A client-side image blurring and deduplication method that supports ownership authentication

An ownership authentication and client-side technology, applied in graphics and image conversion, image data processing, instruments, etc., can solve the problems that image quality evaluation methods cannot meet the requirements of high efficiency, accuracy, human perception, and does not involve image quality evaluation, etc., to achieve fast Efficient deduplication, saving storage resources and network bandwidth, and improving the effect of deduplication rate

Active Publication Date: 2019-10-11
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, the current image deduplication research either does not involve image quality evaluation, or the image quality evaluation method used cannot meet the requirements of high efficiency, accuracy, and human perception. At present, there is no mature image quality evaluation method in the field of image deduplication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A client-side image blurring and deduplication method that supports ownership authentication
  • A client-side image blurring and deduplication method that supports ownership authentication
  • A client-side image blurring and deduplication method that supports ownership authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] refer to figure 1 , the implementation steps of the present invention are as follows:

[0045] Step 1: Perform duplicate detection on the original image W to be deduplicated by the client.

[0046] refer to figure 2 , the specific implementation of this step is as follows:

[0047] 1a) The client calls the imread function from the OpenCV function library to read in the original image W to be deduplicated, and calls the cvtColor function to convert W from an RGB image to a grayscale image, and then calls the resize function to reduce the size of the grayscale image to 64*64 , calling the dct function to perform discrete cosine transform on the reduced image to obtain a 64*64 coefficient matrix F;

[0048] 1b) The client selects the first 8 rows and the first 8 columns in the upper left corner of the coefficient matrix F to obtain an 8*8 low-frequency coefficient matrix F', which represents the low-frequency information of the original image W; then place F' in the po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a client image blurring deduplication method supporting the proprietary authentication. The method mainly aims to solve the problems that an existing deduplication technology is low in accuracy and safety. The method includes the steps that 1, whether an image similar to a to-be-deduplicated original image exists on a server terminal or not is detected, if yes, 'proprietary authentication' is conducted, and if no, deduplication is not conducted; 2, a server conducts the 'proprietary authentication' on the original image, if the authentication is successful, quality comparison is conducted, and if the authentication fails, deduplication is rejected by a client; 3, the server determines whether the quality of the original image is larger than that of the similar image by comparison, if yeas, a link of the similar image is returned to the client, and if no, the original image is uploaded and stored in the server terminal. The method improves the accuracy of repetition detection, ensures the security of the 'proprietary authentication' , therefore, the server terminal can retain the image with good quality, and the method can be used for deduplication of the similar image.

Description

technical field [0001] The invention belongs to the technical field of big data network security, and in particular relates to an image deduplication method, which can be used for deduplication of similar images. Background technique [0002] In the Internet age, a large number of users store data in cloud servers. In order to save disk space and network bandwidth in this storage mode, researchers have proposed many client-side data deduplication technologies. For files with the same content, no matter how many users want to store the file on the cloud server, only the first user needs to upload it, and other users directly link to the file without uploading. It is reported that the deduplication ratio of commercial applications can reach 1:10~1:500, which will save up to 90% of network bandwidth and disk space. [0003] However, client-side deduplication raises new security concerns. Deduplication researchers Halevi et al. recently discovered a new security attack in clie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/174G06T3/40
Inventor 李丹平杨超姜奇李金库马建峰李成洲何司蒙卢璐
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products