CN108256360A - The display methods and terminal of a kind of sensitive information - Google Patents
The display methods and terminal of a kind of sensitive information Download PDFInfo
- Publication number
- CN108256360A CN108256360A CN201711403158.3A CN201711403158A CN108256360A CN 108256360 A CN108256360 A CN 108256360A CN 201711403158 A CN201711403158 A CN 201711403158A CN 108256360 A CN108256360 A CN 108256360A
- Authority
- CN
- China
- Prior art keywords
- picture
- pictures
- sub
- dimension code
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses the display methods and terminal of a kind of sensitive information, and sensitive information to be shown is carried out figure pretreatment, obtains the first picture;The theme color of first picture is extracted, color is negated to the theme color, obtains background colour;First picture is divided into the sub-pictures of M square, therefrom chooses N number of sub-pictures as key area, 0<N≤M;User identifier is generated into two-dimension code image, the user identifier checks that the user of the sensitive information corresponds with having permission, and the two-dimension code image size is identical with the sub-pictures size;First picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, the two-dimension code image is included per frame incompleteness picture, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate, the union of several frame incompleteness pictures is first picture, the leakage of sensitive information can be effectively prevented from, improves the safety of sensitive information.
Description
Technical field
The present invention relates to image processing field more particularly to the display methods and terminal of a kind of sensitive information.
Background technology
With the continuous development of Internet technology, more and more information are transmitted by network between end and end, for
Sensitive informations, the sender such as some enterprises secret or individual privacy often only want to share in controllable range.
In the prior art, generally by way of file encryption help information sender by information security be sent to it is specified
Recipient, and ensure that information is only possessed the personnel of permission and checked, but after this does not ensure that the personnel for possessing permission check
These information leakages are not gone out, for example, by screenshotss, take pictures, record a video, in this way, sensitive information will be detached from the limit of existing platform
System is leaked out.Also have and interfere screenshotss and acquisition information of taking pictures by increasing dynamic covering layer when presentation of information,
But it can not still fight the mode steal information of video recording.
Invention content
The technical problems to be solved by the invention are:The display methods and terminal of a kind of sensitive information are provided, effectively avoided
Information leakage.
In order to solve the above-mentioned technical problem, a kind of technical solution for using of the present invention for:
A kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area
Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission
User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame
Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of several frame incompleteness pictures is first picture.
In order to solve the above-mentioned technical problem, the another technical solution that uses of the present invention for:
A kind of display terminal of sensitive information including memory, processor and is stored on the memory and can be
The computer program run on the processor, the processor realize following steps when performing the computer program:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area
Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission
User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame
Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of several frame incompleteness pictures is first picture.
The beneficial effects of the present invention are:Picture comprising sensitive information is changed from the complete figure static display of a frame
Contain the Dynamic Display of the incomplete figure of two-dimension code image for multiframe, due to the time delay characteristic of human eye, such processing is not
Can receive information to human eye and impact, when leakage person using screenshotss or take pictures come it is illegal obtain information when, cannot be complete
Information if leakage person captures dynamic picture using video recording, can be chased after by revealing the 2 D code information included in information
It traces back and reveals source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve the safety of sensitive information.
Description of the drawings
Fig. 1 is a kind of flow chart of the display methods of sensitive information of the embodiment of the present invention;
Fig. 2 is a kind of structure diagram of the display terminal of sensitive information of the embodiment of the present invention;
Label declaration:
1st, a kind of display terminal of sensitive information;2nd, memory;3rd, processor.
Specific embodiment
For the technology contents that the present invention will be described in detail, the objects and the effects, below in conjunction with embodiment and coordinate attached
Figure is explained.
The design of most critical of the present invention is:By the picture comprising sensitive information and the Quick Response Code figure comprising user identifier
Piece synthesizes several frame incompleteness pictures, per frame incompleteness picture comprising the two-dimension code image, and by several frame incompleteness pictures
It is rendered frame by frame with a scheduled rate.
Please refer to Fig. 1, a kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area
Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission
User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame
Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of several frame incompleteness pictures is first picture.
Seen from the above description, the beneficial effects of the present invention are:Picture comprising sensitive information is complete from a frame
Figure static display is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image, since the time delay of human eye is special
Property, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures illegally to obtain information
When, it cannot get complete information, if leakage person captures dynamic picture using video recording, can be included by revealing in information
2 D code information retrospect leakage source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve sensitive information
Safety.
Further, N number of sub-pictures are therefrom chosen described in the step S3 to specifically include as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the
The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy
A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures
As key area.
Seen from the above description, figure entropy is bigger, then its corresponding sub-pictures contains more information content, chooses information content
More sub-pictures ensure that the number for the key area chosen meets a default size as key area, ensure that figure
The dispersibility and reasonability of piece segmentation, further reduced sensitive information is leaked rate.
Further, the step S5 is specifically included:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from described
It is cut out coming in one picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure
Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image
Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames
Picture ultimately generates 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
Seen from the above description, through the above way by the picture comprising sensitive information from the complete figure static state exhibition of a frame
Show the Dynamic Display for being changed into the incomplete figure that multiframe contains two-dimension code image, and filled in the first picture and cut with background colour
The part cut away so that contrast enhances after the picture carries out gray proces, facilitates identification.
Further, step is further included:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition
One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
Further, the step S63 is specifically included:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square shape and color
The corresponding position of block according to the position, is cut out a picture, as two-dimension code image.
Seen from the above description, gray proces are carried out, and identify two by the picture comprising sensitive information to acquisition
Code picture is tieed up, the corresponding user identifier of two-dimension code image is obtained, using the superior redundant correcting performance of Quick Response Code, can believe
It effectively traces to the source after breath leakage, navigates to the user of leakage sensitive information, solve the problems, such as not tracing to the source in the prior art.
Fig. 2 is please referred to, a kind of display terminal of sensitive information including memory, processor and is stored in the storage
On device and the computer program that can run on the processor, the processor are realized following when performing the computer program
Step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area
Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission
User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame
Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of several frame incompleteness pictures is first picture.
Seen from the above description, the beneficial effects of the present invention are:Picture comprising sensitive information is complete from a frame
Figure static display is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image, since the time delay of human eye is special
Property, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures illegally to obtain information
When, it cannot get complete information, if leakage person captures dynamic picture using video recording, can be included by revealing in information
2 D code information retrospect leakage source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve sensitive information
Safety.
Further, N number of sub-pictures are therefrom chosen described in the step S3 to specifically include as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the
The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy
A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures
As key area.
Seen from the above description, figure entropy is bigger, then its corresponding sub-pictures contains more information content, chooses information content
More sub-pictures ensure that the number for the key area chosen meets a default size as key area, ensure that figure
The dispersibility and reasonability of piece segmentation, further reduced sensitive information is leaked rate.
Further, the step S5 is specifically included:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from described
It is cut out coming in one picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure
Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image
Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames
Picture ultimately generates 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
Seen from the above description, through the above way by the picture comprising sensitive information from the complete figure static state exhibition of a frame
Show the Dynamic Display for being changed into the incomplete figure that multiframe contains two-dimension code image, and filled in the first picture and cut with background colour
The part cut away so that contrast enhances after the picture carries out gray proces, facilitates identification.
Further, step is further included:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition
One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
Further, the step S63 is specifically included:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square shape and color
The corresponding position of block according to the position, is cut out a picture, as two-dimension code image.
Seen from the above description, gray proces are carried out, and identify two by the picture comprising sensitive information to acquisition
Code picture is tieed up, the corresponding user identifier of two-dimension code image is obtained, using the superior redundant correcting performance of Quick Response Code, can believe
It effectively traces to the source after breath leakage, navigates to the user of leakage sensitive information, solve the problems, such as not tracing to the source in the prior art.
