CN109584138A - Picture method for tracing, device, electronic equipment and storage medium - Google Patents

Picture method for tracing, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109584138A
CN109584138A CN201811260372.2A CN201811260372A CN109584138A CN 109584138 A CN109584138 A CN 109584138A CN 201811260372 A CN201811260372 A CN 201811260372A CN 109584138 A CN109584138 A CN 109584138A
Authority
CN
China
Prior art keywords
picture
client
request
target photo
saves
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811260372.2A
Other languages
Chinese (zh)
Inventor
王萌
李健
王伟光
杨阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201811260372.2A priority Critical patent/CN109584138A/en
Publication of CN109584138A publication Critical patent/CN109584138A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This disclosure relates to a kind of picture method for tracing, device, electronic equipment and storage medium, quickly to determine picture leakage person after picture is leaked.Picture method for tracing in the disclosure includes: to receive the picture that client is sent to save request;The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;The Target Photo is sent to the client to save, the mark information is used to track the leakage source of the Target Photo.

Description

Picture method for tracing, device, electronic equipment and storage medium
Technical field
This disclosure relates to picture technical field, and in particular, to a kind of picture method for tracing, device, electronic equipment and deposit Storage media.
Background technique
With the rapid development of science and technology, various application software emerge one after another, user when using various application software, Picture is often saved, and shares picture to other people, so as to cause the picture in application software to be revealed.For example, enterprise is When communication software, picture would generally be related to enterprise secret, if user leaks the picture for being related to enterprise's secret, this will give enterprise Bring serious loss.Therefore, for enterprise, it is often desirable that after picture leakage, it can quickly determine picture leakage person, To reduce due to picture leakage bring loss.
Summary of the invention
Purpose of this disclosure is to provide a kind of picture method for tracing, device, electronic equipment and storage mediums, in picture quilt After leakage, picture leakage person is quickly determined.
To achieve the goals above, in a first aspect, the disclosure provides a kind of picture method for tracing, comprising:
It receives the picture that client is sent and saves request;
The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;
The Target Photo is sent to the client to save, the mark information is for tracking the target figure The leakage source of piece.
Optionally, it includes picture identification that the picture, which saves request,;
The mark information of the client described in steganography in the picture that the client request saves, obtains target figure Piece, comprising:
Corresponding original image is searched according to the picture identification;
The original image is replicated, and in the obtained picture of duplication client described in steganography mark information, Obtain the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate;
The mark information of the client described in steganography in the picture that the client request saves, obtains target figure Piece, comprising:
The mark information of client described in steganography in the screenshot picture, obtains the Target Photo.
Optionally, the mark information of the client described in steganography in the picture that the client request saves, obtains Target Photo, comprising:
The mark information is encrypted, the encrypted mark information steganography is entered into the client request and is saved Picture in.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client The identity information of user.
Second aspect, the disclosure also provide a kind of picture method for tracing, comprising:
When receiving picture preservation instruction, picture is sent to server and saves request;
Receive the Target Photo that request is saved for responding the picture that the server is sent, wherein the target Picture steganography has the mark information of client;
Instruction, which is saved, according to the picture saves the Target Photo.
Optionally, it is that the client is detecting the duplication operation for picture that the picture, which saves instruction, shares behaviour It is generated when any one of work and forwarding operation, the picture saves picture identification of the request including the picture.
Optionally, the picture, which saves, instructs the client to generate when detecting screenshotss operation, the picture Saving request includes screenshot picture.
Optionally, the method also includes:
Determine that the client is in picture browsing mode, the picture browsing mode is that the client unlatching picture is clear Look at the modes of window browsing pictures;
The addition prompt layer in the picture-browsing window, and the leakage-preventing information of picture is shown in the prompt layer;With/ Or, enable the client forbids screenshotss function under the picture browsing mode.
The third aspect, the disclosure also provide a kind of picture follow-up mechanism, comprising:
First receiving module, the picture for receiving client transmission save request;
Steganography module is obtained for the mark information of client described in the steganography in the picture that the client request saves To Target Photo;
First sending module saves, the mark information for the Target Photo to be sent to the client For tracking the leakage source of the Target Photo.
