CN106161947A - Photo encryption method and system for camera terminal - Google Patents

Photo encryption method and system for camera terminal Download PDF

Info

Publication number
CN106161947A
CN106161947A CN201610622526.2A CN201610622526A CN106161947A CN 106161947 A CN106161947 A CN 106161947A CN 201610622526 A CN201610622526 A CN 201610622526A CN 106161947 A CN106161947 A CN 106161947A
Authority
CN
China
Prior art keywords
user
camera terminal
encryption
shooting
photo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610622526.2A
Other languages
Chinese (zh)
Inventor
黄克轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610622526.2A priority Critical patent/CN106161947A/en
Publication of CN106161947A publication Critical patent/CN106161947A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/62Control of parameters via user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/667Camera operation mode switching, e.g. between still and video, sport and normal or high- and low-resolution modes

Abstract

The embodiment of the present application provides a kind of photo encryption method for camera terminal, including: in response to user, the encryption of camera terminal is shot operation, gather the characteristic information of user, generate encryption key, enter shooting preview pattern;In response to user's shooting operation under described shooting preview pattern, shoot photo, and utilize encryption key that described photo is encrypted.The embodiment of the present application also provides for a kind of photo encryption system for camera terminal, shown method and system generate encryption key by gathering user's characteristic information, captured photo is encrypted simultaneously, can effectively reduce user operation, improve encryption efficiency, reduce individual subscriber privacy to divulge a secret risk simultaneously effectively, increase the function of photo terminal.

