Image processing method and system based on privacy protection, medium and equipment
An image processing and privacy protection technology, applied in digital data protection, electronic digital data processing, character and pattern recognition, etc., can solve the problems of long ciphertext length, large computing resources, and low system efficiency, and avoid low efficiency, Good compatibility, tolerating the effect of intrusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] This embodiment discloses an image processing method based on privacy protection, such as figure 1 shown, including the following steps:
[0033] S1 randomly divides the obtained image data into several parts, and stores each part of data in an independent server, and the servers do not collude.
[0034] like figure 2 As shown, the image data is first preprocessed, and various image data are converted into pixel matrices according to requirements, and the image data is standardized so that the image data are all within the same set range. Eliminate image data that obviously does not meet the requirements.
[0035] In this embodiment, the image data is preferably randomly divided into two parts. The separation method is: randomly generate a random matrix A1 with the same dimension as the original image A, and then subtract A1 from A to obtain A2, thereby dividing the original image A into A1 and A1. A2 in two parts. Since A1 is randomly generated, the complete infor...
Embodiment 2
[0051] In this embodiment, the fingerprint image is taken as an example to further elaborate the technical solution in the first embodiment. like Image 6 As shown, the method of fingerprint image processing is:
[0052] Firstly, the fingerprint image data is preprocessed, the image data is converted into a standard format and the images that obviously do not meet the requirements are deleted. Then the image data is separated into two parts, and the content of each part is sent to a model training server separately, and there is no collusion between the two model training servers. After any model training server receives the uploaded data, it uses the sift algorithm for feature extraction, and the feature extraction results are saved to the cloud after semi-homomorphic encryption to construct a K-D tree for classification queries. Substitute the K-D tree into the trained image processing model for feature extraction, compare the extracted features with the existing fingerpri...
Embodiment 3
[0054] This embodiment takes the handwritten signature image as an example to further elaborate the technical solution in the first embodiment. like Figure 7 As shown, the method of handwritten signature image processing is:
[0055] First, the user selects a fully connected neural network as the image processing model, and then separates the handwritten signature image data into two parts, and sends each part to a data processor, and there is no collusion between the two data processors. Any data processor directly trains the image processing model, and after the model training is completed, the handwritten signature image is converted into a vector input and encrypted. Bring the encrypted handwritten signature image data into the trained model to obtain the encrypted result of the operation. Decrypt the returned encrypted result to obtain the image classification result.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


