Check patentability & draft patents in minutes with Patsnap Eureka AI!

Image security identification system and method in network environment

A technology for secure identification and network environment, applied in transmission systems, image communication, digital transmission systems, etc., can solve the problems of reducing identification security, deep neural network model attacks, losses, etc., to achieve high practicability, improved security, The effect of improving efficiency

Inactive Publication Date: 2020-06-12
SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The impact of adversarial samples on major deep neural network models is huge, making deep neural network models vulnerable to third-party attacks using adversarial samples in practical applications, resulting in wrong results, reduced recognition security, and immeasurable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image security identification system and method in network environment
  • Image security identification system and method in network environment
  • Image security identification system and method in network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to better understand the present invention, some basic concepts are firstly explained.

[0042] Cloud computing environment: Cloud computing is an emerging application mode, which integrates traditional application computing resources to form a cloud service center with larger capacity and faster speed. Cloud computing is based on virtualization technology and takes the network as the carrier to provide infrastructure (IaaS), platform (PaaS), software (SaaS) and other services, and integrate large-scale scalable computing, storage, data, applications and other distributed A supercomputing model in which computing resources work together. The application of cloud computing can be expanded and contracted, enabling users to obtain resources suitable for their own needs, and greatly saving users' computing costs while improving computing efficiency.

[0043] Image Security Recognition: It is a biometric technology for identity recognition based on image feature in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image security identification system and method in a network environment, and the method comprises the following steps: 1, enabling a front end to collect a picture, and enabling the front end to comprise an image identification module, an image security identification module and an image security authentication module; 2, the front end performs feature extraction and binaryzation on the acquired picture; step 3, carrying out paillier cryptographic algorithm encryption on the front-end feature data; 4, binding a camera to the DOM element; and step 5, front-end and back-end interaction: the front end submits the data to the background, then the background processes the data and returns a result to the front end, and the front end receives the data sent back by thebackground, analyzes the data and renders a front-end page according to the data of the background. According to the method, the image recognition technology is reasonably and correctly applied on thepremise of safety to a certain extent; privacy information between participants is protected from being leaked to each other in the whole process, third-party lawbreakers are prevented from attackingthe image recognition model by using countermeasure samples to achieve the illegal purpose of the third-party lawbreakers, and the method can be used for safety recognition and classification of electronic files.

Description

technical field [0001] The invention relates to an image security recognition system and method in a network environment, belonging to the field of visual security. Background technique [0002] The research on image recognition technology can be originated in the 1950s, but in the early years, because the accuracy rate was very low in the actual environment, it has not been practical. In recent years, with the rapid development of big data and deep neural network technology, deep neural network has achieved good results in various computer vision classification tasks. Deep neural network technology has begun to be applied to image recognition tasks and has achieved good results. The effect of image recognition has reached more than 99% on many data sets. It has applications in public security cases, enterprise attendance, property security and so on. [0003] With the emergence of cloud services, image recognition technology combined with cloud computing makes it more pra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06K9/00H04L9/00H04N5/232
CPCG06F21/602H04L9/008G06V30/40G06V20/40H04N23/80
Inventor 汪昕金鑫朱星帆时超陈力蒋尚秀
Owner SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More