Description

Photo encryption method and system for camera terminal
Technical field
The application relates to field of information security technology, particularly relates to a kind of photo encryption method for camera terminal and is System.
Background technology
Along with the development of electronic technology field, the resolution ratio of camera head on intelligent terminal is more and more higher, outside people The most increasingly tend to when going out use intelligent terminal to carry out storage of taking pictures, such as shoot photo with mobile phone.But when mobile phone is lost Or when damaging, how protecting photo to be not leaked becomes the topic more paid close attention at present.
The photo of some shooting relates to privacy, and the photo stored would generally be encrypted to protect individual by user Privacy.Traditional cipher mode to photo is all encrypted by the specific password of input through keyboard, such as numerical ciphers, Gesture symbol or password code, these cipher modes are easily peeped by people or steal, and safety coefficient is relatively low;Only input close Code correctly just can check photo, and operating process is complex;Once forget Password, just cannot check the photo of encryption, office again Sex-limited bigger.
During realizing the application, inventor finds that in correlation technique, at least there are the following problems: existing encryption side Method be all first shooting photo after again feature based information be encrypted, it is impossible to shooting photo while feature based information to institute The photo of shooting is encrypted, and process is relatively complicated, the longest, affects Consumer's Experience.
Summary of the invention
The embodiment of the present application provides a kind of photo encryption method for camera terminal and system, in order to solve prior art Middle password is the most easily forgotten or encrypts the problem that photo process is loaded down with trivial details, the longest.
First aspect, the embodiment of the present application provides a kind of photo encryption method for camera terminal, and the method includes:
In response to user, the encryption of camera terminal is shot operation, gather the characteristic information of user, generate encryption key, enter Enter shooting preview pattern;
In response to user's shooting operation under described shooting preview pattern, shoot photo, and utilize described encryption key Described photo is encrypted.
Second aspect, the embodiment of the present application additionally provides a kind of photo encryption system for camera terminal, this system bag Include:
Shooting preparation module, for the encryption of camera terminal being shot operation in response to user, gathers the feature letter of user Breath, generates encryption key, enters shooting preview pattern;
Shooting encrypting module, in response to user under described shooting preview pattern shooting operation, shoot photo, and Utilize described encryption key that described photo is encrypted.
The third aspect, the embodiment of the present application additionally provides a kind of nonvolatile computer storage media, and storage has computer Executable instruction, described computer executable instructions is encrypted for the photo of camera terminal for performing any of the above-described item of the application Method.
Fourth aspect, the embodiment of the present application additionally provides a kind of camera terminal, including: at least one processor, Yi Jicun Reservoir, characteristic information acquisition module;Wherein, described memorizer storage has the operation that can be performed by least one processor described to refer to Order, described instruction is performed by least one processor described so that at least one processor described to be able to carry out the application above-mentioned Any one is for the photo encryption method of camera terminal.
The photo encryption method for camera terminal of the embodiment of the present application offer and system, by shooting the same of photo Time be encrypted operation, greatly simplify cryptographic operation process.The characteristic information gathering user is selected to generate encryption key, simultaneously Captured photo is encrypted, user can be effectively improved and shoot the safety of photo, reduce divulging a secret of individual subscriber privacy Risk, improves the encryption efficiency to captured photo simultaneously;Solve password in prior art the most easily forget or need to use Family first shoots the complex operation problem that photo re-encrypts, and has reached simplification user operation, time-saving effect, has improve simultaneously The convenience of operation.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, required one, the accompanying drawing work used is introduced simply, it should be apparent that, the accompanying drawing in describing below is this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the flow chart of a kind of photo encryption method for camera terminal that the embodiment of the present application provides;
Fig. 2 is a kind of flow chart optionally with the photo encryption method in camera terminal in the embodiment of the present application;
Fig. 3 is a kind of flow chart optionally with the photo encryption method in camera terminal in the embodiment of the present application;
Fig. 4 a is a kind of flow chart optionally with the photo encryption method in camera terminal of method shown in Fig. 3;
Fig. 4 b is the another kind flow chart optionally with the photo encryption method in camera terminal of method shown in Fig. 3;
Fig. 5 a is a kind of flow chart optionally with the photo encryption method in camera terminal of method shown in Fig. 3;
Fig. 5 b is the another kind flow chart optionally with the photo encryption method in camera terminal of method shown in Fig. 3;
Fig. 6 is the structural representation of a kind of photo encryption system for camera terminal that the embodiment of the present application provides;
Fig. 7 is the hardware architecture diagram of the camera terminal for photo encryption that the embodiment of the present application provides.
Detailed description of the invention
For making the purpose of the application, technical scheme and advantage clearer, attached hereinafter with reference in the embodiment of the present application Figure, clearly and completely describes the technical scheme of the application, it is clear that described embodiment is the application one by embodiment Section Example rather than whole embodiments.
