Deep learning training picture encryption and decryption method

A technology for encrypting, decrypting, and training pictures, which is applied in the field of image processing, and can solve problems such as loss of spatial position information, data that cannot be spliced ​​back to the original image, and training that cannot be performed

Active Publication Date: 2021-03-12
FUJIAN YIXINHAI INFORMATION TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme can only obtain the dimensionality reduction vector features of the picture by encrypting the target picture, while the neural network of the target detection requires the regression of the target position and the classification of the target on the picture, and the local encryption scheme loses the data of the target to be detected. The spatial position information on a picture, and the data that is dimensionally reduced at the same time cannot be spliced ​​back to the original picture
Therefore, traditional feature encryption or partial encryption cannot meet the dual requirements of target detection and target classification.
It can be seen that the data encrypted by local features has no spatial features of the image target position, and cannot be trained
[0005] The core objective of the present invention is to solve the problem of data leakage caused by power safety operation data being given to third-party manufacturers for training and the problem of inability to train due to the loss of space characteristics of encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deep learning training picture encryption and decryption method
  • Deep learning training picture encryption and decryption method
  • Deep learning training picture encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0048] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0049] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a deep learning training picture encryption and decryption method. The method comprises an encryption process and a decryption process, wherein the encryption process comprises the steps of converting read picture data into a three-dimensional array, encrypting three channels of each picture, exchanging the encrypted three channels, and then combining the three channels toobtain an output picture. The decryption process comprises the following steps of: acquiring pictures to be decrypted, performing channel exchange on each picture, decrypting the three exchanged channels respectively, and combining the three channels to obtain an output picture. According to the method, model leakage and picture data leakage can be prevented, and the target detection model can betrained.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to a method for encrypting and decrypting training pictures for deep learning. Background technique [0002] The existing conventional solution is plaintext image training. The current image encryption technology can be divided into two categories, namely airspace image encryption technology and compressed image encryption technology. The spatial domain image encryption technology encrypts the uncompressed image, which is characterized by treating the image as three-dimensional data (length and width plus channel) for operation. The typical method of airspace image encryption technology is to use discrete chaos encryption technology. Compressed image encryption technology is encrypted based on a certain compression format or compression technology, such as JPEG, arithmetic coding, wavelet compression technology, etc. [0003] These encryption techniques will lead to non-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06N3/04G06N3/08
CPCG06T1/0021G06N3/084G06T2201/0065G06N3/045
Inventor 赖必贵倪政齐
Owner FUJIAN YIXINHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products