[go: up one dir, main page]

CN113422882A - Hierarchical encryption method, system, equipment and storage medium for image compression coding - Google Patents

Hierarchical encryption method, system, equipment and storage medium for image compression coding Download PDF

Info

Publication number
CN113422882A
CN113422882A CN202110692069.5A CN202110692069A CN113422882A CN 113422882 A CN113422882 A CN 113422882A CN 202110692069 A CN202110692069 A CN 202110692069A CN 113422882 A CN113422882 A CN 113422882A
Authority
CN
China
Prior art keywords
encryption
level
decoder
information
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110692069.5A
Other languages
Chinese (zh)
Other versions
CN113422882B (en
Inventor
陈志波
孙思萌
金鑫
冯若愚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN202110692069.5A priority Critical patent/CN113422882B/en
Publication of CN113422882A publication Critical patent/CN113422882A/en
Application granted granted Critical
Publication of CN113422882B publication Critical patent/CN113422882B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/124Quantisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/44Decoders specially adapted therefor, e.g. video decoders which are asymmetric with respect to the encoder

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

本发明公开了一种图像压缩编码的分级加密方法、系统、设备与存储介质,结合现有的任务驱动的码流结构化图像编码框架设计分级加密的方法,以尽可能不影响压缩编码效率的同时,能够实现图像内容的分级加密,即针对可否解码码流、可否实现机器智能分析任务和可否针对人类视觉恢复图像三个等级进行加密,从而提高视觉数据传输和应用的安全性。

Figure 202110692069

The invention discloses a hierarchical encryption method, system, equipment and storage medium for image compression coding. The hierarchical encryption method is designed in combination with the existing task-driven code stream structured image coding framework, so as to not affect the compression coding efficiency as much as possible. At the same time, it can realize the hierarchical encryption of image content, that is, whether the code stream can be decoded, whether the machine intelligent analysis task can be realized, and whether the image can be restored by human vision can be encrypted, so as to improve the security of visual data transmission and application.

