CN109584138A - Picture method for tracing, device, electronic equipment and storage medium - Google Patents
Picture method for tracing, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN109584138A CN109584138A CN201811260372.2A CN201811260372A CN109584138A CN 109584138 A CN109584138 A CN 109584138A CN 201811260372 A CN201811260372 A CN 201811260372A CN 109584138 A CN109584138 A CN 109584138A
- Authority
- CN
- China
- Prior art keywords
- picture
- client
- request
- target photo
- saves
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004321 preservation Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 17
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000011084 recovery Methods 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003362 replicative effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This disclosure relates to a kind of picture method for tracing, device, electronic equipment and storage medium, quickly to determine picture leakage person after picture is leaked.Picture method for tracing in the disclosure includes: to receive the picture that client is sent to save request;The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;The Target Photo is sent to the client to save, the mark information is used to track the leakage source of the Target Photo.
Description
Technical field
This disclosure relates to picture technical field, and in particular, to a kind of picture method for tracing, device, electronic equipment and deposit
Storage media.
Background technique
With the rapid development of science and technology, various application software emerge one after another, user when using various application software,
Picture is often saved, and shares picture to other people, so as to cause the picture in application software to be revealed.For example, enterprise is
When communication software, picture would generally be related to enterprise secret, if user leaks the picture for being related to enterprise's secret, this will give enterprise
Bring serious loss.Therefore, for enterprise, it is often desirable that after picture leakage, it can quickly determine picture leakage person,
To reduce due to picture leakage bring loss.
Summary of the invention
Purpose of this disclosure is to provide a kind of picture method for tracing, device, electronic equipment and storage mediums, in picture quilt
After leakage, picture leakage person is quickly determined.
To achieve the goals above, in a first aspect, the disclosure provides a kind of picture method for tracing, comprising:
It receives the picture that client is sent and saves request;
The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;
The Target Photo is sent to the client to save, the mark information is for tracking the target figure
The leakage source of piece.
Optionally, it includes picture identification that the picture, which saves request,;
The mark information of the client described in steganography in the picture that the client request saves, obtains target figure
Piece, comprising:
Corresponding original image is searched according to the picture identification;
The original image is replicated, and in the obtained picture of duplication client described in steganography mark information,
Obtain the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate;
The mark information of the client described in steganography in the picture that the client request saves, obtains target figure
Piece, comprising:
The mark information of client described in steganography in the screenshot picture, obtains the Target Photo.
Optionally, the mark information of the client described in steganography in the picture that the client request saves, obtains
Target Photo, comprising:
The mark information is encrypted, the encrypted mark information steganography is entered into the client request and is saved
Picture in.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client
The identity information of user.
Second aspect, the disclosure also provide a kind of picture method for tracing, comprising:
When receiving picture preservation instruction, picture is sent to server and saves request;
Receive the Target Photo that request is saved for responding the picture that the server is sent, wherein the target
Picture steganography has the mark information of client;
Instruction, which is saved, according to the picture saves the Target Photo.
Optionally, it is that the client is detecting the duplication operation for picture that the picture, which saves instruction, shares behaviour
It is generated when any one of work and forwarding operation, the picture saves picture identification of the request including the picture.
Optionally, the picture, which saves, instructs the client to generate when detecting screenshotss operation, the picture
Saving request includes screenshot picture.
Optionally, the method also includes:
Determine that the client is in picture browsing mode, the picture browsing mode is that the client unlatching picture is clear
Look at the modes of window browsing pictures;
The addition prompt layer in the picture-browsing window, and the leakage-preventing information of picture is shown in the prompt layer;With/
Or, enable the client forbids screenshotss function under the picture browsing mode.
The third aspect, the disclosure also provide a kind of picture follow-up mechanism, comprising:
First receiving module, the picture for receiving client transmission save request;
Steganography module is obtained for the mark information of client described in the steganography in the picture that the client request saves
To Target Photo;
First sending module saves, the mark information for the Target Photo to be sent to the client
For tracking the leakage source of the Target Photo.
Optionally, it includes picture identification that the picture, which saves request, and the steganography module is used for according to the picture identification
Corresponding original image is searched, and the original image is replicated, the client described in steganography in the picture that duplication obtains
Mark information, obtain the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate, it is described hidden
Mark information of the writing module for client described in the steganography in the screenshot picture, obtains the Target Photo.
