Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method, device and equipment based on attribute desensitization

A privacy protection and attribute technology, applied in the field of privacy and security, can solve the problems of being simple and rude, unable to distinguish face images, etc., and achieve the effects of good reliability and applicability, improved privacy and security, and easy viewing and understanding

Pending Publication Date: 2021-02-26
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Few face image privacy protection schemes in existing face recognition systems
And very few of them are equipped with privacy protection capabilities, and the schemes used are relatively simple and rude. For example, the reversible image encryption scheme uses simple random transformations of rows and columns to generate face images that cannot be distinguished by the naked eye.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, device and equipment based on attribute desensitization
  • Privacy protection method, device and equipment based on attribute desensitization
  • Privacy protection method, device and equipment based on attribute desensitization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of this specification provide a privacy protection method, device, device, and storage medium based on attribute desensitization.

[0038] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0039] In one or more embodiments of this specification, the content of biological living images is decoupled into several attributes, the attributes associated with privacy (predefined as privacy attri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a privacy protection method, device and equipment based on attribute desensitization. According to the scheme, the method comprises the steps of determining aGAN-based image generation model obtained by training according to samples containing privacy attributes and non-privacy attributes; acquiring a living organism image of the user; generating a livingorganism desensitized image for the privacy attributes according to the living organism image and the image generation model; and processing the living organism desensitized image according to a predetermined strategy so as to support a specified service.

Description

technical field [0001] This specification relates to the technical field of privacy security, and in particular to a privacy protection method, device and equipment based on attribute desensitization. Background technique [0002] In recent years, with the popularity of face recognition systems, users can conveniently scan their faces for identity authentication, and then conduct follow-up business. Face recognition systems often include steps such as face image acquisition, face image processing, face image transmission, and face image storage. In these steps, there is a risk of privacy leakage. Once the user's face image is leaked, it may be used maliciously. , endangering the interests and safety of users. [0003] There are few face image privacy protection schemes in existing face recognition systems. And very few of them are equipped with privacy protection capabilities, and the schemes used are relatively simple and crude. For example, the reversible image encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/36G06F21/62G06K9/00G06N3/04G06N3/08
CPCG06F21/32G06F21/36G06F21/6245G06N3/08G06V40/161G06V40/45G06N3/045
Inventor 曹佳炯丁菁汀
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD