Image information security processing method and device

A technology for safe processing and image information, applied in the field of data security, can solve the problems of no practical application value, encryption method not suitable for image encryption, and no judgment standard for image block strategy

Active Publication Date: 2021-04-23
齐丰科技股份有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the same encryption algorithm is used to encrypt the same image. If the required security is high, the encryption algorithm consumes more system resources, and there is no one that reduces the consumption of system resources without reducing image security. unique encryption method, which is a major flaw in the prior art
[0003] In the prior art, there are schemes to encrypt different parts of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image information security processing method and device
  • Image information security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0036] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0037] figure 1 A method for safely processing image information of the present invention is shown, the method includes:

[0038] A method for securely processing image information, characterized in that the method comprises:

[0039] Collection step S101, the first client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image information security processing method and device, and the method comprises a collection step: enabling a first client to collect N time sequence images Ti through employing image collection equipment, and an encryption step: carrying out the encryption of the N time sequence images Ti through employing a first encryption algorithm and a second encryption algorithm, and obtaining N encrypted images eTi; and a transmission step: enabling the first client to send the encrypted N images eTi to a second client. According to the invention, each image is encrypted by adopting two encryption algorithms based on different characteristic values, and the two encryption algorithms consume different system resources, so that the key part of the image can be encrypted by using the encryption algorithm consuming more system resources, the common part of the image is encrypted by using an encryption algorithm consuming less system resources, and the computing resources of the terminal are saved while the image security is ensured.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and device for securely processing image information. Background technique [0002] In the prior art, the same encryption algorithm is used to encrypt the same image. If the required security is high, the encryption algorithm consumes more system resources, and there is no one that reduces the consumption of system resources without reducing image security. Sexual encryption method, this is a major defect in the prior art. [0003] In the prior art, there are schemes to encrypt different parts of a document using different encryption methods. However, images are more complex than documents, and document encryption methods are not suitable for image encryption. [0004] In the prior art, no simple and efficient image segmentation strategy and criteria for judging different encryption methods are proposed, or the calculation method is complicated, which has no pract...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06T7/70G06T7/62G06N3/04G06K9/62
CPCG06F21/602G06T7/70G06T7/62G06T2207/20021G06N3/045G06F18/24
Inventor 谢玲玲谢雅彦何智
Owner 齐丰科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products