Optionally, the steganography module is for encrypting the mark information, by the encrypted mark information
Steganography enters in the picture that the client request saves.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client
The identity information of user.
Fourth aspect, the disclosure also provide a kind of picture follow-up mechanism, comprising:
Second sending module, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module, the target figure that request is saved for responding the picture sent for receiving the server
Piece, wherein the Target Photo steganography has the mark information of client;
Preserving module saves the Target Photo for saving instruction according to the picture.
Optionally, it is that the client is detecting the duplication operation for picture that the picture, which saves instruction, shares behaviour
It is generated when any one of work and forwarding operation, the picture saves picture identification of the request including the picture.
Optionally, the picture, which saves, instructs the client to generate when detecting screenshotss operation, the picture
Saving request includes screenshot picture.
Optionally, described device further includes determining module, described for determining that the client is in picture browsing mode
Picture browsing mode is the mode that the client opens picture-browsing window browsing pictures;
Described device further includes first processing module and/or Second processing module, and the first processing module is used in institute
Addition prompt layer in picture-browsing window is stated, and shows the leakage-preventing information of picture in the prompt layer;The second processing mould
Block is used under the picture browsing mode, and enable the client forbids screenshotss function.
5th aspect, the disclosure also provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one institute in first aspect
The step of stating method.
6th aspect, the disclosure also provide a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one institute in second aspect
The step of stating method.
7th aspect, the disclosure also provide a kind of computer readable storage medium, are stored thereon with computer program, the journey
The step of any one of first aspect and second aspect the method are realized when sequence is executed by processor.
By adopting the above technical scheme, it at least can achieve following technical effect:
The mark information of above-mentioned technical proposal steganography client in the picture that client request saves, obtains target figure
Then Target Photo is sent to client and saved by piece, so that the picture leaked out through client carries the visitor
The mark information at family end.Therefore, after obtaining the picture being leaked, so that it may be tracked and be let out according to the mark information in the picture
Reveal source, to reduce due to picture leakage bring loss and call to account to leakage person.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool
Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of implementation environment schematic diagram of picture method for tracing shown according to one exemplary embodiment of the disclosure;
Fig. 2 is an a kind of flow chart of picture method for tracing shown according to one exemplary embodiment of the disclosure;
Fig. 3 is an a kind of flow chart of picture method for tracing shown according to disclosure another exemplary embodiment;
Fig. 4 is an a kind of block diagram of picture follow-up mechanism shown according to one exemplary embodiment of the disclosure;
Fig. 5 is an a kind of block diagram of picture follow-up mechanism shown according to disclosure another exemplary embodiment;
Fig. 6 is the block diagram according to a kind of electronic equipment shown in one exemplary embodiment of the disclosure;
Fig. 7 is the block diagram according to a kind of electronic equipment shown in disclosure another exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched
The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
Fig. 1 is a kind of schematic diagram of implementation environment shown in one exemplary embodiment of the disclosure, as shown in Figure 1, the implementation
Environment may include client 110, and the server 120 being connected by network with client 110.Wherein, client 110 is pacified
The application software supported is provided equipped with server 120, such as instant message applications, client 110 can pass through the instant messaging
Software receives the picture that server 120 is sent.Client 110 can be smart phone, tablet computer, PC machine, laptop
Etc..In Fig. 1, client 110 is illustrated by taking smart phone as an example.
Fig. 2 is a kind of flow chart of picture method for tracing shown according to one exemplary embodiment of the disclosure, reference Fig. 2,
The picture method for tracing can be applied to server, comprising the following steps:
Step S201 receives the picture that client is sent and saves request.
Illustratively, which, which saves request and can be client, answers for a certain picture of client detecting user
When system operation, generate and send to server.
In addition, the application software of client installation can be designed as any transmission for picture operate be required to it is first right
Picture is saved, then is sent to the picture of preservation, and transmission operation for example can be forwarding operation or sharing operation.
In this case, which, which saves request and be also possible to client, divides for a certain picture of client detecting user
When enjoying operation or forwarding operation, generate and send to server.
It is above-mentioned only to picture save request generation carry out for example, the disclosure in the specific implementation, according to reality
Border demand, client can also generate picture preservation request and be sent to server, example under other user's operations for picture
Such as, shearing manipulation, the disclosure do not limit this.