Figure 202110692069

Description

Hierarchical encryption method, system, equipment and storage medium for image compression coding
Technical Field
The present invention relates to the field of image compression coding technology, and in particular, to a hierarchical encryption method, system, device and storage medium for image compression coding.
Background
In order to meet the challenge of the big outbreak of visual data in the 5G era and more efficiently support machine intelligent application scenes and even man-machine hybrid intelligent application scenes, the existing methods propose video/image compression methods which are different from most existing video/image compression methods only aiming at human vision for compression coding. Taking a task-driven code stream structured image compression coding scheme as an example, a regional decision network and an alignment module for target detection are introduced into the method, a bounding box of a region possibly existing in an object is extracted based on compressed features, and the features are segmented in a spatial layer. The segmented features are respectively sent to an entropy coding module, and the output is sequentially put into a code stream to form a structured code stream.
Meanwhile, with the rapid array of the internet and the outbreak of visual data, the personal privacy protection problem is paid extensive attention, and the problems that how to efficiently encrypt a designated object, how to ensure an intelligent task and prevent private information from being revealed and the like are the hot problems to be researched and solved urgently at present. The existing image encryption process mainly comprises operations of extracting privacy areas (face detection, sensitive object detection and the like), selecting a privacy protection method to protect the privacy areas, setting privacy data access rights for different users and the like. The protection of the privacy zone involves a method of encryption before encoding, a method of combining encoding, and a method based on data hiding (not only the privacy zone needs to be protected, but also it is desirable to ensure the high subjective quality of the original video, i.e. the original video can be played normally for viewing). The encryption method before coding mainly comprises methods of data replacement, data segmentation and the like, the method combined with coding mainly comprises the methods of encrypting standard transformation angles in transformation coding, encrypting an intra-frame prediction mode, encrypting transformation coefficients, encrypting an entropy coding process and the like, and the method based on data hiding mainly comprises the methods of high-frequency information embedding, image patching and the like based on wavelet transformation.
However, in the above method, especially the method combined with encoding, the encryption protection is only considered for human vision, and is not considered for machine vision application scenarios. In most existing encryption methods, when an image needs to be subjected to a machine intelligence analysis task, since a hierarchical protection mechanism for machine vision and human vision is not designed, the image must be decrypted to recover complete image content, so that personal privacy is greatly threatened in machine intelligence application scenes involving a large amount of sensitive information, such as smart homes and smart cities.
Disclosure of Invention
The invention aims to provide a hierarchical encryption method, a system, equipment and a storage medium for image compression coding, which can improve the safety of visual data transmission and application.
The purpose of the invention is realized by the following technical scheme:
a hierarchical encryption method for image compression encoding, comprising:
the encoding process comprises the following steps: extracting compression characteristics of an input image through an encoder, and performing semantic division on the compression characteristics based on semantic information to obtain object compression characteristics corresponding to each object; extracting prior information for guiding an entropy prior decoder to decode from the compression characteristics of each object in the entropy prior encoder; the object compression characteristics and the corresponding prior information are respectively quantized and structurally coded to obtain corresponding structured code streams; the object includes: various preset target objects in the image;
wherein three levels of encryption are set: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; and the third-level encryption is carried out aiming at the structured code stream of the prior information.
A hierarchical encryption system for image compression encoding, comprising:
an encoder for extracting compression characteristics of an input image;
the semantic division unit is used for carrying out semantic division on the compression characteristics based on the semantic information to obtain object compression characteristics corresponding to each object;
the entropy prior encoder is used for extracting prior information for guiding the entropy prior decoder to decode by utilizing the compression characteristics of each object;
the quantization and structural coding unit is used for respectively performing quantization and structural coding on the object compression characteristics and the corresponding prior information to obtain corresponding structural code streams;
the encryption unit is used for setting any one or more levels of encryption according to the set encryption requirements: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; and the third-level encryption is carried out aiming at the structured code stream of the prior information.
A processing device, comprising: one or more processors; a memory for storing one or more programs;
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the aforementioned methods.
A readable storage medium, storing a computer program which, when executed by a processor, implements the aforementioned method.
The technical scheme provided by the invention can be seen that a hierarchical encryption method is designed by combining the existing task-driven code stream structured image coding framework, so that the compression coding efficiency is not influenced as much as possible, and the hierarchical encryption of image contents can be realized, namely, the encryption can be performed according to three levels of whether the code stream can be decoded, whether a machine intelligent analysis task can be realized and whether the image can be restored by human vision, and the safety of visual data transmission and application is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a block diagram of a hierarchical encryption method for image compression encoding according to an embodiment of the present invention;
FIG. 2 is a diagram of a hierarchical authorization decryption process and corresponding decoding results according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a processing apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
First, terms that may be used herein are explained as follows:
the terms "comprising," "including," "containing," "having," or other similar terms of meaning should be construed as non-exclusive inclusions. For example: including a feature (e.g., material, component, ingredient, carrier, formulation, material, dimension, part, component, mechanism, device, process, procedure, method, reaction condition, processing condition, parameter, algorithm, signal, data, product, or article of manufacture), is to be construed as including not only the particular feature explicitly listed but also other features not explicitly listed as such which are known in the art.
The following describes a hierarchical encryption method for image compression encoding according to the present invention in detail. Details which are not described in detail in the embodiments of the invention belong to the prior art which is known to the person skilled in the art. Those not specifically mentioned in the examples of the present invention were carried out according to the conventional conditions in the art or conditions suggested by the manufacturer. The reagents or instruments used in the examples of the present invention are not specified by manufacturers, and are all conventional products available by commercial purchase.
As shown in fig. 1, which is an overall framework of a hierarchical encryption method for image compression and encoding, when not encrypted, an encoding flow includes: for an input image (i.e. x)t) The compressed features (i.e., y) are extracted by the encoder and semantically partitioned based on semantic information (e.g., location information, category information, attribute information, etc.) to obtain eachObject compression characteristics (i.e. characteristics of object compression) to which an object corresponds
Figure BDA0003127171860000041
At this time, attribute region position information can be obtained according to the attribute information; the compression characteristics of each object are extracted from the entropy prior encoder to guide the prior information (namely, the prior information for guiding the decoding of the entropy prior decoder)
Figure BDA0003127171860000042
) (ii) a The object compression characteristics and the corresponding prior information are respectively quantized and structurally coded to obtain corresponding structured code streams (namely, the corresponding structured code streams
Figure BDA0003127171860000043
) (ii) a The solution process comprises the following steps: the structured code stream of the prior information is restored through an entropy prior decoder (namely the quantized prior information), the decoder guides entropy decoding of object compression characteristics by using the restored prior information, and pixel-level information is restored and obtained through the object compression characteristics after entropy decoding.
As will be understood by those skilled in the art, objects in an image refer to various types of target objects set by a user, such as a person, a car, an animal, and so forth. The recovered information of the three pixel levels is given in fig. 1
Figure BDA0003127171860000044
Respectively, location information, category information, and attribute information. Position information: the area occupied by each type of object in the image is generally represented by an upper left coordinate point and an area length and width; category information: the class to which each subject belongs, e.g., human, car, cat, dog, etc.; attribute information: the related attributes of the object are defined, and the content of the attributes can be set by itself, for example: for a person, the attribute may be a pose or face information; for a car, the attribute may be a license plate; the attribute may also be global information, such as color information, high frequency (structural) information, texture information, etc.; in deep learning, color information, high and low frequency information, texture information, etc. may be dissociated into individual channels of the compressed features; thus, the obtained genus was recoveredSexual information may be certain characteristics or areas of the subject, such as a person's face, a cat's face, a vehicle's license plate, and so forth. The operations of compression feature extraction, semantic division, decoding and the like related to the above processes can be realized by the existing coding framework.
Based on the above compression encoding process, different from the conventional encryption method, the present invention sets three levels of encryption: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; the third-level encryption is carried out aiming at the structured code stream of the prior information; in the device comprising the entropy prior decoder and the decoder, the corresponding decoding operation is carried out by the entropy prior decoder and the decoder according to the decryption authorization level which is locally provided.
In the embodiment of the invention, three levels of encryption modes are designed, and fig. 1 mainly shows the principle of second-level and third-level encryption, wherein a parameter 1 and a parameter 2, and an iteration number 1 and an iteration number 2 are mainly used for distinguishing when introducing two types of encryption levels, and the related specific parameter and the iteration number can be set by a person skilled in the art according to experience; the specific implementation of each encryption level is as follows:
1) and (4) first-level encryption.
In the embodiment of the invention, the first-stage encryption is set for information about whether the pixel level can be recovered (namely whether the information can be watched by human eyes), and in a specific implementation stage, decoder parameters corresponding to an encoder can be encrypted, and the decoder parameters need to be decrypted by additionally transmitting a key during authorization.
