Supercharge Your Innovation With Domain-Expert AI Agents!

Image desensitization processing method and device, verification method and device, equipment and medium

A processing method and desensitization technology, applied in the field of data security, can solve problems that cannot be effectively verified and supervised

Pending Publication Date: 2020-12-15
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the existing images are leaked, if they are abused externally, they cannot be effectively verified and supervised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image desensitization processing method and device, verification method and device, equipment and medium
  • Image desensitization processing method and device, verification method and device, equipment and medium
  • Image desensitization processing method and device, verification method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0052] Combine below Figure 1-Figure 5 An image desensitization processing method according to an embodiment of the present invention is described.

[0053] figure 1 A schematic flow diagram of an image desensitization processing method provided by an embodiment of the present invention; figure 2 A schematic diagram of an image d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an image desensitization processing method and device, an image verification method and device, equipment and a medium. The method comprises the steps of obtaining a to-be-desensitized image; performing desensitization operation on the sensitive area of the to-be-desensitized image to obtain a desensitized image, and superposing a watermark on the desensitized image to obtain a watermark desensitized image, the watermark having a unique identity; processing the watermark desensitized image according to a preset image output parameter to obtain a final image so as to perform identity tracking tracing on the final image according to the unique identity identifier, and superposing a watermark on the desensitized image, the watermark having the unique identity identifier; after the final image is obtained, carrying out identity tracking tracing on the final image according to the unique identity label, and therefore the verification tracing problemthat the image is abused after being leaked is effectively solved.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to an image desensitization processing method, verification method and device, equipment and media. Background technique [0002] In the big data environment, images, portraits and other pictures, as copyrighted works, are extremely easy to be leaked and abused. With the development of computer network communication technology, the exchange and transmission of data has become a relatively simple process. With the help of computers, digital scanners, printers and other electronic equipment, people can conveniently and quickly convey digital information to all parts of the world. Photos apps pose a big security risk. In order to prevent photos from being misused by other organizations, and to verify and trace the source of photo applications, how to effectively desensitize and downgrade photos, and resist machine learning and other security methods has become an imminen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06F21/62
CPCG06T1/0021G06F21/6245
Inventor 赵志岩范英李欣康凯施一琳王贤良郑逢德苏鹏陶成哲
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More