Step S202, the mark information of client described in steganography, obtains mesh in the picture that the client request saves
It marks on a map piece.
The Target Photo is sent to the client and saved by step S203, and the mark information is for tracking
The leakage source of the Target Photo.
It in the embodiments of the present disclosure, can be in client after the picture that server receives client transmission saves request
The mark information of steganography client, obtains Target Photo, the Target Photo is then sent to visitor in the picture that end request saves
Family end is saved, since steganography has the mark information of client in Target Photo, after Target Photo is leaked, so that it may
To get the mark information by steganography recovery, and according to the leakage source of mark information tracking Target Photo, thus real
Now to the quick positioning of picture leakage person, reduce as picture leakage and caused by various losses.
In the embodiments of the present disclosure, the mark information of client can be one or more of following information:
Picture save the timestamp information of request, the location information where client, client active user identity letter
Breath.
For example, after receiving the picture that client is sent and saving request, it can be hidden in the picture that client request saves
The identity information for writing client active user obtains Target Photo, can pass through the body in this way after Target Photo is leaked
Part information, determines the user information for saving the picture, to quickly determine the leakage person of Target Photo.
Alternatively, after receiving the picture that client is sent and saving request, it can also be in the picture that client request saves
Steganography picture saves the timestamp information of request, obtains Target Photo, which is used to characterize user and saves picture
Time can determine the time for saving the picture by the timestamp information after Target Photo is leaked, reduce and search figure
The range of piece leakage person, to quickly determine the leakage person of Target Photo.
It, can also be in the picture of client request preservation or after receiving the picture that client is sent and saving request
Location information where middle steganography client, obtains Target Photo, which is used to characterize the place that user saves picture,
The place for saving the picture can be determined by the location information after Target Photo is leaked, reduce and search picture leakage
The range of person, to quickly determine the leakage person of Target Photo.
It certainly, in the embodiments of the present disclosure, can also be in client request in order to more quickly determine picture leakage person
Location information, client active user in the picture of preservation where the timestamp information of steganography picture preservation request, client
Identity information these three information in the two or three, for example, the steganography client figure in the picture that client request saves
Piece saves the timestamp information and the identity information of client active user the two information of request, or protects in client request
Where identity information, the picture preservation of steganography client active user is requested in the picture deposited timestamp information and client
These three information of location information, etc., the disclosure is not construed as limiting this.
It should be understood that the acquisition of client mark information, which can be server, is receiving picture preservation request every time
Afterwards, by sending the request message acquisition for request client identification information to client.Alternatively possible
In implementation, client, which can carry identification information to save in request in picture, is sent to server, for example, the client
For the installation software application APP in a user device that server provides, by the generation for designing software application APP
Code can be realized in the case where not changing user equipment own system code and carry client identification information in picture preservation
In request, in this case, server can directly save the identification information that client is obtained in request from picture.
In one possible implementation, it may include picture identification that picture, which saves request, correspondingly, above-mentioned steps
S202 can be with are as follows: searches corresponding original image according to the picture identification, and replicates to the original image, is replicating
The mark information of client described in steganography in obtained picture, obtains the Target Photo.
It is worth noting that picture identification be save to request corresponding original image for unique identification picture, for example,
It can be the picture name of the original image, or can be the preservation serial number, etc. of the original image on the server, the disclosure
This is not construed as limiting, as long as original image can be uniquely determined according to the picture identification.
For obtaining the mode of picture identification, the embodiment of the present disclosure is not construed as limiting this, below shown in Fig. 1 for scene
Possible mode is illustrated.When client 110 is from 120 download pictures of server, server 120 is by the picture mark of the picture
Knowledge has sent jointly to client 110, therefore, when client triggering picture saves request, can be directly obtained the picture
Corresponding picture identification.
Illustratively, when server, which receives picture, saves request, server first can be according to picture identification lookup pair
Then the original image answered replicates the original image, finally in the obtained picture of duplication steganography client label
Information obtains Target Photo.Steganography operation can be carried out to avoid the original image stored to server in this way, remain original graph
The original state of piece facilitates other users and operates to the preservation of the original image.