Optionally, it includes picture identification that the picture, which saves request, and the steganography module is used for according to the picture identification Corresponding original image is searched, and the original image is replicated, the client described in steganography in the picture that duplication obtains Mark information, obtain the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate, it is described hidden Mark information of the writing module for client described in the steganography in the screenshot picture, obtains the Target Photo.
Optionally, the steganography module is for encrypting the mark information, by the encrypted mark information Steganography enters in the picture that the client request saves.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client The identity information of user.
Fourth aspect, the disclosure also provide a kind of picture follow-up mechanism, comprising:
Second sending module, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module, the target figure that request is saved for responding the picture sent for receiving the server Piece, wherein the Target Photo steganography has the mark information of client;
Preserving module saves the Target Photo for saving instruction according to the picture.
Optionally, it is that the client is detecting the duplication operation for picture that the picture, which saves instruction, shares behaviour It is generated when any one of work and forwarding operation, the picture saves picture identification of the request including the picture.
Optionally, the picture, which saves, instructs the client to generate when detecting screenshotss operation, the picture Saving request includes screenshot picture.
Optionally, described device further includes determining module, described for determining that the client is in picture browsing mode Picture browsing mode is the mode that the client opens picture-browsing window browsing pictures;
Described device further includes first processing module and/or Second processing module, and the first processing module is used in institute Addition prompt layer in picture-browsing window is stated, and shows the leakage-preventing information of picture in the prompt layer;The second processing mould Block is used under the picture browsing mode, and enable the client forbids screenshotss function.
5th aspect, the disclosure also provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one institute in first aspect The step of stating method.
6th aspect, the disclosure also provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one institute in second aspect The step of stating method.
7th aspect, the disclosure also provide a kind of computer readable storage medium, are stored thereon with computer program, the journey The step of any one of first aspect and second aspect the method are realized when sequence is executed by processor.
By adopting the above technical scheme, it at least can achieve following technical effect:
The mark information of above-mentioned technical proposal steganography client in the picture that client request saves, obtains target figure Then Target Photo is sent to client and saved by piece, so that the picture leaked out through client carries the visitor The mark information at family end.Therefore, after obtaining the picture being leaked, so that it may be tracked and be let out according to the mark information in the picture Reveal source, to reduce due to picture leakage bring loss and call to account to leakage person.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of implementation environment schematic diagram of picture method for tracing shown according to one exemplary embodiment of the disclosure;
Fig. 2 is an a kind of flow chart of picture method for tracing shown according to one exemplary embodiment of the disclosure;
Fig. 3 is an a kind of flow chart of picture method for tracing shown according to disclosure another exemplary embodiment;
Fig. 4 is an a kind of block diagram of picture follow-up mechanism shown according to one exemplary embodiment of the disclosure;
Fig. 5 is an a kind of block diagram of picture follow-up mechanism shown according to disclosure another exemplary embodiment;
Fig. 6 is the block diagram according to a kind of electronic equipment shown in one exemplary embodiment of the disclosure;
Fig. 7 is the block diagram according to a kind of electronic equipment shown in disclosure another exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
Fig. 1 is a kind of schematic diagram of implementation environment shown in one exemplary embodiment of the disclosure, as shown in Figure 1, the implementation Environment may include client 110, and the server 120 being connected by network with client 110.Wherein, client 110 is pacified The application software supported is provided equipped with server 120, such as instant message applications, client 110 can pass through the instant messaging Software receives the picture that server 120 is sent.Client 110 can be smart phone, tablet computer, PC machine, laptop Etc..In Fig. 1, client 110 is illustrated by taking smart phone as an example.
Fig. 2 is a kind of flow chart of picture method for tracing shown according to one exemplary embodiment of the disclosure, reference Fig. 2, The picture method for tracing can be applied to server, comprising the following steps:
Step S201 receives the picture that client is sent and saves request.
Illustratively, which, which saves request and can be client, answers for a certain picture of client detecting user When system operation, generate and send to server.