Embodiment one
Please refer to Fig. 1, a kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
Wherein, figure pretreatment includes text rasterizing, picture format decoding and rich text typesetting etc.;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
In order to obtain the theme color, color quantizing method, cluster, color modeling etc. may be used, specifically, to color sky
Between counted, obtain high-frequency tone, using the high-frequency tone as theme color;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area
Domain, 0<N≤M;
First picture can be divided into lateral X, the square word picture of longitudinal Y, M=X*Y;
Wherein, it is described therefrom to choose N number of sub-pictures and specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the
The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy
A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures
As key area;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission
User correspond, the two-dimension code image size is identical with the sub-pictures size;
The two-dimension code image is used as digital watermarking tracing to the source for subsequent information;
Wherein, the sequence between S2-S4 in no particular order, can also parallel processing;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame
Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of several frame incompleteness pictures is first picture;
Specifically, S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively
It is cut out coming from first picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure
Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image
Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames
Picture ultimately generates 2*N frame pictures;
The N number of sub-pictures for having synthesized two-dimension code image are sheared successively, form 2*N frames complementary picture two-by-two
{DstFrame1_0,DstFrame1_1,DstFrame2_0,DstFrame2_1,……,DstFrameN_0,DstFrameN_
1};
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate;
After rendering, have permission and check that the user of the sensitive information can obtain complete information;
Further include step:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition
One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
Specifically, identifying the square color lump for being respectively distributed to three angles from the black and white picture, determine described
The corresponding position of square color lump, according to the position, is cut out a picture, as two-dimension code image;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image;
By identifying user identifier, you can navigate to the user of leakage sensitive information, complete to trace back to leakage information
Source.
Embodiment two
Fig. 2 is please referred to, a kind of display terminal 1 of sensitive information including memory 2, processor 3 and is stored in described deposit
On reservoir 2 and the computer program that can be run on the processor 3, the processor 3 perform real during the computer program
Step in current embodiment one.
In conclusion the display methods and terminal of a kind of sensitive information provided by the invention, by the figure comprising sensitive information
Piece is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image from the complete figure static display of a frame, due to people
The time delay characteristic of eye, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures
It when illegally to obtain information, cannot get complete information, if leakage person captures dynamic picture using video recording, can pass through
The digital watermarking retrospect leakage source included in leakage information, is effectively prevented from the leakage of sensitive information, improves sensitive information
Safety, effectively contains the illegal interception of information, and can effectively trace to the source after information leakage, frightens from root latent
Source of leakage, be effectively guaranteed privacy of user and enterprise's secret, avoid causing damages to information owner.
The foregoing is merely the embodiment of the present invention, are not intended to limit the scope of the invention, every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made directly or indirectly are used in relevant technical field, similarly include
In the scope of patent protection of the present invention.
Claims (10)
1. a kind of display methods of sensitive information, which is characterized in that including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square therefrom choose N number of sub-pictures as key area, and 0<
N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier is with having permission the use for checking the sensitive information
Family corresponds, and the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, it is incomplete per frame
Picture is described several comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of frame incompleteness picture is first picture.
2. a kind of display methods of sensitive information according to claim 1, which is characterized in that described in the step S3 from
The middle N number of sub-pictures of selection are specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, and it is pre- to determine that image entropy is more than first
If the number m of the sub-pictures of value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, then (N-m) height is randomly selected in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy
Picture, using described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures as
Key area.
3. the display methods of a kind of sensitive information according to claim 1, which is characterized in that the step S5 is specifically wrapped
It includes:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from first figure
It is cut out coming in piece;
The part being cut away in S52, first picture is filled respectively with the background colour, and is closed with the two-dimension code image
Into formation second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and figure in post synthesis successively with the two-dimension code image respectively
The black region in the correspondence two-dimension code image and white area are sheared respectively in piece, form the picture of 2 frames complementation,
Ultimately generate 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
4. the display methods of a kind of sensitive information according to claim 1, which is characterized in that further include step:
S61, clarity is chosen from the picture frame sequence comprising sensitive information after the rendering of acquisition more than the second preset value
One frame picture, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
5. the display methods of a kind of sensitive information according to claim 4, which is characterized in that the step S63 is specifically wrapped
It includes:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square color lump pair
The position answered according to the position, is cut out a picture, as two-dimension code image.
6. a kind of display terminal of sensitive information, including memory, processor and it is stored on the memory and can be in institute
State the computer program run on processor, which is characterized in that the processor is realized following when performing the computer program
Step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square therefrom choose N number of sub-pictures as key area, and 0<
N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier is with having permission the use for checking the sensitive information
Family corresponds, and the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, it is incomplete per frame
Picture is described several comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate
The union of frame incompleteness picture is first picture.
7. a kind of display terminal of sensitive information according to claim 6, which is characterized in that described in the step S3 from
The middle N number of sub-pictures of selection are specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, and it is pre- to determine that image entropy is more than first
If the number m of the sub-pictures of value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, then (N-m) height is randomly selected in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy
Picture, using described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures as
Key area.
8. the display terminal of a kind of sensitive information according to claim 6, which is characterized in that the step S5 is specifically wrapped
It includes:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from first figure
It is cut out coming in piece;
The part being cut away in S52, first picture is filled respectively with the background colour, and is closed with the two-dimension code image
Into formation second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and figure in post synthesis successively with the two-dimension code image respectively
The black region in the correspondence two-dimension code image and white area are sheared respectively in piece, form the picture of 2 frames complementation,
Ultimately generate 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
9. the display terminal of a kind of sensitive information according to claim 6, which is characterized in that further include step:
S61, clarity is chosen from the picture frame sequence comprising sensitive information after the rendering of acquisition more than the second preset value
One frame picture, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
10. the display terminal of a kind of sensitive information according to claim 9, which is characterized in that the step S63 is specifically wrapped
It includes:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square color lump pair
The position answered according to the position, is cut out a picture, as two-dimension code image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711403158.3A CN108256360B (en) | 2017-12-22 | 2017-12-22 | Sensitive information display method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711403158.3A CN108256360B (en) | 2017-12-22 | 2017-12-22 | Sensitive information display method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108256360A true CN108256360A (en) | 2018-07-06 |
CN108256360B CN108256360B (en) | 2020-02-07 |
Family
ID=62722804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711403158.3A Active CN108256360B (en) | 2017-12-22 | 2017-12-22 | Sensitive information display method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108256360B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145618A (en) * | 2018-08-09 | 2019-01-04 | 山东中孚安全技术有限公司 | A method of papery black and white printing sensitive data is hidden based on greyscale transformation |
CN110531911A (en) * | 2019-07-22 | 2019-12-03 | 平安科技(深圳)有限公司 | Screenshotss information control method, device, computer equipment and storage medium |
CN111178869A (en) * | 2019-10-25 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Identification code display method and device, terminal equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130230241A1 (en) * | 2005-11-11 | 2013-09-05 | Colorzip Technology Co., Ltd. | Animated Image Code, Apparatus for Generating/Decoding Animated Image Code, and Method Thereof |
CN105491443A (en) * | 2014-09-19 | 2016-04-13 | 中兴通讯股份有限公司 | Method and device for processing and accessing images |
US20160294781A1 (en) * | 2015-01-25 | 2016-10-06 | Jennifer Kate Ninan | Partial or complete image obfuscation and recovery for privacy protection |
CN106330464A (en) * | 2016-10-26 | 2017-01-11 | 上海众人网络安全技术有限公司 | Identity authentication method, device and system |
CN106656908A (en) * | 2015-10-28 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Two-dimensional code processing method and two-dimensional code processing device |
-
2017
- 2017-12-22 CN CN201711403158.3A patent/CN108256360B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130230241A1 (en) * | 2005-11-11 | 2013-09-05 | Colorzip Technology Co., Ltd. | Animated Image Code, Apparatus for Generating/Decoding Animated Image Code, and Method Thereof |
CN105491443A (en) * | 2014-09-19 | 2016-04-13 | 中兴通讯股份有限公司 | Method and device for processing and accessing images |
US20160294781A1 (en) * | 2015-01-25 | 2016-10-06 | Jennifer Kate Ninan | Partial or complete image obfuscation and recovery for privacy protection |
CN106656908A (en) * | 2015-10-28 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Two-dimensional code processing method and two-dimensional code processing device |
CN106330464A (en) * | 2016-10-26 | 2017-01-11 | 上海众人网络安全技术有限公司 | Identity authentication method, device and system |
Non-Patent Citations (1)
Title |
---|
A.CAVALL ARO: ""ADDING PRIVACY CONSTRAINTS TO VIDEO-BASED APPLICATIONS "", 《PROCEEDINGS OF THE EUROPEAN WORKSHOP FOR THE INTEGRATION OF KNOWLEDGE, SEMANTICS AND DIGITAL MEDIA TECHNOLOGY》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145618A (en) * | 2018-08-09 | 2019-01-04 | 山东中孚安全技术有限公司 | A method of papery black and white printing sensitive data is hidden based on greyscale transformation |
CN109145618B (en) * | 2018-08-09 | 2022-02-22 | 山东中孚安全技术有限公司 | Method for hiding paper black and white printing sensitive data based on gray level transformation |
CN110531911A (en) * | 2019-07-22 | 2019-12-03 | 平安科技(深圳)有限公司 | Screenshotss information control method, device, computer equipment and storage medium |
CN110531911B (en) * | 2019-07-22 | 2022-05-27 | 平安科技(深圳)有限公司 | Screen capture information control method and device, computer equipment and storage medium |
CN111178869A (en) * | 2019-10-25 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Identification code display method and device, terminal equipment and storage medium |
CN111178869B (en) * | 2019-10-25 | 2023-10-17 | 腾讯科技(深圳)有限公司 | Identification code display method and device, terminal equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108256360B (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kabulov et al. | Algorithmic method of security of the Internet of Things based on steganographic coding | |
US20210264139A1 (en) | Creating videos with facial expressions | |
CN107959895B (en) | Video playing tracing method, device, equipment and storage medium | |
CN112529757B (en) | Screen information protection method, device, computer equipment and readable storage medium | |
WO2015131713A1 (en) | Image processing and access method and apparatus | |
US10979746B2 (en) | Video stream display and protection method and device | |
CN108256360A (en) | The display methods and terminal of a kind of sensitive information | |
CN106156237B (en) | Information processing method, information processing unit and user equipment | |
JP6543764B2 (en) | Security authentication method for digital video content and system therefor | |
CN109845271A (en) | Streaming Media plagiarism detection method and system | |
CN110634096B (en) | Self-adaptive multi-mode information hiding method and device | |
CN107509080B (en) | Method and device for displaying coded image and electronic equipment | |
CN115314734A (en) | Video watermark processing method and device, electronic equipment and storage medium | |
English | Comparison of high capacity steganography techniques | |
CN111294543A (en) | System and method for video monitoring photographing protection | |
CN106789856A (en) | A kind of information coding method, coding/decoding method and device | |
CN112633230A (en) | Face encryption method and device, electronic equipment and storage medium | |
CN109859090A (en) | Reversible water mark method and device based on human visual system | |
WO2019194900A1 (en) | Watermarking digital content | |
Reddy | Novel chaos based Steganography for Images using matrix encoding and cat mapping techniques | |
CN113613015A (en) | Tamper-resistant video generation method and device, electronic equipment and readable medium | |
CN114004726A (en) | Watermark display method, watermark display device, computer equipment and storage medium | |
CN112434327A (en) | Information protection method and device and electronic equipment | |
Goswami et al. | An efficient algorithm of steganography using JPEG colored image | |
WO2019126389A1 (en) | Automatic obfuscation engine for computer-generated digital images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |