Big data image protection method and system based on a security area

A safe area and big data technology, applied in the field of information security, can solve the problem of not fully hiding secret information to foreground objects

Active Publication Date: 2019-03-19
NANJING UNIV OF INFORMATION SCI & TECH
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is most similar to the method of the present invention, but the faster rcnn in this method can only realize the identification of the rectangular frame of the foreground object. After informati

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data image protection method and system based on a security area
  • Big data image protection method and system based on a security area
  • Big data image protection method and system based on a security area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to better understand the technical content of the present invention, specific embodiments are given together with the attached drawings for description as follows.

[0067] Aspects of the invention are described in this disclosure with reference to the accompanying drawings, which show a number of illustrated embodiments. Embodiments of the present disclosure are not necessarily defined to include all aspects of the present invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in more detail below, can be implemented in any of numerous ways, since the concepts and embodiments disclosed herein are not limited to any implementation. In addition, some aspects of the present disclosure may be used alone or in any suitable combination with other aspects of the present disclosure.

[0068] The idea of ​​the patent of the present invention is to first select a safe area with complex texture and rich...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a big data image protection method based on a security area, and the method comprises the steps: S1, selecting a target security area through employing a target detection method, and extracting color image features; s2, a big data technology is adopted, a big data picture set is utilized to train a network model and a test network model, an application algorithm of a deep learning model in target detection is applied, and an object area is extracted to serve as a safety area of information protection; and S3, taking the extracted security area as a steganography area ofthe encrypted image, and carrying out secret information hiding by applying a steganography algorithm. According to the invention, the application algorithm of the deep learning model is applied in the target detection, that is, the Mask R-CNN instance segmentation method, and select the region with complex texture noise in the image, an area with complex texture noise in the image, namely a foreground part, is selected, secret information is accurately hidden in a foreground object, and therefore the purpose of more secret image secret information hiding protection is achieved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a large data image protection method and system based on a security area. Background technique [0002] With the rapid development of science and technology, computer network, multimedia technology and personal mobile communication technology have been widely used by everyone. A large amount of multimedia information is transmitted by people more conveniently and quickly in the network, which is convenient for everyone's communication and exchange. However, while multimedia information brings convenience to people's life, information security issues such as personal privacy being spied on and disseminated are gradually becoming more and more serious. aroused people's great attention. In recent years, some information security problems have been solved to a certain extent by information hiding technology. This method hides the secret information in a carrier medium (i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06N3/04G06N3/08G06K9/62
CPCG06F21/602G06N3/08G06N3/048G06N3/045G06F18/24
Inventor 孟若涵孙星明周志立崔琦袁程胜曹燚
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products