After the encryption of the same level, if the decoder authority does not exist, the pixel level recovery cannot be realized, but all compression characteristics are possessed, and the machine intelligent analysis task can be realized.
2) And (5) second-stage encryption.
In the embodiment of the invention, the second-stage encryption is set for whether a machine intelligent analysis task can be realized or not.
The second level of encryption includes two sub-levels:
in the first sub-level (namely 2-1 level encryption), the elements of the prior information are scrambled by adopting a scrambling encryption method, the scrambling parameters are transmitted after being encrypted by adopting an asymmetric encryption method, the scrambling parameters need to be decrypted by a private key during authorization, and extra information such as a secret key does not need to be transmitted in the process. The prior information contains at least 192 × 4 elements, so that the encryption space is large, and the security performance is good.
The second sub-level (i.e., level 2-2 encryption) scrambles its elements using a scrambling encryption method for a specified region of the object compression characteristics. In the embodiment of the present invention, the designated area mainly refers to an area that needs to be encrypted, for example, a sensitive area related to personal privacy or a partial object compression feature (for example, a plurality of channels representing high-frequency information in the compression feature) and the like, the designated area is determined by attribute information during semantic division, the scrambling parameter is transmitted after being encrypted by using an asymmetric encryption method, the scrambling parameter needs to be decrypted by using a private key during authorization, and no additional information such as a secret key needs to be transmitted in the process.
After 2-1 level encryption, if decryption authorization is not obtained, correct object compression characteristics cannot be obtained, namely, machine intelligent analysis tasks cannot be realized. Moreover, even if the first-level decryption authority exists, the pixel-level recovery cannot be correctly realized, and human eyes cannot recognize the image content; after 2-2 level encryption, sensitive attribute information (for example, the information of the human face region introduced above) in the sensitive object is encrypted, and even if 2-1 level and the first level of decryption authority exist, most image content related to the sensitive object can be correctly recovered, and the sensitive attribute information of the sensitive object cannot be recovered.
3) And (4) third-level encryption.
In the embodiment of the invention, the third-level encryption is set for the structured code stream of whether the prior information can be decoded or not. The structured code stream of the prior information is encrypted by adopting an asymmetric encryption method
Figure BDA0003127171860000051
Similarly, the prior information code stream part needs to be decrypted by a private key during authorization, extra information such as a transmission key and the like is not needed in the process, and meanwhile, the encryption security performance is higherHigh.
After the level encryption, if the corresponding decryption authority is not obtained, any information related to the sensitive area cannot be obtained, and even the decoding operation related to the sensitive area cannot be completed.
In the encryption introduction, the scrambling encryption can adopt image scrambling encryption technologies such as cat face transform encryption, radiation transform encryption, magic square transform encryption and the like, the asymmetric encryption method can adopt algorithms such as RSA, DSA, ECC and the like, the priori information code stream and the scrambling parameter code stream are spliced and encrypted by the asymmetric encryption method during encryption, so that the encryption security can be improved, otherwise, the scrambling parameter code stream needs to be filled with useless zero elements due to the fact that the length of a plaintext is too short, and thus too much coding redundancy is introduced.
As shown in the left part of fig. 2, for a structured code stream that is hierarchically encrypted, a hierarchical authorization decryption process is provided, and after receiving a structured code stream that is encrypted at three levels, a device including an entropy prior decoder and a decoder performs a corresponding decoding operation according to a locally possessed decryption authorization level, where the process is as follows:
firstly, whether the authorization of the third-level decryption (namely, the 3-level authorization in the figure) is locally provided is judged, and if so, the scrambled and encrypted prior information can be decoded
Figure BDA0003127171860000061
And recovering the structured code stream of the prior information through an entropy prior decoder. If there is no authorization for third level decryption, then no a priori information and hence no decoding operation can be performed.
Then, judging whether the authorization of the second-level decryption is provided; wherein the second level of encryption comprises two sub-levels: the first sub-level scrambles the elements of the prior information, the second sub-level scrambles the elements of the object compression characteristics of the specified area, and the authorization of the second-level decryption comprises decryption authorization corresponding to each sub-level; if local authorization is available for decryption at the first sub-level (i.e., level 2-1 authorization in the figure), the object compression feature may be restored
Figure BDA0003127171860000062
Specifically, the obtained scrambling parameters are utilized to recover correct prior information and guide entropy decoding of object compression characteristics, so that the compression characteristics are correctly decoded, and can be directly used for machine intelligent analysis tasks but cannot be viewed by human vision; if there is no corresponding decryption authority, the wrong compression characteristics can be obtained by using the wrong a priori information. If local authorization is available for decryption at a second sub-level (i.e., level 2-2 authorization in the figure), the object compression feature may be restored
Figure BDA0003127171860000063
The hidden attribute data is specifically used for decrypting object compression characteristics of the designated area by using the obtained scrambling parameters, specifically, a sensitive attribute part can be decrypted, and if no corresponding decryption authorization exists, sensitive attribute information cannot be correctly identified by a machine intelligent analysis task, so that only part of the machine intelligent analysis tasks can be supported.
Finally, whether the local area has the authorization of the first-level decryption (namely, the level 1 authorization in the figure) is judged, if yes, the decoder parameters are decrypted, the compression characteristics of the decoding object of the decoder parameters obtained by decryption are utilized, and the pixel-level information is recovered and obtained
Figure BDA0003127171860000064
For human visual viewing; if there is no associated decryption authority, the pixel level information cannot be recovered.
As shown in the right part of fig. 2, if there is a first level of decryption authorization but no level 2-1 decryption authorization, the recovered image is confusing and cannot be recognized by human eyes, i.e., (C) part of the image; if there is level 2-1 decryption authority but no level 2-2 decryption authority, the attribute region is confusing and cannot be recognized by the human eye, i.e., the image of part (B). If the right of 2-2 level and 2-1 level is provided, the right compression characteristic is obtained by decryption, the image content can be correctly recovered, and the recovered image can be recognized by human eyes, namely, the image of the part (A).
The above scheme of the embodiment of the invention has the following main beneficial effects:
1) a hierarchical encryption scheme is designed by combining a task-driven code stream structured coding frame, an original high-level semantic information extraction module (for obtaining position information, category information and attribute information) in the task-driven code stream structured coding frame is directly utilized, a sensitive area does not need to be detected independently, and the encryption efficiency is improved.
2) The aim of encrypting the image content can be achieved by encrypting and transmitting the prior information (the code stream length of which is about one tenth of the code stream length of the compression characteristic) for guiding the entropy coding and decoding, and the length of the plaintext to be encrypted is reduced while the safety is ensured, so that the memory required by storing the key is reduced, and the encryption efficiency is improved.
3) A hierarchical encryption scheme is designed for machine intelligent analysis tasks and human vision, and under the application scene of compression coding driven by the machine intelligent analysis tasks, the machine intelligent analysis tasks can be realized while privacy data desensitization is realized, and the data security is ensured.
4) Different encryption levels are set for the sensitive attribute area and the rest areas of a specific sensitive object, so that part of important attribute information can be flexibly protected, and meanwhile, the safety of an encryption scheme is improved;
another embodiment of the present invention further provides a hierarchical encryption system for image compression encoding, which mainly includes:
an encoder for extracting compression characteristics of an input image;
the semantic division unit is used for carrying out semantic division on the compression characteristics based on the semantic information to obtain object compression characteristics corresponding to each object;
the entropy prior encoder is used for extracting prior information for guiding the entropy prior decoder to decode by utilizing the compression characteristics of each object;
the quantization and structural coding unit is used for respectively performing quantization and structural coding on the object compression characteristics and the corresponding prior information to obtain corresponding structural code streams;
the encryption unit is used for setting any one or more levels of encryption according to the set encryption requirements: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; and the third-level encryption is carried out aiming at the structured code stream of the prior information.
The system further comprises: a decoding device, comprising: an entropy prior decoder and decoder; and after receiving the structured code stream subjected to the three-level encryption, the decoding equipment performs corresponding decoding operation according to a decryption authorization level locally possessed.
The system part set corresponds to the framework shown in fig. 1, and the semantic division unit and the encryption unit are not directly shown.
Another embodiment of the present invention further provides a processing apparatus, as shown in fig. 3, which mainly includes: one or more processors; a memory for storing one or more programs; wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods provided by the foregoing embodiments.
Further, the processing device further comprises at least one input device and at least one output device; in the processing device, a processor, a memory, an input device and an output device are connected through a bus.
In the embodiment of the present invention, the specific types of the memory, the input device, and the output device are not limited; for example:
the input device can be a touch screen, an image acquisition device, a physical button or a mouse and the like;
the output device may be a display terminal;
the Memory may be a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as a disk Memory.
Another embodiment of the present invention further provides a readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method provided by the foregoing embodiment.
The readable storage medium in the embodiment of the present invention may be provided in the foregoing processing device as a computer readable storage medium, for example, as a memory in the processing device. The readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A hierarchical encryption method for image compression encoding, comprising:
the encoding process comprises the following steps: extracting compression characteristics of an input image through an encoder, and performing semantic division on the compression characteristics based on semantic information to obtain object compression characteristics corresponding to each object; extracting prior information for guiding an entropy prior decoder to decode from the compression characteristics of each object in the entropy prior encoder; the object compression characteristics and the corresponding prior information are respectively quantized and structurally coded to obtain corresponding structured code streams; the object includes: various preset target objects in the image;
wherein three levels of encryption are set: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; and the third-level encryption is carried out aiming at the structured code stream of the prior information.
2. The hierarchical encryption method for image compression encoding according to claim 1, wherein the first level encryption, the second level encryption and the third level encryption are respectively set for whether pixel level information can be recovered, whether machine intelligent analysis task can be implemented and whether structured code stream of prior information can be decoded.
3. The hierarchical encryption method for image compression encoding according to claim 1, wherein the first-level encryption is performed for the decoder parameters, and the transmission key is required for decryption of the decoder parameters during authorization.
4. The hierarchical encryption method for image compression encoding according to claim 1, wherein the second level of encryption comprises two sub-levels: in the first sublevel, the elements of the prior information are scrambled by adopting a scrambling encryption method, and a private key is required to decrypt the scrambling parameters during authorization; and in the second sublevel, the elements of the specified area of the object compression characteristic are scrambled by adopting a scrambling encryption method.
5. The hierarchical encryption method for image compression coding according to claim 1, wherein the third-level encryption is performed by using an asymmetric encryption method for the structured code stream of the prior information, and the structured code stream of the prior information needs to be decrypted by using a private key during authorization.
6. The hierarchical encryption method for image compression encoding according to any one of claims 1 to 5, wherein for the hierarchically encrypted structured code stream, the method further comprises a step of hierarchical authorization decryption, and in a device comprising an entropy prior decoder and a decoder, a corresponding decoding process is performed according to a locally-owned decryption authorization level, and the step comprises:
judging whether the local has the authorization of the third-level decryption, if so, recovering the structured code stream of the prior information through an entropy prior decoder;
judging whether the local has authorization of second-level decryption; wherein the second level of encryption comprises two sub-levels: the first sub-level scrambles the elements of the prior information, the second sub-level scrambles the elements of the object compression characteristics of the specified area, and the authorization of the second-level decryption comprises decryption authorization corresponding to each sub-level; if the local authority of decryption corresponding to the first sub-level is available, recovering correct prior information by using the acquired scrambling parameters, and guiding entropy decoding of object compression characteristics; if the local authority corresponding to the decryption of the second sub-level is available, decrypting the object compression characteristic of the designated area by using the obtained scrambling parameter;
and judging whether the local area has the authorization of the first-level decryption, if so, decrypting the decoder parameters, decoding the object compression characteristics by using the decoder parameters obtained by decryption, and recovering to obtain the pixel-level information.
7. A hierarchical encryption system for compression encoding of images, comprising:
an encoder for extracting compression characteristics of an input image;
the semantic division unit is used for carrying out semantic division on the compression characteristics based on the semantic information to obtain object compression characteristics corresponding to each object;
the entropy prior encoder is used for extracting prior information for guiding the entropy prior decoder to decode by utilizing the compression characteristics of each object;
the quantization and structural coding unit is used for respectively performing quantization and structural coding on the object compression characteristics and the corresponding prior information to obtain corresponding structural code streams;
the encryption unit is used for setting any one or more levels of encryption according to the set encryption requirements: a first level of encryption, encrypting decoder parameters; second-stage encryption, namely scrambling elements of prior information or object compression characteristics; and the third-level encryption is carried out aiming at the structured code stream of the prior information.
8. The hierarchical encryption system for image compression encoding according to claim 7, comprising: the system further comprises: a decoding device, comprising: an entropy prior decoder and decoder; and after receiving the structured code stream subjected to the three-level encryption, the decoding equipment performs corresponding decoding operation by the entropy prior decoder and the decoder according to the decryption authorization level locally possessed.
9. A processing device, comprising: one or more processors; a memory for storing one or more programs;
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-6.
10. A readable storage medium, storing a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any of claims 1-6.
CN202110692069.5A 2021-06-22 2021-06-22 Hierarchical encryption method, system, equipment and storage medium for image compression coding Active CN113422882B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110692069.5A CN113422882B (en) 2021-06-22 2021-06-22 Hierarchical encryption method, system, equipment and storage medium for image compression coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110692069.5A CN113422882B (en) 2021-06-22 2021-06-22 Hierarchical encryption method, system, equipment and storage medium for image compression coding

Publications (2)

Publication Number Publication Date
CN113422882A true CN113422882A (en) 2021-09-21
CN113422882B CN113422882B (en) 2022-09-02

Family

ID=77716058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110692069.5A Active CN113422882B (en) 2021-06-22 2021-06-22 Hierarchical encryption method, system, equipment and storage medium for image compression coding

Country Status (1)

Country Link
CN (1) CN113422882B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979717A (en) * 2022-07-25 2022-08-30 广州万协通信息技术有限公司 Differential video encryption method based on equipment decoding capability and security chip device
CN115880379A (en) * 2021-09-27 2023-03-31 中国科学技术大学 Semantic scalable image coding method, system, device and storage medium
CN116170581A (en) * 2023-02-17 2023-05-26 厦门瑞为信息技术有限公司 A method for encoding and decoding video information based on object perception and electronic equipment
CN117615079A (en) * 2024-01-23 2024-02-27 北京工业大学 An encryption method and encryption system for image data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11331618A (en) * 1998-05-19 1999-11-30 Canon Inc Image processing apparatus, image data distribution apparatus, image data distribution system, image data distribution method, and storage medium
JP2007013393A (en) * 2005-06-29 2007-01-18 Kddi Corp Image dispersion information generation apparatus and composition apparatus thereof
JP2009213083A (en) * 2008-03-06 2009-09-17 Hitachi Kokusai Electric Inc Image compression method and apparatus
CN104869432A (en) * 2015-05-14 2015-08-26 邓家先 Multi-resolution compression encryption and grading decryption and display method for image
US20170085892A1 (en) * 2015-01-20 2017-03-23 Beijing University Of Technology Visual perception characteristics-combining hierarchical video coding method
CN108650269A (en) * 2018-05-16 2018-10-12 中国科学技术大学 A kind of graded encryption method and system based on intensified learning
CN110225341A (en) * 2019-06-03 2019-09-10 中国科学技术大学 A kind of code flow structure image encoding method of task-driven
CN110391958A (en) * 2019-08-15 2019-10-29 北京中安智达科技有限公司 A kind of pair of network encryption flow carries out feature extraction automatically and knows method for distinguishing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11331618A (en) * 1998-05-19 1999-11-30 Canon Inc Image processing apparatus, image data distribution apparatus, image data distribution system, image data distribution method, and storage medium
JP2007013393A (en) * 2005-06-29 2007-01-18 Kddi Corp Image dispersion information generation apparatus and composition apparatus thereof
JP2009213083A (en) * 2008-03-06 2009-09-17 Hitachi Kokusai Electric Inc Image compression method and apparatus
US20170085892A1 (en) * 2015-01-20 2017-03-23 Beijing University Of Technology Visual perception characteristics-combining hierarchical video coding method
CN104869432A (en) * 2015-05-14 2015-08-26 邓家先 Multi-resolution compression encryption and grading decryption and display method for image
CN108650269A (en) * 2018-05-16 2018-10-12 中国科学技术大学 A kind of graded encryption method and system based on intensified learning
CN110225341A (en) * 2019-06-03 2019-09-10 中国科学技术大学 A kind of code flow structure image encoding method of task-driven
CN110391958A (en) * 2019-08-15 2019-10-29 北京中安智达科技有限公司 A kind of pair of network encryption flow carries out feature extraction automatically and knows method for distinguishing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JIAOLI SHI等: "ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture", 《CHINESE JOURNAL OF ELECTRONICS》 *
张荣等: "基于零树的视频压缩加密联合编码方案", 《通信学报》 *
秦威等: "基于BP神经网络的工程图形数据远程安全快速传输法", 《中国工程科学》 *
郑中华: "基于内容自适应的视频加密技术研究与实现", 《硕士论文》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115880379A (en) * 2021-09-27 2023-03-31 中国科学技术大学 Semantic scalable image coding method, system, device and storage medium
CN114979717A (en) * 2022-07-25 2022-08-30 广州万协通信息技术有限公司 Differential video encryption method based on equipment decoding capability and security chip device
CN116170581A (en) * 2023-02-17 2023-05-26 厦门瑞为信息技术有限公司 A method for encoding and decoding video information based on object perception and electronic equipment
CN116170581B (en) * 2023-02-17 2024-01-23 厦门瑞为信息技术有限公司 A video information encoding and decoding method and electronic device based on target perception
CN117615079A (en) * 2024-01-23 2024-02-27 北京工业大学 An encryption method and encryption system for image data
CN117615079B (en) * 2024-01-23 2024-03-29 北京工业大学 An encryption method and encryption system for image data

Also Published As

Publication number Publication date
CN113422882B (en) 2022-09-02

Similar Documents

Publication Publication Date Title
CN113422882B (en) Hierarchical encryption method, system, equipment and storage medium for image compression coding
JP5269033B2 (en) Image privacy masking method and apparatus
EP2832102B1 (en) Methods and systems for cryptographic access control of video
CN1205479A (en) Apparatus, method and computer program product for protecting copyright data in computer system
EP3482565B1 (en) Streaming piracy detection method and system
CN104134022A (en) Information hiding and protecting method based on image
Embaby et al. Digital watermarking properties, classification and techniques
CN108833921A (en) A kind of decoding method and device
CN108848382B (en) Encoding and decoding method and device
CN112351275A (en) Feature area privacy protection method and device based on original image
CN112434327B (en) Information protection method and device and electronic equipment
KR20100092945A (en) Method and system for the secure distribution of audiovisual data by transactional marking
Sultana et al. A new approach to hide data in color image using LSB steganography technique
Al-Otum et al. Copyright protection of color images for android-based smartphones using watermarking with quick-response code
CN115988220A (en) A method and system for improving data transmission security
CN111476865B (en) Image protection method for image recognition based on deep learning neural network
WO2025077583A1 (en) Vehicle control method and apparatus, electronic device, and storage medium
CN103533457B (en) Multimedia digital watermark embedding and separation method and device
Asif et al. High-Capacity Reversible Data Hiding using Deep Learning
Ahuja et al. Video data security: analysis, relevance and open challenges
Qin et al. Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction and Labeling.
CN119449965B (en) Video privacy protection method, video playback method and related devices
Paul et al. Multimedia security: Basics, its subfields, and allied areas
Mazhar et al. Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
Thanh et al. Frame background influence based invisible watermarking to visible video watermarking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant