Palantir technologies inc. (20240202865). IMAGE OBFUSCATION simplified abstract
Contents
IMAGE OBFUSCATION
Organization Name
Inventor(s)
Arnav Jagasia of NEW YORK NY (US)
Anisha Tandon of NEW YORK NY (US)
David Herrero-quevedo of LONDON (GB)
Fee Christoph of ASTORIA NY (US)
Mihir Patil of New York NY (US)
IMAGE OBFUSCATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240202865 titled 'IMAGE OBFUSCATION
The abstract describes a computer-implemented method for obfuscating image portions and controlling access to them using a key.
- Providing an image with pixels
- Identifying and obfuscating at least one portion of the image
- Modifying pixels of the image portion using a key
- Providing the key in an access profile
- Allocating permissions to users to view the obfuscated image portion
Potential Applications: - Secure image sharing platforms - Privacy protection in image storage and transmission - Digital rights management for sensitive images
Problems Solved: - Preventing unauthorized access to sensitive image content - Safeguarding privacy in image sharing - Controlling viewing permissions for specific image portions
Benefits: - Enhanced security for sensitive images - Improved privacy protection for users - Efficient digital rights management for image content
Commercial Applications: Title: Secure Image Sharing Platform with Access Control This technology can be used in secure messaging apps, cloud storage services, and online image sharing platforms to ensure privacy and control access to sensitive image content.
Prior Art: Researchers can explore prior art related to image obfuscation techniques, access control mechanisms for digital content, and digital rights management systems.
Frequently Updated Research: Stay updated on advancements in image obfuscation methods, access control technologies, and digital rights management solutions to enhance the effectiveness of this innovation.
Questions about Image Obfuscation and Access Control: 1. How does this technology ensure secure access to obfuscated image portions? 2. What are the key benefits of using a key-based access control system for image obfuscation?
Original Abstract Submitted
a computer-implemented method, system and computer program is disclosed. the method may comprise providing an image comprising a plurality of pixels, identifying at least one portion of the image to be obfuscated, modifying pixels of the at least one image portion using a key for producing an updated image in which the at least one image portion is obfuscated, providing the key, or a link to the key, in an access profile for the identified at least one image portion and allocating permissions to one or more users for enabling them to view the at least one image portion, by use of the key, when viewing the updated image.