An image management method and device

An image management and image technology, applied in the field of information security, can solve problems such as document leakage and difficult traceability

Active Publication Date: 2021-11-12
武汉华工安鼎信息技术有限责任公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides an image management method and device to alleviate the technical problem of difficult traceability of leaked files in the existing file management method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image management method and device
  • An image management method and device
  • An image management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0044] Embodiments of the present application provide an image management method, device, electronic device, and computer-readable storage medium, wherein the image management device may be integrated into the electronic device, and the electronic device may be a server or a terminal.

[0045] see figure 1 , figure 1It is a schematic diagram of the application scene of the steganography traceability system provided by the embodiment of the present application. The system may in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides an image management method and device. In the method, a processing server first obtains the currently displayed frame images and the frame images to be processed of multiple user terminals, and divides them to obtain multiple first images carrying first steganographic information. block and multiple second image blocks, then determine the target second image block according to the similarity between each second image block and the corresponding first image block, and then call the encoding model to embed the second steganographic information on the target second image block , obtain the third image block, and finally obtain the target display frame image according to the first image block, the target second image block and the third image block and display it on the target user terminal; the traceability server first obtains the image to be traced and divides it to obtain the fourth image block, and then call the decoding model to obtain the third steganographic information from the fourth image block to determine the target leakage terminal and target leakage time of the image to be traced. The present application realizes the precise source tracing of the images to be traced, and the calculation amount in the process is small.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to an image management method and device. Background technique [0002] With the rapid development of Internet information technology, the issue of information security has become a social hot spot. For some sensitive files, various encryption modes are usually used for protection. However, if sensitive files are leaked by taking pictures or taking screenshots when using the terminal, it will be difficult to trace and locate, and further leakage of information cannot be prevented in time, thus bringing a greater security risk. [0003] Therefore, the existing file management method has the technical problem that it is difficult to trace the source of the file after it is leaked, and needs to be improved. Contents of the invention [0004] Embodiments of the present application provide an image management method and device, which are used to alleviate the te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06F21/16
CPCG06T1/0021G06F21/16
Inventor 廖巍王同洋韩敏王慧强徐胜文
Owner 武汉华工安鼎信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products