Image data secure transmission method and device, processing equipment and storage medium

A technology for secure transmission and image data, applied in image communication, electrical components, etc., can solve problems such as inapplicability of ordinary images and complicated encryption methods, and achieve the effect of increasing difficulty, increasing difficulty and cost

Pending Publication Date: 2021-10-01
SHANGHAI GUAN AN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To a certain extent, this method can ensure that the original image will not be identified and copied, especially when the time provided by the virtual seal or the system time is used as a parameter to encrypt the image coordinate pixels. The encryption method is complicated and is not applicable to ordinary images.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image data secure transmission method and device, processing equipment and storage medium
  • Image data secure transmission method and device, processing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] see figure 1 The step diagram, a method for secure transmission of image data disclosed in this embodiment includes the following steps:

[0035] Step 1. The sender uses the anti-sample technology to modify the original image to generate an adversarial sample image;

[0036] Adversarial example technology is a new technology for attacking deep neural network models ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image data secure transmission method and device, processing equipment and a computer readable storage medium, and the method comprises the following steps: S01, modifying an original picture to generate an adversarial sample picture; S02, comparing the original picture with the adversarial sample picture to generate difference data; S03, respectively encrypting the adversarial sample picture and the difference data, and independently transmitting the adversarial sample picture and the difference data; S04, after receiving the encrypted adversarial sample picture and the difference data, respectively decrypting the adversarial sample picture and the difference data; and S05, restoring the decrypted adversarial sample picture according to the decrypted difference data. According to the method, the adversarial sample picture data and the difference data are encrypted and transmitted respectively, so that the difficulty and the cost of correctly restoring the original picture by a stealer are improved.

Description

technical field [0001] The present invention relates to computer data security, and specifically relates to a method, device, processing device, and storage medium for realizing secure transmission of image data using an adversarial example. Background technique [0002] In Internet / mobile Internet applications, there is a large demand for image transmission, such as portrait photos and ID card photos used in identity verification. These image data involving personal privacy have a huge risk of being intercepted and stolen during transmission. Stealers can use stolen data to carry out illegal and criminal activities, such as using portrait photos to deceive face recognition systems, using information on ID card photos to forge ID cards, etc. [0003] At present, the image encryption algorithm with a key is generally used to solve the problem of secure image transmission. The image is encrypted with an encryption key for transmission, and decrypted with a decryption key at t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04N1/44
CPCH04N1/44H04N1/32272
Inventor 周晓勇梁淑云刘胜马影陶景龙王启凡魏国富夏玉明徐明殷钱安余贤喆
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products