CN106326773B - A kind of method, apparatus and terminal of photo encryption handling - Google Patents
A kind of method, apparatus and terminal of photo encryption handling Download PDFInfo
- Publication number
- CN106326773B CN106326773B CN201610750780.0A CN201610750780A CN106326773B CN 106326773 B CN106326773 B CN 106326773B CN 201610750780 A CN201610750780 A CN 201610750780A CN 106326773 B CN106326773 B CN 106326773B
- Authority
- CN
- China
- Prior art keywords
- photo
- facial image
- image
- encrypted
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
Landscapes
- Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Image Processing (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention provides the method, apparatus and terminal of a kind of photo encryption handling, this method, which is used, carries out recognition of face to photo, to judge in the photo whether to include facial image, if including facial image, then obtain the number of the facial image in the photo, when the number of the facial image is predetermined number, which is encrypted;When the program includes facial image in photo and facial image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management.
Description
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of method, apparatus and terminal of photo encryption handling.
Background technique
With the fast development of terminal technology, the function of terminal is more and more abundant.In the various functions of terminal, function of taking pictures
It can be widely used, and increasingly be liked by user.User takes pictures whenever and wherever possible, so that would generally deposit in terminal
Store up a large amount of photo.
Currently, terminal is usually stored and is shown according to the separate sources of photo to the management of photo.For example, production of taking pictures
Raw photo is put into a file, is put into another file by the received photo of some application program, by again
One received photo of application program is put into another file.
However, this photo management method of the prior art, only roughly classifies to photo, not according to source
It is managed according to the relationship of photo and user.Some privacy photos that user is not intended to other people to see are unable to get protection, lead
Family of applying is faced with the risk of privacy leakage.
It can be seen that photo management method safety in the prior art is low, need further to be improved.
Summary of the invention
The embodiment of the present invention provides the method, apparatus and terminal of a kind of photo encryption handling, and photo management can be improved
Safety.
The embodiment of the present invention provides a kind of method of photo encryption handling, comprising:
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;
If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image is predetermined number, the photo is encrypted.
Correspondingly, point inventive embodiments also provide a kind of device of photo encryption handling, comprising:
Identification module, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
Module is obtained, for obtaining when the judging result of the identification module is includes facial image in the photo
The number of the facial image in the photo;
Encrypting module, for when the number of the facial image is predetermined number, the photo to be encrypted.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, the device including above-mentioned photo encryption handling.
Whether the embodiment of the present invention, which is used, carries out recognition of face to photo, to judge in the photo to include facial image;If
Including facial image, then the number of the facial image in the photo is obtained;It is right when the number of the facial image is predetermined number
The photo is encrypted.When the program includes facial image in photo and facial image is predetermined number, to photo
It is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management
Property.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described.It should be evident that drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the method for the photo encryption handling that the embodiment of the present invention one provides.
Fig. 2 is the flow diagram of the method for photo encryption handling provided by Embodiment 2 of the present invention.
Fig. 3 is the structural schematic diagram of the device for the first photo encryption handling that the embodiment of the present invention three provides.
Fig. 4 is the structural schematic diagram of the device for second of photo encryption handling that the embodiment of the present invention three provides.
Fig. 5 is the structural schematic diagram for the first terminal that the embodiment of the present invention four provides.
Fig. 6 is the structural schematic diagram for second of terminal that the embodiment of the present invention four provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description.Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second ", " third " etc.
(if present) is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be appreciated that this
The object of sample description is interchangeable under appropriate circumstances.In addition, term " includes " and " having " and their any deformation, meaning
Figure, which is to cover, non-exclusive includes.For example, containing the process, method of series of steps or containing a series of modules or list
The device of member, terminal, system those of are not necessarily limited to be clearly listed step or module or unit, can also include unclear
The step of ground is listed or module or unit also may include its intrinsic for these process, methods, device, terminal or system
Its step or module or unit.
The embodiment of the present invention provides the method, apparatus and terminal of a kind of photo encryption handling, will carry out respectively below detailed
Explanation.
Embodiment one
The present embodiment will be described from the angle of the device of photo encryption handling, which specifically can integrate in terminal
In, which can be the equipment such as smart phone, tablet computer.
A kind of method of photo encryption handling, comprising: recognition of face is carried out to photo, with judge in the photo whether include
Facial image;If obtaining the number of the facial image in the photo including facial image;When the number of the facial image is
When predetermined number, which is encrypted.
As shown in Figure 1, the method for the photo encryption handling, detailed process may include:
Whether S101 carries out recognition of face to photo, to judge in the photo to include facial image.
Recognition of face belongs to biometrics identification technology.Recognition of face is the face feature based on people, to the photo of input
It is first determined whether there are facial images.If there is facial image, then the position of each facial image can be further identified
It sets, the location information of size and each major facial organ.Then it according to these information, further extracts in each facial image
Included identity characteristic, and the identity characteristic of the identity characteristic and known facial image is compared, so that identification is every
The identity of a facial image.
In concrete application, photo is not limited to the photo of shooting, can also be through the received picture of application program either
The screenshot etc. generated by the screenshot function of terminal.When terminal often gets a photo, i.e., recognition of face is carried out to the photo,
To judge in the photo whether to include facial image.For example, after user shoots photo by the camera-enabled of terminal, immediately
Recognition of face is carried out to the photo.For another example carrying out people to the photo of browsing when browsing photo by the album function in terminal
Face identification.
When being judged as in the photo includes facial image, step S102 is executed;It does not include people when being judged as in the photo
It, can be there are many processing method when face image.For example, the photo is added when being judged as in the photo does not include facial image
Enter in default file folder, it can be " landscape photograph " that this document, which presss from both sides title,.
S102 obtains the number of the facial image in the photo if including facial image.
Specifically, when judging in photo includes facial image, which is obtained by the face characteristic information identified
The number of facial image in piece.Face characteristic information can be position, size and each major facial organ of facial image
The information such as position.
In practical application, when photo is single shines, the number of the facial image got is one;When photo is double
According to when, the number of the facial image got is two;When photo is more people's photos, the number of the facial image got can
To be three, four etc..
S103 is encrypted the photo when the number of the facial image is predetermined number.
Specifically, predetermined number can be user and preset and store a quantity in the terminal.For example, default
Number can be one or two.After getting the number of facial image, the predetermined number stored in terminal is called, by facial image
Number compared with the predetermined number, to judge whether the number of the facial image is predetermined number.When facial image
When number is predetermined number, which is encrypted.When the number of the facial image is not predetermined number, Ke Yiyou
A variety of processing methods.For example, the photo is added in default file folder when the number of the facial image is not predetermined number,
It can be " Duo Renzhao " that the default file, which presss from both sides title,.
The safety that photo management can be improved is encrypted to photo, ensures the personal secrets of user.In order to mention
Height avoids that the photo for not needing encryption is encrypted, as of the facial image to the accuracy of photo encryption
Number be predetermined number, then to the photo be encrypted can with specifically includes the following steps:
When the number of the facial image is predetermined number, which is matched with pre-set image, to obtain
Matching result;
If the matching result is successful match, which is encrypted.
Specifically, pre-set image can be preparatory typing and the facial image of storage in the terminal.For example, pre-set image can
To be the personal full face of user's shooting.When the number of facial image is predetermined number, by the facial image and default figure
As being matched, to obtain matching result.
Matched specific method, which can be, compares the facial image in the photo with pre-set image, judges the photo
In facial image and pre-set image whether be identical personage image.If the image of identical personage, then matching result is
With success;If not the image of identical personage, then matching result is that it fails to match.
When matching result is successful match, which is encrypted.
In a preferred embodiment, predetermined number is two, and pre-set image is pre-stored two in terminal
The image of different personages.For example, pre-set image can be the personal full face of user and the front of another personage is shone
Piece.The facial image is matched with pre-set image, is specifically included with obtaining matching result:
Two images in the facial image are matched with two pre-set images respectively, to obtain matching result;
If the matching result is successful match, which is encrypted and is specifically included:
If the matching result is two images in the facial image respectively with two pre-set image successful match, right
The photo is encrypted.
Specifically, two images in facial image are matched with two pre-set images respectively, to obtain matching knot
Fruit.For example, two pre-set images are image A, image B, two images in facial image are image C, image D, then will first scheme
As C and image A, image B comparison, if image C is identical as image A (or image B), then image D and image B (or image A) is right
Than, if image D and image B (or image A) are also identical, matching result be the facial image in two images respectively with this two
A pre-set image successful match.
If matching result be the facial image in two images respectively with two pre-set image successful match, to this
Photo is encrypted.
In concrete application, which, which is encrypted, be may comprise steps of:
The photo is added in default file folder;
Default file folder is encrypted.
Specifically, default file folder can be the file pre-established at the terminal.For example, default file folder title can
To be " personal photo ".When matching result is successful match, which is added in default file folder, then to the default text
Part folder is encrypted.Carrying out encryption to default file folder may comprise steps of:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
Specifically, encryption information can be the information such as password, fingerprint, sound, iris.Terminal can receive user and pass through screen
The password or encrypting fingerprint information of curtain or key-press input also can receive the Voice Encryption information that user passes through microphone input,
The iris encryption information that user is inputted by camera can also be received.Then, using received encryption information to default file
Folder is encrypted.
After encrypting to default file folder, only has the people (i.e. other people of user or user's authorization) of permission
The photo in this document folder could be browsed, it is possible thereby to which some privacy photos for protecting user that other people is not intended to see are not let out
Dew, improves the safety of photo management.
When it is implemented, the present invention is not limited by the execution sequence of described each step, conflict is not being generated
In the case of, certain steps can also be carried out using other sequences or be carried out simultaneously.
From the foregoing, it will be observed that the method for photo encryption handling provided in an embodiment of the present invention, carries out recognition of face using to photo,
To judge in the photo whether to include facial image;If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image is predetermined number, which is encrypted.The program includes face figure in photo
As and facial image be predetermined number when, photo is encrypted, so as to be not intended to other people to see some hidden by user
Private photo is protected, and the safety of photo management is improved.
Embodiment two
According to the method for photo encryption handling described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be specifically integrated in smart phone in the method for photo encryption handling, in smart phone
It is described in detail for the method for photo encryption handling.
As shown in Fig. 2, the method for photo encryption handling, detailed process can be such that
Whether S201 carries out recognition of face to photo, to judge in the photo to include facial image.
In concrete application, photo is not limited to the photo of shooting, can also be through the received picture of application program either
The screenshot etc. generated by the screenshot function of smart phone.When smart phone often gets a photo, i.e., the photo is carried out
Recognition of face, to judge in the photo whether to include facial image.For example, after user shoots photo by smart phone, with
Recognition of face is carried out to the photo.For another example opening the photograph after receiving photo by the wechat application program of smart phone
When piece, recognition of face is carried out to the photo.
When being judged as in the photo includes facial image, step S202 is executed;It does not include people when being judged as in the photo
It, can be there are many processing method when face image.For example, the photo is added when being judged as in the photo does not include facial image
Enter in default file folder, it can be " landscape photograph " that this document, which presss from both sides title,.
S202 obtains the number of the facial image in the photo if including facial image.
Specifically, when judging in photo includes facial image, which is obtained by the face characteristic information identified
The number of facial image in piece.Face characteristic information can be position, size and each major facial organ of facial image
The information such as position.
In practical application, when photo is single shines, the number of the facial image got is one;When photo is double
According to when, the number of the facial image got is two;When photo is more people's photos, the number of the facial image got can
To be three, four etc..
S203 matches the facial image with pre-set image when the number of the facial image is predetermined number, with
Obtain matching result.
Specifically, predetermined number can be user and preset and be stored in a quantity in smart phone.For example, with
When family wishes to protect single photo, predetermined number can be set to one;It, can will be pre- when user wishes to protect double photo
If number is set as two.After getting the number of facial image, the predetermined number being stored in smart phone is called, by face
The number of image is compared with the predetermined number, to judge whether the number of the facial image is predetermined number.When face figure
When the number of picture is predetermined number, which is matched with pre-set image;When the number of facial image is not default
It, can be there are many processing method when number.For example, when the number for being judged as the facial image is not predetermined number, by the photograph
Piece is added in default file folder, and it can be " Duo Renzhao " that this document, which presss from both sides title,.
Pre-set image can be preparatory typing and be stored in the facial image in smart phone.For example, user can will clap
The personal full face taken the photograph is set as pre-set image.When the number that judging result is facial image is predetermined number, by the people
Face image is matched with pre-set image, to obtain matching result.
Matched specific method, which can be, compares the facial image in the photo with pre-set image, judges the photo
In facial image and pre-set image whether be identical personage image.If the image of identical personage, then matching result is
With success, step S204 is then executed;If not the image of identical personage, then matching result is that it fails to match.
When predetermined number is two, pre-set image is the image of pre-stored two different personages in smart phone.
For example, pre-set image can be the personal full face of user and the full face of another personage.By the facial image
Carrying out matched specific method with pre-set image can be such that two pre-set images are image A, image B, two in facial image
A image is image C, image D, then first compares image C and image A, image B, if image C is identical as image A (or image B),
Image D and image B (or image A) is compared again, if image D and image B (or image A) are also identical, matching result is the people
Two images in face image then execute step S204 respectively with two pre-set image successful match.
The photo is added in default file folder when matching result is successful match by S204.
Specifically, default file folder can be the file pre-established on smart phone.For example, default file presss from both sides name
Title can be " personal photo " or " privacy photo ".When the matching result in S203 is two in successful match or facial image
Image respectively with two pre-set image successful match when, will the photo be added default file folder in.
S205, receiving encryption key.
S206 encrypts default file folder using the encryption information.
Specifically, encryption information can be the information such as password, fingerprint, sound, iris.It is logical that smart phone can receive user
The password or encrypting fingerprint information for crossing screen or key-press input also can receive user and believed by the Voice Encryption of microphone input
Breath, can also receive the iris encryption information that user is inputted by camera.Then, using received encryption information to default text
Part folder is encrypted.
After encrypting to default file folder, only has the people (i.e. other people of user or user's authorization) of permission
The photo in this document folder could be browsed, it is possible thereby to which some privacy photos for protecting user that other people is not intended to see are not let out
Dew, improves the safety of photo management.
When it is implemented, the present invention is not limited by the execution sequence of described each step, conflict is not being generated
In the case of, certain steps can also be carried out using other sequences or be carried out simultaneously.
From the foregoing, it will be observed that the method for photo encryption handling provided in an embodiment of the present invention, carries out recognition of face using to photo,
To judge in the photo whether to include facial image;If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image is predetermined number, which is matched with pre-set image, to obtain matching result;
When matching result is successful match, which is added in default file folder;Receiving encryption key;Use the encryption information pair
Default file folder is encrypted.The number of facial image of the program in photo be predetermined number and the facial image with
When pre-set image successful match, which is added in default file folder, and using received encryption information to the default file
Folder is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management.
Embodiment three
In order to better implement above method, the embodiment of the present invention also provides a kind of device of photo encryption handling, the dress
Setting can integrate in the terminal, which can be the equipment such as smart phone, tablet computer.
As shown in figure 3, the device of photo encryption handling may include: identification module 301, obtain module 302, encrypting module
303, it is described in detail below:
The identification module 301, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
The acquisition module 302, for when the judging result of the identification module 301 be the photo in include facial image when,
Obtain the number of the facial image in the photo;
The encrypting module 303, for being carried out at encryption to the photo when the number of the facial image is predetermined number
Reason.
Preferably, as shown in figure 4, encrypting module 303 includes: matched sub-block 3031, encrypts submodule 3032, specifically such as
Under:
The matched sub-block 3031, for when the number of the facial image is predetermined number, by the facial image and pre-
If image is matched, to obtain matching result;
The encryption submodule 3032, for when the matching result of the matched sub-block 3031 be successful match when, to the photograph
Piece is encrypted.
Preferably, which is two, which is two pre-set images, and matched sub-block 3031 is specifically used
In:
It is when the number of the facial image is predetermined number, two images in the facial image are default with two respectively
Image is matched, to obtain matching result;
Encryption submodule 3032 is specifically used for:
When the matching result of the matched sub-block 3031 is default with this two respectively for two images in the facial image
When images match success, which is encrypted.
Preferably, which is encrypted and is specifically included:
The photo is added in default file folder;
Default file folder is encrypted.
Preferably, encryption is carried out to default file folder to specifically include:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
When it is implemented, the above modules can be used as independent entity to realize, any combination can also be carried out, is made
It is realized for same or several entities.The specific implementation of the above modules can be found in the embodiment of the method for front, herein not
It repeats again.
From the foregoing, it will be observed that the device of photo encryption handling provided in an embodiment of the present invention, by identification module 301 to photo into
Row recognition of face, to judge in the photo whether to include facial image;Obtain the judgement knot that module 302 works as the identification module 301
When fruit is includes facial image in the photo, the number of the facial image in the photo is obtained;Encrypting module 303 is in the face figure
When the number of picture is predetermined number, which is encrypted.The program includes facial image and face in photo
When image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see obtain
Protection, improves the safety of photo management.
Example IV
The embodiment of the present invention also provides a kind of terminal, which can be the equipment such as smart phone, tablet computer.
As shown in figure 5, terminal 400 may include: identification module 401, obtain module 402, encrypting module 403, specifically retouch
It states as follows:
The identification module 401, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
The acquisition module 402, for when the judging result of the identification module 401 be the photo in include facial image when,
Obtain the number of the facial image in the photo;
The encrypting module 403, for being carried out at encryption to the photo when the number of the facial image is predetermined number
Reason.
Preferably, encrypting module 403 includes: matched sub-block, encrypts submodule, specific as follows:
The matched sub-block, for by the facial image and presetting figure when the number of the facial image is predetermined number
As being matched, to obtain matching result;
The encryption submodule, for adding to the photo when the matching result of the matched sub-block is successful match
Close processing.
Preferably, which is two, which is two pre-set images, and matched sub-block is specifically used for:
It is when the number of the facial image is predetermined number, two images in the facial image are default with two respectively
Image is matched, to obtain matching result;
Encryption submodule is specifically used for:
When the matched sub-block matching result be the facial image in two images respectively with two pre-set images
When successful match, which is encrypted.
Preferably, which is encrypted and is specifically included:
The photo is added in default file folder;
Default file folder is encrypted.
Preferably, encryption is carried out to default file folder to specifically include:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
Aforesaid operations are for details, reference can be made to the embodiment of the method for front, and details are not described herein.
The embodiment of the present invention also provides another terminal, as shown in fig. 6, the terminal 500 may include radio frequency (RF, Radio
Frequency) circuit 501, include one or more memory 502, the input unit of computer readable storage medium
503, display unit 504, sensor 505, voicefrequency circuit 506, Wireless Fidelity (WiFi, Wireless Fidelity) module
507, the components such as processor 508 and the power supply 509 of processing core are included one or more than one.Those skilled in the art
Member it is appreciated that terminal structure shown in Fig. 6 not structure paired terminal restriction, may include more more or fewer than illustrating
Component perhaps combines certain components or different component layouts.
Radio circuit 501 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station
Downlink information receive after, transfer to one or more than one processor 508 processing;In addition, the data for being related to uplink are sent
To base station.In general, radio circuit 501 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillations
Device, subscriber identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low noise amplification
Device (LNA, Low Noise Amplifier), duplexer etc..In addition, radio circuit 501 can also by wireless communication with network
It is communicated with other equipment.Any communication standard or agreement, including but not limited to global system for mobile telecommunications can be used in the wireless communication
System (GSM, Global System of Mobile communication), general packet radio service (GPRS, General
Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more
Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term
Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 502 can be used for storing software program and module.Processor 508 is stored in memory 502 by operation
Software program and module, thereby executing various function application and data processing.Memory 502 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal
(such as audio data, phone directory etc.) etc..In addition, memory 502 may include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memory 502 can also include Memory Controller, to provide processor 508 and input unit 503 to memory 502
Access.
Input unit 503 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment
In, input unit 503 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching
Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or
Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula
It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 508, and can reception processing
Order that device 508 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 503 can also include other input equipments.Specifically, other are defeated
Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
One of mark, operating stick etc. are a variety of.
Display unit 504 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display
Unit 504 may include display panel, optionally, can using liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further
, touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to
Device 508 is followed by subsequent processing device 508 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event
Visual output.Although touch sensitive surface and display panel are to realize input and input as two independent components in Fig. 6
Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 505, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 506 can provide the audio interface between user and terminal by loudspeaker, microphone.Voicefrequency circuit
The audio data received can be converted into electric signal by 506, be transferred to loudspeaker, be converted to voice signal output by loudspeaker;
On the other hand, the voice signal of collection is converted to electric signal by microphone, is converted to audio number after being received by voicefrequency circuit 506
According to then such as another terminal will be sent to through radio circuit 501 after audio data output processor 508 handles, or by sound
Frequency is further processed according to output to memory 502.Voicefrequency circuit 506 is also possible that earphone jack, to provide peripheral hardware
The communication of earphone and terminal.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be helped by wireless fidelity module 507
User sends and receive e-mail, browses webpage and access streaming video etc., it provides wireless broadband internet access for user.
Although Fig. 6 shows wireless fidelity module 507, but it is understood that, and it is not belonging to must be configured into for terminal, completely may be used
To omit within the scope of not changing the essence of the invention as needed.
Processor 508 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 502, and call and be stored in memory 502
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 508 can wrap
Include one or more processing cores;Preferably, processor 508 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 508.
Terminal further includes the power supply 509 (such as battery) powered to all parts.Preferably, power supply can pass through power supply pipe
Reason system and processor 508 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.Power supply 509 can also include one or more direct current or AC power source, recharging system, power failure inspection
The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
Although being not shown in Fig. 6, terminal can also include camera, bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, the processor 508 in terminal can be according to following instruction, will be one or more
The corresponding executable file of the process of application program is loaded into memory 502, and is run by processor 508 and be stored in storage
Application program in device 502, to realize various functions:
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;If being obtained including facial image
Take the number of the facial image in the photo;When the number of the facial image is predetermined number, which is encrypted
Processing.
Preferably, processor 508 has identification module, obtains module, encrypting module, is described in detail below:
Whether processor 508 is used to carry out recognition of face to photo by identification module, to judge in the photo to include people
Face image;
Processor 508 is used to work as the judging result of the identification module by acquisition module to include facial image in the photo
When, obtain the number of the facial image in the photo;
Processor 508 is used for through encrypting module when the number of the facial image is predetermined number, is carried out to the photo
Encryption.
Aforesaid operations are for details, reference can be made to the embodiment of the method for front, and details are not described herein.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of terminal, by carrying out recognition of face to photo, to judge the photograph
It whether include facial image in piece;If obtaining the number of the facial image in the photo including facial image;When the face figure
When the number of picture is predetermined number, which is encrypted.The program includes facial image and face in photo
When image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see obtain
Protection, improves the safety of photo management.
It should be noted that those of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or
Part steps are relevant hardware can be instructed to complete by program, which can store in computer-readable storage medium
In matter, storage medium may include: read-only memory (ROM, Read OnlyMemory), random access memory (RAM,
Random Access Memory), disk or CD etc..
The method, apparatus and terminal for being provided for the embodiments of the invention a kind of photo encryption handling above have carried out in detail
It introduces, used herein a specific example illustrates the principle and implementation of the invention, the explanation of above embodiments
It is merely used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be understood
For limitation of the present invention.
Claims (6)
1. a kind of method of photo encryption handling characterized by comprising
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;
If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image be two when, by two images in the facial image respectively with two pre-set images
It is matched, to obtain matching result;
If the matching result be the facial image in two images respectively with described two pre-set image successful match,
Receive the Voice Encryption information that user passes through microphone input;
The photo is encrypted using the Voice Encryption information;
If the number in the photo not including facial image in facial image or the photo is not two, by the photograph
Piece is added in the first default file folder.
2. the method according to claim 1, wherein the described the step of photo is encrypted, is specific
Include:
The photo is added in default file folder;
Default file folder is encrypted.
3. a kind of device of photo encryption handling characterized by comprising
Identification module, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
Module is obtained, for when the judging result of the identification module be in the photo includes facial image, described in acquisition
The number of the facial image in photo;
Encrypting module is used for:
When the number of the facial image be two when, by two images in the facial image respectively with two pre-set images
It is matched, to obtain matching result;
If the matching result be the facial image in two images respectively with described two pre-set image successful match,
Receive the Voice Encryption information that user passes through microphone input;
The photo is encrypted using the Voice Encryption information;
If the number in the photo not including facial image in facial image or the photo is not two, by the photograph
Piece is added in the first default file folder.
4. device according to claim 3, which is characterized in that the described photo is encrypted specifically includes:
The photo is added in default file folder;
Default file folder is encrypted.
5. a kind of terminal, which is characterized in that the terminal includes device described in claim 3 or 4.
6. a kind of storage medium, which is characterized in that computer program is stored in the storage medium, when the computer program
When running on computers, so that method described in computer perform claim requirement 1 or 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610750780.0A CN106326773B (en) | 2016-08-29 | 2016-08-29 | A kind of method, apparatus and terminal of photo encryption handling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610750780.0A CN106326773B (en) | 2016-08-29 | 2016-08-29 | A kind of method, apparatus and terminal of photo encryption handling |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106326773A CN106326773A (en) | 2017-01-11 |
CN106326773B true CN106326773B (en) | 2019-05-03 |
Family
ID=57788615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610750780.0A Expired - Fee Related CN106326773B (en) | 2016-08-29 | 2016-08-29 | A kind of method, apparatus and terminal of photo encryption handling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106326773B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106874918A (en) * | 2017-02-23 | 2017-06-20 | 上海与德信息技术有限公司 | A kind of photo store method and device |
CN107181911A (en) * | 2017-04-07 | 2017-09-19 | 北京安云世纪科技有限公司 | A kind of image pickup method, device and mobile terminal |
CN107181910A (en) * | 2017-04-07 | 2017-09-19 | 北京安云世纪科技有限公司 | A kind of image pickup method of mobile terminal, device and mobile terminal |
CN107172344A (en) * | 2017-04-07 | 2017-09-15 | 北京安云世纪科技有限公司 | Shooting file memory method, device and the mobile terminal of a kind of mobile terminal |
CN107169367A (en) * | 2017-04-07 | 2017-09-15 | 北京安云世纪科技有限公司 | A kind of storage method, device and mobile terminal for shooting file |
CN109729431B (en) * | 2018-12-26 | 2021-02-09 | 维沃移动通信有限公司 | Video privacy protection method and terminal equipment |
US11379610B2 (en) | 2019-07-10 | 2022-07-05 | Blackberry Limited | Methods and devices for automatically encrypting files |
CN111401197B (en) * | 2020-03-10 | 2023-08-15 | 支付宝(杭州)信息技术有限公司 | Picture risk identification method, device and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034714A (en) * | 2012-12-11 | 2013-04-10 | 北京百度网讯科技有限公司 | Mobile terminal, picture sorting management method and picture sorting management device of mobile terminal |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN105354510A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo naming method and naming system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020025040A1 (en) * | 2000-06-28 | 2002-02-28 | Howard Stein | Method and apparatus for generating an encryption key |
CN101510205B (en) * | 2009-03-16 | 2013-02-27 | 广州市有福数码科技有限公司 | Method for implementing automatically clustering photographs, apparatus and system |
-
2016
- 2016-08-29 CN CN201610750780.0A patent/CN106326773B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034714A (en) * | 2012-12-11 | 2013-04-10 | 北京百度网讯科技有限公司 | Mobile terminal, picture sorting management method and picture sorting management device of mobile terminal |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN105354510A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo naming method and naming system |
Also Published As
Publication number | Publication date |
---|---|
CN106326773A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106326773B (en) | A kind of method, apparatus and terminal of photo encryption handling | |
CN103473494B (en) | A kind of run the method for application, device and terminal unit | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106126015B (en) | A kind of application program launching control method and terminal | |
WO2018032661A1 (en) | Information displaying method for terminal device, and terminal device | |
CN104519485B (en) | Communication means, device and system between a kind of terminal | |
CN104967790B (en) | Method, photo taking, device and mobile terminal | |
CN106921791B (en) | Multimedia file storage and viewing method and device and mobile terminal | |
CN107145794B (en) | Data processing method and device and mobile terminal | |
CN106446841B (en) | A kind of fingerprint template matching order update method and terminal | |
CN104217172B (en) | Privacy content inspection method and device | |
CN109194818A (en) | A kind of information processing method and terminal | |
US10216404B2 (en) | Method of securing image data and electronic device adapted to the same | |
CN108415641A (en) | A kind of processing method and mobile terminal of icon | |
CN109062634B (en) | Application starting method and mobile terminal | |
CN109857297A (en) | Information processing method and terminal device | |
CN108898552A (en) | Picture joining method, double screen terminal and computer readable storage medium | |
WO2021068895A1 (en) | Screen capturing method and terminal device thereof | |
CN106469280A (en) | The method and device of instant messaging interface processing | |
CN105162930B (en) | The way of recording and device of mobile terminal | |
CN108270757A (en) | A kind of user account switching method, device, client and system | |
EP3687118A1 (en) | Information search method, terminal, network device, and system | |
CN104348944A (en) | Caller identification method and caller identification terminal | |
CN110287719A (en) | File encrypting method and mobile terminal | |
CN109634481A (en) | Text display method, device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190503 |