See the flow process of a kind of photo encryption method for camera terminal that Fig. 1 is illustrated that the embodiment of the present application provides Figure, comprises the steps:
S11: in response to user, the encryption of camera terminal is shot operation, gather the characteristic information of user, generate encryption close Key, enters shooting preview pattern;
S12: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
The method that illustrated embodiment provides, can gather the characteristic information of user, according to user under encryption exposal model Characteristic information generate and encrypt key accordingly, and operation camera terminal enters shooting preview pattern and carries out preview and take pictures, The photo taken by secret key pair of encrypting utilizing gained eventually is encrypted.Shown method can be effectively improved user and shoot photo Safety, reduce individual subscriber privacy risk of divulging a secret, improve the encryption efficiency to captured photo simultaneously, add shooting The encryption camera function of terminal;Solve password in prior art the most easily to forget or need first to shoot photo and be encrypted again Complex operation problem, reached simplification user operation, time-saving effect, the experience sense greatly improving user is subject to.
See the flow chart of a kind of alternative embodiment that Fig. 2 is illustrated that in the embodiment of the present application, for method shown in Fig. 1 Specific implementation process include:
S21: in response to user, the encryption of camera terminal is shot operation, gather the finger print information of user, generate encryption close Key, enters shooting preview pattern;
S22: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S22 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment In, encryption shooting operation includes user's operation to the fingerprint identification module of camera terminal, and the characteristic information of user includes user Finger print information.The method that illustrated embodiment provides, selects finger print information based on user to be encrypted captured photo. User makes camera terminal enter encryption exposal model by particular key (such as length presses fingerprint key), and camera terminal utilizes fingerprint to know Other module gathers the finger print information (such as thumb fingerprint) of user and generates encryption key, simultaneously enters shooting preview pattern and enters The photo operation that row preview is to be captured, the final photo captured by secret key pair of encrypting generated according to user fingerprints information adds Close.
The method that illustrated embodiment is provided, it is possible to effectively utilize the finger print information of user to select to enter exposal model, again Can be encrypted captured photo, user uses fingerprint number of times less, simple and quick;Camera terminal shines in shooting It is encrypted based on user fingerprints while sheet, improves the efficiency of encryption;Owing to Fingerprint Lock has uniqueness, user is without load Heart password is forgotten or password reveals the inconvenience and loss that may bring, the most effectively and safely.
See the schematic flow sheet of a kind of alternative embodiment that the embodiment of the present application shown in Fig. 3 provides, for shown in Fig. 1 The specific implementation process of method includes:
S31: in response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather The image information of user, generates encryption key, enters shooting preview pattern;
S32: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S32 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment Select gather user image information captured photo is encrypted, shown image information include user face information or Iris information.User makes camera terminal enter specific encryption shooting mould by assignment key (such as growing by power switch key) Formula, such as uses face feature and/or the screening-mode of iris information encryption photo.The photographic head of camera terminal includes preposition taking the photograph As head and post-positioned pick-up head, now need to open front-facing camera and utilize characteristic information acquisition module based on selected shooting The corresponding characteristic information of type collection, utilizes setting means (such as picture coding) to generate and encrypts key accordingly, enter shooting Preview mode previewing photos.
Further, the face information of user can be face's Global Information, it is also possible to be part facial information, such as eye The shape information of eyeball, the size information of lip, the size information of nose, the shape information of nose, face mask information, nose exist Positional information in face, lip positional information in face.
See a kind of alternative embodiment that Fig. 4 a is illustrated that in method shown in Fig. 3, for the concrete reality of method shown in Fig. 3 The process of executing includes:
S41: in response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather The image information of user, after generating encryption key, enters the shooting preview pattern of front-facing camera;
S42: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S42 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment The method provided can apply to shooting and the image of user position homonymy, certainly the taking pictures of such as user, user and other people Group photo, now camera terminal only need to be opened front-facing camera and enter shooting preview pattern preview image to be captured.Shooting is eventually End utilizes the image information of front-facing camera collection user and enters the image that shooting preview pattern preview is to be captured, Ke Yixuan Select and after gathering user images information in advance, carry out the photo operation that shooting preview is to be captured again.
See the another kind of alternative embodiment that Fig. 4 b is illustrated that in method shown in Fig. 3, concrete for method shown in Fig. 3 Implementation process includes:
S51: in response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, enter While the shooting preview pattern of front-facing camera, gather the image information of user, generate encryption key;
