Image data leakage prevention method, device and equipment

An image data, anti-leakage technology, applied in the direction of instruments, biological neural network models, character and pattern recognition, etc., can solve the problem of security protection of key data that cannot be imaged

Pending Publication Date: 2019-04-09
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides an image data leakage prevention method, device and equipment to solve the problem in the prior art that the key data of the image cannot be safely protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image data leakage prevention method, device and equipment
  • Image data leakage prevention method, device and equipment
  • Image data leakage prevention method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] An embodiment of the present invention provides an image data leakage prevention method, such as figure 1 shown, including:

[0047] Step S101: labeling the acquired image data to obtain the labeled image data;

[0048] In order to obtain the convolutional neural network model, sample data is first required for model training. This step acquires image data and marks the data to be recognized in the image data, that is, the image data to be recognized and the key data of the recognized image data are marked out. It is mainly to mark out some representative image data, such as various distorted images, or image data with cartoons, characters, etc. In order to facilitate the later training of the convolutional neural network model.

[0049] Step S102: training a convolutional neural network based on the labeled image data to obtain a convolutional neural network model;

[0050] Put the labeled image data and the key data of the image data into the convolutional neural n...

Embodiment 2

[0074] Such as Figure 4 As shown, an embodiment of the present invention provides an image data leakage prevention device, including:

[0075] Annotation module 401: for annotating the acquired image data to obtain the annotated image data;

[0076] In order to obtain the convolutional neural network model, the sample data is first required for model training. This step acquires the image data, and marks the data to be recognized in the image data, that is, the image data to be recognized and the key data of the recognized image data are marked out. , so as to facilitate the later training of the convolutional neural network model.

[0077] Training module 402: for training a convolutional neural network based on the labeled image data to obtain a convolutional neural network model;

[0078] Put the labeled image data and the key data of the image data into the convolutional neural network to train the convolutional neural network, so as to obtain the trained convolutional ...

Embodiment 3

[0095] An embodiment of the present invention provides an electronic device. The electronic device includes: a memory, a processor, and a computer program stored in the memory and operable on the processor. The computer program is executed by the processor. The method steps of Embodiment 1 are realized during execution.

[0096] The processor can be a general-purpose processor, such as a central processing unit (Central Processing Unit, CPU), a digital signal processor (Digital Signal Processor, DSP), an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), or configured One or more integrated circuits implementing embodiments of the invention. Wherein, the memory is used to store executable instructions of the processor; the memory is used to store program codes and transmit the program codes to the processor. Memory can include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM); also can include non...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image data leakage prevention method, an image data leakage prevention device and image data leakage prevention equipment. The method comprises the steps: carrying out the marking of the obtained image data, and obtaining marked image data; Training a convolutional neural network based on the labeled image data to obtain a convolutional neural network model; And identifying to-be-detected image data based on the convolutional neural network model; AND training the convolutional neural network, and identifying the to-be-detected image data by using the trained convolutional neural network model. The convolutional neural network is applied to leakage protection of the image data, content recognition is performed on the image data to be protected, and key data partsin the image are recognized, so that the purpose of performing safety protection on the key data of the image is achieved. And a positive technical effect is achieved.

Description

technical field [0001] The invention relates to the field of mobile network security, in particular to an image data leakage prevention method, device and equipment. Background technique [0002] Data security is more and more concerned by enterprises. Enterprises will have a lot of important data to protect. Currently, data leakage prevention mainly focuses on text data security protection. However, with the development of the information industry, the protection requirements for image data are also increasing. growing day by day. [0003] The existing anti-leakage of image data mainly uses image feature extraction based on wavelet transform technology, and recognition of text content in images based on OCR technology, so as to construct the content fingerprint of the image. [0004] Adopt above-mentioned technology to have following defective: [0005] 1. The security protection ability of image data is relatively weak. When the image is distorted and deformed, the conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/32G06K9/62G06N3/04
CPCG06V10/24G06N3/045G06F18/2155
Inventor 宋鹏举
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products