Abstract
Data security and privacy have become a problem which people pay more attention to. In the process of feature extraction and detection of lens defects, the security of data transmission becomes more and more important. This paper according to the characteristics of the lens defect extraction method is studied and discussed through a single scan of the two boundary value of graphics and images, without the need to fill the region, does not need the help of chain codes statistical region number and boundary information. According to the established balanced binary search tree, the area and perimeter of each defect were calculated. This method works fast, and it needs only small amount of calculation; it can suppress noise better and accurate. This paper combines the detection of networking and information exchange, in order to ensure the normal lens defects in feature extraction efficiency. And comparing several encryption algorithms in the data transmission process, selecting the best storage and encryption technology to ensure data security and improve the security of the system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.