S52: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S52 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment The method provided, is similarly applied to the image of shooting and user position homonymy, and therefore camera terminal only need to be opened preposition Photographic head.Unlike method shown in Fig. 4 a, the front-facing camera in present implementation is same at preview image to be captured Time gather user image information generate encrypt key accordingly.When such as user autodynes, containing user in image to be captured Face information, therefore front-facing camera can preview user to be captured certainly take pictures while gather the face information of user And generate and encrypt key accordingly, reduce the photo encryption time used with this.
See a kind of alternative embodiment that Fig. 5 a is illustrated that in method shown in Fig. 3, for the step in method shown in Fig. 3 The specific implementation process of S31 includes:
S61: in response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather The image information of user, after generating encryption key, opens the post-positioned pick-up head of camera terminal, and the shooting entering post-positioned pick-up head is pre- Look at pattern;
S62: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S62 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment The method provided, can apply to the image of shooting and user position not homonymy, such as picture with scenes, now camera terminal Front-facing camera and post-positioned pick-up head need to be opened, utilize front-facing camera gather user images information and utilize post-positioned pick-up head Enter the image that shooting preview pattern preview is to be captured.In method shown in Fig. 5 a first with front-facing camera gather user profile with It is then turned on post-positioned pick-up head after generating corresponding encryption key and enters the image that shooting preview pattern preview is to be captured.
See the another kind of alternative embodiment that Fig. 5 b is illustrated that in method shown in Fig. 3, concrete for method shown in Fig. 3 Implementation process includes:
S71: in response to user, the encryption of camera terminal is shot operation, open the post-positioned pick-up head of camera terminal, enter While the shooting preview pattern of post-positioned pick-up head, open the front-facing camera of camera terminal, gather the image information of user, raw Become encryption key;
S72: in response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to compare Sheet is encrypted.
In illustrated embodiment, step S72 can be found in the description of step S12 of Fig. 1, does not repeats them here.Illustrated embodiment The method provided, can be applied equally to the image of shooting and user position not homonymy, and mobile device need to open preposition taking the photograph As head and post-positioned pick-up head.Unlike method shown in Fig. 5 a, the front-facing camera in present implementation gathers user images Operation is carried out with the preview operation of post-positioned pick-up head simultaneously.Such as, open post-positioned pick-up head preview scenery picture, open simultaneously Open the generation of front-facing camera preview user face information and encrypt key accordingly, it is possible to effectively reduce encryption photo opporunity.
In illustrated embodiment, encryption file can be generated after captured image is encrypted, at least include user characteristics Information, encryption key and the image encrypted.When user browses the image encrypted, camera terminal can respond user operation And open front-facing camera or fingerprint key and gather user's characteristic information and carry out Information Authentication, such as user fingerprints Information Authentication, User's face information and/or iris information checking.Owing to being affected by environmental factorss such as illumination, cause collected user The user's characteristic information gathered when characteristic information is not necessarily with encryption is completely the same, for avoiding camera terminal error in judgement, and can To generate deciphering key based on the information that collected and to carry out similarity-rough set with encryption key, when similarity more than or etc. When predetermined threshold (such as 80%), then this deciphering key is carried out correction process secret to generate the deciphering consistent with encryption key Key, utilizes the deciphering file of the deciphering secret key pair after error correction to be decrypted afterwards.Shown decryption method is not limited to the embodiment of the present application The method provided, it is also possible to be additive method known in the art.
The method that the embodiment of the present application is provided, by being encrypted operation while shooting photo, greatly simplify Cryptographic operation process.Select the characteristic information gathering user that captured photo is encrypted, user's shooting can be effectively improved The safety of photo, reduce the risk of divulging a secret of individual subscriber privacy, improve the encryption efficiency to captured photo simultaneously;According to institute Concrete scene to be shot selects corresponding cipher mode to carry out shooting encryption, adds the encryption camera function of camera terminal; Solve password in prior art the most easily forget or need user first to shoot the complex operation problem that photo re-encrypts, reach Simplification user operation, time-saving effect, improve user and experience experience.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
See the structural representation that Fig. 6 is illustrated that a kind of photo encryption system for camera terminal of the embodiment of the present application Figure, including:
Shooting preparation module, for the encryption of camera terminal being shot operation in response to user, gathers the feature letter of user Breath, generates encryption key, enters shooting preview pattern;
Shooting encrypting module, in response to user's shooting operation under shooting preview pattern, shooting photo, and utilize Photo is encrypted by encryption key.
In a kind of alternative embodiment, encryption shooting operation includes user's operation to the fingerprint identification module of camera terminal, The characteristic information of user includes the finger print information of user.
