WO2024060666A1 - Face image encryption/decryption method and apparatus, electronic device, and storage medium - Google Patents

Face image encryption/decryption method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
WO2024060666A1
WO2024060666A1 PCT/CN2023/097284 CN2023097284W WO2024060666A1 WO 2024060666 A1 WO2024060666 A1 WO 2024060666A1 CN 2023097284 W CN2023097284 W CN 2023097284W WO 2024060666 A1 WO2024060666 A1 WO 2024060666A1
Authority
WO
WIPO (PCT)
Prior art keywords
frequency domain
encrypted
sample
encryption
face
Prior art date
Application number
PCT/CN2023/097284
Other languages
French (fr)
Chinese (zh)
Inventor
石海林
梅涛
胡一博
Original Assignee
北京京东尚科信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京京东尚科信息技术有限公司 filed Critical 北京京东尚科信息技术有限公司
Publication of WO2024060666A1 publication Critical patent/WO2024060666A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/10Image enhancement or restoration by non-spatial domain filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20064Wavelet transform [DWT]

Definitions

  • the present disclosure relates to the field of image processing technology, and specifically to a face image encryption/decryption method and its device, electronic equipment, storage media, computer program products and computer programs.
  • encrypted face images can render most deep recognition models ineffective, achieve identity encryption, and prevent the encrypted images from undergoing changes that are perceptible to the human eye, ensuring normal sharing on social media.
  • common operations of uploading photos on social media such as scaling and compressing, the encryption effect of the image will be affected, and the encrypted image cannot be restored to the original image, which has great limitations in practical applications.
  • the embodiments of the present disclosure provide a facial image encryption/decryption method and apparatus, electronic device, storage medium, computer program product, and computer program.
  • a method for encrypting a face image comprising:
  • encryption processing is performed based on the frequency domain face image.
  • the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
  • a method for decrypting a face image including:
  • inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image.
  • the reversible model is applied to the face identity steganography task to achieve utilization
  • a model efficiently implements encryption and decryption of face images.
  • a facial image encryption device comprising:
  • the frequency domain processing module is used to perform frequency domain processing on the original face image and obtain N frequency domain face images at different frequencies, where N is a positive integer;
  • the encryption module is used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the encrypted frequency domain face images of each of the N frequency domain face images;
  • the frequency domain inverse processing module is used to perform frequency domain inverse processing on N encrypted frequency domain face images to obtain encrypted face images.
  • a device for decrypting facial images including:
  • the frequency domain processing module is used to perform frequency domain processing on encrypted face images and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer;
  • the decryption module is used to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images;
  • the frequency domain inverse processing module is used to perform frequency domain inverse processing on N frequency domain face images to obtain the original face image.
  • an electronic device including a memory and a processor
  • the processor reads the executable program code stored in the memory to run a program corresponding to the executable program code, so as to implement the encryption/decryption method of the face image according to any embodiment of the present disclosure.
  • a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the face image encryption/decryption method of any embodiment of the present disclosure is implemented. .
  • a computer program product including a computer program.
  • the computer program When executed by a processor, the computer program implements the encryption/decryption method of a facial image according to any embodiment of the present disclosure.
  • a computer program including a computer program code.
  • the computer program code When the computer program code is run on a computer, the computer performs the encryption of a face image according to any embodiment of the present disclosure. /decryption method.
  • Figure 1 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure
  • Figure 2 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure
  • Figure 3 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure
  • Figure 4 is a schematic diagram of a target face encryption network
  • Figure 5 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure
  • Figure 6 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure.
  • Figure 7 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure
  • Figure 8 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure
  • Figure 9 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure.
  • Figure 10 is a schematic diagram of a target face decryption network
  • Figure 11 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure.
  • Figure 12 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure.
  • Figure 13 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure.
  • FIG14 is a structural diagram of a facial image decryption device according to an embodiment of the present disclosure.
  • Figure 15 is a structural diagram of a facial image decryption device according to an embodiment of the present disclosure.
  • Figure 16 is a block diagram of an electronic device used to implement the encryption/decryption method of a face image according to an embodiment of the present disclosure.
  • Figure 1 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 1, the method includes steps S11 to S14.
  • the frequency of an image is an indicator of the intensity of grayscale changes in an image, so it can be considered that the edges of the image occupy the high-frequency band, while the main body of the image or the slowly changing grayscale area occupies the low-frequency band.
  • Frequency domain processing of the original face image can transform the image in high-frequency areas such as edges that are difficult for the human eye to detect, thereby ensuring that the encryption is imperceptible and robust.
  • the frequency domain processing method of the image includes Fourier transform and wavelet transform.
  • wavelet transform is used to perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is positive integer.
  • wavelet transform is performed on the face image to obtain four branches, including one low-frequency face image and three high-frequency face images.
  • the encryption seed is used to encrypt the frequency domain face image.
  • the encryption key of the original face image can also be obtained based on the encryption seed.
  • the encryption key can be used to restore the encrypted face image to the original face image, realizing the human face image. Reversibility of face image encryption.
  • the encryption seed is obtained by randomly sampling from a Gaussian normal distribution of the original face image.
  • S13 Perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain encrypted frequency domain face images of each of the N frequency domain face images.
  • construct an encryption model for face images use the obtained encryption seeds and N frequency domain face images as network inputs, and perform convolution encryption processing through the model to obtain each of the N frequency domain face images. Encrypted frequency domain face images.
  • an encryption model for face images can also be designed based on the traditional reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
  • the original face image was processed in the frequency domain to perform image transformation on high-frequency areas such as edges that are not easily perceived by the human eye.
  • the encryption is completed, it is necessary to perform frequency domain inversion of the N encrypted frequency domain face images.
  • Process to obtain the encrypted face image The cosine similarity between the features of the encrypted face image and the original face image is low, but still maintains high visual quality, achieving traceless encryption of face identity.
  • frequency domain processing is performed on the original face image, N frequency domain face images at different frequencies are obtained, N is a positive integer, the encryption seed is obtained, and the encryption seed and N frequency domain face images are processed.
  • convolution encryption processing an encrypted frequency domain face image of each of the N frequency domain face images is obtained.
  • the N encrypted frequency domain face images are subjected to frequency domain inverse processing to obtain an encrypted face image.
  • encryption processing is performed based on the frequency domain face image. In this way, the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
  • Figure 2 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 2, the method includes steps S21 to S24.
  • steps S21 to S22 please refer to the relevant content records in the above embodiments, and will not be described again here.
  • the encryption key of the original face image can be obtained.
  • the encryption key can restore the encrypted face image to the original face image, achieving reversibility of face image encryption.
  • the setting order of the column vector to be encrypted may be: the encryption seed is the first row vector element in the column vector to be encrypted, starting from the second row vector element, the N frequency domain face images are arranged in frequency from The order from low to high determines the respective row in the column vector to be encrypted.
  • the process of obtaining the encryption key includes: obtaining the first convolution results of each of N frequency domain face images, adding the encryption seed and the N first convolution results to obtain the encryption key.
  • the acquisition process of the encrypted frequency domain face image i' of the frequency domain face image i among N frequency domain face images includes: determining the target row of the frequency domain face image i in the column vector to be encrypted, and obtaining the front of the target row.
  • the second convolution result of a row of processing results of the first vector element that has been convolutionally encrypted, and the second convolution result is multiplied by the frequency domain face image i to obtain the multiplication result.
  • N frequency domain face images include one low-frequency face image and three high-frequency face images
  • set the encryption seed to The low-frequency face image is
  • the three high-frequency face images are then the encryption key Frequency domain face image Corresponding encrypted frequency domain face images
  • the calculation process is as follows.
  • the sum of ⁇ ( ⁇ ), ⁇ ( ⁇ ) and ⁇ ( ⁇ ) is an arbitrary function, and exp( ⁇ ) represents the indicator function.
  • S24 Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain the encrypted face image.
  • step S24 please refer to the relevant content records in the above embodiments, and will not be described again here.
  • a convolution encryption process is performed on the encryption seed and N frequency domain face images to obtain the encryption key of the original face image and the encrypted frequency domain face images of each of the N frequency domain face images.
  • a column vector to be encrypted is created to perform convolution encryption processing on the encryption seed and N frequency domain face images. Encrypted frequency domain face images of each of the N frequency domain face images can be obtained, and then the encrypted face can be obtained. image, and obtain the encryption key to achieve reversibility of face image encryption.
  • Figure 3 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 3, the method includes steps S31 to S34.
  • S31 Perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is a positive integer.
  • the encryption seed and N frequency domain face images are used as input data and input into the target face encryption network.
  • the target face encryption network performs convolution encryption processing on the input data to obtain the encrypted frequencies of each of the N frequency domain face images. Domain face image.
  • FIG 4 is a schematic diagram of a target face encryption network.
  • discrete wavelet transformation DWT
  • DWT discrete wavelet transformation
  • the target face encryption network performs convolution encryption on the input data to obtain the encryption key k and the frequency domain face image IL , Respective encrypted frequency domain face images right
  • IDWT Inverse Discrete Wavelet Transformation
  • the target face encryption network can choose to deeply analyze the DenseNet module and implement it in combination with the Convolutional Block Attention Module (CBAM) module.
  • CBAM Convolutional Block Attention Module
  • S34 Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain the encrypted face image.
  • step S34 please refer to the relevant content records in the above embodiments, and will not be described again here.
  • convolution encryption processing is performed based on the target face encryption network, and encrypted frequency domain face images of each of the N frequency domain face images are obtained.
  • a target face encryption network is constructed to perform convolution encryption processing on the encryption seed and N frequency domain face images. Encrypted frequency domain face images of each of the N frequency domain face images can be obtained, and then the encrypted face image can be obtained. face image, and obtain the encryption key to achieve reversibility of face image encryption.
  • Figure 5 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 5, the method includes steps S51 to S56.
  • sample face image set includes multiple sample face images
  • sample encryption seed set includes multiple sample encryption seeds
  • Face detection and alignment are performed on the original image set, and the unified resolution is 256*256 after cropping, which is used as a sample face image set.
  • the sample face image set can also be divided into a training set, a verification set, and a test set for model training at different stages.
  • S52 Perform frequency domain processing on the sample face image to obtain N sample frequency domain face images at different frequencies.
  • the sample face images need to be processed in the same frequency domain.
  • the sample face images are subjected to wavelet transformation to obtain sample frequencies at four different frequencies.
  • domain image which includes one low-frequency face image and three high-frequency face images.
  • S53 Input the sample encryption seed and N sample frequency domain face images into the face encryption network for convolution encryption processing, and obtain encrypted sample frequency domain face images of each of the N sample frequency domain face images.
  • S54 Perform frequency domain inverse processing on the N encrypted sample frequency domain face images to obtain the encrypted sample face image.
  • sample face image undergoes frequency domain processing and frequency domain inverse processing, which is similar to the frequency domain processing and frequency domain inverse processing of the original face image.
  • steps S53 to S54 please refer to various steps in this disclosure. The relevant introduction in the embodiment will not be repeated here.
  • multiple loss functions of the face encryption network can be designed, and the multiple loss functions can be weighted to obtain the total loss function of the face encryption network.
  • the parameters of the constructed face encryption network are adjusted and optimized, and the next sample face image and sample encryption seed are used to continue training the adjusted face encryption network until the end of training conditions are met and the target face encryption is obtained. network.
  • the face encryption network when the encryption effect, visual quality and robustness of the encrypted sample face image meet the set requirements, can be considered to have reached the set number of training times and the training end conditions are met. In some embodiments, when the training duration reaches the set value, it can also be considered that the face encryption network has reached the set number of training times and meets the training end conditions.
  • the encryption effect is measured by the cosine similarity of facial features before and after encryption, and the visual quality is measured by four indicators: SSIM, PSNR, LPIPS, and MAE.
  • SSIM cosine similarity of facial features before and after encryption
  • PSNR PSNR
  • LPIPS LPIPS
  • MAE the encryption effect and visual quality experimental results of the encrypted sample image As shown in the table below.
  • the encrypted sample face image is scaled, compressed, and converted to grayscale, which are common operations when uploading images on social media, and the cosine similarity between the features of the encrypted sample face image and the sample face image is obtained to determine the face.
  • the robustness of the encryption network For example, the experimental results of the robustness of the encrypted sample image are shown in the table below.
  • A represents the sample face image
  • A' represents the encrypted sample face image
  • A" represents the deformed encrypted sample face image.
  • the table shows the cosine similarity of the facial features. The lower the cosine similarity between the obtained features, That is to say, it proves that the encryption effect of the constructed face encryption network is better.
  • Table 2 it can be found that the encryption obtained by the face encryption network After the sample face image is scaled, compressed, and converted to grayscale, which are common operations when uploading images on social media, it can maintain the feature similarity with the original image, that is, it is robust to these attack methods.
  • a sample face image set and a sample encryption seed set are obtained.
  • the sample face image set includes multiple sample face images
  • the sample encryption seed set includes multiple sample encryption seeds.
  • the sample face images are subjected to frequency domain Process, obtain N sample frequency domain face images at different frequencies, input the sample encryption seeds and N sample frequency domain face images into the face encryption network for convolution encryption processing, and obtain N sample frequency domain faces. Encrypted sample frequency domain face images of each image, perform frequency domain inverse processing on the N encrypted sample frequency domain face images, and obtain the encrypted sample face image.
  • the sample frequency domain face image Face image and corresponding encrypted sample frequency domain face image determine the loss function of the face encryption network, adjust the initial face encryption network based on the loss function, and continue to adjust the adjusted face based on the next sample face image and sample encryption seed
  • the face encryption network is trained until the end of training to obtain the target face encryption network.
  • the face encryption network is trained according to the needs of face identity steganography. In this way, the target face encryption network can be obtained, so that the encryption effect, visual quality and The robustness meets the set requirements.
  • Figure 6 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 6, the method includes steps S61 to S65.
  • Reconstruction loss function It is used to constrain the encrypted image and the original face image to be as similar as possible.
  • the specific calculation method is as follows:
  • Encrypted loss function includes: obtaining the first face feature of the sample face image and the second face feature of the encrypted sample face image, and obtaining the encryption loss function based on the first face feature and the second face feature.
  • the specific calculation method is as follows:
  • S62 Determine the low-frequency loss function and the high-frequency loss function based on the sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
  • Low frequency loss function Used to ensure that the low-frequency information of the image before and after encryption is consistent, and the high-frequency loss function It is used to constrain changes in the encryption process to occur as much as possible at the edges, that is, areas that are not easily noticeable to the human eye.
  • the acquisition process of the low-frequency loss function includes: determining the frequency of the sample frequency domain face image, obtaining the first sample frequency domain face image whose frequency is less than the set frequency threshold, and based on the first sample frequency domain face image and the corresponding The encrypted sample frequency domain face image is used to obtain the low-frequency loss function.
  • the specific calculation method is as follows:
  • the acquisition process of the high-frequency loss function includes: acquiring a second sample frequency domain face image with a frequency greater than or equal to the set frequency threshold, and based on the second sample frequency domain face image and the corresponding encrypted sample frequency domain face image, Obtain the high-frequency loss function.
  • the specific calculation method is as follows:
  • S63 Perform pixel value normalization processing on the encrypted sample face image, and obtain a pixel loss function based on the normalized pixel value.
  • Pixel loss function Used to limit the pixel value of the generated image to be between 0-1 to ensure visual quality.
  • the process of obtaining the pixel loss function includes: obtaining the absolute value of the difference between the normalized pixel value of each pixel of the encrypted sample face image and the set value, and determining the maximum absolute value. Obtain the minimum normalized pixel value of the encrypted sample face image, and obtain the pixel loss function based on the maximum absolute value and the minimum normalized pixel value.
  • the specific calculation method is as follows:
  • Adversarial loss function Includes the first adversarial loss function and the second adversarial loss function
  • the adversarial loss function is used to ensure the authenticity of the generated images.
  • the process of obtaining the first adversarial function includes: obtaining the first adversarial loss function based on the first true and false identification value and the second true and false identification value.
  • the specific calculation method is as follows:
  • the process of obtaining the second adversarial function includes: obtaining the second adversarial loss function based on the second true and false identification value.
  • the specific calculation method is as follows:
  • the weighting coefficients are set to a 1 and a 2 , and the sum of a 1 and a 2 is 1, then the specific calculation method of the adversarial loss function is as follows:
  • S65 Weight the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function to obtain the loss function of the face encryption network.
  • a weighted coefficient is assigned to each loss function according to the importance of the requirements corresponding to each loss function, and the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network.
  • the specific calculation method is as follows:
  • the reconstruction loss function and the encryption loss function are obtained based on the sample face image and the encrypted sample face image, and the low-frequency loss function and the encryption loss function are determined based on the sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
  • the high-frequency loss function normalizes the pixel value of the encrypted sample face image, and based on the normalized pixel value, obtains the pixel loss function, performs adversarial recognition on the sample face image and the encrypted sample face image, and obtains the sample person
  • the first true and false recognition value of the face image and the second true and false recognition value of the encrypted sample face image are obtained, and based on the first true and false recognition value and the second true and false recognition value, the adversarial loss function is obtained, and the reconstruction loss function and encryption are
  • the loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network.
  • a loss function is designed according to the needs of the face identity steganographic task.
  • the face encryption network is adjusted based on the loss function, which can improve the encryption effect, visual quality and robustness of the face image encrypted through the target face encryption network.
  • the stickiness meets the set requirements.
  • the above embodiment introduces the encryption method of the face image.
  • the process and calculation formula in the decryption method of the face image can be deduced to realize the face identity.
  • the reversibility of encryption is implemented in the following examples:
  • Figure 7 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 7, the method includes steps S71 to S74.
  • the encryption key of the original face image can be obtained at the same time, which is used to decrypt the encrypted face image.
  • encryption keys may be obtained from third parties who have permission to use the identity information and from the encryptor themselves.
  • S73 Perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images.
  • construct a decryption model of face images use the obtained encryption key and N encrypted frequency domain face images as network input, perform convolution decryption processing through the model, and obtain N encrypted frequency domain face images.
  • the face images are their respective frequency domain face images.
  • a decryption model for face images can also be designed based on the traditional reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
  • S74 Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
  • frequency domain processing was performed on the encrypted face image to restore the image transformation in the high-frequency area.
  • frequency domain inverse processing it is necessary to perform frequency domain inverse processing on the N frequency domain face images to obtain the original face. image.
  • the encrypted face image is subjected to frequency domain processing, and N encrypted frequency domain face images at different frequencies are obtained.
  • N is a positive integer
  • the encryption key is obtained
  • the encryption key and N encrypted frequency domain images are obtained.
  • the face image is subjected to convolution decryption processing to obtain the frequency domain face image of each of the N encrypted frequency domain face images.
  • the N frequency domain face images are subjected to frequency domain inverse processing to obtain the original face image.
  • inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image.
  • the reversible model is applied to the face identity steganography task to achieve utilization
  • a model efficiently implements encryption and decryption of face images.
  • Figure 8 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 8, the method includes steps S81 to S84.
  • steps S81 to S82 please refer to the relevant content records in the above embodiments, and will not be described again here.