In addition, the application software of client installation can be designed as any transmission for picture operate be required to it is first right Picture is saved, then is sent to the picture of preservation, and transmission operation for example can be forwarding operation or sharing operation. In this case, which, which saves request and be also possible to client, divides for a certain picture of client detecting user When enjoying operation or forwarding operation, generate and send to server.
It is above-mentioned only to picture save request generation carry out for example, the disclosure in the specific implementation, according to reality Border demand, client can also generate picture preservation request and be sent to server, example under other user's operations for picture Such as, shearing manipulation, the disclosure do not limit this.
Step S202, the mark information of client described in steganography, obtains mesh in the picture that the client request saves It marks on a map piece.
The Target Photo is sent to the client and saved by step S203, and the mark information is for tracking The leakage source of the Target Photo.
It in the embodiments of the present disclosure, can be in client after the picture that server receives client transmission saves request The mark information of steganography client, obtains Target Photo, the Target Photo is then sent to visitor in the picture that end request saves Family end is saved, since steganography has the mark information of client in Target Photo, after Target Photo is leaked, so that it may To get the mark information by steganography recovery, and according to the leakage source of mark information tracking Target Photo, thus real Now to the quick positioning of picture leakage person, reduce as picture leakage and caused by various losses.
In the embodiments of the present disclosure, the mark information of client can be one or more of following information:
Picture save the timestamp information of request, the location information where client, client active user identity letter Breath.
For example, after receiving the picture that client is sent and saving request, it can be hidden in the picture that client request saves The identity information for writing client active user obtains Target Photo, can pass through the body in this way after Target Photo is leaked Part information, determines the user information for saving the picture, to quickly determine the leakage person of Target Photo.
Alternatively, after receiving the picture that client is sent and saving request, it can also be in the picture that client request saves Steganography picture saves the timestamp information of request, obtains Target Photo, which is used to characterize user and saves picture Time can determine the time for saving the picture by the timestamp information after Target Photo is leaked, reduce and search figure The range of piece leakage person, to quickly determine the leakage person of Target Photo.
It, can also be in the picture of client request preservation or after receiving the picture that client is sent and saving request Location information where middle steganography client, obtains Target Photo, which is used to characterize the place that user saves picture, The place for saving the picture can be determined by the location information after Target Photo is leaked, reduce and search picture leakage The range of person, to quickly determine the leakage person of Target Photo.
It certainly, in the embodiments of the present disclosure, can also be in client request in order to more quickly determine picture leakage person Location information, client active user in the picture of preservation where the timestamp information of steganography picture preservation request, client Identity information these three information in the two or three, for example, the steganography client figure in the picture that client request saves Piece saves the timestamp information and the identity information of client active user the two information of request, or protects in client request Where identity information, the picture preservation of steganography client active user is requested in the picture deposited timestamp information and client These three information of location information, etc., the disclosure is not construed as limiting this.
It should be understood that the acquisition of client mark information, which can be server, is receiving picture preservation request every time Afterwards, by sending the request message acquisition for request client identification information to client.Alternatively possible In implementation, client, which can carry identification information to save in request in picture, is sent to server, for example, the client For the installation software application APP in a user device that server provides, by the generation for designing software application APP Code can be realized in the case where not changing user equipment own system code and carry client identification information in picture preservation In request, in this case, server can directly save the identification information that client is obtained in request from picture.
In one possible implementation, it may include picture identification that picture, which saves request, correspondingly, above-mentioned steps S202 can be with are as follows: searches corresponding original image according to the picture identification, and replicates to the original image, is replicating The mark information of client described in steganography in obtained picture, obtains the Target Photo.
It is worth noting that picture identification be save to request corresponding original image for unique identification picture, for example, It can be the picture name of the original image, or can be the preservation serial number, etc. of the original image on the server, the disclosure This is not construed as limiting, as long as original image can be uniquely determined according to the picture identification.
For obtaining the mode of picture identification, the embodiment of the present disclosure is not construed as limiting this, below shown in Fig. 1 for scene Possible mode is illustrated.When client 110 is from 120 download pictures of server, server 120 is by the picture mark of the picture Knowledge has sent jointly to client 110, therefore, when client triggering picture saves request, can be directly obtained the picture Corresponding picture identification.