In alternatively possible implementation, picture saves section that the screenshotss that request may include client operate
Shield picture, then, correspondingly, it can be the mark information of the steganography client in the screenshot picture in step S202, obtain
Target Photo.
That is, picture save request can be client detect user screenshotss operation when, generate and send to
Server, it is illustrated by mobile phone 110 of client shown in Fig. 1, the mobile phone 110 is in the screenshotss operation for detecting user
Afterwards, generation includes that the picture of screenshot picture saves request, and sends picture preservation request to server 120, when server connects
Receive this include screenshot picture picture save request when, the mark information of steganography client, obtains mesh in the screenshot picture
It marks on a map piece.It in this way, can by the mark information of steganography in screenshot picture after user reveals screenshot picture
More quickly and accurately to determine picture leakage person, reduce since picture reveals the various losses of bring.
It should be noted that being stated on the implementation to before the scheme for returning to client after screenshot picture progress steganography, go back
Can carry out subscriber authentication, when subscriber authentication success when, client can detect user screenshotss operation after,
It generates picture preservation request Concurrency and gives server, to realize the steganography for screenshot picture.
In addition, server can save the screenshot picture received or save the target figure that steganography has client mark information
In this case piece when user needs to save the screenshot picture again, directly can send corresponding mark letter to server
Breath, then server determines the corresponding screenshot picture of the identification information, and the steganography in the screenshot picture according to the identification information
The mark information of client obtains Target Photo, and the Target Photo is finally sent to client.Alternatively, when user needs again
When secondary preservation Target Photo, the identification information of the Target Photo can be directly sent to server, then server can root
Target Photo is returned to client according to the identification information.
By above mode, after user reveals screenshot picture, just by the mark information of steganography in screenshot picture
It can more quickly and accurately determine picture leakage person, reduce since picture reveals the various losses of bring.
Optionally, mark information can also be encrypted in step S202, it is then that encrypted mark information is hidden
It is written in the picture that client request saves.
Wherein, the mode of encryption can be by DES (Data Encryption Standard, symmetric encipherment algorithm),
RSA (Rivest Shamir Adlemen, rivest, shamir, adelman) etc. is encrypted, and the disclosure adds mark information
Close concrete mode is not construed as limiting.
In the picture that steganography is saved to client request after mark information is encrypted, avoids and steganography recovery is carried out to picture
The leakage of client mark information afterwards can protect the safety of client mark information.If the picture is leaked, obtaining
After revealing picture, steganography recovery first can be carried out to leakage picture, the decryption of information is marked further according to encryption key, thus
Client mark information of the steganography in the picture is obtained, with clear picture leakage person.
It should be understood that being restored to the steganography of leakage picture or clothes can not be passed through to the decryption oprerations of mark information
Business device is realized, that is, the steganography recovery or right to leakage picture may be implemented in the electronic equipments such as any electronic equipment, such as computer
The decryption oprerations of mark information, the embodiment of the present disclosure are not construed as limiting this.
In addition, it is necessary to explanation, in the embodiments of the present disclosure, the steganography carried out in the picture that client request saves
Operation can be the operation of the steganography based on airspace, can also be the steganography operation, etc. based on transform domain, the disclosure to this not yet
It limits.
By the picture method for tracing of the embodiment of the present disclosure, the picture that can be sent in client, which saves, requests corresponding figure
The mark information of steganography client in piece, obtains Target Photo, and the Target Photo is then sent to client and is saved.By
Steganography has the mark information of client in Target Photo, therefore after Target Photo is leaked, so that it may be believed according to the label
It reduces and is made since picture is revealed to realize the quick positioning to picture leakage person in the leakage source of breath tracking Target Photo
At various losses.
Based on the same inventive concept, a kind of picture method for tracing is also provided in disclosure example, referring to Fig. 3, which is chased after
Track method is applied to client, comprising the following steps:
Step S301 sends picture to server and saves request when receiving picture preservation instruction;
Step S302 receives the Target Photo that request is saved for responding the picture that the server is sent, wherein
The Target Photo steganography has the mark information of client;
Step S303 saves instruction according to the picture and saves the Target Photo.
Optionally, it is that the client is detecting the duplication operation for picture, sharing operation which, which saves instruction,
It is generated when with any one of forwarding operation, in this case, which saves the figure that request may include the picture
Piece mark.
