Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method and device, electronic equipment and readable storage medium

An encryption method and image technology, applied in the field of image processing, can solve the problems of privacy data leakage, low security, large workload, etc., and achieve the effect of ensuring encryption effect, improving security and efficiency, and reducing computing and storage requirements.

Pending Publication Date: 2021-10-08
VIVO MOBILE COMM HANGZHOU CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the screen content of the user is photographed by others on the screen of the terminal device, or the real-time display of the screen is obtained by a malicious application on the terminal, many private data of the user are leaked through the screen image
[0003] In related technologies, for the encryption of terminal images, some keys encrypt images, which has low security, and these encryption methods are often easily cracked by artificial intelligence technology
Some strengthen the security of the image by setting a different key for each image, but the workload is heavy, which brings a greater burden on the calculation and storage of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device, electronic equipment and readable storage medium
  • Image encryption method and device, electronic equipment and readable storage medium
  • Image encryption method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application belong to the protection scope of this application.

[0031] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It should be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application can be practiced in sequences other than those illustrated or described herein, and that references to "first," "second," etc. distinguish Objects are generally o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an image encryption method and device, electronic equipment and a readable storage medium, and belongs to the technical field of image processing. The image encryption method comprises the following steps: determining a target area where to-be-encrypted content in a to-be-encrypted original image is located; performing mask processing on the target area, and determining mask information of the target area; adding adversarial noise and auxiliary noise to the original image, and generating a noise image; and performing fusion processing on the original image, the noise image and the mask information to generate a target encrypted image.

Description

technical field [0001] The present application relates to the technical field of image processing, in particular, to an image encryption method, device, electronic equipment and readable storage medium. Background technique [0002] With the continuous development of mobile Internet terminal equipment, more and more information exchange depends on the transmission of terminal equipment. When the screen content of the user is captured by others on the screen of the terminal device, or the real-time display of the screen is obtained by a malicious application on the terminal, many private data of the user will be leaked through the screen image. [0003] In related technologies, for the encryption of terminal images, some keys are used to encrypt images, which has low security, and these encryption methods are often easily cracked by artificial intelligence technology. Some strengthen the security of the image by setting a different key for each image, but the workload is hea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 安丁
Owner VIVO MOBILE COMM HANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products