  • S83 Perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images and encryption seeds of each of the N encrypted frequency domain face images.
  • elements respectively, perform convolution decryption processing based on the encryption key and N encrypted frequency domain face images to obtain the decryption result of the vector element, where the decryption result is the encryption seed of the encryption key or one of the frequency domain face images.
  • the setting order of the column vector to be decrypted can be: the encryption key is the first row vector element in the column vector to be decrypted, and starting from the second row vector element, the N encrypted frequency domain face images are determined in order from low to high frequency to determine their respective rows in the column vector to be decrypted.
  • the acquisition process of the frequency domain face image i of the encrypted frequency domain face image i' among the N encrypted frequency domain face images includes: determining the target row of the encrypted frequency domain face image i' in the column vector to be decrypted, and obtaining A first convolution result of the decrypted result of the first vector element that has been subjected to convolution decryption located behind the target row, and a third convolution result of the second vector element that has not been subjected to convolution decryption located in front of the target row. Gets the second convolution result of the second vector element of the row preceding the target row.
  • the process of obtaining the encryption seed includes: subtracting the encryption key from the first convolution results of N frequency domain face images to obtain the encryption seed.
  • N encrypted frequency domain face images include one encrypted low-frequency face image and three encrypted high-frequency face images
  • the encryption key is set to The encrypted low-frequency face image is The three encrypted high-frequency face images are Then encrypt the seed Encrypted frequency domain face image Corresponding frequency domain face images
  • the calculation process is as follows.
  • the sum of ⁇ ( ⁇ ), ⁇ ( ⁇ ) and ⁇ ( ⁇ ) is an arbitrary function, and exp( ⁇ ) represents the indicator function.
  • S84 Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
  • step S84 please refer to the relevant content records in the above embodiments, and will not be described again here.
  • a convolution decryption process is performed on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images and encryption seeds for each of the N encrypted frequency domain face images.
  • a column vector to be decrypted is created to perform convolution decryption processing on the encryption key and N encrypted frequency domain face images. Frequency domain face images of each of the N encrypted frequency domain face images can be obtained, and the original face image can be restored. face image.
  • Figure 9 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 9, the method includes steps S91 to S94.
  • S93 based on the target face decryption network, perform convolution decryption processing on the encryption key and N encrypted frequency domain face images to obtain the encryption seed and the frequency domain face images of the N encrypted frequency domain face images.
  • the encryption key and N encrypted frequency domain face images are used as input data and input into the target face decryption network.
  • the target face decryption network performs convolution and decryption processing on the input data to obtain each of the N encrypted frequency domain face images. Frequency domain face image.
  • target face decryption network and target face encryption network in the embodiments of the present disclosure can be designed based on the existing two-branch reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
  • Figure 10 is a schematic diagram of a target face decryption network designed based on the above target face encryption network.
  • the encrypted image I en is subjected to discrete wavelet transformation (Discrete Wavelet Transformation, DWT), obtain four encrypted frequency domain face images at different frequencies, including an encrypted low-frequency face image and three high-frequency face images And get the encryption key k. Will k, As input data, it is input into the target face decryption network.
  • the target face decryption network performs convolution decryption processing on the input data to obtain the encryption seed s and the encrypted frequency domain face image. Respective frequency domain face images right By performing Inverse Discrete Wavelet Transformation (IDWT), the decrypted image I de can be obtained.
  • IDWT Inverse Discrete Wavelet Transformation
  • the target face decryption network can choose to deeply parse the DenseNet module and implement it in combination with the Convolutional Block Attention Module (CBAM) module.
  • CBAM Convolutional Block Attention Module
  • S94 Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
  • step S94 please refer to the relevant contents in the above embodiment, which will not be repeated here.
  • convolution decryption processing is performed based on the target face decryption network, and frequency domain face images of each of N encrypted frequency domain face images are obtained.
  • a target face decryption network is constructed to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images. Frequency domain face images of each of the N encrypted frequency domain face images can be obtained, and then restored Original face image.
  • FIG. 11 is a flowchart of a method for decrypting a facial image according to an embodiment of the present disclosure. As shown in FIG. 11 , the method includes steps S111 to S116 .
  • the sample face image set includes multiple sample encrypted face images
  • the sample encryption key set includes multiple sample encryption keys.
  • S112 Perform frequency domain processing on the sample encrypted face image to obtain N sample encrypted frequency domain face images at different frequencies.
  • S113 input the sample encryption key and N sample encrypted frequency domain face images into the face decryption network for convolution decryption processing, and obtain sample frequency domain face images of each of the N sample encrypted frequency domain face images.
  • S114 Perform frequency domain inverse processing on N sample frequency domain face images to obtain sample face images.
  • steps S112 to S115 please refer to the relevant introductions in the embodiments of the present disclosure, and will not be described again here.
  • the face decryption network when the decryption effect and visual quality of the sample face image meet the set requirements, can be considered to have reached the set number of training times and meet the training end conditions. In some embodiments, when the training duration reaches the set value, it can also be considered that the face decryption network has reached the set number of training times and the training end conditions are met.
  • the decryption effect is measured by the cosine similarity of facial features between the decrypted image and the original image
  • the visual quality is measured by three indicators: SSIM, LPIPS, and MAE.
  • SSIM cosine similarity of facial features between the decrypted image and the original image
  • MAE three indicators: SSIM, LPIPS, and MAE.
  • a sample encrypted face image set and a sample encryption key set are obtained, the sample face image set includes multiple sample encrypted face images, the sample encryption key set includes multiple sample encryption keys, and the sample is encrypted
  • the face image is processed in the frequency domain, and N sample encrypted frequency domain face images at different frequencies are obtained.
  • the sample encryption key and N sample encrypted frequency domain face images are input into the face decryption network for convolution decryption processing.
  • each sample frequency domain face image of N sample encrypted frequency domain face images obtains each sample frequency domain face image of N sample encrypted frequency domain face images, perform frequency domain inverse processing on the N sample frequency domain face images, and obtain the sample face image, based on the sample encrypted face image and sample face Face image, sample encrypted frequency domain face image and corresponding sample frequency domain face image, determine the loss function of the face decryption network, adjust the initial face decryption network based on the loss function, and encrypt the face image and sample based on the next sample
  • the encryption key continues to train the adjusted face decryption network until the target face decryption network is obtained after training.
  • the face decryption network is trained according to the requirement of reversible face encryption. In this way, the target face decryption network can be obtained, so that the decryption effect and visual quality of the face image decrypted by the target face decryption network meet the requirements of the design. Set requirements.
  • FIG 12 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure.
  • the face image encryption device 120 includes a frequency domain processing module 121, an acquisition module 122, an encryption module 123 and a frequency domain Inverse processing module 124.
  • the frequency domain processing module 121 is used to perform frequency domain processing on the original face image and obtain N frequency domain face images at different frequencies, where N is a positive integer.
  • Obtaining module 122 is used to obtain encrypted seeds.
  • the encryption module 123 is used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain encrypted frequency domain face images of each of the N frequency domain face images.
  • the frequency domain inverse processing module 124 is used to perform frequency domain inverse processing on N encrypted frequency domain face images to obtain encrypted face images.
  • encryption processing is performed based on the frequency domain face image.
  • the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
  • the encryption module 123 is also used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the original face image. Encryption key.
  • the encryption module 123 is also used to: combine the encryption seed and N frequency domain face images in a set order to obtain a column to be encrypted Vector; starting from the first row, the vector elements in the encrypted column vector are treated row by row in positive order, and convolution encryption is performed based on the encryption seed and N frequency domain face images to obtain the processing result of the vector element, where the processing result is the encryption key or is one of the encrypted frequency domain face images.
  • the setting order of the column vector to be encrypted is: the encryption seed is the first row vector element in the column vector to be encrypted, starting from the second row vector element , N frequency domain face images determine their respective rows in the column vector to be encrypted in order from low to high frequency.
  • the encryption module 123 is also used to: obtain the first convolution results of each of the N frequency domain face images; The convolution results are added to obtain the encryption key.
  • the encryption module 123 is also used to: determine the target row of the frequency domain face image i in the column vector to be encrypted; obtain the previous row of the target row The second convolution result of the processing result of the first vector element that has undergone convolution encryption processing, and the second convolution result is multiplied with the frequency domain face image i to obtain the multiplication result; obtain each of the first vector elements located in front of the target row The third convolution result of the processing result of a vector element; obtain The first convolution result of the frequency domain face image of the second vector element located behind the target row that has not undergone convolution encryption processing; the multiplication result, the first convolution result of the second vector element and the first convolution result of the first vector element The three convolution results are added to obtain the encrypted frequency domain face image i', where the values of i and i' range from 1 to N.
  • the encryption module 123 is also used to: input the encryption seed and N frequency domain face images as input data into the target face encryption network, The target face encryption network performs convolution encryption on the input data to obtain the encrypted frequency domain face images of each of the N frequency domain face images.
  • the face image encryption device 120 further includes: a training module 125, which is used to: obtain a sample face image set and a sample encryption seed set, wherein the sample face image set includes a plurality of sample face images, and the sample encryption seed set includes a plurality of sample encryption seeds; perform frequency domain processing on the sample face images to obtain N sample frequency domain face images at different frequencies; input the sample encryption seeds and the N sample frequency domain face images into a face encryption network for convolution encryption processing to obtain encrypted sample frequency domain face images of the N sample frequency domain face images; perform frequency domain inverse processing on the N encrypted sample frequency domain face images to obtain encrypted sample face images; determine a loss function of the face encryption network based on the sample face images and the encrypted sample face images, the sample frequency domain face images and the corresponding encrypted sample frequency domain face images; adjust the initial face encryption network based on the loss function, and continue to train the adjusted face encryption network based on the next sample face image and the sample encryption seed until the training
  • a training module 125 which is used to: obtain a sample face image set and
  • the training module 125 is also used to: obtain the reconstruction loss function and the encryption loss function according to the sample face image and the encrypted sample face image; Frequency domain face image and corresponding encrypted sample frequency domain face image, determine the low-frequency loss function and high-frequency loss function; perform pixel value normalization processing on the encrypted sample face image, and obtain pixels based on the normalized pixel value Loss function; perform adversarial recognition on the sample face image and the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the first true and false The recognition value and the second true and false recognition value are used to obtain the adversarial loss function; the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss of the face encryption network function.
  • the training module 125 is also used to: obtain the first facial feature of the sample face image and the second facial feature of the encrypted sample face image. , and obtain the encryption loss function based on the first face feature and the second face feature.
  • the training module 125 is also used to: determine the frequency of the face image in the sample frequency domain; obtain the first sample frequency whose frequency is less than the set frequency threshold. domain face image, and obtain the low-frequency loss function based on the first sample frequency domain face image and the corresponding encrypted sample frequency domain face image; obtain the second sample frequency domain face image with a frequency greater than or equal to the set frequency threshold , and obtain the high-frequency loss function based on the second sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
  • the training module 125 is also used to: obtain the absolute value of the difference between the normalized pixel value of each pixel of the encrypted sample face image and the set value, and determine the maximum absolute value; obtain the minimum normalized pixel value of the encrypted sample face image; and obtain the pixel loss function based on the maximum absolute value and the minimum normalized pixel value.
  • the training module 125 is also used to: obtain the first adversarial loss function based on the first true and false identification value and the second true and false identification value;
  • the second true and false identification value is used to obtain the second adversarial loss function;
  • the first adversarial loss function and the second adversarial loss function are weighted to obtain the adversarial loss function.
  • the frequency domain processing module 121 is also used to: perform frequency domain decomposition on the original face image based on wavelet transform to obtain N frequency domain faces. image.
  • the acquisition module 122 is also configured to randomly sample the Gaussian normal distribution to obtain encryption seeds.
  • FIG 14 is a structural diagram of a face image decryption device according to an embodiment of the present disclosure.
  • the face image decryption device 130 includes a frequency domain processing module 131, an acquisition module 132, a decryption module 133 and a frequency domain Inverse processing module 134.
  • the frequency domain processing module 131 is used to perform frequency domain processing on the encrypted face image and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer.
  • Obtaining module 132 is used to obtain the encryption key.
  • the decryption module 133 is used to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images.
  • the frequency domain inverse processing module 134 is used to perform frequency domain inverse processing on N frequency domain face images to obtain original face images.
  • inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image.
  • the reversible model is applied to the face identity steganography task to achieve utilization
  • a model efficiently implements encryption and decryption of face images.
  • the decryption module 133 is also configured to: combine the encryption key and N encrypted frequency domain face images in a set order to obtain a to-be-received face image. Decrypt the column vector; treat the vector elements in the decrypted column vector row by row in reverse order starting from the last row, and perform convolution decryption processing based on the encryption key and N encrypted frequency domain face images to obtain the decryption result of the vector elements, where , the decryption result is the encryption seed of the encryption key or one of the frequency domain face images.
  • the setting order of the column vector to be decrypted is: the encryption key is the first row vector element in the column vector to be decrypted, and starting from the second row vector element, the N encrypted frequency domain face images are ordered from low to high in frequency to determine their respective rows in the column vector to be decrypted.
  • the decryption module 133 is also used to: determine the target row of the encrypted frequency domain face image i' in the column vector to be decrypted; obtain the target row located in The first convolution result of the decryption result of the subsequent first vector element that has undergone convolution decryption processing, and the third convolution result of the second vector element that has not undergone convolution decryption processing in front of the target row; obtain the target row's The second convolution result of the second vector element in the previous row; subtract the encrypted frequency domain face image i' from the first convolution result of the first vector element and the third convolution result of the second vector element to obtain Subtract the result, and multiply the subtraction result with the second convolution result to obtain the frequency domain face image i of the encrypted frequency domain face image i'.
  • the decryption module 133 is also configured to: subtract the encryption key from the first convolution results of the N frequency domain face images to obtain the encrypted seed.
  • the decryption module 133 is also used to: input the encryption key and N encrypted frequency domain face images as input data into the target face decryption network.
  • the target face decryption network performs convolution decryption processing on the input data to obtain the frequency domain face images of each of the N encrypted frequency domain face images.
  • the face image decryption device 130 also includes: a training module 135 for: obtaining a sample encrypted face image set and Sample encryption key set.
  • the sample face image set includes multiple sample encrypted face images.
  • the sample encryption key set includes multiple sample encryption keys.
  • Frequency domain processing is performed on the sample encrypted face image to obtain N different frequencies.
  • the sample encrypted frequency domain face image; the sample encryption key and N sample encrypted frequency domain face images are input into the face decryption network for convolution decryption processing, and each sample of the N sample encrypted frequency domain face image is obtained.
  • Frequency domain face images perform frequency domain inverse processing on N sample frequency domain face images to obtain sample face images; encrypt face images and sample face images based on samples, sample encrypted frequency domain face images and corresponding samples Frequency domain face image, determine the loss function of the face decryption network; adjust the initial face decryption network based on the loss function, and continue to train the adjusted face decryption network based on the next sample encrypted face image and sample encryption key , until the end of training to obtain the target face decryption network.
  • the training module 135 is also used to: obtain the reconstruction loss function and the encryption loss function according to the sample face image and the encrypted sample face image; Frequency domain face image and corresponding encrypted sample frequency domain face image, determine the low-frequency loss function and high-frequency loss function; perform pixel value normalization processing on the encrypted sample face image, and obtain pixels based on the normalized pixel value Loss function; perform adversarial recognition on the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the first true and false recognition value and the second true and false recognition value Two true and false recognition values, obtain the adversarial loss function;
  • the construction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network.
  • the present disclosure also provides an electronic device, a readable storage medium, a computer program product, and a computer program.
  • the present disclosure also provides an electronic device, including a memory and a processor; wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, to Encryption/decryption method for facial images used to implement any embodiment of the present disclosure.
  • FIG. 16 illustrates a schematic block diagram of an example electronic device 140 that may be used to implement embodiments of the present disclosure.
  • Electronic devices are intended to refer to various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers.
  • Electronic devices may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices, and other similar computing devices.
  • the components shown herein, their connections and relationships, and their functions are examples only and are not intended to limit implementations of the disclosure described and/or claimed herein.
  • the system includes a memory 141 , a processor 142 , and a computer program stored in the memory 141 and executable on the processor 142 .
  • the processor 142 executes the program, the aforementioned facial image encryption/decryption method is implemented.
  • the present disclosure also provides a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the face image encryption/decryption method of any embodiment of the present disclosure is implemented. .
  • a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any suitable combination of the foregoing.
  • machine-readable storage media would include one or more wire-based electrical connections, laptop disks, hard drives, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • RAM random access memory
  • ROM read only memory
  • EPROM or flash memory erasable programmable read only memory
  • CD-ROM portable compact disk read-only memory
  • magnetic storage device or any suitable combination of the above.
  • the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or a trackball) through which a user can provide input to the computer.
  • a display device eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and pointing device eg, a mouse or a trackball
  • Other kinds of devices may also be used to provide interaction with the user; for example, the feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and may be provided in any form, including Acoustic input, voice input or tactile input) to receive input from the user.
  • the systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., A user's computer having a graphical user interface or web browser through which the user can interact with implementations of the systems and technologies described herein), or including such backend components, middleware components, or any combination of front-end components in a computing system.
  • the components of the system may be interconnected by any form or medium of digital data communication (eg, a communications network). Examples of communication networks include: local area network (LAN), wide area network (WAN), and the Internet.
  • Computer systems may include clients and servers.
  • Clients and servers are generally remote from each other and typically interact over a communications network.
  • the relationship of client and server is created by computer programs running on corresponding computers and having a client-server relationship with each other.
  • the server can be a cloud server, a distributed system server, or a server combined with a blockchain.
  • the present disclosure also provides a computer program product, including a computer program.
  • the computer program When executed by a processor, the computer program implements the encryption/decryption method of a face image as in any embodiment of the present disclosure.
  • the present disclosure also provides a computer program.
  • the computer program includes a computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to perform the facial image processing according to any embodiment of the present disclosure. Encryption/decryption methods.
  • first and second are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as “first” and “second” may explicitly or implicitly include one or more of these features.
  • “plurality” means two or more than two, unless otherwise explicitly and specifically limited.
  • references to the terms “one embodiment,” “some embodiments,” “an example,” “specific examples,” or “some examples” or the like means that specific features are described in connection with the embodiment or example. , structures, materials or features are included in at least one embodiment or example of the invention. In this specification, the schematic expressions of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, those skilled in the art may combine and combine different embodiments or examples and features of different embodiments or examples described in this specification unless they are inconsistent with each other.

Abstract

Provided are a face image encryption/decryption method and apparatus, an electronic device, a storage medium, a computer program product, and a computer program. The face image encryption method comprises: performing frequency domain processing on an original face image to obtain N frequency domain face images at different frequencies, wherein N is a positive integer; obtaining encryption seeds; performing convolutional encryption on the encryption seeds and the N frequency domain face images to obtain respective encrypted frequency domain face images of the N frequency domain face images; and performing frequency domain inverse processing on the N encrypted frequency domain face images to obtain an encrypted face image.

Description

人脸图像的加密/解密方法、装置、电子设备及存储介质Face image encryption/decryption method, device, electronic equipment and storage medium
相关申请的交叉引用Cross-references to related applications
本申请要求在2022年09月22日在中国提交的中国专利申请号2022111562577的优先权,其全部内容通过引用并入本文。This application claims priority from Chinese Patent Application No. 2022111562577 filed in China on September 22, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开涉及图像处理技术领域,具体涉及一种人脸图像的加密/解密方法及其装置、电子设备、存储介质、计算机程序产品和计算机程序。The present disclosure relates to the field of image processing technology, and specifically to a face image encryption/decryption method and its device, electronic equipment, storage media, computer program products and computer programs.
背景技术Background technique
相关技术中,经过加密处理的人脸图像可以使得大多数深度识别模型失效,实现身份加密,并使加密后的图像不发生人眼可感知的变化,保证社交媒体上的正常分享。但是对于社交媒体中上传照片的常见操作,例如缩放、压缩等,图像的加密效果会受到影响,并且加密后的图像无法恢复为原始图像,在实际应用中存在较大的局限性。In related technologies, encrypted face images can render most deep recognition models ineffective, achieve identity encryption, and prevent the encrypted images from undergoing changes that are perceptible to the human eye, ensuring normal sharing on social media. However, for common operations of uploading photos on social media, such as scaling and compressing, the encryption effect of the image will be affected, and the encrypted image cannot be restored to the original image, which has great limitations in practical applications.
发明内容Contents of the invention
本公开实施例提供了一种人脸图像的加密/解密方法及其装置、电子设备、存储介质、计算机程序产品和计算机程序。The embodiments of the present disclosure provide a facial image encryption/decryption method and apparatus, electronic device, storage medium, computer program product, and computer program.
根据本公开实施例的一方面,提供了一种人脸图像的加密方法,包括:According to one aspect of an embodiment of the present disclosure, a method for encrypting a face image is provided, comprising:
对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数;Perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is a positive integer;
获取加密种子;Get encrypted seeds;
对加密种子和N个频域人脸图像进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像;Perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the encrypted frequency domain face images of each of the N frequency domain face images;
对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。Perform frequency domain inverse processing on N encrypted frequency domain face images to obtain encrypted face images.
本公开实施例中将原始人脸图像转换为频域人脸图像后,基于频域人脸图像进行加密处理,通过这种方式,可以约束加密过程中的变换发生在人眼不易感知的边缘等高频区域,从而保证了加密的不易察觉及鲁棒。In the embodiment of the present disclosure, after the original face image is converted into a frequency domain face image, encryption processing is performed based on the frequency domain face image. In this way, the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
根据本公开实施例的另一方面,提供了一种人脸图像的解密方法,包括:According to another aspect of the embodiment of the present disclosure, a method for decrypting a face image is provided, including:
对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数;Perform frequency domain processing on the encrypted face image to obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer;
获取加密密钥; Get the encryption key;
对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像;Perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images;
对N个频域人脸图像进行频域逆处理,得到原始人脸图像。Perform frequency domain inverse processing on N frequency domain face images to obtain the original face image.
本公开实施例中在人脸图像加密的基础上进行逆处理,可以对加密人脸图像进行解密,恢复原始人脸图像,并且第一次将可逆模型应用于人脸身份密写任务,实现利用一个模型高效实现人脸图像的加密和解密。In the embodiment of the present disclosure, inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image. For the first time, the reversible model is applied to the face identity steganography task to achieve utilization A model efficiently implements encryption and decryption of face images.
根据本公开实施例的一方面,提供了一种人脸图像的加密装置,包括:According to one aspect of an embodiment of the present disclosure, there is provided a facial image encryption device, comprising:
频域处理模块,用于对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数;The frequency domain processing module is used to perform frequency domain processing on the original face image and obtain N frequency domain face images at different frequencies, where N is a positive integer;
获取模块,用于获取加密种子;Obtain module, used to obtain encrypted seeds;
加密模块,用于对加密种子和N个频域人脸图像进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像;The encryption module is used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the encrypted frequency domain face images of each of the N frequency domain face images;
频域逆处理模块,用于对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。The frequency domain inverse processing module is used to perform frequency domain inverse processing on N encrypted frequency domain face images to obtain encrypted face images.
根据本公开实施例的另一方面,提供了一种人脸图像的解密装置,包括:According to another aspect of the embodiment of the present disclosure, a device for decrypting facial images is provided, including:
频域处理模块,用于对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数;The frequency domain processing module is used to perform frequency domain processing on encrypted face images and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer;
获取模块,用于获取加密密钥;Obtain module, used to obtain encryption keys;
解密模块,用于对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像;The decryption module is used to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images;
频域逆处理模块,用于对N个频域人脸图像进行频域逆处理,得到原始人脸图像。The frequency domain inverse processing module is used to perform frequency domain inverse processing on N frequency domain face images to obtain the original face image.
根据本公开实施例的另一方面,提供了一种电子设备,包括存储器、处理器;According to another aspect of the embodiment of the present disclosure, an electronic device is provided, including a memory and a processor;
其中,处理器通过读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于实现本公开任一实施例的人脸图像的加密/解密方法。Wherein, the processor reads the executable program code stored in the memory to run a program corresponding to the executable program code, so as to implement the encryption/decryption method of the face image according to any embodiment of the present disclosure.
根据本公开实施例的另一方面,提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现本公开任一实施例的人脸图像的加密/解密方法。According to another aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the face image encryption/decryption method of any embodiment of the present disclosure is implemented. .
根据本公开实施例的另一方面,提供了一种计算机程序产品,包括计算机程序,计算机程序在被处理器执行时实现本公开任一实施例的人脸图像的加密/解密方法。According to another aspect of the embodiments of the present disclosure, a computer program product is provided, including a computer program. When executed by a processor, the computer program implements the encryption/decryption method of a facial image according to any embodiment of the present disclosure.
根据本公开实施例的另一方面,提供了一种计算机程序,包括计算机程序代码,当所述计算机程序代码在计算机上运行时,以使得计算机执行本公开任一实施例的人脸图像的加密/解密方法。According to another aspect of an embodiment of the present disclosure, a computer program is provided, including a computer program code. When the computer program code is run on a computer, the computer performs the encryption of a face image according to any embodiment of the present disclosure. /decryption method.
应当理解,本部分所描述的内容并非旨在标识本公开的实施例的关键或重要特征,也不用于限制本公开的范围。本公开的其它特征将通过以下的说明书而变得容易理解。 It should be understood that what is described in this section is not intended to identify key or important features of the embodiments of the disclosure, nor is it intended to limit the scope of the disclosure. Other features of the present disclosure will become readily understood from the following description.
附图说明Description of drawings
图1是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 1 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图2是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 2 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图3是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 3 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图4是一种目标人脸加密网络的示意图;Figure 4 is a schematic diagram of a target face encryption network;
图5是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 5 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图6是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 6 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图7是根据本公开一个实施例的人脸图像的解密方法的流程图;Figure 7 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure;
图8是根据本公开一个实施例的人脸图像的解密方法的流程图;Figure 8 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure;
图9是根据本公开一个实施例的人脸图像的解密方法的流程图;Figure 9 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure;
图10是一种目标人脸解密网络的示意图;Figure 10 is a schematic diagram of a target face decryption network;
图11是根据本公开一个实施例的人脸图像的加密方法的流程图;Figure 11 is a flow chart of a facial image encryption method according to an embodiment of the present disclosure;
图12是根据本公开一个实施例的人脸图像的加密装置的结构图;Figure 12 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure;
图13是根据本公开一个实施例的人脸图像的加密装置的结构图;Figure 13 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure;
图14是根据本公开一个实施例的人脸图像的解密装置的结构图;FIG14 is a structural diagram of a facial image decryption device according to an embodiment of the present disclosure;
图15是根据本公开一个实施例的人脸图像的解密装置的结构图;Figure 15 is a structural diagram of a facial image decryption device according to an embodiment of the present disclosure;
图16是用来实现本公开实施例的人脸图像的加密/解密方法的电子设备的框图。Figure 16 is a block diagram of an electronic device used to implement the encryption/decryption method of a face image according to an embodiment of the present disclosure.
具体实施方式Detailed ways
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals throughout represent the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the drawings are exemplary and are intended to explain the present invention and are not to be construed as limiting the present invention.
下面结合参考附图描述本公开的人脸图像的加密/解密方法及其装置、电子设备、存储介质、计算机程序产品和计算机程序。The following describes the facial image encryption/decryption method and its device, electronic device, storage medium, computer program product and computer program disclosed in the present invention in conjunction with the reference drawings.
图1是根据本公开一个实施例的人脸图像的加密方法的流程图,如图1所示,该方法包括步骤S11至S14。Figure 1 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 1, the method includes steps S11 to S14.
S11,对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数。S11, perform frequency domain processing on the original face image, and obtain N frequency domain face images at different frequencies, where N is a positive integer.
图像的频率是表征图像中灰度变化剧烈程度的指标,因此可以认为图像的边缘占据高频段,而图像主体或灰度缓变区域占据低频段。对原始人脸图像进行频域处理,可以针对人眼不易感知的边缘等高频区域进行图像变换,从而保证加密的不易察觉及鲁棒。 The frequency of an image is an indicator of the intensity of grayscale changes in an image, so it can be considered that the edges of the image occupy the high-frequency band, while the main body of the image or the slowly changing grayscale area occupies the low-frequency band. Frequency domain processing of the original face image can transform the image in high-frequency areas such as edges that are difficult for the human eye to detect, thereby ensuring that the encryption is imperceptible and robust.
图像的频域处理方法包括傅里叶变换和小波变换,本公开实施例中采用小波变换对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,其中N为正整数。作为一种可能的实现方式,对人脸图像进行小波变换得到四个分支,包括一个低频人脸图像和三个高频人脸图像。The frequency domain processing method of the image includes Fourier transform and wavelet transform. In the embodiment of the present disclosure, wavelet transform is used to perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is positive integer. As a possible implementation method, wavelet transform is performed on the face image to obtain four branches, including one low-frequency face image and three high-frequency face images.
S12,获取加密种子。S12, obtain the encrypted seed.
加密种子用于对频域人脸图像进行加密处理,同时,基于加密种子还可以获取原始人脸图像的加密密钥,通过加密密钥可以将加密人脸图像恢复为原始人脸图像,实现人脸图像加密的可逆性。The encryption seed is used to encrypt the frequency domain face image. At the same time, the encryption key of the original face image can also be obtained based on the encryption seed. The encryption key can be used to restore the encrypted face image to the original face image, realizing the human face image. Reversibility of face image encryption.
在一些实施例中,从原始人脸图像的高斯正态分布进行随机采样,得到加密种子。In some embodiments, the encryption seed is obtained by randomly sampling from a Gaussian normal distribution of the original face image.
S13,对加密种子和N个频域人脸图像进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。S13: Perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain encrypted frequency domain face images of each of the N frequency domain face images.
作为一种可能的实现方式,构建人脸图像的加密模型,将获取的加密种子和N个频域人脸图像作为网络输入,通过模型进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。As a possible implementation method, construct an encryption model for face images, use the obtained encryption seeds and N frequency domain face images as network inputs, and perform convolution encryption processing through the model to obtain each of the N frequency domain face images. Encrypted frequency domain face images.
在一些实施例中,还可以在传统可逆模型的基础上设计人脸图像的加密模型,利用一个模型高效实现人脸图像的加密和解密。In some embodiments, an encryption model for face images can also be designed based on the traditional reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
S14,对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。S14: Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain the encrypted face image.
前述步骤中对原始人脸图像进行了频域处理,以针对人眼不易感知的边缘等高频区域进行图像变换,相应地,加密完成后需要对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。加密人脸图像与原始人脸图像的特征间余弦相似度较低,但仍保持较高的视觉质量,实现人脸身份的无痕加密。In the aforementioned steps, the original face image was processed in the frequency domain to perform image transformation on high-frequency areas such as edges that are not easily perceived by the human eye. Correspondingly, after the encryption is completed, it is necessary to perform frequency domain inversion of the N encrypted frequency domain face images. Process to obtain the encrypted face image. The cosine similarity between the features of the encrypted face image and the original face image is low, but still maintains high visual quality, achieving traceless encryption of face identity.
本公开实施例中,对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数,获取加密种子,对加密种子和N个频域人脸图像进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像,对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。本公开实施例中将原始人脸图像转换为频域人脸图像后,基于频域人脸图像进行加密处理,通过这种方式,可以约束加密过程中的变换发生在人眼不易感知的边缘等高频区域,从而保证了加密的不易察觉及鲁棒。In the embodiment of the present disclosure, frequency domain processing is performed on the original face image, N frequency domain face images at different frequencies are obtained, N is a positive integer, the encryption seed is obtained, and the encryption seed and N frequency domain face images are processed. Through convolution encryption processing, an encrypted frequency domain face image of each of the N frequency domain face images is obtained. The N encrypted frequency domain face images are subjected to frequency domain inverse processing to obtain an encrypted face image. In the embodiment of the present disclosure, after the original face image is converted into a frequency domain face image, encryption processing is performed based on the frequency domain face image. In this way, the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
图2是根据本公开一个实施例的人脸图像的加密方法的流程图,如图2所示,该方法包括步骤S21至S24。Figure 2 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 2, the method includes steps S21 to S24.
S21,对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数。S21, perform frequency domain processing on the original face image, and obtain N frequency domain face images at different frequencies, where N is a positive integer.
S22,获取加密种子。 S22, obtain the encrypted seed.
关于步骤S21~步骤S22的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For the introduction of steps S21 to S22, please refer to the relevant content records in the above embodiments, and will not be described again here.
S23,对加密种子和N个频域人脸图像进行卷积加密处理,得到原始人脸图像的加密密钥和N个频域人脸图像各自的加密频域人脸图像。S23. Perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the encryption key of the original face image and the encrypted frequency domain face images of each of the N frequency domain face images.
对加密种子和N个频域人脸图像进行卷积加密处理,不仅可以得到N个频域人脸图像各自的加密频域人脸图像,而且可以得到原始人脸图像的加密密钥。该加密密钥可以将加密人脸图像恢复为原始人脸图像,实现人脸图像加密的可逆性。By performing convolution encryption processing on the encryption seed and N frequency domain face images, not only the encrypted frequency domain face images of each of the N frequency domain face images can be obtained, but also the encryption key of the original face image can be obtained. The encryption key can restore the encrypted face image to the original face image, achieving reversibility of face image encryption.
作为一种可能的实现方式,对加密种子和N个频域人脸图像,按照设定顺序进行组合得到一个待加密列向量,从首行开始按照正序逐行对待加密列向量中的向量元素,分别基于加密种子和N个频域人脸图像进行卷积加密处理,以得到向量元素的处理结果,其中,处理结果为加密密钥或者为其中一个加密频域人脸图像。As a possible implementation method, combine the encryption seeds and N frequency domain face images in a set order to obtain a column vector to be encrypted, and treat the vector elements in the encrypted column vector row by row in positive order starting from the first row. , respectively perform convolution encryption processing based on the encryption seed and N frequency domain face images to obtain the processing result of the vector element, where the processing result is the encryption key or one of the encrypted frequency domain face images.
在一些实施例中,待加密列向量的设定顺序可以为:加密种子为该待加密列向量中的首行向量元素,从第二行向量元素开始,N个频域人脸图像按照频率从低到高的顺序确定各自在待加密列向量中的行。In some embodiments, the setting order of the column vector to be encrypted may be: the encryption seed is the first row vector element in the column vector to be encrypted, starting from the second row vector element, the N frequency domain face images are arranged in frequency from The order from low to high determines the respective row in the column vector to be encrypted.
加密密钥的获取过程,包括:获取N个频域人脸图像各自的第一卷积结果,对加密种子和N个第一卷积结果相加,得到加密密钥。The process of obtaining the encryption key includes: obtaining the first convolution results of each of N frequency domain face images, adding the encryption seed and the N first convolution results to obtain the encryption key.
N个频域人脸图像中频域人脸图像i的加密频域人脸图像i’的获取过程,包括:确定频域人脸图像i在待加密列向量中的目标行,获取目标行的前一行经过卷积加密处理的第一向量元素的处理结果的第二卷积结果,并将第二卷积结果与频域人脸图像i相乘得到相乘结果。获取位于目标行前面的每个第一向量元素的处理结果的第三卷积结果。获取位于目标行后面未经过卷积加密处理的第二向量元素的频域人脸图像的第一卷积结果。对相乘结果、第二向量元素的第一卷积结果和第一向量元素的第三卷积结果相加,得到加密频域人脸图像i’,其中,i和i’的取值为1至N。The acquisition process of the encrypted frequency domain face image i' of the frequency domain face image i among N frequency domain face images includes: determining the target row of the frequency domain face image i in the column vector to be encrypted, and obtaining the front of the target row. The second convolution result of a row of processing results of the first vector element that has been convolutionally encrypted, and the second convolution result is multiplied by the frequency domain face image i to obtain the multiplication result. Gets the third convolution result of the processing result for each first vector element preceding the target row. Obtain the first convolution result of the frequency domain face image of the second vector element located behind the target row that has not undergone convolution encryption processing. Add the multiplication result, the first convolution result of the second vector element and the third convolution result of the first vector element to obtain the encrypted frequency domain face image i', where the values of i and i' are 1 to N.
举例说明,当N个频域人脸图像包括一个低频人脸图像和三个高频人脸图像时,设定加密种子为低频人脸图像为三个高频人脸图像分别为则加密密钥频域人脸图像分别对应的加密频域人脸图像的计算过程如下。




For example, when N frequency domain face images include one low-frequency face image and three high-frequency face images, set the encryption seed to The low-frequency face image is The three high-frequency face images are then the encryption key Frequency domain face image Corresponding encrypted frequency domain face images The calculation process is as follows.




其中,φ(·)、η(·)和ρ(·)和为任意函数,exp(·)表示指示函数。 Among them, the sum of φ(·), η(·) and ρ(·) is an arbitrary function, and exp(·) represents the indicator function.
S24,对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。S24: Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain the encrypted face image.
关于步骤S24的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For an introduction to step S24, please refer to the relevant content records in the above embodiments, and will not be described again here.
本公开实施例中,对加密种子和N个频域人脸图像进行卷积加密处理,得到原始人脸图像的加密密钥和N个频域人脸图像各自的加密频域人脸图像。本公开实施例中创建待加密列向量对加密种子和N个频域人脸图像进行卷积加密处理,可以得到N个频域人脸图像各自的加密频域人脸图像,进而得到加密人脸图像,并且得到加密密钥,实现人脸图像加密的可逆性。In the embodiment of the present disclosure, a convolution encryption process is performed on the encryption seed and N frequency domain face images to obtain the encryption key of the original face image and the encrypted frequency domain face images of each of the N frequency domain face images. In the embodiment of the present disclosure, a column vector to be encrypted is created to perform convolution encryption processing on the encryption seed and N frequency domain face images. Encrypted frequency domain face images of each of the N frequency domain face images can be obtained, and then the encrypted face can be obtained. image, and obtain the encryption key to achieve reversibility of face image encryption.
图3是根据本公开一个实施例的人脸图像的加密方法的流程图,如图3所示,该方法包括步骤S31至S34。Figure 3 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 3, the method includes steps S31 to S34.
S31,对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数。S31: Perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is a positive integer.
S32,获取加密种子。S32, obtain the encrypted seed.
S33,基于目标人脸加密网络,对加密种子和N个频域人脸图像进行卷积加密处理,得到加密密钥和N个频域人脸图像各自的加密频域人脸图像。S33. Based on the target face encryption network, perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the encryption key and the encrypted frequency domain face images of each of the N frequency domain face images.
将加密种子和N个频域人脸图像作为输入数据,输入目标人脸加密网络中,由目标人脸加密网络对输入数据进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。The encryption seed and N frequency domain face images are used as input data and input into the target face encryption network. The target face encryption network performs convolution encryption processing on the input data to obtain the encrypted frequencies of each of the N frequency domain face images. Domain face image.
举例说明,图4为一种目标人脸加密网络的示意图,如图4所示,对原始图像I进行离散小波变换(Discrete Wavelet Transformation,DWT),获取四个不同频率上的频域人脸图像,其中包括一个低频人脸图像IL和三个高频人脸图像并对高斯正态分布进行随机采样,获取加密种子s。将s、IL作为输入数据输入目标人脸加密网络中,由目标人脸加密网络对输入数据进行卷积加密处理,得到加密密钥k和频域人脸图像IL各自的加密频域人脸图像进行离散小波逆变换(Inverse Discrete Wavelet Transformation,IDWT),即可获取加密图像IenFor example, Figure 4 is a schematic diagram of a target face encryption network. As shown in Figure 4, discrete wavelet transformation (DWT) is performed on the original image I to obtain four frequency domain face images at different frequencies. , which includes a low-frequency face image IL and three high-frequency face images And randomly sample the Gaussian normal distribution to obtain the encryption seed s. Will s, I L , As input data, it is input into the target face encryption network. The target face encryption network performs convolution encryption on the input data to obtain the encryption key k and the frequency domain face image IL , Respective encrypted frequency domain face images right By performing Inverse Discrete Wavelet Transformation (IDWT), the encrypted image I en can be obtained.
关于卷积加密处理的具体计算过程可以参见本公开图2实施例中的相关介绍,此处不再赘述。需要说明的是,图4中省略了指数计算的模块。在计算过程中,s对应对应对应对应对应而k对应对应对应对应对应 Regarding the specific calculation process of the convolution encryption process, please refer to the relevant introduction in the embodiment of FIG. 2 of this disclosure, and will not be described again here. It should be noted that the module for index calculation is omitted in Figure 4. During the calculation process, s corresponds to correspond correspond correspond correspond And k corresponds to correspond correspond correspond correspond
在一些实施例中,目标人脸加密网络可以选择深入解析DenseNet模块,并结合卷积注意力机制(Convolutional Block Attention Module,CBAM)模块进行实现。In some embodiments, the target face encryption network can choose to deeply analyze the DenseNet module and implement it in combination with the Convolutional Block Attention Module (CBAM) module.
S34,对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。 S34: Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain the encrypted face image.
关于步骤S34的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For an introduction to step S34, please refer to the relevant content records in the above embodiments, and will not be described again here.
本公开实施例中基于目标人脸加密网络进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。本公开实施例中构建目标人脸加密网络对加密种子和N个频域人脸图像进行卷积加密处理,可以得到N个频域人脸图像各自的加密频域人脸图像,进而得到加密人脸图像,并且得到加密密钥,实现人脸图像加密的可逆性。In the embodiment of the present disclosure, convolution encryption processing is performed based on the target face encryption network, and encrypted frequency domain face images of each of the N frequency domain face images are obtained. In the embodiment of the present disclosure, a target face encryption network is constructed to perform convolution encryption processing on the encryption seed and N frequency domain face images. Encrypted frequency domain face images of each of the N frequency domain face images can be obtained, and then the encrypted face image can be obtained. face image, and obtain the encryption key to achieve reversibility of face image encryption.
图5是根据本公开一个实施例的人脸图像的加密方法的流程图,如图5所示,该方法包括步骤S51至S56。Figure 5 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 5, the method includes steps S51 to S56.
S51,获取样本人脸图像集和样本加密种子集,样本人脸图像集中包括多个样本人脸图像,样本加密种子集中包括多个样本加密种子。S51. Obtain a sample face image set and a sample encryption seed set. The sample face image set includes multiple sample face images, and the sample encryption seed set includes multiple sample encryption seeds.
对原始图像集进行人脸检测与对齐,裁剪后统一分辨率为256*256,作为样本人脸图像集。在一些实施例中,还可以将样本人脸图像集划分为训练集、验证集和测试集,用于不同阶段的模型训练。Face detection and alignment are performed on the original image set, and the unified resolution is 256*256 after cropping, which is used as a sample face image set. In some embodiments, the sample face image set can also be divided into a training set, a verification set, and a test set for model training at different stages.
对高斯正态分布进行随机采样,获取样本加密种子集。Randomly sample the Gaussian normal distribution to obtain the sample encryption seed set.
S52,对样本人脸图像进行频域处理,获取N个不同频率上的样本频域人脸图像。S52: Perform frequency domain processing on the sample face image to obtain N sample frequency domain face images at different frequencies.
关于频域处理的具体实现可以参见本公开各实施例中的相关介绍,此处不再赘述。需要说明的是,在同一人脸加密网络的训练过程中,需要对样本人脸图像进行相同的频域处理,例如,对样本人脸图像都进行小波变换,获取四个不同频率上的样本频域图像,其中包括一个低频人脸图像和三个高频人脸图像。Regarding the specific implementation of frequency domain processing, please refer to the relevant introduction in each embodiment of the present disclosure, and will not be described again here. It should be noted that during the training process of the same face encryption network, the sample face images need to be processed in the same frequency domain. For example, the sample face images are subjected to wavelet transformation to obtain sample frequencies at four different frequencies. domain image, which includes one low-frequency face image and three high-frequency face images.
S53,将样本加密种子和N个样本频域人脸图像,输入人脸加密网络中进行卷积加密处理,得到N个样本频域人脸图像各自的加密样本频域人脸图像。S53: Input the sample encryption seed and N sample frequency domain face images into the face encryption network for convolution encryption processing, and obtain encrypted sample frequency domain face images of each of the N sample frequency domain face images.
S54,对N个加密样本频域人脸图像进行频域逆处理,得到加密样本人脸图像。S54: Perform frequency domain inverse processing on the N encrypted sample frequency domain face images to obtain the encrypted sample face image.
需要说明的是,样本人脸图像进行频域处理和频域逆处理过程,与原始人脸图像频域处理和频域逆处理过程类似,关于步骤S53~步骤S54的具体实现可以参见本公开各实施例中的相关介绍,此处不再赘述。It should be noted that the sample face image undergoes frequency domain processing and frequency domain inverse processing, which is similar to the frequency domain processing and frequency domain inverse processing of the original face image. For the specific implementation of steps S53 to S54, please refer to various steps in this disclosure. The relevant introduction in the embodiment will not be repeated here.
S55,基于样本人脸图像和加密样本人脸图像、样本频域人脸图像和对应的加密样本频域人脸图像,确定人脸加密网络的损失函数。S55, determining the loss function of the face encryption network based on the sample face image and the encrypted sample face image, the sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
为了满足人脸身份密写任务的需求,即约束加密人脸图像和原始人脸图像尽可能相似,保证加密前后图像低频信息一致,约束加密过程中的变化尽可能发生在边缘即人眼不易察觉的区域,并保证生成图像的真实性,需要设计损失函数,并结合损失值进行模型更新。In order to meet the needs of the face identity steganography task, it is necessary to constrain the encrypted face image and the original face image to be as similar as possible, ensure that the low-frequency information of the image before and after encryption is consistent, and constrain the changes in the encryption process to occur at the edge as much as possible, that is, not easily detectable by the human eye. area and ensure the authenticity of the generated image, it is necessary to design a loss function and update the model based on the loss value.
在一些实施例中,为了满足人脸加密网络的多种需求,可以设计多种人脸加密网络的损失函数,对多种损失函数进行加权,得到人脸加密网络的总损失函数。 In some embodiments, in order to meet the various needs of the face encryption network, multiple loss functions of the face encryption network can be designed, and the multiple loss functions can be weighted to obtain the total loss function of the face encryption network.
S56,基于损失函数调整初始人脸加密网络,并基于下一个样本人脸图像和样本加密种子继续对调整后的人脸加密网络进行训练,直至训练结束得到目标人脸加密网络。S56, adjust the initial face encryption network based on the loss function, and continue to train the adjusted face encryption network based on the next sample face image and sample encryption seed, until the target face encryption network is obtained after the training.
基于损失函数对构建的人脸加密网络进行参数调整与优化,并返回使用下一个样本人脸图像和样本加密种子对调整后的人脸加密网络继续训练,直至满足训练结束条件得到目标人脸加密网络。Based on the loss function, the parameters of the constructed face encryption network are adjusted and optimized, and the next sample face image and sample encryption seed are used to continue training the adjusted face encryption network until the end of training conditions are met and the target face encryption is obtained. network.
在一些实施例中,当加密样本人脸图像的加密效果、视觉质量和鲁棒性满足设定要求,可以认为人脸加密网络达到训练设定次数,满足训练结束条件。在一些实施例中,当训练时长达到设定值,也可认为人脸加密网络达到训练设定次数,满足训练结束条件。In some embodiments, when the encryption effect, visual quality and robustness of the encrypted sample face image meet the set requirements, the face encryption network can be considered to have reached the set number of training times and the training end conditions are met. In some embodiments, when the training duration reaches the set value, it can also be considered that the face encryption network has reached the set number of training times and meets the training end conditions.
在一些实施例中,通过加密前后人脸特征的余弦相似度来衡量加密效果,通过SSIM、PSNR、LPIPS、MAE四个指标衡量视觉质量,举例说明,加密样本图像的加密效果及视觉质量实验结果如下表所示。In some embodiments, the encryption effect is measured by the cosine similarity of facial features before and after encryption, and the visual quality is measured by four indicators: SSIM, PSNR, LPIPS, and MAE. For example, the encryption effect and visual quality experimental results of the encrypted sample image As shown in the table below.
表1加密效果及视觉质量实验结果
Table 1 Experimental results of encryption effect and visual quality
得到的特征间余弦相似度越低,即证明构建的人脸加密网络的加密效果越好。根据表1结果,可以证明本公开的人脸加密网络能够在保证视觉质量的前提下,对人脸图像进行有效加密。The lower the cosine similarity between the obtained features is, the better the encryption effect of the constructed face encryption network is. According to the results in Table 1, it can be proven that the face encryption network of the present disclosure can effectively encrypt face images while ensuring visual quality.
在一些实施例中,对加密样本人脸图像进行缩放、压缩、转灰度这些在社交媒体上传图像时常见的操作,并获取其与样本人脸图像的特征间余弦相似度,以判断人脸加密网络的鲁棒性,举例说明,加密样本图像的鲁棒性实验结果如下表所示。In some embodiments, the encrypted sample face image is scaled, compressed, and converted to grayscale, which are common operations when uploading images on social media, and the cosine similarity between the features of the encrypted sample face image and the sample face image is obtained to determine the face. The robustness of the encryption network. For example, the experimental results of the robustness of the encrypted sample image are shown in the table below.
表2加密鲁棒性实验结果
Table 2 Encryption robustness experimental results
其中,A表示样本人脸图像,A’表示加密样本人脸图像,A”表示变形后的加密样本人脸图像,表格中为人脸特征的余弦相似度。得到的特征间余弦相似度越低,即证明构建的人脸加密网络的加密效果越好。根据表2中结果可以发现,通过人脸加密网络得到的加密 样本人脸图像,经过缩放、压缩、转灰度这些在社交媒体上传图像时常见的操作之后,可以保持与原图的特征相似度,即对于这些攻击手段具有鲁棒性。Among them, A represents the sample face image, A' represents the encrypted sample face image, and A" represents the deformed encrypted sample face image. The table shows the cosine similarity of the facial features. The lower the cosine similarity between the obtained features, That is to say, it proves that the encryption effect of the constructed face encryption network is better. According to the results in Table 2, it can be found that the encryption obtained by the face encryption network After the sample face image is scaled, compressed, and converted to grayscale, which are common operations when uploading images on social media, it can maintain the feature similarity with the original image, that is, it is robust to these attack methods.
本公开实施例中,获取样本人脸图像集和样本加密种子集,样本人脸图像集中包括多个样本人脸图像,样本加密种子集中包括多个样本加密种子,对样本人脸图像进行频域处理,获取N个不同频率上的样本频域人脸图像,将样本加密种子和N个样本频域人脸图像,输入人脸加密网络中进行卷积加密处理,得到N个样本频域人脸图像各自的加密样本频域人脸图像,对N个加密样本频域人脸图像进行频域逆处理,得到加密样本人脸图像,基于样本人脸图像和加密样本人脸图像、样本频域人脸图像和对应的加密样本频域人脸图像,确定人脸加密网络的损失函数,基于损失函数调整初始人脸加密网络,并基于下一个样本人脸图像和样本加密种子继续对调整后的人脸加密网络进行训练,直至训练结束得到目标人脸加密网络。本公开实施例中针对人脸身份密写的需求训练人脸加密网络,通过这种方式可以获取目标人脸加密网络,使得通过目标人脸加密网络加密的人脸图像的加密效果、视觉质量和鲁棒性满足设定要求。In the embodiment of the present disclosure, a sample face image set and a sample encryption seed set are obtained. The sample face image set includes multiple sample face images, and the sample encryption seed set includes multiple sample encryption seeds. The sample face images are subjected to frequency domain Process, obtain N sample frequency domain face images at different frequencies, input the sample encryption seeds and N sample frequency domain face images into the face encryption network for convolution encryption processing, and obtain N sample frequency domain faces. Encrypted sample frequency domain face images of each image, perform frequency domain inverse processing on the N encrypted sample frequency domain face images, and obtain the encrypted sample face image. Based on the sample face image and the encrypted sample face image, the sample frequency domain face image Face image and corresponding encrypted sample frequency domain face image, determine the loss function of the face encryption network, adjust the initial face encryption network based on the loss function, and continue to adjust the adjusted face based on the next sample face image and sample encryption seed The face encryption network is trained until the end of training to obtain the target face encryption network. In the embodiment of the present disclosure, the face encryption network is trained according to the needs of face identity steganography. In this way, the target face encryption network can be obtained, so that the encryption effect, visual quality and The robustness meets the set requirements.
图6是根据本公开一个实施例的人脸图像的加密方法的流程图,如图6所示,该方法包括步骤S61至S65。Figure 6 is a flow chart of a face image encryption method according to an embodiment of the present disclosure. As shown in Figure 6, the method includes steps S61 to S65.
S61,根据样本人脸图像和加密样本人脸图像,获取重建损失函数和加密损失函数。S61: Obtain the reconstruction loss function and the encryption loss function based on the sample face image and the encrypted sample face image.
重建损失函数用于约束加密后图像和原始人脸图像尽可能相似,具体计算方式如下:
Reconstruction loss function It is used to constrain the encrypted image and the original face image to be as similar as possible. The specific calculation method is as follows:
加密损失函数用于约束加密前后人脸特征远离。加密损失函数的获取过程,包括:获取样本人脸图像的第一人脸特征和加密样本人脸图像的第二人脸特征,并基于第一人脸特征和第二人脸特征,获取加密损失函数,具体计算方式如下:
Encrypted loss function The process of obtaining the encryption loss function includes: obtaining the first face feature of the sample face image and the second face feature of the encrypted sample face image, and obtaining the encryption loss function based on the first face feature and the second face feature. The specific calculation method is as follows:
S62,根据样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数。S62: Determine the low-frequency loss function and the high-frequency loss function based on the sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
低频损失函数用于保证加密前后图像低频信息一致,高频损失函数用于约束加密过程中的变化尽可能发生在边缘即人眼不易察觉的区域。Low frequency loss function Used to ensure that the low-frequency information of the image before and after encryption is consistent, and the high-frequency loss function It is used to constrain changes in the encryption process to occur as much as possible at the edges, that is, areas that are not easily noticeable to the human eye.
低频损失函数的获取过程,包括:确定样本频域人脸图像的频率,获取频率小于设定频率阈值的第一样本频域人脸图像,并根据第一样本频域人脸图像和对应的加密样本频域人脸图像,获取低频损失函数,具体计算方式如下:
The acquisition process of the low-frequency loss function includes: determining the frequency of the sample frequency domain face image, obtaining the first sample frequency domain face image whose frequency is less than the set frequency threshold, and based on the first sample frequency domain face image and the corresponding The encrypted sample frequency domain face image is used to obtain the low-frequency loss function. The specific calculation method is as follows:
高频损失函数的获取过程,包括:获取频率大于或者等于设定频率阈值的第二样本频域人脸图像,并根据第二样本频域人脸图像和对应的加密样本频域人脸图像,获取高频损失函数,具体计算方式如下:
The acquisition process of the high-frequency loss function includes: acquiring a second sample frequency domain face image with a frequency greater than or equal to the set frequency threshold, and based on the second sample frequency domain face image and the corresponding encrypted sample frequency domain face image, Obtain the high-frequency loss function. The specific calculation method is as follows:
S63,对加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数。S63: Perform pixel value normalization processing on the encrypted sample face image, and obtain a pixel loss function based on the normalized pixel value.
像素损失函数用于限制生成图像像素值处于0-1之间,从而保证视觉质量。像素损失函数的获取过程,包括:获取加密样本人脸图像每个像素的归一化像素值与设定值的差值的绝对值,并确定最大绝对值。获取加密样本人脸图像的最小归一化像素值,基于最大绝对值和最小归一化像素值,得到像素损失函数,具体计算方式如下:
Pixel loss function Used to limit the pixel value of the generated image to be between 0-1 to ensure visual quality. The process of obtaining the pixel loss function includes: obtaining the absolute value of the difference between the normalized pixel value of each pixel of the encrypted sample face image and the set value, and determining the maximum absolute value. Obtain the minimum normalized pixel value of the encrypted sample face image, and obtain the pixel loss function based on the maximum absolute value and the minimum normalized pixel value. The specific calculation method is as follows:
S64,对样本人脸图像和加密样本人脸图像进行对抗识别,获取样本人脸图像的第一真假识别值和加密样本人脸图像的第二真假识别值,并基于第一真假识别值和第二真假识别值,获取对抗损失函数。S64, perform adversarial recognition on the sample face image and the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the first true and false recognition value value and the second true and false identification value to obtain the adversarial loss function.
对抗损失函数包括第一对抗损失函数和第二对抗损失函数对抗损失函数用于保证生成图像的真实性。Adversarial loss function Includes the first adversarial loss function and the second adversarial loss function The adversarial loss function is used to ensure the authenticity of the generated images.
第一对抗函数的获取过程,包括:基于第一真假识别值和第二真假识别值,获取第一对抗损失函数,具体计算方式如下:
The process of obtaining the first adversarial function includes: obtaining the first adversarial loss function based on the first true and false identification value and the second true and false identification value. The specific calculation method is as follows:
第二对抗函数的获取过程,包括:基于第二真假识别值,获取第二对抗损失函数,具体计算方式如下:
The process of obtaining the second adversarial function includes: obtaining the second adversarial loss function based on the second true and false identification value. The specific calculation method is as follows:
对第一对抗损失函数和第二对抗损失函数进行加权,得到对抗损失函数在一些实施例中,设定加权系数为a1和a2,且a1和a2的和值为1,则对抗损失函数的具体计算方式如下:
For the first adversarial loss function and the second adversarial loss function Weighting is performed to obtain the adversarial loss function In some embodiments, the weighting coefficients are set to a 1 and a 2 , and the sum of a 1 and a 2 is 1, then the specific calculation method of the adversarial loss function is as follows:
S65,对重建损失函数、加密损失函数、低频损失函数、高频损失函数、像素损失函数和对抗损失函数进行加权,得到人脸加密网络的损失函数。S65: Weight the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function to obtain the loss function of the face encryption network.
在一些实施例中,根据每种损失函数所对应的需求的重要程度,为每种损失函数分配加权系数,对重建损失函数、加密损失函数、低频损失函数、高频损失函数、像素损失函数和对抗损失函数进行加权,得到人脸加密网络的损失函数具体计算方式如下:
In some embodiments, a weighted coefficient is assigned to each loss function according to the importance of the requirements corresponding to each loss function, and the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network. The specific calculation method is as follows:
本公开实施例中,根据样本人脸图像和加密样本人脸图像,获取重建损失函数和加密损失函数,根据样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数,对加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数,对样本人脸图像和加密样本人脸图像进行对抗识别,获取样本人脸图像的第一真假识别值和加密样本人脸图像的第二真假识别值,并基于第一真假识别值和第二真假识别值,获取对抗损失函数,对重建损失函数、加密损失函数、低频损失函数、高频损失函数、像素损失函数和对抗损失函数进行加权,得到人脸加密网络的损失函数。本公开实施例中针对人脸身份密写任务的需求设计损失函数,基于损失函数对人脸加密网络进行调整,可以使通过目标人脸加密网络加密的人脸图像的加密效果、视觉质量和鲁棒性满足设定要求。In the embodiment of the present disclosure, the reconstruction loss function and the encryption loss function are obtained based on the sample face image and the encrypted sample face image, and the low-frequency loss function and the encryption loss function are determined based on the sample frequency domain face image and the corresponding encrypted sample frequency domain face image. The high-frequency loss function normalizes the pixel value of the encrypted sample face image, and based on the normalized pixel value, obtains the pixel loss function, performs adversarial recognition on the sample face image and the encrypted sample face image, and obtains the sample person The first true and false recognition value of the face image and the second true and false recognition value of the encrypted sample face image are obtained, and based on the first true and false recognition value and the second true and false recognition value, the adversarial loss function is obtained, and the reconstruction loss function and encryption are The loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network. In the embodiment of the present disclosure, a loss function is designed according to the needs of the face identity steganographic task. The face encryption network is adjusted based on the loss function, which can improve the encryption effect, visual quality and robustness of the face image encrypted through the target face encryption network. The stickiness meets the set requirements.
上述实施例中介绍了人脸图像的加密方法,相应地,基于人脸图像的加密方法中的流程与计算公式,可以倒推出人脸图像的解密方法中的流程与计算公式,实现人脸身份加密的可逆性,具体实现方式如下实施例:The above embodiment introduces the encryption method of the face image. Correspondingly, based on the process and calculation formula in the encryption method of the face image, the process and calculation formula in the decryption method of the face image can be deduced to realize the face identity. The reversibility of encryption is implemented in the following examples:
图7是根据本公开一个实施例的人脸图像的解密方法的流程图,如图7所示,该方法包括步骤S71至S74。Figure 7 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 7, the method includes steps S71 to S74.
S71,对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数。S71, perform frequency domain processing on the encrypted face image, and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer.
关于频域处理的具体实现可以参见本公开各实施例中的相关介绍,此处不再赘述。Regarding the specific implementation of frequency domain processing, please refer to the relevant introduction in each embodiment of the present disclosure, and will not be described again here.
S72,获取加密密钥。S72, obtain the encryption key.
在对原始人脸图像进行加密时,可以同时得到原始人脸图像的加密密钥,用于对加密人脸图像进行解密。在一些实施例中,对于获得使用身份信息许可的第三方及加密者本人,可以获取加密密钥。When encrypting the original face image, the encryption key of the original face image can be obtained at the same time, which is used to decrypt the encrypted face image. In some embodiments, encryption keys may be obtained from third parties who have permission to use the identity information and from the encryptor themselves.
S73,对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。S73: Perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images.
作为一种可能的实现方式,构建人脸图像的解密模型,将获取的加密密钥和N个加密频域人脸图像作为网络输入,通过模型进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。As a possible implementation method, construct a decryption model of face images, use the obtained encryption key and N encrypted frequency domain face images as network input, perform convolution decryption processing through the model, and obtain N encrypted frequency domain face images. The face images are their respective frequency domain face images.
在一些实施例中,还可以在传统可逆模型的基础上设计人脸图像的解密模型,利用一个模型高效实现人脸图像的加密和解密。In some embodiments, a decryption model for face images can also be designed based on the traditional reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
S74,对N个频域人脸图像进行频域逆处理,得到原始人脸图像。S74: Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
前述步骤中对加密人脸图像进行了频域处理,以对高频区域的图像变换进行恢复,相应地,解密完成后需要对N个频域人脸图像进行频域逆处理,得到原始人脸图像。 In the previous steps, frequency domain processing was performed on the encrypted face image to restore the image transformation in the high-frequency area. Correspondingly, after the decryption is completed, it is necessary to perform frequency domain inverse processing on the N frequency domain face images to obtain the original face. image.
本公开实施例中,对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数,获取加密密钥,对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像,对N个频域人脸图像进行频域逆处理,得到原始人脸图像。本公开实施例中在人脸图像加密的基础上进行逆处理,可以对加密人脸图像进行解密,恢复原始人脸图像,并且第一次将可逆模型应用于人脸身份密写任务,实现利用一个模型高效实现人脸图像的加密和解密。In this disclosed embodiment, the encrypted face image is subjected to frequency domain processing, and N encrypted frequency domain face images at different frequencies are obtained. N is a positive integer, the encryption key is obtained, and the encryption key and N encrypted frequency domain images are obtained. The face image is subjected to convolution decryption processing to obtain the frequency domain face image of each of the N encrypted frequency domain face images. The N frequency domain face images are subjected to frequency domain inverse processing to obtain the original face image. In the embodiment of the present disclosure, inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image. For the first time, the reversible model is applied to the face identity steganography task to achieve utilization A model efficiently implements encryption and decryption of face images.
图8是根据本公开一个实施例的人脸图像的解密方法的流程图,如图8所示,该方法包括步骤S81至S84。Figure 8 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 8, the method includes steps S81 to S84.
S81,对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数。S81, perform frequency domain processing on the encrypted face image, and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer.
S82,获取加密密钥。S82, obtain the encryption key.
关于步骤S81~步骤S82的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For the introduction of steps S81 to S82, please refer to the relevant content records in the above embodiments, and will not be described again here.
S83,对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像和加密种子。S83: Perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images and encryption seeds of each of the N encrypted frequency domain face images.
对加密密钥和N个加密频域人脸图像进行卷积解密处理,不仅可以得到N个加密频域人脸图像各自的频域人脸图像,而且可以得到加密种子。该加密种子在人脸身份加密时,与原始人脸图像同时作为输入。By performing convolution and decryption processing on the encryption key and N encrypted frequency domain face images, not only the frequency domain face images of each of the N encrypted frequency domain face images can be obtained, but also the encryption seeds can be obtained. This encryption seed is used as input at the same time as the original face image when encrypting face identity.
作为一种可能的实现方式,对加密密钥和N个加密频域人脸图像,按照设定顺序进行组合得到一个待解密列向量,从末行开始按照倒序逐行对待解密列向量中的向量元素,分别基于加密密钥和N个加密频域人脸图像进行卷积解密处理,以得到向量元素的解密结果,其中,解密结果为加密密钥的加密种子或者为其中一个频域人脸图像。As a possible implementation method, combine the encryption key and N encrypted frequency domain face images in a set order to obtain a column vector to be decrypted, and treat the vectors in the decrypted column vector row by row in reverse order starting from the last row. elements, respectively, perform convolution decryption processing based on the encryption key and N encrypted frequency domain face images to obtain the decryption result of the vector element, where the decryption result is the encryption seed of the encryption key or one of the frequency domain face images. .
在一些实施例中,待解密列向量的设定顺序可以为:加密密钥为该待解密列向量中的首行向量元素,从第二行向量元素开始,N个加密频域人脸图像按照频率从低到高的顺序确定各自在待解密列向量中的行。In some embodiments, the setting order of the column vector to be decrypted can be: the encryption key is the first row vector element in the column vector to be decrypted, and starting from the second row vector element, the N encrypted frequency domain face images are determined in order from low to high frequency to determine their respective rows in the column vector to be decrypted.
N个加密频域人脸图像中加密频域人脸图像i’的频域人脸图像i的获取过程,包括:确定加密频域人脸图像i’在待解密列向量中的目标行,获取位于目标行后面的经过卷积解密处理的第一向量元素的解密结果的第一卷积结果,以及位于目标行前面的未经过卷积解密处理的第二向量元素的第三卷积结果。获取目标行的前一行的第二向量元素的第二卷积结果。将加密频域人脸图像i’与第一向量元素的第一卷积结果、第二向量元素的第三卷积结果相减,得到相减结果,并将相减结果与第二卷积结果相乘,得到加密频域人脸图像i’的频域人脸图像i。 The acquisition process of the frequency domain face image i of the encrypted frequency domain face image i' among the N encrypted frequency domain face images includes: determining the target row of the encrypted frequency domain face image i' in the column vector to be decrypted, and obtaining A first convolution result of the decrypted result of the first vector element that has been subjected to convolution decryption located behind the target row, and a third convolution result of the second vector element that has not been subjected to convolution decryption located in front of the target row. Gets the second convolution result of the second vector element of the row preceding the target row. Subtract the encrypted frequency domain face image i' from the first convolution result of the first vector element and the third convolution result of the second vector element to obtain a subtraction result, and combine the subtraction result with the second convolution result Multiply to obtain the frequency domain face image i of the encrypted frequency domain face image i'.
加密种子的获取过程,包括:将加密密钥与N个频域人脸图像的第一卷积结果相减,得到加密种子。The process of obtaining the encryption seed includes: subtracting the encryption key from the first convolution results of N frequency domain face images to obtain the encryption seed.
举例说明,当N个加密频域人脸图像包括一个加密低频人脸图像和三个加密高频人脸图像时,设定加密密钥为加密低频人脸图像为三个加密高频人脸图像分别为 则加密种子加密频域人脸图像分别对应的频域人脸图像的计算过程如下。




For example, when N encrypted frequency domain face images include one encrypted low-frequency face image and three encrypted high-frequency face images, the encryption key is set to The encrypted low-frequency face image is The three encrypted high-frequency face images are Then encrypt the seed Encrypted frequency domain face image Corresponding frequency domain face images The calculation process is as follows.




其中,φ(·)、η(·)和ρ(·)和为任意函数,exp(·)表示指示函数。Among them, the sum of φ(·), η(·) and ρ(·) is an arbitrary function, and exp(·) represents the indicator function.
S84,对N个频域人脸图像进行频域逆处理,得到原始人脸图像。S84: Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
关于步骤S84的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For an introduction to step S84, please refer to the relevant content records in the above embodiments, and will not be described again here.
本公开实施例中,对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像和加密种子。本公开实施例中创建待解密列向量对加密密钥和N个加密频域人脸图像进行卷积解密处理,可以得到N个加密频域人脸图像各自的频域人脸图像,恢复原始人脸图像。In the embodiment of the present disclosure, a convolution decryption process is performed on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images and encryption seeds for each of the N encrypted frequency domain face images. In the embodiment of the present disclosure, a column vector to be decrypted is created to perform convolution decryption processing on the encryption key and N encrypted frequency domain face images. Frequency domain face images of each of the N encrypted frequency domain face images can be obtained, and the original face image can be restored. face image.
图9是根据本公开一个实施例的人脸图像的解密方法的流程图,如图9所示,该方法包括步骤S91至S94。Figure 9 is a flow chart of a method for decrypting a face image according to an embodiment of the present disclosure. As shown in Figure 9, the method includes steps S91 to S94.
S91,对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数。S91, perform frequency domain processing on the encrypted face image, and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer.
S92,获取加密密钥。S92, obtain the encryption key.
S93,基于目标人脸解密网络,对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到加密种子和N个加密频域人脸图像各自的频域人脸图像。S93, based on the target face decryption network, perform convolution decryption processing on the encryption key and N encrypted frequency domain face images to obtain the encryption seed and the frequency domain face images of the N encrypted frequency domain face images.
将加密密钥和N个加密频域人脸图像作为输入数据,输入目标人脸解密网络中,由目标人脸解密网络对输入数据进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。The encryption key and N encrypted frequency domain face images are used as input data and input into the target face decryption network. The target face decryption network performs convolution and decryption processing on the input data to obtain each of the N encrypted frequency domain face images. Frequency domain face image.
需要说明的是,本公开实施例中的目标人脸解密网络与目标人脸加密网络可以在现有的两分支可逆模型基础上进行设计,利用一个模型高效实现人脸图像的加密和解密。It should be noted that the target face decryption network and target face encryption network in the embodiments of the present disclosure can be designed based on the existing two-branch reversible model, and one model can be used to efficiently implement encryption and decryption of face images.
举例说明,图10为在上述目标人脸加密网络的基础上设计的一种目标人脸解密网络的示意图,如图10所示,对加密图像Ien进行离散小波变换(Discrete Wavelet Transformation, DWT),获取四个不同频率上的加密频域人脸图像,其中包括一个加密低频人脸图像和三个高频人脸图像并获取加密密钥k。将k、作为输入数据输入目标人脸解密网络中,由目标人脸解密网络对输入数据进行卷积解密处理,得到加密种子s和加密频域人脸图像各自的频域人脸图像进行离散小波逆变换(Inverse Discrete Wavelet Transformation,IDWT),即可获取解密图像IdeFor example, Figure 10 is a schematic diagram of a target face decryption network designed based on the above target face encryption network. As shown in Figure 10, the encrypted image I en is subjected to discrete wavelet transformation (Discrete Wavelet Transformation, DWT), obtain four encrypted frequency domain face images at different frequencies, including an encrypted low-frequency face image and three high-frequency face images And get the encryption key k. Will k, As input data, it is input into the target face decryption network. The target face decryption network performs convolution decryption processing on the input data to obtain the encryption seed s and the encrypted frequency domain face image. Respective frequency domain face images right By performing Inverse Discrete Wavelet Transformation (IDWT), the decrypted image I de can be obtained.
关于卷积解密处理的具体计算过程可以参见本公开图9实施例中的相关介绍,此处不再赘述。需要说明的是,图11中省略了指数计算的模块。在计算过程中,s对应对应对应对应对应而k对应对应对应对应对应 Regarding the specific calculation process of the convolution decryption process, please refer to the relevant introduction in the embodiment of FIG. 9 of the present disclosure, and will not be described again here. It should be noted that the module for index calculation is omitted in Figure 11. During the calculation process, s corresponds to correspond correspond correspond correspond And k corresponds to correspond correspond correspond correspond
在一些实施例中,目标人脸解密网络可以选择深入解析DenseNet模块,并结合卷积注意力机制(Convolutional Block Attention Module,CBAM)模块进行实现。In some embodiments, the target face decryption network can choose to deeply parse the DenseNet module and implement it in combination with the Convolutional Block Attention Module (CBAM) module.
S94,对N个频域人脸图像进行频域逆处理,得到原始人脸图像。S94: Perform frequency domain inverse processing on the N frequency domain face images to obtain the original face image.
关于步骤S94的介绍可参见上述实施例中相关内容的记载,此处不再赘述。For the introduction of step S94, please refer to the relevant contents in the above embodiment, which will not be repeated here.
本公开实施例中基于目标人脸解密网络进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。本公开实施例中构建目标人脸解密网络对加密密钥和N个加密频域人脸图像进行卷积解密处理,可以得到N个加密频域人脸图像各自的频域人脸图像,进而恢复原始人脸图像。In the embodiment of the present disclosure, convolution decryption processing is performed based on the target face decryption network, and frequency domain face images of each of N encrypted frequency domain face images are obtained. In the embodiment of the present disclosure, a target face decryption network is constructed to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images. Frequency domain face images of each of the N encrypted frequency domain face images can be obtained, and then restored Original face image.
图11是根据本公开一个实施例的人脸图像的解密方法的流程图,如图11所示,该方法包括步骤S111至S116。FIG. 11 is a flowchart of a method for decrypting a facial image according to an embodiment of the present disclosure. As shown in FIG. 11 , the method includes steps S111 to S116 .
S111,获取样本加密人脸图像集和样本加密密钥集,样本人脸图像集中包括多个样本加密人脸图像,样本加密密钥集中包括多个样本加密密钥。S111. Obtain a sample encrypted face image set and a sample encryption key set. The sample face image set includes multiple sample encrypted face images, and the sample encryption key set includes multiple sample encryption keys.
S112,对样本加密人脸图像进行频域处理,获取N个不同频率上的样本加密频域人脸图像。S112: Perform frequency domain processing on the sample encrypted face image to obtain N sample encrypted frequency domain face images at different frequencies.
S113,将样本加密密钥和N个样本加密频域人脸图像,输入人脸解密网络中进行卷积解密处理,得到N个样本加密频域人脸图像各自的样本频域人脸图像。S113, input the sample encryption key and N sample encrypted frequency domain face images into the face decryption network for convolution decryption processing, and obtain sample frequency domain face images of each of the N sample encrypted frequency domain face images.
S114,对N个样本频域人脸图像进行频域逆处理,得到样本人脸图像。S114: Perform frequency domain inverse processing on N sample frequency domain face images to obtain sample face images.
S115,基于样本加密人脸图像和样本人脸图像、样本加密频域人脸图像和对应的样本频域人脸图像,确定人脸解密网络的损失函数。S115. Determine the loss function of the face decryption network based on the sample encrypted face image and the sample face image, the sample encrypted frequency domain face image and the corresponding sample frequency domain face image.
关于步骤S112~步骤S115的具体实现可以参见本公开各实施例中的相关介绍,此处不再赘述。 Regarding the specific implementation of steps S112 to S115, please refer to the relevant introductions in the embodiments of the present disclosure, and will not be described again here.
S116,基于损失函数调整初始人脸解密网络,并基于下一个样本加密人脸图像和样本加密密钥继续对调整后的人脸解密网络进行训练,直至训练结束得到目标人脸解密网络。S116, adjust the initial face decryption network based on the loss function, and continue to train the adjusted face decryption network based on the next sample encrypted face image and sample encryption key until the end of the training to obtain the target face decryption network.
基于损失函数对构建的人脸解密网络进行参数调整与优化,并返回使用下一个加密人脸图像和样本加密密钥对调整后的人脸解密网络继续训练,直至满足训练结束条件得到目标人脸解密网络。Adjust and optimize the parameters of the constructed face decryption network based on the loss function, and return to use the next encrypted face image and sample encryption key to continue training the adjusted face decryption network until the end of training conditions are met to obtain the target face Decrypt the network.
在一些实施例中,当样本人脸图像的解密效果、视觉质量满足设定要求,可以认为人脸解密网络达到训练设定次数,满足训练结束条件。在一些实施例中,当训练时长达到设定值,也可认为人脸解密网络达到训练设定次数,满足训练结束条件。In some embodiments, when the decryption effect and visual quality of the sample face image meet the set requirements, the face decryption network can be considered to have reached the set number of training times and meet the training end conditions. In some embodiments, when the training duration reaches the set value, it can also be considered that the face decryption network has reached the set number of training times and the training end conditions are met.
在一些实施例中,通过解密图像与原始图像人脸特征的余弦相似度来衡量解密效果,通过SSIM、LPIPS、MAE三个指标衡量视觉质量,举例说明,样本图像的解密效果及视觉质量实验结果如下表所示。In some embodiments, the decryption effect is measured by the cosine similarity of facial features between the decrypted image and the original image, and the visual quality is measured by three indicators: SSIM, LPIPS, and MAE. For example, the decryption effect of the sample image and the visual quality experimental results As shown in the table below.
表3解密图像的恢复质量
Table 3 Recovery quality of decrypted images
得到的特征间余弦相似度越高,即证明构建的人脸解密网络的解密效果越好。根据表3结果,可以证明本公开的人脸解密网络能够在保证视觉质量的前提下,对人脸图像进行有效解密。The higher the cosine similarity between the obtained features is, the better the decryption effect of the constructed face decryption network is. According to the results in Table 3, it can be proven that the face decryption network of the present disclosure can effectively decrypt face images while ensuring visual quality.
与此同时,如果使用不匹配的加密密钥,将无法正确恢复原始图像,密钥的唯一性和不可复制性保证了加密的安全性。At the same time, if a mismatched encryption key is used, the original image cannot be correctly restored. The uniqueness and non-replicability of the key ensures the security of encryption.
本公开实施例中,获取样本加密人脸图像集和样本加密密钥集,样本人脸图像集中包括多个样本加密人脸图像,样本加密密钥集中包括多个样本加密密钥,对样本加密人脸图像进行频域处理,获取N个不同频率上的样本加密频域人脸图像,将样本加密密钥和N个样本加密频域人脸图像,输入人脸解密网络中进行卷积解密处理,得到N个样本加密频域人脸图像各自的样本频域人脸图像,对N个样本频域人脸图像进行频域逆处理,得到样本人脸图像,基于样本加密人脸图像和样本人脸图像、样本加密频域人脸图像和对应的样本频域人脸图像,确定人脸解密网络的损失函数,基于损失函数调整初始人脸解密网络,并基于下一个样本加密人脸图像和样本加密密钥继续对调整后的人脸解密网络进行训练,直至训练结束得到目标人脸解密网络。本公开实施例中针对人脸加密可逆的需求训练人脸解密网络,通过这种方式可以获取目标人脸解密网络,使得通过目标人脸解密网络解密的人脸图像的解密效果和视觉质量满足设定要求。 In this disclosed embodiment, a sample encrypted face image set and a sample encryption key set are obtained, the sample face image set includes multiple sample encrypted face images, the sample encryption key set includes multiple sample encryption keys, and the sample is encrypted The face image is processed in the frequency domain, and N sample encrypted frequency domain face images at different frequencies are obtained. The sample encryption key and N sample encrypted frequency domain face images are input into the face decryption network for convolution decryption processing. , obtain each sample frequency domain face image of N sample encrypted frequency domain face images, perform frequency domain inverse processing on the N sample frequency domain face images, and obtain the sample face image, based on the sample encrypted face image and sample face Face image, sample encrypted frequency domain face image and corresponding sample frequency domain face image, determine the loss function of the face decryption network, adjust the initial face decryption network based on the loss function, and encrypt the face image and sample based on the next sample The encryption key continues to train the adjusted face decryption network until the target face decryption network is obtained after training. In the embodiment of the present disclosure, the face decryption network is trained according to the requirement of reversible face encryption. In this way, the target face decryption network can be obtained, so that the decryption effect and visual quality of the face image decrypted by the target face decryption network meet the requirements of the design. Set requirements.
图12是根据本公开一个实施例的人脸图像的加密装置的结构图,如图12所示,人脸图像的加密装置120包括频域处理模块121、获取模块122、加密模块123和频域逆处理模块124。Figure 12 is a structural diagram of a face image encryption device according to an embodiment of the present disclosure. As shown in Figure 12, the face image encryption device 120 includes a frequency domain processing module 121, an acquisition module 122, an encryption module 123 and a frequency domain Inverse processing module 124.
频域处理模块121,用于对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,N为正整数。The frequency domain processing module 121 is used to perform frequency domain processing on the original face image and obtain N frequency domain face images at different frequencies, where N is a positive integer.
获取模块122,用于获取加密种子。Obtaining module 122 is used to obtain encrypted seeds.
加密模块123,用于对加密种子和N个频域人脸图像进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。The encryption module 123 is used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain encrypted frequency domain face images of each of the N frequency domain face images.
频域逆处理模块124,用于对N个加密频域人脸图像进行频域逆处理,得到加密人脸图像。The frequency domain inverse processing module 124 is used to perform frequency domain inverse processing on N encrypted frequency domain face images to obtain encrypted face images.
需要说明的是,前述对人脸图像的加密方法实施例的解释说明也适用于该实施例的人脸图像的加密装置,此处不再赘述。It should be noted that the foregoing explanation of the embodiment of the facial image encryption method is also applicable to the facial image encryption device of this embodiment, and will not be described again here.
本公开实施例中将原始人脸图像转换为频域人脸图像后,基于频域人脸图像进行加密处理,通过这种方式,可以约束加密过程中的变换发生在人眼不易感知的边缘等高频区域,从而保证了加密的不易察觉及鲁棒。In the embodiment of the present disclosure, after the original face image is converted into a frequency domain face image, encryption processing is performed based on the frequency domain face image. In this way, the transformation during the encryption process can be constrained to occur at edges that are difficult for the human eye to perceive, etc. high-frequency region, thus ensuring that the encryption is imperceptible and robust.
在一些实施例中,在本公开实施例一种可能的实现方式中,加密模块123,还用于:对加密种子和N个频域人脸图像进行卷积加密处理,得到原始人脸图像的加密密钥。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the encryption module 123 is also used to perform convolution encryption processing on the encryption seed and N frequency domain face images to obtain the original face image. Encryption key.
在一些实施例中,在本公开实施例一种可能的实现方式中,加密模块123,还用于:对加密种子和N个频域人脸图像,按照设定顺序进行组合得到一个待加密列向量;从首行开始按照正序逐行对待加密列向量中的向量元素,分别基于加密种子和N个频域人脸图像进行卷积加密处理,以得到向量元素的处理结果,其中,处理结果为加密密钥或者为其中一个加密频域人脸图像。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the encryption module 123 is also used to: combine the encryption seed and N frequency domain face images in a set order to obtain a column to be encrypted Vector; starting from the first row, the vector elements in the encrypted column vector are treated row by row in positive order, and convolution encryption is performed based on the encryption seed and N frequency domain face images to obtain the processing result of the vector element, where the processing result is the encryption key or is one of the encrypted frequency domain face images.
在一些实施例中,在本公开实施例一种可能的实现方式中,待加密列向量的设定顺序为:加密种子为待加密列向量中的首行向量元素,从第二行向量元素开始,N个频域人脸图像按照频率从低到高的顺序确定各自在待加密列向量中的行。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the setting order of the column vector to be encrypted is: the encryption seed is the first row vector element in the column vector to be encrypted, starting from the second row vector element , N frequency domain face images determine their respective rows in the column vector to be encrypted in order from low to high frequency.
在一些实施例中,在本公开实施例一种可能的实现方式中,加密模块123,还用于:获取N个频域人脸图像各自的第一卷积结果;对加密种子和N个第一卷积结果相加,得到加密密钥。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the encryption module 123 is also used to: obtain the first convolution results of each of the N frequency domain face images; The convolution results are added to obtain the encryption key.
在一些实施例中,在本公开实施例一种可能的实现方式中,加密模块123,还用于:确定频域人脸图像i在待加密列向量中的目标行;获取目标行的前一行经过卷积加密处理的第一向量元素的处理结果的第二卷积结果,并将第二卷积结果与频域人脸图像i相乘得到相乘结果;获取位于目标行前面的每个第一向量元素的处理结果的第三卷积结果;获取 位于目标行后面未经过卷积加密处理的第二向量元素的频域人脸图像的第一卷积结果;对相乘结果、第二向量元素的第一卷积结果和第一向量元素的第三卷积结果相加,得到加密频域人脸图像i’,其中,i和i’的取值为1至N。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the encryption module 123 is also used to: determine the target row of the frequency domain face image i in the column vector to be encrypted; obtain the previous row of the target row The second convolution result of the processing result of the first vector element that has undergone convolution encryption processing, and the second convolution result is multiplied with the frequency domain face image i to obtain the multiplication result; obtain each of the first vector elements located in front of the target row The third convolution result of the processing result of a vector element; obtain The first convolution result of the frequency domain face image of the second vector element located behind the target row that has not undergone convolution encryption processing; the multiplication result, the first convolution result of the second vector element and the first convolution result of the first vector element The three convolution results are added to obtain the encrypted frequency domain face image i', where the values of i and i' range from 1 to N.
在一些实施例中,在本公开实施例一种可能的实现方式中,加密模块123,还用于:将加密种子和N个频域人脸图像作为输入数据,输入目标人脸加密网络中,由目标人脸加密网络对输入数据进行卷积加密处理,得到N个频域人脸图像各自的加密频域人脸图像。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the encryption module 123 is also used to: input the encryption seed and N frequency domain face images as input data into the target face encryption network, The target face encryption network performs convolution encryption on the input data to obtain the encrypted frequency domain face images of each of the N frequency domain face images.
在一些实施例中,在本公开实施例一种可能的实现方式中,如图13所示,人脸图像的加密装置120还包括:训练模块125,用于:获取样本人脸图像集和样本加密种子集,样本人脸图像集中包括多个样本人脸图像,样本加密种子集中包括多个样本加密种子;对样本人脸图像进行频域处理,获取N个不同频率上的样本频域人脸图像;将样本加密种子和N个样本频域人脸图像,输入人脸加密网络中进行卷积加密处理,得到N个样本频域人脸图像各自的加密样本频域人脸图像;对N个加密样本频域人脸图像进行频域逆处理,得到加密样本人脸图像;基于样本人脸图像和加密样本人脸图像、样本频域人脸图像和对应的加密样本频域人脸图像,确定人脸加密网络的损失函数;基于损失函数调整初始人脸加密网络,并基于下一个样本人脸图像和样本加密种子继续对调整后的人脸加密网络进行训练,直至训练结束得到目标人脸加密网络。In some embodiments, in a possible implementation of the disclosed embodiment, as shown in FIG. 13 , the face image encryption device 120 further includes: a training module 125, which is used to: obtain a sample face image set and a sample encryption seed set, wherein the sample face image set includes a plurality of sample face images, and the sample encryption seed set includes a plurality of sample encryption seeds; perform frequency domain processing on the sample face images to obtain N sample frequency domain face images at different frequencies; input the sample encryption seeds and the N sample frequency domain face images into a face encryption network for convolution encryption processing to obtain encrypted sample frequency domain face images of the N sample frequency domain face images; perform frequency domain inverse processing on the N encrypted sample frequency domain face images to obtain encrypted sample face images; determine a loss function of the face encryption network based on the sample face images and the encrypted sample face images, the sample frequency domain face images and the corresponding encrypted sample frequency domain face images; adjust the initial face encryption network based on the loss function, and continue to train the adjusted face encryption network based on the next sample face image and the sample encryption seed until the training is completed to obtain the target face encryption network.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块125,还用于:根据样本人脸图像和加密样本人脸图像,获取重建损失函数和加密损失函数;根据样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数;对加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数;对样本人脸图像和加密样本人脸图像进行对抗识别,获取样本人脸图像的第一真假识别值和加密样本人脸图像的第二真假识别值,并基于第一真假识别值和第二真假识别值,获取对抗损失函数;对重建损失函数、加密损失函数、低频损失函数、高频损失函数、像素损失函数和对抗损失函数进行加权,得到人脸加密网络的损失函数。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the training module 125 is also used to: obtain the reconstruction loss function and the encryption loss function according to the sample face image and the encrypted sample face image; Frequency domain face image and corresponding encrypted sample frequency domain face image, determine the low-frequency loss function and high-frequency loss function; perform pixel value normalization processing on the encrypted sample face image, and obtain pixels based on the normalized pixel value Loss function; perform adversarial recognition on the sample face image and the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the first true and false The recognition value and the second true and false recognition value are used to obtain the adversarial loss function; the reconstruction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss of the face encryption network function.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块125,还用于:获取样本人脸图像的第一人脸特征和加密样本人脸图像的第二人脸特征,并基于第一人脸特征和第二人脸特征,获取加密损失函数。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the training module 125 is also used to: obtain the first facial feature of the sample face image and the second facial feature of the encrypted sample face image. , and obtain the encryption loss function based on the first face feature and the second face feature.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块125,还用于:确定样本频域人脸图像的频率;获取频率小于设定频率阈值的第一样本频域人脸图像,并根据第一样本频域人脸图像和对应的加密样本频域人脸图像,获取低频损失函数;获取频率大于或者等于设定频率阈值的第二样本频域人脸图像,并根据第二样本频域人脸图像和对应的加密样本频域人脸图像,获取高频损失函数。 In some embodiments, in a possible implementation of the embodiment of the present disclosure, the training module 125 is also used to: determine the frequency of the face image in the sample frequency domain; obtain the first sample frequency whose frequency is less than the set frequency threshold. domain face image, and obtain the low-frequency loss function based on the first sample frequency domain face image and the corresponding encrypted sample frequency domain face image; obtain the second sample frequency domain face image with a frequency greater than or equal to the set frequency threshold , and obtain the high-frequency loss function based on the second sample frequency domain face image and the corresponding encrypted sample frequency domain face image.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块125,还用于:获取加密样本人脸图像每个像素的归一化像素值与设定值的差值的绝对值,并确定最大绝对值;获取加密样本人脸图像的最小归一化像素值;基于最大绝对值和最小归一化像素值,得到像素损失函数。In some embodiments, in a possible implementation method of the disclosed embodiment, the training module 125 is also used to: obtain the absolute value of the difference between the normalized pixel value of each pixel of the encrypted sample face image and the set value, and determine the maximum absolute value; obtain the minimum normalized pixel value of the encrypted sample face image; and obtain the pixel loss function based on the maximum absolute value and the minimum normalized pixel value.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块125,还用于:基于第一真假识别值和第二真假识别值,获取第一对抗损失函数;基于第二真假识别值,获取第二对抗损失函数;对第一对抗损失函数和第二对抗损失函数进行加权,得到对抗损失函数。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the training module 125 is also used to: obtain the first adversarial loss function based on the first true and false identification value and the second true and false identification value; The second true and false identification value is used to obtain the second adversarial loss function; the first adversarial loss function and the second adversarial loss function are weighted to obtain the adversarial loss function.
在一些实施例中,在本公开实施例一种可能的实现方式中,频域处理模块121,还用于:基于小波变换对原始人脸图像进行频域分解,以获取N个频域人脸图像。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the frequency domain processing module 121 is also used to: perform frequency domain decomposition on the original face image based on wavelet transform to obtain N frequency domain faces. image.
在一些实施例中,在本公开实施例一种可能的实现方式中,获取模块122,还用于:对高斯正态分布进行随机采样,以获取加密种子。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the acquisition module 122 is also configured to randomly sample the Gaussian normal distribution to obtain encryption seeds.
图14是根据本公开一个实施例的人脸图像的解密装置的结构图,如图14所示,人脸图像的解密装置130包括频域处理模块131、获取模块132、解密模块133和频域逆处理模块134。Figure 14 is a structural diagram of a face image decryption device according to an embodiment of the present disclosure. As shown in Figure 14, the face image decryption device 130 includes a frequency domain processing module 131, an acquisition module 132, a decryption module 133 and a frequency domain Inverse processing module 134.
频域处理模块131,用于对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,N为正整数。The frequency domain processing module 131 is used to perform frequency domain processing on the encrypted face image and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer.
获取模块132,用于获取加密密钥。Obtaining module 132 is used to obtain the encryption key.
解密模块133,用于对加密密钥和N个加密频域人脸图像进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。The decryption module 133 is used to perform convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images.
频域逆处理模块134,用于对N个频域人脸图像进行频域逆处理,得到原始人脸图像。The frequency domain inverse processing module 134 is used to perform frequency domain inverse processing on N frequency domain face images to obtain original face images.
需要说明的是,前述对人脸图像的解密方法实施例的解释说明也适用于该实施例的人脸图像的解密装置,此处不再赘述。It should be noted that the foregoing explanation of the embodiment of the facial image decryption method is also applicable to the facial image decryption device of this embodiment, and will not be described again here.
本公开实施例中在人脸图像加密的基础上进行逆处理,可以对加密人脸图像进行解密,恢复原始人脸图像,并且第一次将可逆模型应用于人脸身份密写任务,实现利用一个模型高效实现人脸图像的加密和解密。In the embodiment of the present disclosure, inverse processing is performed on the basis of face image encryption, which can decrypt the encrypted face image and restore the original face image. For the first time, the reversible model is applied to the face identity steganography task to achieve utilization A model efficiently implements encryption and decryption of face images.
在一些实施例中,在本公开实施例一种可能的实现方式中,解密模块133,还用于:对加密密钥和N个加密频域人脸图像,按照设定顺序进行组合得到一个待解密列向量;从末行开始按照倒序逐行对待解密列向量中的向量元素,分别基于加密密钥和N个加密频域人脸图像进行卷积解密处理,以得到向量元素的解密结果,其中,解密结果为加密密钥的加密种子或者为其中一个频域人脸图像。 In some embodiments, in a possible implementation of the embodiment of the present disclosure, the decryption module 133 is also configured to: combine the encryption key and N encrypted frequency domain face images in a set order to obtain a to-be-received face image. Decrypt the column vector; treat the vector elements in the decrypted column vector row by row in reverse order starting from the last row, and perform convolution decryption processing based on the encryption key and N encrypted frequency domain face images to obtain the decryption result of the vector elements, where , the decryption result is the encryption seed of the encryption key or one of the frequency domain face images.
在一些实施例中,在本公开实施例一种可能的实现方式中,待解密列向量的设定顺序为:加密密钥为待解密列向量中的首行向量元素,从第二行向量元素开始,N个加密频域人脸图像按照频率从低到高的顺序确定各自在待解密列向量中的行。In some embodiments, in a possible implementation method of the embodiments of the present disclosure, the setting order of the column vector to be decrypted is: the encryption key is the first row vector element in the column vector to be decrypted, and starting from the second row vector element, the N encrypted frequency domain face images are ordered from low to high in frequency to determine their respective rows in the column vector to be decrypted.
在一些实施例中,在本公开实施例一种可能的实现方式中,解密模块133,还用于:确定加密频域人脸图像i’在待解密列向量中的目标行;获取位于目标行后面的经过卷积解密处理的第一向量元素的解密结果的第一卷积结果,以及位于目标行前面的未经过卷积解密处理的第二向量元素的第三卷积结果;获取目标行的前一行的第二向量元素的第二卷积结果;将加密频域人脸图像i’与第一向量元素的第一卷积结果、第二向量元素的第三卷积结果相减,得到相减结果,并将相减结果与第二卷积结果相乘,得到加密频域人脸图像i’的频域人脸图像i。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the decryption module 133 is also used to: determine the target row of the encrypted frequency domain face image i' in the column vector to be decrypted; obtain the target row located in The first convolution result of the decryption result of the subsequent first vector element that has undergone convolution decryption processing, and the third convolution result of the second vector element that has not undergone convolution decryption processing in front of the target row; obtain the target row's The second convolution result of the second vector element in the previous row; subtract the encrypted frequency domain face image i' from the first convolution result of the first vector element and the third convolution result of the second vector element to obtain Subtract the result, and multiply the subtraction result with the second convolution result to obtain the frequency domain face image i of the encrypted frequency domain face image i'.
在一些实施例中,在本公开实施例一种可能的实现方式中,解密模块133,还用于:将加密密钥与N个频域人脸图像的第一卷积结果相减,得到加密种子。In some embodiments, in a possible implementation of this embodiment of the present disclosure, the decryption module 133 is also configured to: subtract the encryption key from the first convolution results of the N frequency domain face images to obtain the encrypted seed.
在一些实施例中,在本公开实施例一种可能的实现方式中,解密模块133,还用于:将加密密钥和N个加密频域人脸图像作为输入数据,输入目标人脸解密网络中,由目标人脸解密网络对输入数据进行卷积解密处理,得到N个加密频域人脸图像各自的频域人脸图像。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the decryption module 133 is also used to: input the encryption key and N encrypted frequency domain face images as input data into the target face decryption network. In , the target face decryption network performs convolution decryption processing on the input data to obtain the frequency domain face images of each of the N encrypted frequency domain face images.
在一些实施例中,在本公开实施例一种可能的实现方式中,如图15所示,人脸图像的解密装置130还包括:训练模块135,用于:获取样本加密人脸图像集和样本加密密钥集,样本人脸图像集中包括多个样本加密人脸图像,样本加密密钥集中包括多个样本加密密钥;对样本加密人脸图像进行频域处理,获取N个不同频率上的样本加密频域人脸图像;将样本加密密钥和N个样本加密频域人脸图像,输入人脸解密网络中进行卷积解密处理,得到N个样本加密频域人脸图像各自的样本频域人脸图像;对N个样本频域人脸图像进行频域逆处理,得到样本人脸图像;基于样本加密人脸图像和样本人脸图像、样本加密频域人脸图像和对应的样本频域人脸图像,确定人脸解密网络的损失函数;基于损失函数调整初始人脸解密网络,并基于下一个样本加密人脸图像和样本加密密钥继续对调整后的人脸解密网络进行训练,直至训练结束得到目标人脸解密网络。In some embodiments, in a possible implementation of the embodiment of the present disclosure, as shown in Figure 15, the face image decryption device 130 also includes: a training module 135 for: obtaining a sample encrypted face image set and Sample encryption key set. The sample face image set includes multiple sample encrypted face images. The sample encryption key set includes multiple sample encryption keys. Frequency domain processing is performed on the sample encrypted face image to obtain N different frequencies. The sample encrypted frequency domain face image; the sample encryption key and N sample encrypted frequency domain face images are input into the face decryption network for convolution decryption processing, and each sample of the N sample encrypted frequency domain face image is obtained. Frequency domain face images; perform frequency domain inverse processing on N sample frequency domain face images to obtain sample face images; encrypt face images and sample face images based on samples, sample encrypted frequency domain face images and corresponding samples Frequency domain face image, determine the loss function of the face decryption network; adjust the initial face decryption network based on the loss function, and continue to train the adjusted face decryption network based on the next sample encrypted face image and sample encryption key , until the end of training to obtain the target face decryption network.
在一些实施例中,在本公开实施例一种可能的实现方式中,训练模块135,还用于:根据样本人脸图像和加密样本人脸图像,获取重建损失函数和加密损失函数;根据样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数;对加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数;对和加密样本人脸图像进行对抗识别,获取样本人脸图像的第一真假识别值和加密样本人脸图像的第二真假识别值,并基于第一真假识别值和第二真假识别值,获取对抗损失函数;对重 建损失函数、加密损失函数、低频损失函数、高频损失函数、像素损失函数和对抗损失函数进行加权,得到人脸加密网络的损失函数。In some embodiments, in a possible implementation of the embodiment of the present disclosure, the training module 135 is also used to: obtain the reconstruction loss function and the encryption loss function according to the sample face image and the encrypted sample face image; Frequency domain face image and corresponding encrypted sample frequency domain face image, determine the low-frequency loss function and high-frequency loss function; perform pixel value normalization processing on the encrypted sample face image, and obtain pixels based on the normalized pixel value Loss function; perform adversarial recognition on the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the first true and false recognition value and the second true and false recognition value Two true and false recognition values, obtain the adversarial loss function; The construction loss function, encryption loss function, low-frequency loss function, high-frequency loss function, pixel loss function and adversarial loss function are weighted to obtain the loss function of the face encryption network.
根据本公开的实施例,本公开还提供了一种电子设备、一种可读存储介质、一种计算机程序产品和一种计算机程序。According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium, a computer program product, and a computer program.
根据本公开的实施例,本公开还提供了一种电子设备,包括存储器、处理器;其中,处理器通过读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于实现本公开任一实施例的人脸图像的加密/解密方法。According to an embodiment of the present disclosure, the present disclosure also provides an electronic device, including a memory and a processor; wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, to Encryption/decryption method for facial images used to implement any embodiment of the present disclosure.
图16示出了可以用来实施本公开的实施例的示例电子设备140的示意性框图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本公开的实现。16 illustrates a schematic block diagram of an example electronic device 140 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to refer to various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. Electronic devices may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions are examples only and are not intended to limit implementations of the disclosure described and/or claimed herein.
如图16所示,包括存储器141、处理器142及存储在存储器141上并可在处理器142上运行的计算机程序,处理器142执行程序时,实现前述的人脸图像的加密/解密方法。As shown in FIG. 16 , the system includes a memory 141 , a processor 142 , and a computer program stored in the memory 141 and executable on the processor 142 . When the processor 142 executes the program, the aforementioned facial image encryption/decryption method is implemented.
根据本公开的实施例,本公开还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现本公开任一实施例的人脸图像的加密/解密方法。According to an embodiment of the present disclosure, the present disclosure also provides a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the face image encryption/decryption method of any embodiment of the present disclosure is implemented. .
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。In the context of this disclosure, a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any suitable combination of the foregoing. More specific examples of machine-readable storage media would include one or more wire-based electrical connections, laptop disks, hard drives, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。 To provide interaction with a user, the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or a trackball) through which a user can provide input to the computer. Other kinds of devices may also be used to provide interaction with the user; for example, the feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and may be provided in any form, including Acoustic input, voice input or tactile input) to receive input from the user.
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)和互联网。The systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., A user's computer having a graphical user interface or web browser through which the user can interact with implementations of the systems and technologies described herein), or including such backend components, middleware components, or any combination of front-end components in a computing system. The components of the system may be interconnected by any form or medium of digital data communication (eg, a communications network). Examples of communication networks include: local area network (LAN), wide area network (WAN), and the Internet.
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。服务器可以是云服务器,也可以为分布式系统的服务器,或者是结合了区块链的服务器。Computer systems may include clients and servers. Clients and servers are generally remote from each other and typically interact over a communications network. The relationship of client and server is created by computer programs running on corresponding computers and having a client-server relationship with each other. The server can be a cloud server, a distributed system server, or a server combined with a blockchain.
根据本公开的实施例,本公开还提供了一种计算机程序产品,包括计算机程序,计算机程序在被处理器执行时实现如本公开任一实施例的人脸图像的加密/解密方法。According to an embodiment of the present disclosure, the present disclosure also provides a computer program product, including a computer program. When executed by a processor, the computer program implements the encryption/decryption method of a face image as in any embodiment of the present disclosure.
根据本公开的实施例,本公开还提供了一种计算机程序,该计算机程序包括计算机程序代码,当该计算机程序代码在计算机上运行时,使得计算机执行本公开任一实施例的人脸图像的加密/解密方法。According to an embodiment of the present disclosure, the present disclosure also provides a computer program. The computer program includes a computer program code. When the computer program code is run on a computer, it causes the computer to perform the facial image processing according to any embodiment of the present disclosure. Encryption/decryption methods.
需要说明的是,前述对方法、装置实施例的解释说明也适用于上述实施例的电子设备、计算机可读存储介质、计算机程序产品和计算机程序,此处不再赘述。It should be noted that the foregoing explanations of the method and device embodiments also apply to the electronic equipment, computer-readable storage media, computer program products and computer programs of the above-mentioned embodiments, and will not be described again here.
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本发明的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。In addition, the terms “first” and “second” are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of the present invention, "plurality" means two or more than two, unless otherwise explicitly and specifically limited.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, reference to the terms "one embodiment," "some embodiments," "an example," "specific examples," or "some examples" or the like means that specific features are described in connection with the embodiment or example. , structures, materials or features are included in at least one embodiment or example of the invention. In this specification, the schematic expressions of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, those skilled in the art may combine and combine different embodiments or examples and features of different embodiments or examples described in this specification unless they are inconsistent with each other.
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。 Although the embodiments of the present invention have been shown and described above, it can be understood that the above-mentioned embodiments are illustrative and should not be construed as limitations of the present invention. Those of ordinary skill in the art can make modifications to the above-mentioned embodiments within the scope of the present invention. The embodiments are subject to changes, modifications, substitutions and variations.
本公开所有实施例均可以单独被执行,也可以与其他实施例相结合被执行,均视为本公开要求的保护范围。 All embodiments of the present disclosure can be executed alone or in combination with other embodiments, which are considered to be within the scope of protection claimed by the present disclosure.

Claims (20)

  1. 一种人脸图像的加密方法,其特征在于,包括:A facial image encryption method, which is characterized by including:
    对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,所述N为正整数;Perform frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies, where N is a positive integer;
    获取加密种子;Get encrypted seeds;
    对所述加密种子和N个所述频域人脸图像进行卷积加密处理,得到N个所述频域人脸图像各自的加密频域人脸图像;Perform convolution encryption processing on the encryption seed and the N frequency domain face images to obtain encrypted frequency domain face images of each of the N frequency domain face images;
    对N个所述加密频域人脸图像进行频域逆处理,得到加密人脸图像。Perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain encrypted face images.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1, further comprising:
    对所述加密种子和N个所述频域人脸图像进行卷积加密处理,得到所述原始人脸图像的加密密钥。Perform convolution encryption processing on the encryption seed and the N frequency domain face images to obtain the encryption key of the original face image.
  3. 根据权利要求1或2所述的方法,其特征在于,所述对所述加密种子和N个所述频域人脸图像进行卷积加密处理的过程,包括:The method according to claim 1 or 2, characterized in that the process of performing convolution encryption processing on the encryption seed and N frequency domain face images includes:
    对所述加密种子和N个所述频域人脸图像,按照设定顺序进行组合得到一个待加密列向量;Combine the encryption seed and the N frequency domain face images in a set order to obtain a column vector to be encrypted;
    从首行开始按照正序逐行对所述待加密列向量中的向量元素,分别基于所述加密种子和N个所述频域人脸图像进行卷积加密处理,以得到所述向量元素的处理结果,其中,所述处理结果为所述加密密钥或者为其中一个所述加密频域人脸图像。Starting from the first row, perform convolution encryption processing on the vector elements in the column vector to be encrypted row by row in positive order based on the encryption seed and the N frequency domain face images to obtain the vector elements. Processing result, wherein the processing result is the encryption key or one of the encrypted frequency domain face images.
  4. 根据权利要求2或3所述的方法,其特征在于,所述加密密钥的获取过程,包括:The method according to claim 2 or 3, characterized in that the process of obtaining the encryption key comprises:
    获取N个所述频域人脸图像各自的第一卷积结果;Obtain the first convolution results of each of the N frequency domain face images;
    对所述加密种子和N个所述第一卷积结果相加,得到所述加密密钥。The encryption seed and N first convolution results are added to obtain the encryption key.
  5. 根据权利要求3或4所述的方法,其特征在于,N个所述频域人脸图像中频域人脸图像i的加密频域人脸图像i’的获取过程,包括:The method according to claim 3 or 4, characterized in that the acquisition process of the encrypted frequency domain face image i' of the frequency domain face image i among the N frequency domain face images includes:
    确定所述频域人脸图像i在所述待加密列向量中的目标行;Determine the target row of the frequency domain face image i in the column vector to be encrypted;
    获取所述目标行的前一行经过所述卷积加密处理的第一向量元素的所述处理结果的第二卷积结果,并将所述第二卷积结果与所述频域人脸图像i相乘得到相乘结果;Obtain the second convolution result of the processing result of the first vector element of the previous row of the target row that has undergone the convolution encryption process, and combine the second convolution result with the frequency domain face image i Multiply to get the multiplication result;
    获取位于所述目标行前面的每个所述第一向量元素的所述处理结果的第三卷积结果;Obtaining a third convolution result of the processing result of each first vector element located in front of the target row;
    获取位于所述目标行后面未经过所述卷积加密处理的第二向量元素的所述频域人脸图像的第一卷积结果;Obtain the first convolution result of the frequency domain face image of the second vector element located behind the target row that has not undergone the convolution encryption process;
    对所述相乘结果、所述第二向量元素的第一卷积结果和所述第一向量元素的第三卷积结果相加,得到所述加密频域人脸图像i’,其中,所述i和i’的取值为1至N。 The multiplication result, the first convolution result of the second vector element and the third convolution result of the first vector element are added to obtain the encrypted frequency domain face image i', where The values of i and i' are from 1 to N.
  6. 根据权利要求5所述的方法,其特征在于,所述对所述加密种子和N个所述频域人脸图像进行卷积加密处理,得到N个所述频域人脸图像各自的加密频域人脸图像,包括:The method according to claim 5, characterized in that: performing convolution encryption processing on the encryption seed and the N frequency domain face images to obtain the encrypted frequency of each of the N frequency domain face images. Domain face images, including:
    将所述加密种子和N个所述频域人脸图像作为输入数据,输入目标人脸加密网络中,由所述目标人脸加密网络对所述输入数据进行卷积加密处理,得到N个所述频域人脸图像各自的加密频域人脸图像。The encryption seed and N frequency domain face images are used as input data and input into the target face encryption network. The target face encryption network performs convolution encryption processing on the input data to obtain N all the face images. The respective encrypted frequency domain face images of the frequency domain face images are described.
  7. 根据权利要求6所述的方法,其特征在于,所述目标人脸加密网络的训练过程,包括:The method according to claim 6, characterized in that the training process of the target face encryption network includes:
    获取样本人脸图像集和样本加密种子集,所述样本人脸图像集中包括多个样本人脸图像,所述样本加密种子集中包括多个样本加密种子;Obtain a sample face image set and a sample encryption seed set, the sample face image set includes a plurality of sample face images, and the sample encryption seed set includes a plurality of sample encryption seeds;
    对所述样本人脸图像进行频域处理,获取N个不同频率上的样本频域人脸图像;Perform frequency domain processing on the sample face image to obtain N sample frequency domain face images at different frequencies;
    将所述样本加密种子和N个所述样本频域人脸图像,输入人脸加密网络中进行卷积加密处理,得到N个所述样本频域人脸图像各自的加密样本频域人脸图像;The sample encryption seed and the N sample frequency domain face images are input into the face encryption network for convolution encryption processing to obtain the encrypted sample frequency domain face images of each of the N sample frequency domain face images. ;
    对N个所述加密样本频域人脸图像进行频域逆处理,得到加密样本人脸图像;Perform frequency domain inverse processing on N encrypted sample frequency domain face images to obtain encrypted sample face images;
    基于所述样本人脸图像和所述加密样本人脸图像、所述样本频域人脸图像和对应的加密样本频域人脸图像,确定所述人脸加密网络的损失函数;Determine the loss function of the face encryption network based on the sample face image and the encrypted sample face image, the sample frequency domain face image and the corresponding encrypted sample frequency domain face image;
    基于所述损失函数调整初始人脸加密网络,并基于下一个样本人脸图像和样本加密种子继续对调整后的人脸加密网络进行训练,直至训练结束得到所述目标人脸加密网络。The initial face encryption network is adjusted based on the loss function, and the adjusted face encryption network is continued to be trained based on the next sample face image and sample encryption seed, until the target face encryption network is obtained after training is completed.
  8. 根据权利要求7所述的方法,其特征在于,所述基于所述样本人脸图像和所述加密样本人脸图像、所述样本频域人脸图像和对应的加密样本频域人脸图像,确定所述人脸加密网络的损失函数,包括:The method according to claim 7, characterized in that, based on the sample face image and the encrypted sample face image, the sample frequency domain face image and the corresponding encrypted sample frequency domain face image, Determine the loss function of the face encryption network, including:
    根据所述样本人脸图像和所述加密样本人脸图像,获取重建损失函数和加密损失函数;Obtain a reconstruction loss function and an encryption loss function according to the sample face image and the encrypted sample face image;
    根据所述样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数;Determine the low-frequency loss function and the high-frequency loss function according to the sample frequency domain face image and the corresponding encrypted sample frequency domain face image;
    对所述加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数;Perform pixel value normalization processing on the encrypted sample face image, and obtain a pixel loss function based on the normalized pixel value;
    对所述样本人脸图像和所述加密样本人脸图像进行对抗识别,获取所述样本人脸图像的第一真假识别值和所述加密样本人脸图像的第二真假识别值,并基于所述第一真假识别值和所述第二真假识别值,获取对抗损失函数;Perform adversarial recognition on the sample face image and the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and Based on the first true and false identification value and the second true and false identification value, obtain an adversarial loss function;
    对所述重建损失函数、所述加密损失函数、所述低频损失函数、所述高频损失函数、所述像素损失函数和所述对抗损失函数进行加权,得到所述人脸加密网络的损失函数。 The reconstruction loss function, the encryption loss function, the low-frequency loss function, the high-frequency loss function, the pixel loss function and the adversarial loss function are weighted to obtain the loss function of the face encryption network .
  9. 根据权利要求1至8中任一项所述的方法,其特征在于,所述对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,包括:The method according to any one of claims 1 to 8, characterized in that performing frequency domain processing on the original face image to obtain N frequency domain face images at different frequencies includes:
    基于小波变换对所述原始人脸图像进行频域分解,以获取N个所述频域人脸图像。The original face image is decomposed in frequency domain based on wavelet transform to obtain N frequency domain face images.
  10. 一种人脸图像的解密方法,其特征在于,包括:A method for decrypting face images, which is characterized by including:
    对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,所述N为正整数;Perform frequency domain processing on the encrypted face image to obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer;
    获取加密密钥;Get the encryption key;
    对所述加密密钥和N个所述加密频域人脸图像进行卷积解密处理,得到N个所述加密频域人脸图像各自的频域人脸图像;Perform convolution and decryption processing on the encryption key and the N encrypted frequency domain face images to obtain frequency domain face images of each of the N encrypted frequency domain face images;
    对N个所述频域人脸图像进行频域逆处理,得到原始人脸图像。Perform frequency domain inverse processing on the N frequency domain face images to obtain original face images.
  11. 根据权利要求10所述的方法,其特征在于,所述对所述加密密钥和N个所述加密频域人脸图像进行卷积解密处理的过程,包括:The method according to claim 10, characterized in that the process of performing convolution decryption processing on the encryption key and the N encrypted frequency domain face images includes:
    对所述加密密钥和N个所述加密频域人脸图像,按照设定顺序进行组合得到一个待解密列向量;The encryption key and the N encrypted frequency domain face images are combined according to the set order to obtain a column vector to be decrypted;
    从末行开始按照倒序逐行对所述待解密列向量中的向量元素,分别基于所述加密密钥和N个所述加密频域人脸图像进行卷积解密处理,以得到所述向量元素的解密结果,其中,所述解密结果为所述加密密钥的加密种子或者为其中一个所述频域人脸图像。Starting from the last row, perform convolution decryption processing on the vector elements in the column vector to be decrypted row by row in reverse order based on the encryption key and the N encrypted frequency domain face images to obtain the vector elements. The decryption result, wherein the decryption result is the encryption seed of the encryption key or one of the frequency domain face images.
  12. 根据权利要求10或11所述的方法,其特征在于,所述对所述加密密钥和N个所述加密频域人脸图像进行卷积解密处理,得到N个所述加密频域人脸图像各自的频域人脸图像,包括:The method according to claim 10 or 11, characterized in that: performing convolution and decryption processing on the encryption key and N encrypted frequency domain face images to obtain N encrypted frequency domain face images. The respective frequency domain face images of the images, including:
    将所述加密密钥和N个所述加密频域人脸图像作为输入数据,输入目标人脸解密网络中,由所述目标人脸解密网络对所述输入数据进行卷积解密处理,得到N个所述加密频域人脸图像各自的频域人脸图像。The encryption key and the N encrypted frequency domain face images are used as input data and input into the target face decryption network. The target face decryption network performs convolution decryption processing on the input data to obtain N Frequency domain face images of each of the encrypted frequency domain face images.
  13. 根据权利要求12所述的方法,其特征在于,所述目标人脸解密网络的训练过程,包括:The method according to claim 12, characterized in that the training process of the target face decryption network includes:
    获取样本加密人脸图像集和样本加密密钥集,所述样本人脸图像集中包括多个样本加密人脸图像,所述样本加密密钥集中包括多个样本加密密钥;Acquire a sample encrypted face image set and a sample encryption key set, wherein the sample face image set includes a plurality of sample encrypted face images, and the sample encryption key set includes a plurality of sample encryption keys;
    对所述样本加密人脸图像进行频域处理,获取N个不同频率上的样本加密频域人脸图像;Perform frequency domain processing on the sample encrypted face image to obtain N sample encrypted frequency domain face images at different frequencies;
    将所述样本加密密钥和N个所述样本加密频域人脸图像,输入人脸解密网络中进行卷积解密处理,得到N个所述样本加密频域人脸图像各自的样本频域人脸图像;Input the sample encryption key and the N sample encrypted frequency domain face images into a face decryption network for convolution decryption processing to obtain sample frequency domain face images of each of the N sample encrypted frequency domain face images;
    对N个所述样本频域人脸图像进行频域逆处理,得到样本人脸图像; Perform frequency domain inverse processing on N sample frequency domain face images to obtain sample face images;
    基于所述样本加密人脸图像和所述样本人脸图像、所述样本加密频域人脸图像和对应的样本频域人脸图像,确定所述人脸解密网络的损失函数;Determine a loss function of the face decryption network based on the sample encrypted face image and the sample face image, the sample encrypted frequency domain face image and the corresponding sample frequency domain face image;
    基于所述损失函数调整所述初始人脸解密网络,并基于下一个样本加密人脸图像和样本加密密钥继续对调整后的人脸解密网络进行训练,直至训练结束得到所述目标人脸解密网络。Adjust the initial face decryption network based on the loss function, and continue to train the adjusted face decryption network based on the next sample encrypted face image and sample encryption key until the end of training to obtain the target face decryption network.
  14. 根据权利要求13所述的方法,其特征在于,所述基于所述样本加密人脸图像和所述样本人脸图像、所述样本加密频域人脸图像和对应的样本频域人脸图像,确定所述人脸解密网络的损失函数,包括:The method according to claim 13, characterized in that the encrypted face image based on the sample and the sample face image, the sample encrypted frequency domain face image and the corresponding sample frequency domain face image, Determine the loss function of the face decryption network, including:
    根据所述样本人脸图像和所述加密样本人脸图像,获取重建损失函数和加密损失函数;Obtain a reconstruction loss function and an encryption loss function according to the sample face image and the encrypted sample face image;
    根据所述样本频域人脸图像和对应的加密样本频域人脸图像,确定低频损失函数和高频损失函数;Determine the low-frequency loss function and the high-frequency loss function according to the sample frequency domain face image and the corresponding encrypted sample frequency domain face image;
    对所述加密样本人脸图像进行像素值归一化处理,并基于归一化像素值,获取像素损失函数;Perform pixel value normalization processing on the encrypted sample face image, and obtain a pixel loss function based on the normalized pixel value;
    对所述和所述加密样本人脸图像进行对抗识别,获取所述样本人脸图像的第一真假识别值和所述加密样本人脸图像的第二真假识别值,并基于所述第一真假识别值和所述第二真假识别值,获取对抗损失函数;Perform adversarial recognition on the encrypted sample face image, obtain the first true and false recognition value of the sample face image and the second true and false recognition value of the encrypted sample face image, and based on the third A true and false identification value and the second true and false identification value to obtain an adversarial loss function;
    对所述重建损失函数、所述加密损失函数、所述低频损失函数、所述高频损失函数、所述像素损失函数和所述对抗损失函数进行加权,得到所述人脸加密网络的损失函数。The reconstruction loss function, the encryption loss function, the low-frequency loss function, the high-frequency loss function, the pixel loss function and the adversarial loss function are weighted to obtain the loss function of the face encryption network .
  15. 一种人脸图像的加密装置,其特征在于,包括:A face image encryption device, characterized by including:
    频域处理模块,用于对原始人脸图像进行频域处理,获取N个不同频率上的频域人脸图像,所述N为正整数;A frequency domain processing module, used to perform frequency domain processing on the original face image and obtain N frequency domain face images at different frequencies, where N is a positive integer;
    获取模块,用于获取加密种子;An acquisition module, used to obtain an encrypted seed;
    加密模块,用于对所述加密种子和N个所述频域人脸图像进行卷积加密处理,得到N个所述频域人脸图像各自的加密频域人脸图像;An encryption module, configured to perform convolution encryption processing on the encryption seed and the N frequency domain face images, to obtain encrypted frequency domain face images of each of the N frequency domain face images;
    频域逆处理模块,用于对N个所述加密频域人脸图像进行频域逆处理,得到加密人脸图像。A frequency domain inverse processing module is used to perform frequency domain inverse processing on the N encrypted frequency domain face images to obtain an encrypted face image.
  16. 一种人脸图像的解密装置,其特征在于,包括:A device for decrypting facial images, which is characterized by including:
    频域处理模块,用于对加密人脸图像进行频域处理,获取N个不同频率上的加密频域人脸图像,所述N为正整数;A frequency domain processing module, used to perform frequency domain processing on the encrypted face image, and obtain N encrypted frequency domain face images at different frequencies, where N is a positive integer;
    获取模块,用于获取加密密钥; Obtain module, used to obtain encryption keys;
    解密模块,用于对所述加密密钥和N个所述加密频域人脸图像进行卷积解密处理,得到N个所述加密频域人脸图像各自的频域人脸图像;A decryption module, configured to perform convolution and decryption processing on the encryption key and the N encrypted frequency domain face images, to obtain frequency domain face images of each of the N encrypted frequency domain face images;
    频域逆处理模块,用于对N个所述频域人脸图像进行频域逆处理,得到原始人脸图像。A frequency domain inverse processing module is used to perform frequency domain inverse processing on the N frequency domain face images to obtain original face images.
  17. 一种电子设备,其特征在于,包括存储器、处理器;An electronic device, characterized by including a memory and a processor;
    其中,所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于实现如权利要求1至9或权利要求10至14中任一项所述的方法。The processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to implement the method according to any one of claims 1 to 9 or claims 10 to 14.
  18. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1至9或权利要求10至14中任一项所述的方法。A computer-readable storage medium with a computer program stored thereon, characterized in that when the program is executed by a processor, the method as described in any one of claims 1 to 9 or 10 to 14 is implemented.
  19. 一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现根据权利要求1至9或权利要求10至14中任一项所述的方法。A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 9 or 10 to 14.
  20. 一种计算机程序,其特征在于,所述计算机程序包括计算机程序代码,当所述计算机程序代码在计算机上运行时,以使得计算机执行如权利要求1至9或权利要求10至14中任一项所述的方法。 A computer program, characterized in that the computer program includes computer program code, and when the computer program code is run on a computer, the computer executes any one of claims 1 to 9 or 10 to 14 the method described.
PCT/CN2023/097284 2022-09-22 2023-05-30 Face image encryption/decryption method and apparatus, electronic device, and storage medium WO2024060666A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211156257.7A CN115601214A (en) 2022-09-22 2022-09-22 Face image encryption/decryption method and device, electronic equipment and storage medium
CN202211156257.7 2022-09-22

Publications (1)

Publication Number Publication Date
WO2024060666A1 true WO2024060666A1 (en) 2024-03-28

Family

ID=84844513

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/097284 WO2024060666A1 (en) 2022-09-22 2023-05-30 Face image encryption/decryption method and apparatus, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN115601214A (en)
WO (1) WO2024060666A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115601214A (en) * 2022-09-22 2023-01-13 北京京东尚科信息技术有限公司(Cn) Face image encryption/decryption method and device, electronic equipment and storage medium
CN117650945B (en) * 2024-01-29 2024-04-05 南通云链通信息科技有限公司 Self-media data security operation management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107045627A (en) * 2017-03-22 2017-08-15 海南大学 A kind of face encryption recognition methods based on ciphertext domain
CN108776790A (en) * 2018-06-06 2018-11-09 海南大学 Face encryption recognition methods based on neural network under cloud environment
CN113807258A (en) * 2021-09-17 2021-12-17 南京工业大学 Encrypted face recognition method based on neural network and DCT (discrete cosine transformation)
CN115601214A (en) * 2022-09-22 2023-01-13 北京京东尚科信息技术有限公司(Cn) Face image encryption/decryption method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107045627A (en) * 2017-03-22 2017-08-15 海南大学 A kind of face encryption recognition methods based on ciphertext domain
CN108776790A (en) * 2018-06-06 2018-11-09 海南大学 Face encryption recognition methods based on neural network under cloud environment
CN113807258A (en) * 2021-09-17 2021-12-17 南京工业大学 Encrypted face recognition method based on neural network and DCT (discrete cosine transformation)
CN115601214A (en) * 2022-09-22 2023-01-13 北京京东尚科信息技术有限公司(Cn) Face image encryption/decryption method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
" Master’s Theses ", 15 July 2015, HARBIN UNIVERSITY OF SCIENCE AND TECHNOLOGY, China, article FENG, XUEJIAO: "Image Encryption Algorithm Based on Wavelet Transform Research", pages: 1 - 60, XP009553367 *
JIA-SHENG LIU, HUANG XIAN-WU, ZHU CAN-YAN, ZHONG XING-RONG: "Image Encryption Algorithm Based on Chaos and Wavelet Transform", MICROELECTRONICS & COMPUTER, vol. 24, no. 12, 5 December 2007 (2007-12-05), pages 6 - 12, XP093149972, DOI: 10.19304/j.cnki.issn1000-7180.2007.12.002 *

Also Published As

Publication number Publication date
CN115601214A (en) 2023-01-13

Similar Documents

Publication Publication Date Title
Wang et al. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT
Singh et al. A new robust watermarking system in integer DCT domain
WO2024060666A1 (en) Face image encryption/decryption method and apparatus, electronic device, and storage medium
Chai et al. An image encryption scheme based on multi-objective optimization and block compressed sensing
Ziad et al. Cryptoimg: Privacy preserving processing over encrypted images
Rustad et al. Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
Tarif et al. A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
Kannammal et al. Two level security for medical images using watermarking/encryption algorithms
Liu et al. Color image watermark decoder by modeling quaternion polar harmonic transform with BKF distribution
Ponuma et al. Visually meaningful image encryption using data hiding and chaotic compressive sensing
Zhang et al. Harnessing the hybrid cloud for secure big image data service
Yue et al. No-reference quality evaluator of transparently encrypted images
Tang et al. Robust multiple color images encryption using discrete Fourier transforms and chaotic map
Zhang et al. An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation
Karawia Image encryption based on Fisher‐Yates shuffling and three dimensional chaotic economic map
CN110750520A (en) Feature data processing method, device and equipment and readable storage medium
Hu et al. Secure nonlocal denoising in outsourced images
Singh et al. A robust image hashing based on discrete wavelet transform
Krishnamoorthi et al. A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices
Huang et al. High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
Devi et al. A novel robust blind medical image watermarking using rank-based DWT
Behnia et al. Design and implementation of coupled chaotic maps in watermarking
Siddiqui et al. Chaos-based video steganography method in discrete cosine transform domain
Tanwar et al. Privacy preserving image scaling using 2D bicubic interpolation over the cloud