Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection-based user authenticated outsourcing image denoising method

A privacy protection and image technology, applied in the field of image processing, can solve the problems of processing time delay, affecting user experience, high demand for network bandwidth, etc.

Active Publication Date: 2020-06-05
FUZHOU UNIV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the new scheme, the JL transformation still needs to be performed by the client, and the denoising process requires the user to interact with the two cloud servers
[0005] The above three types of ciphertext denoising schemes are all based on cloud servers (see figure 1 ), easily lead to processing time delay and high demand for network bandwidth, affecting user experience
In addition, the existing scheme does not consider the issue of outsourcing authentication for users to perform authorization and revocation operations from the perspective of system practicability
Currently, the field still lacks a viable approach that supports privacy-preserving low-latency and user-authenticable outsourced image denoising schemes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection-based user authenticated outsourcing image denoising method
  • Privacy protection-based user authenticated outsourcing image denoising method
  • Privacy protection-based user authenticated outsourcing image denoising method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0083] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0084] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a privacy protection-based user authenticated outsourcing image denoising method. The method comprises the following steps that: a trusted third party TTP allocates related keys to a content owner CO, an authorized user AU and two edge computing servers ES1 and ES2; the CO firstly uses a secret key distributed by the TTP to encrypt a noisy image, and sends the encrypted image to the first edge computing server ES1; the second edge computing server ES2 assists the first edge computing server ES1 to perform ciphertext image denoising, and a result obtained through calculation is sent to the first edge computing server ES1; and the AU makes an image use request to the corresponding CO, obtains the corresponding denoised ciphertext image from the first edge computing server ES1, and authorizes the user AU to decrypt and recover the required plaintext denoised image with the help of the private key of the AU. According to the invention, the image denoising service is provided while the user privacy data security is ensured; and moreover, the local calculation and communication overhead of the user is reduced, and the ciphertext denoising effect is almost equal to the plaintext domain performance.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to a user-authenticable outsourced image denoising method based on privacy protection. Background technique [0002] At present, computer vision technology has been widely used in image classification, object detection, semantic segmentation and other fields. These fields generally have certain requirements for image quality, but in reality, the digital images obtained by the imaging equipment itself or many external environment interferences are often noisy. If these noisy images are directly used as samples for research, it may be difficult have a certain negative impact on the research results. Therefore, before image processing, it is often necessary to perform a denoising preprocessing operation on the sample image to obtain higher quality sample data. [0003] In recent years, with the popularization of mobile imaging devices such as smart phones and digital cameras...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F9/50G06T5/00
CPCG06F21/602G06F21/6245G06F9/5072G06T2207/10004G06T5/70
Inventor 程航黄逸冰王美清陈飞颜娜招黄芹健
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products