CN108491785B - Artificial intelligence image identification attack defense system - Google Patents

Artificial intelligence image identification attack defense system Download PDF

Info

Publication number
CN108491785B
CN108491785B CN201810223172.3A CN201810223172A CN108491785B CN 108491785 B CN108491785 B CN 108491785B CN 201810223172 A CN201810223172 A CN 201810223172A CN 108491785 B CN108491785 B CN 108491785B
Authority
CN
China
Prior art keywords
image
module
target
recognition
monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810223172.3A
Other languages
Chinese (zh)
Other versions
CN108491785A (en
Inventor
罗禹铭
罗禹城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangyu Safety Technology Shenzhen Co ltd
Original Assignee
Wangyu Safety Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangyu Safety Technology Shenzhen Co ltd filed Critical Wangyu Safety Technology Shenzhen Co ltd
Priority to CN201810223172.3A priority Critical patent/CN108491785B/en
Publication of CN108491785A publication Critical patent/CN108491785A/en
Application granted granted Critical
Publication of CN108491785B publication Critical patent/CN108491785B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/96Management of image or video recognition tasks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Software Systems (AREA)
  • Power Engineering (AREA)
  • Image Analysis (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an artificial intelligence image identification attack defense system, which comprises: the system comprises a monitor end and a server end, wherein the monitor end is in communication connection with the server end; the monitor end comprises an image target position detection module, an image digitization module, an image security coding module and a coding transmission encryption module, and the server end comprises a coding transmission decryption module, an image security decoding module, a numerical imaging module, an image target secondary classification algorithm module, an artificial intelligent deep learning server host and a background image target database; the invention carries out intelligent recognition of the human face through the artificial intelligent image recognition attack defense system, avoids the confusion attack of artificial intelligent image recognition, quickly judges the authenticity of the image target and improves the safety of human face recognition.