In this way, after server receives picture preservation request, it can be first corresponding by server according to the picture identification
Original image replicated, then in the picture of duplication steganography client mark information, obtain Target Photo, and send
It is saved to client.If the Target Photo is leaked, so that it may mark letter according to the client of steganography in Target Photo
Breath tracking picture leakage person, to reduce the various losses as caused by picture leakage.
Optionally, which, which saves instruction, can also be what client was generated when detecting that screenshotss operate, in such feelings
Under condition, it may include screenshot picture which, which saves request,.
In this way, after server receives the screenshot picture for including in picture preservation request, it will be in the screenshot picture
The mark information of middle steganography client, obtains Target Photo, and is sent to client and is saved.If the Target Photo is let out
Dew, so that it may picture leakage person be tracked according to the client mark information of steganography in Target Photo, to reduce since picture is let out
Various losses caused by dew.
Optionally, in the embodiments of the present disclosure, can also scheme when determining that the client is in picture browsing mode
Addition prompt layer in piece browser window, and the leakage-preventing information of picture is shown in the prompt layer.
Wherein, picture browsing mode is the mode that client opens picture-browsing window browsing pictures, the leakage-preventing letter of picture
Breath may include the identification information of client active user, such as the name of active user, work number, cell-phone number etc., this
It is open that this is not construed as limiting, as long as can determine unique client user by the leakage-preventing information of picture.
Illustratively, when client is in picture browsing mode, translucent mention can be added in picture-browsing window
Show layer, with identification informations such as the name, the work numbers that show client active user, improves the leakage-preventing meaning of picture of active user
Know.Also, if user has carried out screenshotss operation, then this section at browsing pictures (client is in picture browsing mode)
Screen, which operates corresponding screenshot picture, will include the leakage-preventing information of picture that prompt layer is shown, therefore, when the screenshot picture is leaked
Afterwards, leakage person can quickly be determined by the leakage-preventing information of the picture, to reduce since picture reveals the various losses of bring.
In addition, alternatively or additionally, when client is in picture browsing mode, the screenshotss of client can also be forbidden
Function prevents client user from revealing picture by way of screenshotss.I.e. the embodiment of the present disclosure provide method can also include
When determining that client is under picture browsing mode, enable the client forbids screenshotss function.
By above mode, for client after sending picture and saving request, what is received is that steganography has client label
The Target Photo of information.If Target Photo is leaked, so that it may according to the client mark information of steganography, quickly determine figure
Piece leakage person is lost as caused by picture leakage to reduce.
Illustrate the complete procedure of client and server interaction in the embodiment of the present disclosure below.
As picture A of the user in browsing client target application software, " copying picture " is clicked, that is, client
As soon as the duplicate instructions for the picture in client objectives application software that user issues are had received, then client is to clothes
Business device sends picture and saves request, and the picture saves the mark for requesting the original image including picture A and request duplication should
The solicited message of original image.
Server receives the picture and saves request, saves the mark in request according to the picture, determines that picture A is corresponding
Then original image replicates the original image, finally in the obtained picture of duplication steganography client mark information,
Target Photo is obtained, and the Target Photo is sent to client.
After client receives the Target Photo, is replicated according to above-mentioned duplicate instructions and save the Target Photo.If objective
Family end subscriber reveals the Target Photo, so that it may according to the client mark information fast track picture of steganography in Target Photo
Leakage person, to reduce since picture reveals the various losses of bring.
Based on the same inventive concept, the disclosure also provides a kind of picture follow-up mechanism, referring to Fig. 4, the picture follow-up mechanism
400 are applied to server, may include with lower module:
First receiving module 401, the picture for receiving client transmission save request;
Steganography module 402, for the mark information of client described in the steganography in the picture that the client request saves,
Obtain Target Photo;
First sending module 403 is saved for the Target Photo to be sent to the client, the label letter
Cease the leakage source for tracking the Target Photo.
Optionally, it includes the picture mark that the original image of duplication was requested and requested in picture reproduction that the picture, which saves request,
Know, the steganography module 402 is for replicating the original image according to the picture identification, and the figure obtained in duplication
The mark information of client described in steganography in piece, obtains the Target Photo.
Optionally, the screenshot picture that the screenshotss that the picture saves that request includes the client operate, it is described hidden
Mark information of the writing module 402 for client described in the steganography in the screenshot picture, obtains the Target Photo.
