Image privacy recognition method, device, computer equipment and storage medium

A recognition method and image technology, applied in the field of information security, can solve the problems of high classifier training complexity, low classification result accuracy, and poor robustness, and achieve low training complexity, reduced prediction complexity, and high accuracy Effect

Active Publication Date: 2020-05-19
数字广东网络建设有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the anti-privacy hiding technologies for binary images extract features related to texture characteristics, morphological characteristics, and statistical characteristics from binary images, and then use classifiers to classify the features of binary images to judge Whether privacy-related information is hidden; however, the above classifiers tend to have high training complexity, poor robustness, and low accuracy of classification results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image privacy recognition method, device, computer equipment and storage medium
  • Image privacy recognition method, device, computer equipment and storage medium
  • Image privacy recognition method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0026] Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to an image privacy identification method, device, computer equipment and storage medium. The method includes: acquiring an image to be identified; extracting residual matrixes of at least eight different directions of the image to be identified; determining a local residual pattern histogram of the image to be identified according to the residual matrix of at least eight different directions of the image to be identified; Obtain the Fisher score of the feature vector in the local residual pattern histogram of the image to be recognized, filter the feature vector in the local residual pattern histogram of the image to be recognized according to the Fisher score, and obtain the target feature vector of the image to be recognized; The feature vector is input into the trained image classification model, and whether the image to be recognized is a privacy image is identified according to the classification result of the image classification model. The method can efficiently and accurately judge whether there is private information hidden in the image, and the judgment process has low complexity and good robustness.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to an image privacy identification method, device, computer equipment and storage medium. Background technique [0002] In recent years, with the development of computer technology and communication technology, the production and dissemination of information has become increasingly convenient. Maintaining personal privacy and improving the level of personal privacy protection are of great significance to society. There are some criminals who, through privacy hiding technology, embed users' private information in a specific carrier (such as audio, video, image, text, etc.) without being detected, in order to achieve the purpose of stealing the privacy of individuals, companies or governments , seriously impairing information security. [0003] Digital image privacy hiding technology can be understood as a technology that uses digital images as a carrier to rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/46G06K9/62
CPCG06V10/507G06F18/2132G06F18/24
Inventor 陈晓亮王新辉徐延林
Owner 数字广东网络建设有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products