Description

Artificial intelligence image identification attack defense system
Technical Field
The invention relates to the technical field of artificial intelligence image recognition, in particular to an artificial intelligence image recognition attack defense system.
Background
At present, the arrival of AI (Artificial Intelligence, a new technical science for researching and developing theories, methods, technologies and application systems for simulating, extending and expanding human Intelligence) will lead human beings to enter a new era, and along with the development of computer technology and information technology, AI Artificial Intelligence increasingly affects our daily life.
The image recognition refers to a technology of processing, analyzing and understanding images by using a computer to recognize various targets and objects in different modes, and in general industrial use, an industrial camera is adopted to shoot pictures, and then software is used for further recognition processing according to the gray level difference of the pictures.
At present, the face recognition is applied in a large range, but the work in the aspect of safety protection is weak, particularly the front end (camera) of image acquisition, the safety protection capability is weak, and the situations of invasion and hijacking of the camera are very common; if an attacker invades the camera and tampers with the image and the video acquired by the camera, artificial intelligent processing such as background face recognition can be misled.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The invention aims to solve the technical problem that the artificial intelligent image identification attack defense system aims to perform intelligent identification on a human face through the artificial intelligent image identification attack defense system, avoid the confusion attack of artificial intelligent image identification, quickly judge the authenticity of an image target and improve the safety of human face identification.
The technical scheme adopted by the invention for solving the technical problem is as follows:
an artificial intelligence image recognition attack defense system, wherein the artificial intelligence image recognition attack defense system comprises:
the system comprises a monitor end and a server end, wherein the monitor end is in communication connection with the server end;
the monitor side includes:
the image target position detection module is used for identifying the target position of the image acquired by the monitor in real time and extracting pixel points needing security coding protection;
the image digitization module is used for carrying out digitization processing on the image;
the image security coding module is used for coding the digitized image by a security algorithm;
the encoding transmission encryption module is used for encrypting the encoding information and transmitting the encrypted encoding information to the server end through network packets;
the server side includes:
the coding transmission decryption module is used for decrypting the received coding information;
the image security decoding module is used for decoding the decrypted coding information into a numerical value before the original image is coded and restoring the numerical value into an original target image through a digital image algorithm;
the numerical value imaging module is used for carrying out imaging processing on the numerical value;
the image target classification algorithm module is used for preliminarily judging the authenticity of the image target through a rule base artificially defined by the authenticity characteristics of the target;
the artificial intelligent deep learning server host is used for comparing and identifying the detailed characteristics of the image target and then transmitting the characteristic information to the background image target database;
and the background image target database is used for returning or displaying the real data information of the image target according to the application range after comparing the corresponding information of the image target characteristics.
The artificial intelligence image recognition attack defense system, wherein, the monitor end further comprises: a monitor for image capture.
The artificial intelligence image recognition attack defense system is characterized in that the monitor comprises a camera and a mobile terminal.
The artificial intelligence image identification attack defense system is characterized in that the coding transmission encryption module encrypts coding information through a Hash algorithm.
The artificial intelligence image identification attack defense system is characterized in that the coding transmission decryption module decrypts the received coding information through a Hash algorithm.
The artificial intelligence image recognition attack defense system, wherein, the server end further comprises:
and the face identity data comparison module is used for acquiring an identity recognition result according to the real data information obtained through the background image target database.
The artificial intelligence image recognition attack defense system, wherein, the server end further comprises:
and the face characteristic picture searching module is used for acquiring a picture identification result according to the real data information obtained through the background image target database.
The artificial intelligence image recognition attack defense system, wherein, the server end further comprises:
and the image detection module is used for detecting the image again when the image target binary algorithm module judges that the image is attacked when the image is transmitted to the package.
The invention discloses an artificial intelligence image identification attack defense system, which comprises: the system comprises a monitor end and a server end, wherein the monitor end is in communication connection with the server end; the monitor end comprises an image target position detection module, an image digitization module, an image security coding module and a coding transmission encryption module, and the server end comprises a coding transmission decryption module, an image security decoding module, a numerical imaging module, an image target secondary classification algorithm module, an artificial intelligent deep learning server host and a background image target database; the invention carries out intelligent recognition of the human face through the artificial intelligent image recognition attack defense system, avoids the confusion attack of artificial intelligent image recognition, quickly judges the authenticity of the image target and improves the safety of human face recognition.
Drawings
FIG. 1 is a functional diagram of an embodiment of the system for defending against image recognition attacks.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the system for defending against image recognition attack of artificial intelligence according to the preferred embodiment of the present invention is an artificial intelligence image recognition attack defending system, wherein the system for defending against image recognition attack of artificial intelligence comprises:
the system comprises a monitor terminal 100 and a server terminal 200, wherein the monitor terminal 100 is in communication connection with the server terminal 200; the monitor terminal 100 includes: an image target position detection module 110, configured to perform target position identification on an image obtained by a monitor in real time, and extract a pixel point that needs security coding protection; an image digitizing module 120, configured to perform digital processing on the image; the image security coding module 130 is used for coding the digitized image by a security algorithm; the encoding transmission encryption module 140 is used for encrypting the encoding information and transmitting the encrypted encoding information to the server through network packets; the server 200 includes: a coding transmission decryption module 210, configured to decrypt the received coding information; the image security decoding module 220 is configured to decode the decrypted encoded information into a value before encoding of the original image, and restore the value to the original target image through a digital image algorithm; a numerical imaging module 230, configured to perform imaging processing on the numerical value; the image target classification algorithm module 240 is used for preliminarily judging the authenticity of the image target through a rule base artificially defined by the authenticity characteristics of the target; the artificial intelligence deep learning server host 250 is used for comparing and identifying the detailed characteristics of the image target and then transmitting the characteristic information to the background image target database; and the background image target database 260 is used for returning or displaying the real data information of the image target according to the application range after comparing the corresponding information of the image target characteristics.