In a kind of alternative embodiment, shooting preparation module is used for:
In response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather user Image information, generate encryption key, enter shooting preview pattern.
In a kind of alternative embodiment, shooting preparation module is used for:
In response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather user Image information, generate after encryption key, enter the shooting preview pattern of front-facing camera.
In a kind of alternative embodiment, shooting preparation module is used for:
In response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, enter preposition While the shooting preview pattern of photographic head, gather the image information of user, generate encryption key.
In a kind of alternative embodiment, shooting preparation module is used for:
In response to user, the encryption of camera terminal is shot operation, open the front-facing camera of camera terminal, gather user Image information, generate after encryption key, open the post-positioned pick-up head of camera terminal, enter the shooting preview mould of post-positioned pick-up head Formula.
In a kind of alternative embodiment, shooting preparation module is used for:
In response to user, the encryption of camera terminal is shot operation, open the post-positioned pick-up head of camera terminal, enter rearmounted While the shooting preview pattern of photographic head, opening the front-facing camera of camera terminal, gather the image information of user, generation adds Decryption key.
In a kind of alternative embodiment, the image information of user includes face information and/or the iris information of user.
The system that the embodiment of the present application is provided, by being encrypted operation while shooting photo, greatly simplify Cryptographic operation process.Select the characteristic information gathering user that captured photo is encrypted, user's shooting can be effectively improved The safety of photo, reduce the risk of divulging a secret of individual subscriber privacy, improve the encryption efficiency to captured photo simultaneously;According to institute Concrete scene to be shot selects corresponding cipher mode to carry out shooting encryption, adds the encryption camera function of camera terminal; Decrease password in prior art the most easily forget or need user first to shoot the troublesome operation that photo re-encrypts, reach letter Changing user operation, time-saving effect, the experience sense that improve user is subject to.
The embodiment of the present application provides the nonvolatile computer storage media that a kind of photo for camera terminal is encrypted, Described computer-readable storage medium storage has computer executable instructions, and this computer executable instructions can perform above-mentioned any means The photo encryption method for camera terminal in embodiment, configure with:
In response to user, the encryption of camera terminal is shot operation, gather the characteristic information of user, generate encryption key, enter Enter shooting preview pattern;
In response to user's shooting operation under shooting preview pattern, shoot photo, and utilize encryption key to described photograph Sheet is encrypted.
As a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software program, non-volatile Property computer executable program and module, as corresponding in the photo encryption method for camera terminal in the embodiment of the present application Programmed instruction/module (such as, the shooting preparation module shown in accompanying drawing 6 and shooting encrypting module).One or more Module stores is in described non-volatile computer readable storage medium storing program for executing, when being executed by a processor, performs above-mentioned any means The method of the encryption shooting photo in embodiment.
Non-volatile computer readable storage medium storing program for executing can include storing program area and storage data field, wherein, stores journey Sequence district can store the application program required for operating system, at least one function;Storage data field can store the feature letter of user Cease and encrypt accordingly the photo etc. after key, encryption.Additionally, non-volatile computer readable storage medium storing program for executing can include height Speed random access memory, it is also possible to include nonvolatile memory, for example, at least one disk memory, flush memory device, Or other non-volatile solid state memory parts.
Fig. 7 is the hardware architecture diagram of the camera terminal for photo encryption that the embodiment of the present application provides, such as Fig. 7 institute Showing, this camera terminal includes:
One or more processors 810 and memorizer 820, characteristic information acquisition module 830, with a process in Fig. 7 As a example by device 810.
Camera terminal shown in Fig. 7 also includes input equipment and output device, processor 810, memorizer 820, feature Information acquisition module 830, input equipment 840, output device 850 can be connected by bus or other modes, with logical in Fig. 7 As a example by crossing bus connection.
Memorizer 820 is above-mentioned non-volatile computer readable storage medium storing program for executing.Processor 810 is stored in by operation Non-volatile software program, instruction and module in reservoir 820, thus perform the application of various functions and the data of server Process, i.e. realize the photo encryption method for camera terminal of said method embodiment memorizer.
Characteristic information acquisition module 830 can carry out user's characteristic information collection behaviour according to selected encryption exposal model Make, including the finger print information of user, the face information of user and/or iris information.Input equipment 840 is and encryption exposal model The key signals input being associated and the input of photo to be encrypted.Output device 850 can include the display devices such as display screen with And the photo files encrypted.
One or more module stores is in described memorizer 820, when by one or more processor During 810 execution, perform the photo encryption method for camera terminal in above-mentioned any means embodiment.
The said goods can perform the method that the embodiment of the present application is provided, and possesses the corresponding functional module of execution method and has Benefit effect.The ins and outs of the most detailed description, can be found in the method that the embodiment of the present application is provided.
As a kind of embodiment, above-mentioned camera terminal includes:
At least one processor;And,
For storing the memorizer of the executable operational order of at least one processor;With
Characteristic information acquisition module, wherein,
Memorizer storage has the instruction that can be performed by least one processor, and shown instruction is by least one processor described Perform so that at least one processor described can:
In response to user, the encryption of camera terminal is shot operation, perform the encryption shooting instruction of storage in memorizer, control Characteristic information acquisition module processed gathers the characteristic information of described user, generates encryption key according to the characteristic information of described user, Enter shooting preview pattern;
In response to user's shooting operation under shooting preview pattern, perform shooting instruction shooting photo, and utilize encryption Described in double secret key, photo is encrypted.
A kind of optional camera terminal, characteristic information acquisition module is finger print information acquisition module.
A kind of optional camera terminal, characteristic information acquisition module is front-facing camera.
A kind of optional camera terminal, processor 810 configure with:
Performing encryption shooting instruction, open the front-facing camera of camera terminal, controlling feature information acquisition module collection is used The image information at family, after generating encryption key, enters the shooting preview pattern of front-facing camera.
A kind of optional camera terminal, processor 810 configure with:
Perform encryption shooting instruction, open the front-facing camera of camera terminal, enter the shooting preview mould of front-facing camera While formula, controlling feature information acquisition module gathers the image information of user, generates encryption key.
A kind of optional camera terminal, processor 810 configure with:
Performing encryption shooting instruction, open the front-facing camera of camera terminal, controlling feature information acquisition module collection is used The image information at family, after generating encryption key, opens the post-positioned pick-up head of camera terminal, enters the shooting preview of post-positioned pick-up head Pattern.
A kind of optional camera terminal, processor 810 configure with:
Perform encryption shooting instruction, open the post-positioned pick-up head of camera terminal, enter the shooting preview mould of post-positioned pick-up head While formula, opening the front-facing camera of camera terminal, controlling feature information acquisition module gathers the image information of user, generates Encryption key.
A kind of optional camera terminal, the image information of user includes face information and/or the iris information of user.
The said goods can perform the method that the embodiment of the present application is provided, and possesses the corresponding functional module of execution method and has Benefit effect.The ins and outs of the most detailed description, can be found in the method that the embodiment of the present application is provided.
The photo terminal electronic equipment of the embodiment of the present application exists in a variety of forms, includes but not limited to:
(1) mobile communication equipment: the feature of this kind equipment is to possess mobile communication function, and take pictures with offer, encrypt The photo of lock shooting is main target.This Terminal Type includes: smart mobile phone (such as iPhone), multimedia handset, functional hands Machine, and low-end mobile phone etc..
(2) super mobile personal computer equipment: this kind equipment belongs to the category of personal computer, has calculating and processes merit Can, the most also possess mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind equipment can take pictures and encrypt captured photo.This kind equipment includes: intelligence Energy camera, intelligent television, gate inhibition etc..
(4) server: providing the equipment of the service of calculating, the composition of server includes that processor, hard disk, internal memory, system are total Lines etc., server is similar with general computer architecture, but owing to needing to provide highly reliable service, is therefore processing energy The aspects such as power, stability, reliability, safety, extensibility, manageability require higher.
(5) other have the electronic installation of encryption function of taking pictures.
Device embodiment described above is only schematically, and the wherein said unit illustrated as separating component can To be or to may not be physically separate, the parts shown as unit can be or may not be physics list Unit, i.e. may be located at a place, or can also be distributed on multiple NE.Can be selected it according to the actual needs In some or all of module realize the purpose of the present embodiment scheme.
Through the above description of the embodiments, those skilled in the art it can be understood that to each embodiment can The mode adding general hardware platform by software realizes, naturally it is also possible to pass through hardware.Based on such understanding, above-mentioned technology The part that correlation technique is contributed by scheme the most in other words can embody with the form of software product, this computer Software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions in order to Make a computer equipment (can be personal computer, server, or the network equipment etc.) perform each embodiment or The method described in some part of embodiment.
Last it is noted that above example is only in order to illustrate the technical scheme of the application, it is not intended to limit;Although With reference to previous embodiment, the application is described in detail, it will be understood by those within the art that: it still may be used So that the technical scheme described in foregoing embodiments to be modified, or wherein portion of techniques feature is carried out equivalent; And these amendment or replace, do not make appropriate technical solution essence depart from the application each embodiment technical scheme spirit and Scope.

Claims (10)

1. the photo encryption method for camera terminal, it is characterised in that
In response to user, the encryption of camera terminal is shot operation, gather the characteristic information of described user, generate encryption key, enter Enter shooting preview pattern;
In response to described user shooting operation under described shooting preview pattern, shoot photo, and utilize described encryption key Described photo is encrypted.
Method the most according to claim 1, it is characterised in that
Described encryption shooting operation includes user's operation to the fingerprint identification module of described camera terminal,
The characteristic information of described user includes the finger print information of user.
Method the most according to claim 1, it is characterised in that the described shooting encryption of camera terminal in response to user is grasped Make, gather the characteristic information of described user, generate encryption key, enter shooting preview pattern and include:
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, generates encryption key, enters shooting preview pattern.
Method the most according to claim 3, it is characterised in that the described encryption bat in response to user to described camera terminal Take the photograph operation, open the front-facing camera of described camera terminal, gather the image information of described user, generate encryption key, enter Shooting preview pattern includes:
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, after generating encryption key, enters the shooting preview pattern of described front-facing camera;Or
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, enter While the shooting preview pattern of described front-facing camera, gather the image information of described user, generate encryption key;Or
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, generates after encryption key, opens the post-positioned pick-up head of described camera terminal, enters described rearmounted take the photograph Shooting preview pattern as head;Or
In response to user, the encryption of described camera terminal is shot operation, open the post-positioned pick-up head of described camera terminal, enter While the shooting preview pattern of described post-positioned pick-up head, open the front-facing camera of described camera terminal, gather described user Image information, generate encryption key.
5. according to the method described in claim 3 or 4, it is characterised in that
The image information of described user includes face information and/or the iris information of user.
6. the photo encryption system for camera terminal, it is characterised in that
Shooting preparation module, for the encryption of camera terminal being shot operation in response to user, gathers the feature letter of described user Breath, generates encryption key, enters shooting preview pattern;
Shooting encrypting module, in response to described user under described shooting preview pattern shooting operation, shoot photo, and Utilize described encryption key that described photo is encrypted.
System the most according to claim 6, it is characterised in that
Described encryption shooting operation includes user's operation to the fingerprint identification module of described camera terminal,
The characteristic information of described user includes the finger print information of user.
System the most according to claim 6, it is characterised in that described shooting preparation module is used for:
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, generates encryption key, enters shooting preview pattern.
System the most according to claim 8, it is characterised in that described shooting preparation module is used for:
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, after generating encryption key, enters the shooting preview pattern of described front-facing camera;Or
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, enter While the shooting preview pattern of described front-facing camera, gather the image information of described user, generate encryption key;Or
In response to user, the encryption of described camera terminal is shot operation, open the front-facing camera of described camera terminal, gather The image information of described user, generates after encryption key, opens the post-positioned pick-up head of described camera terminal, enters described rearmounted take the photograph Shooting preview pattern as head;Or
In response to user, the encryption of described camera terminal is shot operation, open the post-positioned pick-up head of described camera terminal, enter While the shooting preview pattern of described post-positioned pick-up head, open the front-facing camera of described camera terminal, gather described user Image information, generate encryption key.
System the most according to claim 8 or claim 9, it is characterised in that the image information of described user includes the face of user Information and/or iris information.
CN201610622526.2A 2016-08-01 2016-08-01 Photo encryption method and system for camera terminal Pending CN106161947A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610622526.2A CN106161947A (en) 2016-08-01 2016-08-01 Photo encryption method and system for camera terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610622526.2A CN106161947A (en) 2016-08-01 2016-08-01 Photo encryption method and system for camera terminal