Illustratively, when server, which receives picture, saves request, server first can be according to picture identification lookup pair Then the original image answered replicates the original image, finally in the obtained picture of duplication steganography client label Information obtains Target Photo.Steganography operation can be carried out to avoid the original image stored to server in this way, remain original graph The original state of piece facilitates other users and operates to the preservation of the original image.
In alternatively possible implementation, picture saves section that the screenshotss that request may include client operate Shield picture, then, correspondingly, it can be the mark information of the steganography client in the screenshot picture in step S202, obtain Target Photo.
That is, picture save request can be client detect user screenshotss operation when, generate and send to Server, it is illustrated by mobile phone 110 of client shown in Fig. 1, the mobile phone 110 is in the screenshotss operation for detecting user Afterwards, generation includes that the picture of screenshot picture saves request, and sends picture preservation request to server 120, when server connects Receive this include screenshot picture picture save request when, the mark information of steganography client, obtains mesh in the screenshot picture It marks on a map piece.It in this way, can by the mark information of steganography in screenshot picture after user reveals screenshot picture More quickly and accurately to determine picture leakage person, reduce since picture reveals the various losses of bring.
It should be noted that being stated on the implementation to before the scheme for returning to client after screenshot picture progress steganography, go back Can carry out subscriber authentication, when subscriber authentication success when, client can detect user screenshotss operation after, It generates picture preservation request Concurrency and gives server, to realize the steganography for screenshot picture.
In addition, server can save the screenshot picture received or save the target figure that steganography has client mark information In this case piece when user needs to save the screenshot picture again, directly can send corresponding mark letter to server Breath, then server determines the corresponding screenshot picture of the identification information, and the steganography in the screenshot picture according to the identification information The mark information of client obtains Target Photo, and the Target Photo is finally sent to client.Alternatively, when user needs again When secondary preservation Target Photo, the identification information of the Target Photo can be directly sent to server, then server can root Target Photo is returned to client according to the identification information.
By above mode, after user reveals screenshot picture, just by the mark information of steganography in screenshot picture It can more quickly and accurately determine picture leakage person, reduce since picture reveals the various losses of bring.
Optionally, mark information can also be encrypted in step S202, it is then that encrypted mark information is hidden It is written in the picture that client request saves.
Wherein, the mode of encryption can be by DES (Data Encryption Standard, symmetric encipherment algorithm), RSA (Rivest Shamir Adlemen, rivest, shamir, adelman) etc. is encrypted, and the disclosure adds mark information Close concrete mode is not construed as limiting.
In the picture that steganography is saved to client request after mark information is encrypted, avoids and steganography recovery is carried out to picture The leakage of client mark information afterwards can protect the safety of client mark information.If the picture is leaked, obtaining After revealing picture, steganography recovery first can be carried out to leakage picture, the decryption of information is marked further according to encryption key, thus Client mark information of the steganography in the picture is obtained, with clear picture leakage person.
It should be understood that being restored to the steganography of leakage picture or clothes can not be passed through to the decryption oprerations of mark information Business device is realized, that is, the steganography recovery or right to leakage picture may be implemented in the electronic equipments such as any electronic equipment, such as computer The decryption oprerations of mark information, the embodiment of the present disclosure are not construed as limiting this.
In addition, it is necessary to explanation, in the embodiments of the present disclosure, the steganography carried out in the picture that client request saves Operation can be the operation of the steganography based on airspace, can also be the steganography operation, etc. based on transform domain, the disclosure to this not yet It limits.
By the picture method for tracing of the embodiment of the present disclosure, the picture that can be sent in client, which saves, requests corresponding figure The mark information of steganography client in piece, obtains Target Photo, and the Target Photo is then sent to client and is saved.By Steganography has the mark information of client in Target Photo, therefore after Target Photo is leaked, so that it may be believed according to the label It reduces and is made since picture is revealed to realize the quick positioning to picture leakage person in the leakage source of breath tracking Target Photo At various losses.
Based on the same inventive concept, a kind of picture method for tracing is also provided in disclosure example, referring to Fig. 3, which is chased after Track method is applied to client, comprising the following steps:
Step S301 sends picture to server and saves request when receiving picture preservation instruction;
Step S302 receives the Target Photo that request is saved for responding the picture that the server is sent, wherein The Target Photo steganography has the mark information of client;
Step S303 saves instruction according to the picture and saves the Target Photo.
Optionally, it is that the client is detecting the duplication operation for picture, sharing operation which, which saves instruction, It is generated when with any one of forwarding operation, in this case, which saves the figure that request may include the picture Piece mark.
In this way, after server receives picture preservation request, it can be first corresponding by server according to the picture identification Original image replicated, then in the picture of duplication steganography client mark information, obtain Target Photo, and send It is saved to client.If the Target Photo is leaked, so that it may mark letter according to the client of steganography in Target Photo Breath tracking picture leakage person, to reduce the various losses as caused by picture leakage.
Optionally, which, which saves instruction, can also be what client was generated when detecting that screenshotss operate, in such feelings Under condition, it may include screenshot picture which, which saves request,.
In this way, after server receives the screenshot picture for including in picture preservation request, it will be in the screenshot picture The mark information of middle steganography client, obtains Target Photo, and is sent to client and is saved.If the Target Photo is let out Dew, so that it may picture leakage person be tracked according to the client mark information of steganography in Target Photo, to reduce since picture is let out Various losses caused by dew.
Optionally, in the embodiments of the present disclosure, can also scheme when determining that the client is in picture browsing mode Addition prompt layer in piece browser window, and the leakage-preventing information of picture is shown in the prompt layer.
Wherein, picture browsing mode is the mode that client opens picture-browsing window browsing pictures, the leakage-preventing letter of picture Breath may include the identification information of client active user, such as the name of active user, work number, cell-phone number etc., this It is open that this is not construed as limiting, as long as can determine unique client user by the leakage-preventing information of picture.
Illustratively, when client is in picture browsing mode, translucent mention can be added in picture-browsing window Show layer, with identification informations such as the name, the work numbers that show client active user, improves the leakage-preventing meaning of picture of active user Know.Also, if user has carried out screenshotss operation, then this section at browsing pictures (client is in picture browsing mode) Screen, which operates corresponding screenshot picture, will include the leakage-preventing information of picture that prompt layer is shown, therefore, when the screenshot picture is leaked Afterwards, leakage person can quickly be determined by the leakage-preventing information of the picture, to reduce since picture reveals the various losses of bring.
In addition, alternatively or additionally, when client is in picture browsing mode, the screenshotss of client can also be forbidden Function prevents client user from revealing picture by way of screenshotss.I.e. the embodiment of the present disclosure provide method can also include When determining that client is under picture browsing mode, enable the client forbids screenshotss function.
By above mode, for client after sending picture and saving request, what is received is that steganography has client label The Target Photo of information.If Target Photo is leaked, so that it may according to the client mark information of steganography, quickly determine figure Piece leakage person is lost as caused by picture leakage to reduce.
Illustrate the complete procedure of client and server interaction in the embodiment of the present disclosure below.
As picture A of the user in browsing client target application software, " copying picture " is clicked, that is, client As soon as the duplicate instructions for the picture in client objectives application software that user issues are had received, then client is to clothes Business device sends picture and saves request, and the picture saves the mark for requesting the original image including picture A and request duplication should The solicited message of original image.
Server receives the picture and saves request, saves the mark in request according to the picture, determines that picture A is corresponding Then original image replicates the original image, finally in the obtained picture of duplication steganography client mark information, Target Photo is obtained, and the Target Photo is sent to client.
After client receives the Target Photo, is replicated according to above-mentioned duplicate instructions and save the Target Photo.If objective Family end subscriber reveals the Target Photo, so that it may according to the client mark information fast track picture of steganography in Target Photo Leakage person, to reduce since picture reveals the various losses of bring.
Based on the same inventive concept, the disclosure also provides a kind of picture follow-up mechanism, referring to Fig. 4, the picture follow-up mechanism 400 are applied to server, may include with lower module:
First receiving module 401, the picture for receiving client transmission save request;
Steganography module 402, for the mark information of client described in the steganography in the picture that the client request saves, Obtain Target Photo;
First sending module 403 is saved for the Target Photo to be sent to the client, the label letter Cease the leakage source for tracking the Target Photo.
Optionally, it includes the picture mark that the original image of duplication was requested and requested in picture reproduction that the picture, which saves request, Know, the steganography module 402 is for replicating the original image according to the picture identification, and the figure obtained in duplication The mark information of client described in steganography in piece, obtains the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate, it is described hidden Mark information of the writing module 402 for client described in the steganography in the screenshot picture, obtains the Target Photo.
Optionally, the steganography module 402 believes the encrypted label for encrypting to the mark information Breath steganography enters in the picture that the client request saves.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client The identity information of user.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
By above device, it can be saved in the picture that client is sent and request steganography client in corresponding picture Mark information obtains Target Photo, and the Target Photo is then sent to client and is saved.Due to steganography in Target Photo There is the mark information of client, therefore after Target Photo is leaked, so that it may which Target Photo is tracked according to the mark information Reveal source, to realize quick positioning to picture leakage person, reduce as picture leakage and caused by various losses.
Based on the same inventive concept, the disclosure also provides a kind of picture follow-up mechanism, referring to Fig. 5, the picture follow-up mechanism 500 are applied to client, may include with lower module:
Second sending module 501, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module 502, the mesh that request is saved for responding the picture sent for receiving the server It marks on a map piece, wherein the Target Photo steganography has the mark information of client;
Preserving module 503 saves the Target Photo for saving instruction according to the picture.
Optionally, second sending module 501 is used to answer receive that user issues for the client objectives When with the duplicate instructions of the picture in software, Xiang Suoshu server sends the picture and saves request, and the picture preservation is asked Ask the mark of the original image including the picture and the solicited message of the request duplication original image.
Optionally, the second sending module 501 is used in the screenshotss instruction for receiving user, and Xiang Suoshu server sends packet The picture for including screenshot picture saves request.
Optionally, described device 500 further includes determining module, for determining that the client is in picture browsing mode, The picture browsing mode is the mode that the client opens picture-browsing window browsing pictures;Described device 500 further includes First processing module and/or Second processing module, wherein the first processing module in the picture-browsing window for adding Add prompt layer, and shows the leakage-preventing information of picture in the prompt layer;The Second processing module is used for clear in the picture It lookes under mode, enable the client forbids screenshotss function.
By above mode, for client after sending picture and saving request, what is received is that steganography has client label The Target Photo of information.If the Target Photo is leaked, so that it may according to the client mark information of steganography, determine that picture is let out Dew person is lost as caused by picture leakage to reduce.
Based on the same inventive concept, the embodiment of the present disclosure also provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, it is any of the above-described applied to client to realize for executing the computer program in the memory The step of picture method for tracing at end.
Fig. 6 is a kind of block diagram for the above-mentioned electronic equipment that the embodiment of the present disclosure provides, which may be provided as A kind of client, such as smart phone, tablet computer etc., the embodiment of the present disclosure do not limit the type and form of electronic equipment It is fixed.As an example, as shown in fig. 6, the electronic equipment 600 may include: processor 601, memory 602.The electronics is set Standby 600 can also include multimedia component 603, one of input/output (I/O) interface 604 and communication component 605 or More persons.
Wherein, processor 601 is used for the integrated operation of controlling electronic devices 600, to complete above-mentioned to be applied to client Picture method for tracing in all or part of the steps, for example, processor 601 can receive picture save instruction when, to Server sends picture and saves request, then receives the target that request is saved for responding the picture that the server is sent Picture, and instruction is saved according to the picture and saves the Target Photo.
Memory 602 is used to store various types of data to support the operation in the electronic equipment 600, these data examples It such as may include the instruction and application program phase of any application or method for being operated on the electronic equipment 600 The data of pass, such as the Target Photo, etc. that the steganography received has client mark information can be saved.
Memory 602 can realize by any kind of volatibility or non-volatile memory device or their combination, Such as static random access memory (Static Random Access Memory, abbreviation SRAM), electrically erasable is only It reads memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), it is erasable Except programmable read only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), may be programmed only It reads memory (Programmable Read-Only Memory, abbreviation PROM), read-only memory (Read-Only Memory, Abbreviation ROM), magnetic memory, flash memory, disk or CD.
Multimedia component 603 may include screen and audio component.Wherein screen for example can be touch screen, then can be with When user touches the picture save button on the touch screen, it is determined that receive picture and save instruction.Audio component is for defeated Out and/or input audio signal.For example, audio component may include a microphone, microphone is for receiving external audio letter Number.The received audio signal can be further stored in memory 602 or be sent by communication component 605.Audio component Further include at least one loudspeaker, is used for output audio signal.I/O interface 604 is between processor 601 and other interface modules Interface is provided, other above-mentioned interface modules can be keyboard, mouse, button etc..These buttons can be virtual push button or reality Body button can be used for receiving picture and save instruction.
Communication component 605 is for carrying out wired or wireless communication between the electronic equipment 600 and other equipment.Channel radio Letter, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G or 4G or they One or more of combination, therefore the corresponding communication component 505 may include: Wi-Fi module, bluetooth module, NFC mould Block.
In one exemplary embodiment, electronic equipment 600 can be by one or more application specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device, Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array (Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member Part is realized, for executing the above-mentioned picture method for tracing applied to client.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of any of the above-described picture method for tracing applied to client is realized when program instruction is executed by processor.For example, the meter Calculation machine readable storage medium storing program for executing can be the above-mentioned memory 602 including program instruction, and above procedure instruction can be by electronic equipment 600 Processor 601 execute to complete any of the above-described picture method for tracing applied to client.
Based on the same inventive concept, the embodiment of the present disclosure also provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, it is any of the above-described applied to service to realize for executing the computer program in the memory The step of picture method for tracing of device.
Wherein, a kind of block diagram of the electronic equipment is as shown in fig. 7, electronic equipment 700 may be provided as a server.Ginseng According to Fig. 7, electronic equipment 700 includes processor 722, and quantity can be one or more and memory 732, for storing The computer program that can be executed by processor 722.The computer program stored in memory 732 may include one or one with On each correspond to one group of instruction module.In addition, processor 722, which can be configured as, executes the computer program, with Any of the above-described picture method for tracing applied to server is executed, for example, processor 722 can receive the picture of client transmission Save request, then in the picture that the client request saves client described in steganography mark information, obtain target figure Piece, and the Target Photo is sent to the client and is saved, the mark information is for tracking the Target Photo Leakage source.
In addition, electronic equipment 700 can also include power supply module 726 and communication component 750, which can be with It is configured as executing the power management of electronic equipment 700, which, which can be configured as, realizes electronic equipment 700 Communication, for example, wired or wireless communication.In addition, the electronic equipment 700 can also include input/output (I/O) interface 758.Electricity Sub- equipment 700 can be operated based on the operating system for being stored in memory 732, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of any of the above-described picture method for tracing applied to server is realized when program instruction is executed by processor.For example, the meter Calculation machine readable storage medium storing program for executing can be the above-mentioned memory 732 including program instruction, and above procedure instruction can be by electronic equipment 700 Processor 722 execute to complete any of the above-described picture method for tracing applied to server.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (10)

1. a kind of picture method for tracing characterized by comprising
It receives the picture that client is sent and saves request;
The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;
The Target Photo is sent to the client to save, the mark information is for tracking the Target Photo Reveal source.
2. the method according to claim 1, wherein it includes picture identification that the picture, which saves request,;
The mark information of the client described in steganography in the picture that the client request saves, obtains Target Photo, wraps It includes:
Corresponding original image is searched according to the picture identification;
The original image is replicated, and in the obtained picture of duplication client described in steganography mark information, obtain The Target Photo.
3. the method according to claim 1, wherein the picture saves the screenshotss that request includes the client Operate obtained screenshot picture;
The mark information of the client described in steganography in the picture that the client request saves, obtains Target Photo, wraps It includes:
The mark information of client described in steganography in the screenshot picture, obtains the Target Photo.
4. a kind of picture method for tracing characterized by comprising
When receiving picture preservation instruction, picture is sent to server and saves request;
Receive the Target Photo that request is saved for responding the picture that the server is sent, wherein the Target Photo Steganography has the mark information of client;
Instruction, which is saved, according to the picture saves the Target Photo.
5. according to the method described in claim 4, it is characterized in that, it is that the client is detecting that the picture, which saves instruction, For the duplication operation of picture, when any one of sharing operation and forwarding operation, is generated, and the picture saves request and includes The picture identification of the picture.
6. a kind of picture follow-up mechanism characterized by comprising
First receiving module, the picture for receiving client transmission save request;
Steganography module obtains mesh for the mark information of client described in the steganography in the picture that the client request saves It marks on a map piece;
First sending module is saved for the Target Photo to be sent to the client, and the mark information is used for Track the leakage source of the Target Photo.
7. a kind of picture follow-up mechanism characterized by comprising
Second sending module, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module, the Target Photo that request is saved for responding the picture sent for receiving the server, Wherein, the Target Photo steganography has the mark information of client;
Preserving module saves the Target Photo for saving instruction according to the picture.
8. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-3 The step of method.
9. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one of claim 4 or 5 institute The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of any one of claim 1-5 the method is realized when execution.
CN201811260372.2A 2018-10-26 2018-10-26 Picture method for tracing, device, electronic equipment and storage medium Pending CN109584138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811260372.2A CN109584138A (en) 2018-10-26 2018-10-26 Picture method for tracing, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811260372.2A CN109584138A (en) 2018-10-26 2018-10-26 Picture method for tracing, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109584138A true CN109584138A (en) 2019-04-05

Family

ID=65921023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811260372.2A Pending CN109584138A (en) 2018-10-26 2018-10-26 Picture method for tracing, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109584138A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149535A (en) * 2019-05-16 2019-08-20 北京小米移动软件有限公司 Image management method and device, storage medium
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610810A (en) * 2015-12-23 2016-05-25 北京奇虎科技有限公司 Data processing method, client and servers

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610810A (en) * 2015-12-23 2016-05-25 北京奇虎科技有限公司 Data processing method, client and servers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王洪君等: "一种基于隐写术的机密文档泄露追踪方案", 《电子技术与软件工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149535A (en) * 2019-05-16 2019-08-20 北京小米移动软件有限公司 Image management method and device, storage medium
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
US20210227064A1 (en) Mobile communication device
EP3772700B1 (en) Method and device for encrypting model of neural network, and storage medium
CN104852911B (en) Safe verification method, apparatus and system
CN112287372B (en) Method and apparatus for protecting clipboard privacy
US9525548B2 (en) Provisioning techniques
CN104636645A (en) Method and device for controlling data accessing
KR101768813B1 (en) System for providing remote consulting service and security solution thereof
CN103095457A (en) Login and verification method for application program
CN110826103B (en) Method, device, equipment and storage medium for processing document authority based on blockchain
CN108900553B (en) Communication method, device and computer readable storage medium
CN103107887A (en) Method and device for controlling files based on position information
US20220294624A1 (en) Encryption method and device, electronic apparatus and storage medium
CN107766701A (en) Electronic equipment, dynamic library file guard method and device
CN106778225A (en) The method and apparatus for processing password
Stach How to assure privacy on android phones and devices?
CN109584138A (en) Picture method for tracing, device, electronic equipment and storage medium
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN108155993B (en) Data encryption method and device for VSIM card
US9854444B2 (en) Apparatus and methods for preventing information disclosure
CN113468606A (en) Application program access method and electronic equipment
KR20140025680A (en) Method for controlling mobile terminal
CN106062762A (en) Application encryption method and device
KR101789007B1 (en) Method for managing mobile control based on mobile device and mobile device using the same
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN114553552A (en) Data encryption method and device, data decryption method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405

RJ01 Rejection of invention patent application after publication