Optionally, the steganography module 402 believes the encrypted label for encrypting to the mark information
Breath steganography enters in the picture that the client request saves.
Optionally, the mark information of the client includes one or more of following information:
It is current that the picture saves location information where the timestamp information of request, the client, the client
The identity information of user.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
By above device, it can be saved in the picture that client is sent and request steganography client in corresponding picture
Mark information obtains Target Photo, and the Target Photo is then sent to client and is saved.Due to steganography in Target Photo
There is the mark information of client, therefore after Target Photo is leaked, so that it may which Target Photo is tracked according to the mark information
Reveal source, to realize quick positioning to picture leakage person, reduce as picture leakage and caused by various losses.
Based on the same inventive concept, the disclosure also provides a kind of picture follow-up mechanism, referring to Fig. 5, the picture follow-up mechanism
500 are applied to client, may include with lower module:
Second sending module 501, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module 502, the mesh that request is saved for responding the picture sent for receiving the server
It marks on a map piece, wherein the Target Photo steganography has the mark information of client;
Preserving module 503 saves the Target Photo for saving instruction according to the picture.
Optionally, second sending module 501 is used to answer receive that user issues for the client objectives
When with the duplicate instructions of the picture in software, Xiang Suoshu server sends the picture and saves request, and the picture preservation is asked
Ask the mark of the original image including the picture and the solicited message of the request duplication original image.
Optionally, the second sending module 501 is used in the screenshotss instruction for receiving user, and Xiang Suoshu server sends packet
The picture for including screenshot picture saves request.
Optionally, described device 500 further includes determining module, for determining that the client is in picture browsing mode,
The picture browsing mode is the mode that the client opens picture-browsing window browsing pictures;Described device 500 further includes
First processing module and/or Second processing module, wherein the first processing module in the picture-browsing window for adding
Add prompt layer, and shows the leakage-preventing information of picture in the prompt layer;The Second processing module is used for clear in the picture
It lookes under mode, enable the client forbids screenshotss function.
By above mode, for client after sending picture and saving request, what is received is that steganography has client label
The Target Photo of information.If the Target Photo is leaked, so that it may according to the client mark information of steganography, determine that picture is let out
Dew person is lost as caused by picture leakage to reduce.
Based on the same inventive concept, the embodiment of the present disclosure also provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, it is any of the above-described applied to client to realize for executing the computer program in the memory
The step of picture method for tracing at end.
Fig. 6 is a kind of block diagram for the above-mentioned electronic equipment that the embodiment of the present disclosure provides, which may be provided as
A kind of client, such as smart phone, tablet computer etc., the embodiment of the present disclosure do not limit the type and form of electronic equipment
It is fixed.As an example, as shown in fig. 6, the electronic equipment 600 may include: processor 601, memory 602.The electronics is set
Standby 600 can also include multimedia component 603, one of input/output (I/O) interface 604 and communication component 605 or
More persons.
Wherein, processor 601 is used for the integrated operation of controlling electronic devices 600, to complete above-mentioned to be applied to client
Picture method for tracing in all or part of the steps, for example, processor 601 can receive picture save instruction when, to
Server sends picture and saves request, then receives the target that request is saved for responding the picture that the server is sent
Picture, and instruction is saved according to the picture and saves the Target Photo.
Memory 602 is used to store various types of data to support the operation in the electronic equipment 600, these data examples
It such as may include the instruction and application program phase of any application or method for being operated on the electronic equipment 600
The data of pass, such as the Target Photo, etc. that the steganography received has client mark information can be saved.
Memory 602 can realize by any kind of volatibility or non-volatile memory device or their combination,
Such as static random access memory (Static Random Access Memory, abbreviation SRAM), electrically erasable is only
It reads memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), it is erasable
Except programmable read only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), may be programmed only
It reads memory (Programmable Read-Only Memory, abbreviation PROM), read-only memory (Read-Only Memory,
Abbreviation ROM), magnetic memory, flash memory, disk or CD.
