Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption and identification method device, equipment and medium

An encryption method and image technology, applied in the field of image processing, can solve the problems of exposure of encryption and decryption algorithms, easy discovery of images, and images that can only be opened in an authorized way, so as to reduce the computational complexity of encryption and reduce the computational complexity of encryption. Effect

Active Publication Date: 2020-10-16
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the encoding method is used for encryption, the encrypted image information can only be opened by the user who holds the key or a specific analysis application; if the redundant information is used for encryption, the image can only be opened by authorized methods
Therefore, the image in the encrypted state using the existing encryption method is easy to be found, and after discovery, the cracker will try to crack the image.
Especially in the application scenarios on the web side, the encryption and decryption algorithms are easily exposed in the browser

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and identification method device, equipment and medium
  • Image encryption and identification method device, equipment and medium
  • Image encryption and identification method device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is a flowchart of an image encryption method provided by Embodiment 1 of the present invention. This embodiment is used to prevent the situation that images may be illegally tampered when transmitted between different devices. The method can be executed by the image encryption device provided in the embodiment of the present invention, and the device can be integrated into a device for network communication. see figure 1 , the method specifically includes:

[0034] S101. Select a target contour area from contours of an image.

[0035] Specifically, the contour of the image is extracted, and the target contour area is selected from the contour as the area to be encrypted subsequently. For example, the image is converted into a bitmap through Photoshop or Windows drawing software, and the bitmap is processed in gray scale, and the image contour is extracted by image gradient algorithm for the gray scale processed image. Selecting the target contour area r...

Embodiment 2

[0041] figure 2 It is a flowchart of an image recognition method provided by Embodiment 2 of the present invention. This embodiment is used to check whether an image has been illegally tampered with during transmission between different devices. The method can be executed by the image recognition device provided in the embodiment of the present invention, and the device can be integrated into a device for network communication. see figure 2 , the method specifically includes:

[0042] S201. Extract a target outline area of ​​an image and pixel point information in a similarity-encrypted area located on at least one side of the target outline area.

[0043] Wherein, the pixel point information may include: pixel value and position information of each pixel point.

[0044] S202. Match the extracted pixel point information in the target contour area and the similarity encryption area with a preset pixel encoding rule.

[0045] Wherein, the preset pixel coding rule is the s...

Embodiment 3

[0050] image 3 It is a schematic structural diagram of an image encryption device provided by Embodiment 3 of the present invention. The device can execute the image encryption method provided by any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method. Such as image 3 As shown, the device may include:

[0051] Contour area selection module 31, for selecting target contour area from the contour of image;

[0052] A pixel value determination module 32, configured to generate a similarity encryption area on at least one side of the target contour area, and based on a preset pixel encoding rule, according to the position and pixel value of each pixel in the target contour area, and The position and pixel value of each pixel point in the adjacent image area located at least one side of the target outline area determines the pixel value of each pixel point in the similarity encryption area.

[0053] On th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses an image encryption method, an image encryption device, an image identification method and an image identification device, which relate to the field of image processing. The image encryption method comprises the steps of: selecting a target contour region from a contour of an image; and generating a similarity encryption region on at least one side of the target contour region, and determining a pixel value of each pixel point in the similarity encryption region based on a preset pixel encoding rule according to positions and pixel values of pixel points in the target contour region as well as positions and pixel values of pixel points in an adjacent image region on at least one side of the target contour region. Through selecting at least one sideof the target contour region to generate the similarity encryption region, and determining the pixel values of the pixel points in the similarity encryption region according to the positions and the pixel values of the pixel points in the target contour region as well as the positions and the pixel values of the pixel points in the adjacent image region on at least one side of the target contour region, the effects that encryption is not easy to find and the computation burden of encryption is reduced are realized.

Description

technical field [0001] Embodiments of the present invention relate to the field of image processing, and in particular, to an image encryption and recognition method, device, device, and medium. Background technique [0002] With the development of communication technology, images are frequently transmitted between different devices, and image security has become a hot spot, such as in image sharing and video conferencing. In order to ensure the security of the image content, it is necessary to use computer encryption technology to encrypt the image. Different from traditional text encryption methods, images have the characteristics of large data content and complex structure, so traditional text encryption methods are not suitable for image encryption. [0003] The current image encryption method mainly encrypts the image by encoding the image content or adding redundant information at the fixed position of the image, so as to prevent image tampering. However, if encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
CPCH04N1/32267H04N1/32272
Inventor 孟浩马丽芬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD