Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for securely processing image information

A technology for safe processing and image information, which is applied in the field of data security, can solve problems such as no image block strategy judging criteria, encryption methods not suitable for image encryption, and no practical application value, so as to achieve simple and efficient determination methods and ensure image Safe and ensure correct decryption effect

Active Publication Date: 2021-06-25
齐丰科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the same encryption algorithm is used to encrypt the same image. If the required security is high, the encryption algorithm consumes more system resources, and there is no one that reduces the consumption of system resources without reducing image security. unique encryption method, which is a major flaw in the prior art
[0003] In the prior art, there are schemes to encrypt different parts of the document using different encryption methods. However, the image is more complex than the document, and the encryption method of the document is not suitable for the encryption of the image.
[0004] In the prior art, no simple and efficient image segmentation strategy and judging criteria for different encryption methods are proposed, or the calculation method is complicated, which has no practical application value at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for securely processing image information
  • A method and device for securely processing image information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0036] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0037] figure 1 A method for safely processing image information of the present invention is shown, the method includes:

[0038] A method for securely processing image information, characterized in that the method comprises:

[0039] Collection step S101, the first client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method and device for safely processing image information, the method comprising: a collection step, the first client uses an image collection device to collect N time-series images Ti, and an encryption step, using Encrypted by the first encryption algorithm and the second encryption algorithm to obtain encrypted N images eTi; in the transmission step, the first client sends the encrypted N images eTi to the second client. The present invention uses two encryption algorithms to encrypt each image based on different eigenvalues, and the two encryption algorithms consume different system resources, that is, the key part of the image can use an encryption algorithm that consumes more system resources For encryption, the general part of the image is encrypted using an encryption algorithm that consumes less system resources, which saves computing resources of the terminal while ensuring image security.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and device for securely processing image information. Background technique [0002] In the prior art, the same encryption algorithm is used to encrypt the same image. If the required security is high, the encryption algorithm consumes more system resources, and there is no one that reduces the consumption of system resources without reducing image security. Sexual encryption method, this is a major defect in the prior art. [0003] In the prior art, there are schemes to encrypt different parts of a document using different encryption methods. However, images are more complex than documents, and document encryption methods are not suitable for image encryption. [0004] In the prior art, no simple and efficient image segmentation strategy and criteria for judging different encryption methods are proposed, or the calculation method is complicated, which has no pract...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06T7/70G06T7/62G06N3/04G06K9/62
CPCG06F21/602G06T7/70G06T7/62G06T2207/20021G06N3/045G06F18/24
Inventor 谢玲玲谢雅彦何智
Owner 齐丰科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products