Multimedia component 603 may include screen and audio component.Wherein screen for example can be touch screen, then can be with
When user touches the picture save button on the touch screen, it is determined that receive picture and save instruction.Audio component is for defeated
Out and/or input audio signal.For example, audio component may include a microphone, microphone is for receiving external audio letter
Number.The received audio signal can be further stored in memory 602 or be sent by communication component 605.Audio component
Further include at least one loudspeaker, is used for output audio signal.I/O interface 604 is between processor 601 and other interface modules
Interface is provided, other above-mentioned interface modules can be keyboard, mouse, button etc..These buttons can be virtual push button or reality
Body button can be used for receiving picture and save instruction.
Communication component 605 is for carrying out wired or wireless communication between the electronic equipment 600 and other equipment.Channel radio
Letter, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G or 4G or they
One or more of combination, therefore the corresponding communication component 505 may include: Wi-Fi module, bluetooth module, NFC mould
Block.
In one exemplary embodiment, electronic equipment 600 can be by one or more application specific integrated circuit
(Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital
Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device,
Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array
(Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member
Part is realized, for executing the above-mentioned picture method for tracing applied to client.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should
The step of any of the above-described picture method for tracing applied to client is realized when program instruction is executed by processor.For example, the meter
Calculation machine readable storage medium storing program for executing can be the above-mentioned memory 602 including program instruction, and above procedure instruction can be by electronic equipment 600
Processor 601 execute to complete any of the above-described picture method for tracing applied to client.
Based on the same inventive concept, the embodiment of the present disclosure also provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, it is any of the above-described applied to service to realize for executing the computer program in the memory
The step of picture method for tracing of device.
Wherein, a kind of block diagram of the electronic equipment is as shown in fig. 7, electronic equipment 700 may be provided as a server.Ginseng
According to Fig. 7, electronic equipment 700 includes processor 722, and quantity can be one or more and memory 732, for storing
The computer program that can be executed by processor 722.The computer program stored in memory 732 may include one or one with
On each correspond to one group of instruction module.In addition, processor 722, which can be configured as, executes the computer program, with
Any of the above-described picture method for tracing applied to server is executed, for example, processor 722 can receive the picture of client transmission
Save request, then in the picture that the client request saves client described in steganography mark information, obtain target figure
Piece, and the Target Photo is sent to the client and is saved, the mark information is for tracking the Target Photo
Leakage source.
In addition, electronic equipment 700 can also include power supply module 726 and communication component 750, which can be with
It is configured as executing the power management of electronic equipment 700, which, which can be configured as, realizes electronic equipment 700
Communication, for example, wired or wireless communication.In addition, the electronic equipment 700 can also include input/output (I/O) interface 758.Electricity
Sub- equipment 700 can be operated based on the operating system for being stored in memory 732, such as Windows ServerTM, Mac OS
XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should
The step of any of the above-described picture method for tracing applied to server is realized when program instruction is executed by processor.For example, the meter
Calculation machine readable storage medium storing program for executing can be the above-mentioned memory 732 including program instruction, and above procedure instruction can be by electronic equipment 700
Processor 722 execute to complete any of the above-described picture method for tracing applied to server.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure
Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance
In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can
No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally
Disclosed thought equally should be considered as disclosure disclosure of that.
Claims (10)
1. a kind of picture method for tracing characterized by comprising
It receives the picture that client is sent and saves request;
The mark information of client described in steganography, obtains Target Photo in the picture that the client request saves;
The Target Photo is sent to the client to save, the mark information is for tracking the Target Photo
Reveal source.
2. the method according to claim 1, wherein it includes picture identification that the picture, which saves request,;
The mark information of the client described in steganography in the picture that the client request saves, obtains Target Photo, wraps
It includes:
Corresponding original image is searched according to the picture identification;
The original image is replicated, and in the obtained picture of duplication client described in steganography mark information, obtain
The Target Photo.
3. the method according to claim 1, wherein the picture saves the screenshotss that request includes the client
Operate obtained screenshot picture;
The mark information of the client described in steganography in the picture that the client request saves, obtains Target Photo, wraps
It includes:
The mark information of client described in steganography in the screenshot picture, obtains the Target Photo.
4. a kind of picture method for tracing characterized by comprising
When receiving picture preservation instruction, picture is sent to server and saves request;
Receive the Target Photo that request is saved for responding the picture that the server is sent, wherein the Target Photo
Steganography has the mark information of client;
Instruction, which is saved, according to the picture saves the Target Photo.
