Data security and privacy have become a problem which people pay more attention to. In the process of feature extraction and detection of lens defects, the security of data transmission… Click to show full abstract
Data security and privacy have become a problem which people pay more attention to. In the process of feature extraction and detection of lens defects, the security of data transmission becomes more and more important. This paper according to the characteristics of the lens defect extraction method is studied and discussed through a single scan of the two boundary value of graphics and images, without the need to fill the region, does not need the help of chain codes statistical region number and boundary information. According to the established balanced binary search tree, the area and perimeter of each defect were calculated. This method works fast, and it needs only small amount of calculation; it can suppress noise better and accurate. This paper combines the detection of networking and information exchange, in order to ensure the normal lens defects in feature extraction efficiency. And comparing several encryption algorithms in the data transmission process, selecting the best storage and encryption technology to ensure data security and improve the security of the system.
               
Click one of the above tabs to view related content.