Publications (1)

Publication Number Publication Date
CN106161947A true CN106161947A (en) 2016-11-23

Family

ID=57328359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610622526.2A Pending CN106161947A (en) 2016-08-01 2016-08-01 Photo encryption method and system for camera terminal

Country Status (1)

Country Link
CN (1) CN106161947A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463850A (en) * 2017-07-27 2017-12-12 上海爱优威软件开发有限公司 Concealed photographic method
CN107577956A (en) * 2017-08-29 2018-01-12 维沃移动通信有限公司 A kind of photo time slot scrambling and electronic equipment
WO2018113537A1 (en) * 2016-12-22 2018-06-28 惠州Tcl移动通信有限公司 Method and system for encrypting photograph on the basis fingerprint identification
CN109348183A (en) * 2018-11-20 2019-02-15 珠海格力电器股份有限公司 A kind of image data protection identifying system and its method and camera, terminal
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100046753A1 (en) * 2008-08-25 2010-02-25 Pfu Limited Information output system, method, and program for tampering detection
CN104092926A (en) * 2014-06-19 2014-10-08 中科创达软件股份有限公司 Digital camera and image secrecy maintaining method of camera
CN104253933A (en) * 2013-06-26 2014-12-31 华为技术有限公司 Shooting method and device
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment
CN105095787A (en) * 2015-05-19 2015-11-25 努比亚技术有限公司 Information processing method and device
CN105306822A (en) * 2015-10-23 2016-02-03 上海卓易科技股份有限公司 Encrypted photographing method and device based on fingerprint identification technology
CN105335665A (en) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 Encryption method, encryption system, decryption method and decryption system of picture

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100046753A1 (en) * 2008-08-25 2010-02-25 Pfu Limited Information output system, method, and program for tampering detection
CN104253933A (en) * 2013-06-26 2014-12-31 华为技术有限公司 Shooting method and device
CN104092926A (en) * 2014-06-19 2014-10-08 中科创达软件股份有限公司 Digital camera and image secrecy maintaining method of camera
CN105095787A (en) * 2015-05-19 2015-11-25 努比亚技术有限公司 Information processing method and device
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment
CN105306822A (en) * 2015-10-23 2016-02-03 上海卓易科技股份有限公司 Encrypted photographing method and device based on fingerprint identification technology
CN105335665A (en) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 Encryption method, encryption system, decryption method and decryption system of picture

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113537A1 (en) * 2016-12-22 2018-06-28 惠州Tcl移动通信有限公司 Method and system for encrypting photograph on the basis fingerprint identification
US11405193B2 (en) 2016-12-22 2022-08-02 Huizhou Tcl Mobile Communication Co., Ltd. Encrypted photographing method and system based on fingerprint recognition
CN107463850A (en) * 2017-07-27 2017-12-12 上海爱优威软件开发有限公司 Concealed photographic method
CN107577956A (en) * 2017-08-29 2018-01-12 维沃移动通信有限公司 A kind of photo time slot scrambling and electronic equipment
CN109348183A (en) * 2018-11-20 2019-02-15 珠海格力电器股份有限公司 A kind of image data protection identifying system and its method and camera, terminal
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106161947A (en) Photo encryption method and system for camera terminal
Li et al. TIPRDC: task-independent privacy-respecting data crowdsourcing framework for deep learning with anonymized intermediate representations
CN104040934B (en) Image privacy is protected when being manipulated by cloud service
CN106557678B (en) A kind of intelligent terminal mode switching method and its device
EP3110161B1 (en) Method, apparatus and computer program product for controlling access to concurrently captured images
CN105260669B (en) The transmission method and Transmission system of photo
CN102509053A (en) Authentication and authorization method, processor, equipment and mobile terminal
WO2016187940A1 (en) Information protecting method, mobile terminal and computer storage medium
CA3156555C (en) Cryptographic key management
Luo et al. Anonymous subject identification and privacy information management in video surveillance
CN105279443A (en) Picture encrypting and decrypting methods and devices
Keykhaie et al. Lightweight and secure face-based active authentication for mobile users
Natgunanathan et al. An overview of protection of privacy in multibiometrics
CN107423628A (en) File encrypting method, device and terminal
CN111581622A (en) Information processing method and device and electronic equipment
CN105025203B (en) With reference to the image encipher-decipher method and its image capturing device of physiological characteristic
US11501580B1 (en) Methods and systems for implementing secure biometric recognition
US20150020165A1 (en) System of executing application and method thereof
KR102539533B1 (en) Method and apparatus for preventing other people from photographing identification
CN208077174U (en) Identification device for authentication
Abbas et al. Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions
CN108038386A (en) Image encryption method, device, computer installation and computer-readable recording medium
Farinella et al. A context-driven privacy enforcement system for autonomous media capture devices
CN108921085A (en) Auth method, device and equipment
US11610013B2 (en) Secure content augmentation systems and methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161123

WD01 Invention patent application deemed withdrawn after publication