A two-stage secure multi-party computation method for image and text localization and recognition
A technology for secure multi-party computing and text positioning, applied in computing, computer components, neural learning methods, etc., can solve problems such as the inability to meet privacy protection requirements, and achieve high security and reliable services.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] like figure 1As shown, the present embodiment relates to a method for locating and recognizing image text based on the privacy protection of secure multi-party computing, wherein the involved server provides a remote calling interface based on services such as HTTP, and the models for text locating and recognition are trained in plaintext respectively. Deployed on the server side, the method specifically includes the following steps:
[0026] 1) Based on the function secret sharing protocol in the secure multi-party computing, the user encrypts the information of each pixel in the picture through the secret function therein, and transmits the encrypted picture information to the cloud server;
[0027] 2) The cloud server performs feature extraction on the image information based on the trained single-character text positioning model, and obtains three-level encrypted image single-character positioning feature map F char1 , F char2 and F char3 , and transmit the encry...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


