Non-peer image encryption method based on saliency detection

An encryption method and non-equivalent technology, which is applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve the problems of image retention of private information, large amount of calculation, etc., to avoid information leakage, improve efficiency, and good encryption effect Effect

Pending Publication Date: 2020-10-27
JIANGXI UNIVERSITY OF FINANCE AND ECONOMICS
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a non-peer-to-peer image encryption method based on saliency detection to solve the problem that the existing image encryption algorithm has too much calculation or the encrypted image still retains the private information in the image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-peer image encryption method based on saliency detection
  • Non-peer image encryption method based on saliency detection
  • Non-peer image encryption method based on saliency detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0025] The present invention is a non-peer image encryption method based on saliency detection, see figure 1 , The present invention adopts the following steps to achieve: First, perform step S1 to obtain the original image. Specifically, the captured original image is acquired through the CCD sensor or CMOS sensor of the electronic device. Preferably, the original image includes a large number of pixels, and each pixel has its own pixel ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a non-peer image encryption method based on saliency detection, and the method comprises the steps: obtaining an original image, and generating a saliency image according to thesignificance mapping combination of preset features of the original image; dividing the original image into an important region and a non-important region according to the saliency map; encrypting the important region by adopting a DNA encryption algorithm to obtain a first encrypted image; performing compressed sensing encryption on the non-important area to obtain a second encrypted image; andrecombining the first encrypted image and the second encrypted image to obtain a final encrypted image. According to the method provided by the invention, the security of the image can be ensured, thecalculation amount of image encryption operation can be reduced, and the data volume of image transmission and storage is reduced.

Description

Technical field [0001] The invention relates to the technical field of digital image and digital video processing, and in particular to a non-peer image encryption method based on saliency detection. Background technique [0002] The Internet of Things technology is widely used in all aspects of people’s lives. The huge network combined with various information sensing equipment forms the real-time interconnection of computers and real things at any time and anywhere, and a large amount of image data is generated in this process. These image data contain a large amount of personal information, and the privacy and security of image data has become a problem that people are concerned about and need to be solved urgently. [0003] Image encryption technology can prevent the leakage of personal private information in the image, and ensure that secure image data is shared on the cloud server. Traditional image encryption technologies can be divided into two categories: full encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 温文媖涂荣鑫张玉书方玉明杨勇
Owner JIANGXI UNIVERSITY OF FINANCE AND ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products