A method, device and system for protecting image privacy
A privacy protection and picture technology, applied in the field of information security, can solve the problems of poor privacy protection performance and security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0110] see figure 1 , which shows a process of a picture privacy protection method, the method is used for a sending terminal, and the method includes:
[0111] S101: The sending terminal obtains the optimal sparse coefficient of the picture information corresponding to the picture on the representation dictionary;
[0112] S102: The sending terminal obtains a sparse threshold for distinguishing public information of a picture from private information of a picture according to the optimal sparse coefficient;
[0113] S103: The sending terminal acquires public picture information and private picture information according to the relationship between the sparse threshold and the optimal sparse coefficient and the representation dictionary;
[0114] S104: The sending terminal uploads the public information of the picture to a public website, obtains the ID assigned by the social networking site to the public information of the picture, names the private information of the picture...
Embodiment 2
[0157] see Figure 5 , which shows a process of a picture privacy protection method, the method is used for a receiving terminal, and the method includes:
[0158] S501: When the receiving terminal receives the URL request information including the ID of the public picture information, acquire the public picture information and the private picture information according to the ID of the public picture information;
[0159] S502: The receiving terminal acquires reconstructed sparse representation coefficients from the public picture information and private picture information according to a preset method;
[0160] S503: The receiving terminal acquires a composite picture according to the relationship between the reconstructed sparse representation coefficients and the representation dictionary.
[0161] For step S501, see Figure 6 When the receiving terminal receives a request message of a Uniform Resource Locator (URL, Uniform Resource Locator) containing the ID of the publi...
Embodiment 3
[0190] see Figure 8 , which shows a detailed method flow of picture privacy protection, the detailed method includes:
[0191] S801: The sending terminal obtains a sparse representation of the picture information corresponding to the picture on the representation dictionary;
[0192] S802: When the sparse representation satisfies the constraint condition, the sending terminal obtains the optimal sparse representation using a preset optimization method, and the sending terminal calls the optimal sparse representation an optimal sparse coefficient;
[0193] S803: The sending terminal obtains a sparse threshold for distinguishing the public information of the picture from the private information of the picture according to the optimal sparse coefficient;
[0194] S804: The sending terminal acquires public information coefficients and private information coefficients according to the relationship between the sparse threshold and the optimal sparse coefficient;
[0195] S805: Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