5. according to the method described in claim 4, it is characterized in that, it is that the client is detecting that the picture, which saves instruction,
For the duplication operation of picture, when any one of sharing operation and forwarding operation, is generated, and the picture saves request and includes
The picture identification of the picture.
6. a kind of picture follow-up mechanism characterized by comprising
First receiving module, the picture for receiving client transmission save request;
Steganography module obtains mesh for the mark information of client described in the steganography in the picture that the client request saves
It marks on a map piece;
First sending module is saved for the Target Photo to be sent to the client, and the mark information is used for
Track the leakage source of the Target Photo.
7. a kind of picture follow-up mechanism characterized by comprising
Second sending module, for sending picture to server and saving request when receiving picture preservation instruction;
Second receiving module, the Target Photo that request is saved for responding the picture sent for receiving the server,
Wherein, the Target Photo steganography has the mark information of client;
Preserving module saves the Target Photo for saving instruction according to the picture.
8. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-3
The step of method.
9. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one of claim 4 or 5 institute
The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The step of any one of claim 1-5 the method is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811260372.2A CN109584138A (en) | 2018-10-26 | 2018-10-26 | Picture method for tracing, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811260372.2A CN109584138A (en) | 2018-10-26 | 2018-10-26 | Picture method for tracing, device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109584138A true CN109584138A (en) | 2019-04-05 |
Family
ID=65921023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811260372.2A Pending CN109584138A (en) | 2018-10-26 | 2018-10-26 | Picture method for tracing, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109584138A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149535A (en) * | 2019-05-16 | 2019-08-20 | 北京小米移动软件有限公司 | Image management method and device, storage medium |
CN110362979A (en) * | 2019-06-05 | 2019-10-22 | 努比亚技术有限公司 | A kind of method for secret protection, terminal and computer readable storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610810A (en) * | 2015-12-23 | 2016-05-25 | 北京奇虎科技有限公司 | Data processing method, client and servers |
-
2018
- 2018-10-26 CN CN201811260372.2A patent/CN109584138A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610810A (en) * | 2015-12-23 | 2016-05-25 | 北京奇虎科技有限公司 | Data processing method, client and servers |
Non-Patent Citations (1)
Title |
---|
王洪君等: "一种基于隐写术的机密文档泄露追踪方案", 《电子技术与软件工程》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149535A (en) * | 2019-05-16 | 2019-08-20 | 北京小米移动软件有限公司 | Image management method and device, storage medium |
CN110362979A (en) * | 2019-06-05 | 2019-10-22 | 努比亚技术有限公司 | A kind of method for secret protection, terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210227064A1 (en) | Mobile communication device | |
EP3772700B1 (en) | Method and device for encrypting model of neural network, and storage medium | |
CN104852911B (en) | Safe verification method, apparatus and system | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
US9525548B2 (en) | Provisioning techniques | |
CN104636645A (en) | Method and device for controlling data accessing | |
KR101768813B1 (en) | System for providing remote consulting service and security solution thereof | |
CN103095457A (en) | Login and verification method for application program | |
CN110826103B (en) | Method, device, equipment and storage medium for processing document authority based on blockchain | |
CN108900553B (en) | Communication method, device and computer readable storage medium | |
CN103107887A (en) | Method and device for controlling files based on position information | |
US20220294624A1 (en) | Encryption method and device, electronic apparatus and storage medium | |
CN107766701A (en) | Electronic equipment, dynamic library file guard method and device | |
CN106778225A (en) | The method and apparatus for processing password | |
Stach | How to assure privacy on android phones and devices? | |
CN109584138A (en) | Picture method for tracing, device, electronic equipment and storage medium | |
CN113055169B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN108155993B (en) | Data encryption method and device for VSIM card | |
US9854444B2 (en) | Apparatus and methods for preventing information disclosure | |
CN113468606A (en) | Application program access method and electronic equipment | |
KR20140025680A (en) | Method for controlling mobile terminal | |
CN106062762A (en) | Application encryption method and device | |
KR101789007B1 (en) | Method for managing mobile control based on mobile device and mobile device using the same | |
CN107302519B (en) | Identity authentication method and device for terminal equipment, terminal equipment and server | |
CN114553552A (en) | Data encryption method and device, data decryption method and device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |
|
RJ01 | Rejection of invention patent application after publication |