Image encryption, identification method and device, equipment and medium
An encryption method and image recognition technology, which is applied in the field of image processing, can solve the problems of exposure of encryption and decryption algorithms, easy discovery of images, and images can only be opened in an authorized way, so as to reduce the amount of encryption calculations and reduce the amount of encryption calculations Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] figure 1 It is a flowchart of an image encryption method provided by Embodiment 1 of the present invention. This embodiment is used to prevent the situation that images may be illegally tampered when transmitted between different devices. The method can be executed by the image encryption device provided in the embodiment of the present invention, and the device can be integrated into a device for network communication. see figure 1 , the method specifically includes:
[0034] S101. Select a target contour area from contours of an image.
[0035] Specifically, the contour of the image is extracted, and the target contour area is selected from the contour as the area to be encrypted subsequently. For example, the image is converted into a bitmap through Photoshop or Windows drawing software, and the bitmap is processed in gray scale, and the image contour is extracted by image gradient algorithm for the gray scale processed image. Selecting the target contour area r...
Embodiment 2
[0041] figure 2 It is a flowchart of an image recognition method provided by Embodiment 2 of the present invention. This embodiment is used to check whether an image has been illegally tampered with during transmission between different devices. The method can be executed by the image recognition device provided in the embodiment of the present invention, and the device can be integrated into a device for network communication. see figure 2 , the method specifically includes:
[0042] S201. Extract a target outline area of an image and pixel point information in a similarity-encrypted area located on at least one side of the target outline area.
[0043] Wherein, the pixel point information may include: pixel value and position information of each pixel point.
[0044] S202. Match the extracted pixel point information in the target contour area and the similarity encryption area with a preset pixel encoding rule.
[0045] Wherein, the preset pixel coding rule is the s...
Embodiment 3
[0050] image 3 It is a schematic structural diagram of an image encryption device provided by Embodiment 3 of the present invention. The device can execute the image encryption method provided by any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method. Such as image 3 As shown, the device may include:
[0051] Contour area selection module 31, for selecting target contour area from the contour of image;
[0052] A pixel value determination module 32, configured to generate a similarity encryption area on at least one side of the target contour area, and based on a preset pixel encoding rule, according to the position and pixel value of each pixel in the target contour area, and The position and pixel value of each pixel point in the adjacent image area located at least one side of the target outline area determines the pixel value of each pixel point in the similarity encryption area.
[0053] On th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