The present invention first captures the current image in real time through the monitor hardware, then uses the image target position detection module 110 to identify the target (not all the pixels need to be security coded, only the key image part needs to be security coded and protected, therefore, the target identification needs to be performed first, and extracts the part needing security coded and protected, thereby reducing the traffic), and uses the image digitization module 120 to digitize the image, the digitized image enters the image security coding module 130, after the security algorithm coding, the coding information is encrypted by the coding transmission encryption module 140, and finally transmitted to the server 200 through the network package.
The image security coding module 130 may perform security coding at each pixel position of the image, transmit the picture coding information to the background (which is the background for processing the image and video) through the image digitizing module 120, and decode the picture coding information from the background into the original image; after the monitor hardware acquires the original image, the target identification is carried out on the content of the original image, and the added safety protection hardware carries out safety coding while the content of the target image is subjected to digital processing, so that an attacker is prevented from tampering the content of the image.
Further, the monitor terminal 100 further includes: a monitor for image capture; the monitor comprises a camera and a mobile terminal.
Wherein, the encoding transmission encryption module 140 encrypts the encoding information by a hash algorithm; the encoding transmission decryption module 210 decrypts the received encoded information through a hash algorithm.
Further, as shown in fig. 1, the server 200 further includes: a face identity data comparison module 270, configured to obtain an identity recognition result according to the real data information obtained through the background image target database; the face feature image searching module 280 is configured to obtain an image recognition result according to the real data information obtained through the background image target database.
Further, as shown in fig. 1, the server 200 further includes: the image detection module 290 is configured to detect the image again when the image target binary algorithm module 240 determines that the image has been attacked during packet transmission.
Specifically, the present invention first captures the current image in real time through the monitor hardware (or other image capturing devices), then identifies the target position by the image target position detection module 110, digitizes the image (for example, a human face) by the image digitization module 120, enters the image security coding module 130 (for example, a hash algorithm encryption module in this embodiment) through the digitized image, codes the security algorithm, then encrypts the coded information by the code transmission encryption module 140, and finally transmits the encrypted information to the server 200 through the network packet.
The server 200 decrypts the encoded information by using the encoding transmission decryption module 210, and decodes the decrypted encoded information into the original pre-encoded image value through the image security decoding module 220, and finally restores the original pre-encoded image value into the original target image through the digital imaging module 230.
Generally speaking, the artificial intelligence pattern recognition aliasing attack is carried out, (such as deep learning network differential evolution attack, fake false face recognition attack, etc., differential evolution is an optimization algorithm in artificial intelligence image recognition, the differential evolution attack is to change the pixels of the face picture transmitted to the server side from the local side, modify the single pixel point or multiple pixel points of the face picture, and make the judgment of the deep learning artificial intelligence (DNN) of the server side misaligned), the most probable attack point of a hacker is the pattern packet, and the process of transmitting the pattern packet to the host computer of the server side 200 through the network, namely the process of transmitting the pattern packet to the code transmission decryption module of the server side 200 from the code transmission encryption module 140 of the monitor side 100.
In order to avoid the risk of confusion of an artificial intelligent target identification server end caused by the confusion attack of artificial intelligent image identification, before a decrypted image enters an artificial intelligent deep learning server, the authenticity of the image target is preliminarily judged by a rule base artificially defined by target authenticity characteristics through an image target two-classification algorithm module 240 (because the operational capability of images such as a camera and video acquisition equipment is limited, an error exists in the identification of an image block similar to a human face, an image block which is not the human face but is similar to the human face is marked as a target image, and safety coding is carried out, in order to improve the efficiency of the next human face identification processing, a part which is not the human face needs to be firstly screened out, namely after the target image is found to be falsified through checking the safety coding, whether the falsified target is planned confusion attack or not is further analyzed, because in the image data transmission process, data transmission errors can also occur, not necessarily targeted attacks).
If the target does satisfy the target authenticity feature, the pattern allows further comparison via an artificial intelligence deep learning network (DNN). If not, it can be known that the picture may have been subjected to the hacking attack during the packet transmission, and the information cannot be directly inputted into the artificial intelligence recognition database to avoid database confusion, and the picture needs to be sent to the image detection module 290 for rechecking.
After the artificial intelligent deep learning network (DNN) further compares and identifies the detailed characteristics of the target, the characteristic information is transmitted to the processing center of the background target database 260, and after the corresponding information of the target characteristics is successfully compared by the background target database 260, the real data information of the target is returned or displayed according to the application range.
In summary, the present invention provides an artificial intelligence image recognition attack defense system, which includes: the system comprises a monitor end and a server end, wherein the monitor end is in communication connection with the server end; the monitor end comprises an image target position detection module, an image digitization module, an image security coding module and a coding transmission encryption module, and the server end comprises a coding transmission decryption module, an image security decoding module, a numerical imaging module, an image target secondary classification algorithm module, an artificial intelligent deep learning server host and a background image target database; the monitor end carries out target position identification on the image acquired in real time, acquires pixel points needing safety coding protection, and carries out digital processing on the image; the monitor end encodes the digitized image, encrypts encoded information and transmits the encrypted encoded information into the server end through a network packet; the server side decrypts the received coding information, restores the received coding information into an original target image, and preliminarily judges the authenticity of the image target after carrying out imaging processing on the numerical value; and the server end compares and identifies the detailed characteristics of the image target, compares the corresponding information of the image target characteristics, and returns or displays the real data information of the image target according to the application range. According to the invention, through intelligent recognition of the human face, the confusion attack of artificial intelligent pattern recognition is avoided, the authenticity of the image target is rapidly judged, and the safety of human face recognition is improved.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (5)

