byte corresponding to the key tag in the original picture (source.jpg) according to Table 1, and record the storage byte corresponding to the key tag and its location information, and get: the SOI position of the key tag is 0, the storage word The section is 0xFFC0, the APP1 position is 2, and the storage byte is 0x FFE1. . . . . . The last one is the EOI position is 85297, and the storage byte is 0xFFD9. Collect storage bytes and locations to generate a list ;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A picture hiding method for protecting personal privacy comprises the steps of 1.1) determining a picture key tag parsing table; 1.2) scanning an original picture, and recording key tag storage bytes and corresponding positions to generate a list; 1.3) obtain a password character string according to an encrypted password or / and a randomly generated password, the password character string having a length the same as the number of key tags; 1.4) changing the key tag storage bytes in the list into password characters in the password character string; 1.5) sequentially taking out elements of the password character string and elements in the list to obtain a new string, and encrypting the new string to obtain an encrypted string; 1.6) writing in auxiliary information; and 1.17) after image start tag storage bytes covering up the picture is removed, splicing the remaining part to the tail part of arr_byte to complete the hiding of the original picture. Also provided are a picture restoration method for protecting personal privacy and a picture hiding system. According to the invention, the picture processing efficiency is high when massive pictures are processed.

Description

Technical field [0001] The invention relates to the field of unstructured big data storage, and relates to a picture hiding method, a restoration method and a picture hiding system for hiding original picture information after technical processing of pictures (jpg files) that may leak personal privacy. Background technique [0002] For the public domain, with the rapid growth and popularity of social media, people have played down personal privacy issues because of the convenience of information exchange. Pictures uploaded to the Internet are often used maliciously; for individuals, people like to use personal pictures. Stored in a personal computer or mobile storage. When the computer is sent for maintenance or the mobile storage device is lost, the pictures related to personal privacy are often leaked; for specific fields, such as medical diagnosis pictures in the medical field, these pictures often contain patients’ pictures. If personal information is not properly controlled ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00H04L29/06
CPCG06T1/00G06T1/0021H04L63/0428
Inventor 于海龙李建元王辉吴越
Owner ENJOYOR COMPANY LIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products