1. An artificial intelligence image recognition attack defense system, characterized in that the artificial intelligence image recognition attack defense system includes:
the system comprises a monitor end and a server end, wherein the monitor end is in communication connection with the server end;
the monitor side includes:
the image target position detection module is used for identifying the target position of the image acquired by the monitor in real time and extracting pixel points needing security coding protection;
the image digitization module is used for carrying out digitization processing on the image;
the image security coding module is used for coding the digitized image by a security algorithm;
the encoding transmission encryption module is used for encrypting the encoding information and transmitting the encrypted encoding information to the server end through network packets;
the server side includes:
the coding transmission decryption module is used for decrypting the received coding information;
the image security decoding module is used for decoding the decrypted coding information into a numerical value before the original image is coded and restoring the numerical value into an original target image through a digital image algorithm;
the numerical value imaging module is used for carrying out imaging processing on the numerical value;
the image target classification algorithm module is used for preliminarily judging the authenticity of the image target through a rule base artificially defined by the authenticity characteristics of the target; the risk that the artificial intelligent target identification server end is confused due to the confusion attack of the artificial intelligent image identification is avoided; the image target is a human face, and the image target is classified into authenticity of the human face;
the image detection module is used for detecting the image again when the image target binary algorithm module judges that the image is attacked when the image is transmitted to the package;
before the decrypted original target image enters the artificial intelligent deep learning server host, the decrypted original target image needs to enter an image target two-classification algorithm module;
the artificial intelligent deep learning server host is used for comparing and identifying the detailed characteristics of the image target and then transmitting the characteristic information to the background image target database;
the background image target database is used for returning or displaying the real data information of the image target according to the application range after comparing the corresponding information of the image target characteristics;
the face identity data comparison module is used for acquiring an identity recognition result according to the real data information obtained through the background image target database;
the face characteristic picture searching module is used for acquiring a picture identification result according to the real data information obtained through the background image target database;
through the intelligent recognition of the human face, the confusion attack of artificial intelligent pattern recognition is avoided, the authenticity of an image target is quickly judged, and the safety of the human face recognition is improved.
2. The system of claim 1, wherein the monitor terminal further comprises: a monitor for image capture.
3. The system of claim 2, wherein the monitor comprises a camera and a mobile terminal.
4. The system of claim 1, wherein the encoded transmission encryption module encrypts the encoded information by a hash algorithm.
5. The system of claim 1, wherein the encoded transmission decryption module decrypts the received encoded information by a hash algorithm.
CN201810223172.3A 2018-03-19 2018-03-19 Artificial intelligence image identification attack defense system Active CN108491785B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810223172.3A CN108491785B (en) 2018-03-19 2018-03-19 Artificial intelligence image identification attack defense system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810223172.3A CN108491785B (en) 2018-03-19 2018-03-19 Artificial intelligence image identification attack defense system

Publications (2)

Publication Number Publication Date
CN108491785A CN108491785A (en) 2018-09-04
CN108491785B true CN108491785B (en) 2020-07-28

Family

ID=63339904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810223172.3A Active CN108491785B (en) 2018-03-19 2018-03-19 Artificial intelligence image identification attack defense system

Country Status (1)

Country Link
CN (1) CN108491785B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109271137B (en) * 2018-09-11 2020-06-02 网御安全技术(深圳)有限公司 Modular multiplication device based on public key encryption algorithm and coprocessor
CN110070115B (en) * 2019-04-04 2021-09-03 广州大学 Single-pixel attack sample generation method, device, equipment and storage medium
CN110046622B (en) * 2019-04-04 2021-09-03 广州大学 Targeted attack sample generation method, device, equipment and storage medium
CN110263674B (en) * 2019-05-31 2022-02-15 武汉大学 Anti-reconnaissance camouflage 'invisible clothes' generation method for deep pedestrian re-identification system
CN111401273B (en) * 2020-03-19 2022-04-29 支付宝(杭州)信息技术有限公司 User feature extraction system and device for privacy protection
CN111274601A (en) * 2020-03-23 2020-06-12 上海金桥信息股份有限公司 Image security identification system and method under network environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957911A (en) * 2010-09-29 2011-01-26 汉王科技股份有限公司 Face identification method and system
CN105488486A (en) * 2015-12-07 2016-04-13 清华大学 Face recognition method and device for preventing photo attack
CN106778525A (en) * 2016-11-25 2017-05-31 北京旷视科技有限公司 Identity identifying method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170214701A1 (en) * 2016-01-24 2017-07-27 Syed Kamran Hasan Computer security based on artificial intelligence

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957911A (en) * 2010-09-29 2011-01-26 汉王科技股份有限公司 Face identification method and system
CN105488486A (en) * 2015-12-07 2016-04-13 清华大学 Face recognition method and device for preventing photo attack
CN106778525A (en) * 2016-11-25 2017-05-31 北京旷视科技有限公司 Identity identifying method and device

Also Published As

Publication number Publication date
CN108491785A (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN108491785B (en) Artificial intelligence image identification attack defense system
CN107580196B (en) Video data sharing system and method
US10659220B2 (en) Method and system for encrypting and decrypting two-dimensional code mask
KR101747221B1 (en) Image data transmitting and receiving method and camara terminal and server for image forgery detection in security camera system
Hämmerle-Uhl et al. Watermarking as a means to enhance biometric systems: A critical survey
KR20020021080A (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
KR20040053253A (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
CN106534171B (en) Security authentication method, device and terminal
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
CN116132989B (en) Industrial Internet security situation awareness system and method
CN108512651B (en) Artificial intelligence image identification attack defense method, system and storage medium
KR101951605B1 (en) Cctv image security system to prevent image leakage
CN116383793B (en) Face data processing method, device, electronic equipment and computer readable medium
US11374933B2 (en) Securing digital data transmission in a communication network
CN113139428A (en) Target identification method, edge device, frontier defense monitoring system and readable storage medium
CN112307875A (en) Face verification method and face verification system
CN108600168A (en) A kind of secure coding method and system for the attack of artificial intelligence image identification
JP2019095872A (en) Search system, search device, terminal device, search method, and program
Stănescu et al. Cover processing-based steganographic model with improved security
WO2020199393A1 (en) Anti-counterfeiting system and anti-counterfeiting method
KR20210084804A (en) Method for Restoring Distortion Video Based on Identification Card Recognition
CN111818237A (en) Video monitoring analysis system and method
KR20210084805A (en) Method for Restoring Distortion Video Based on Finger Print Recognition
KR20210084802A (en) Method for Restoring Distortion Video
CN117834952B (en) Video conference content secure transmission method, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant