CN111538997A - Image processing method, image processing device, storage medium and terminal - Google Patents

Image processing method, image processing device, storage medium and terminal Download PDF

Info

Publication number
CN111538997A
CN111538997A CN202010241894.9A CN202010241894A CN111538997A CN 111538997 A CN111538997 A CN 111538997A CN 202010241894 A CN202010241894 A CN 202010241894A CN 111538997 A CN111538997 A CN 111538997A
Authority
CN
China
Prior art keywords
picture
user
encryption
thumbnail
selection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010241894.9A
Other languages
Chinese (zh)
Inventor
徐静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN202010241894.9A priority Critical patent/CN111538997A/en
Publication of CN111538997A publication Critical patent/CN111538997A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/54Browsing; Visualisation therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses an image processing method, an image processing device, a storage medium and a terminal, wherein the method comprises the following steps: selecting at least one picture in the folder based on a selection instruction of a user, encrypting the at least one picture, and displaying an encryption mark on the thumbnail of the at least one picture after the encryption is completed. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.

Description

Image processing method, image processing device, storage medium and terminal
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an image processing method, an image processing apparatus, a storage medium, and an image processing apparatus.
Background
With the development of the internet era, the use frequency of the intelligent terminal in daily life is higher and higher, and one of the most used functions of the intelligent terminal is to take a picture and store the picture. In the related art, in order to protect the privacy of the user, the user may add an encrypted album or an encrypted folder, and the user may add pictures to the encrypted album or the encrypted folder, or encrypt the album application by using software. However, the inventors have found that the user has a problem that the operation is troublesome and the flexibility is not high when encrypting a picture by the above-described technique.
Disclosure of Invention
The embodiment of the application provides an image processing method and device, a computer storage medium and a terminal, and aims to solve the technical problems of complex operation and low flexibility when a user encrypts a picture in the related technology.
The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides an image processing method, where the method includes:
selecting at least one picture in the folder based on a selection instruction of a user;
encrypting the at least one picture;
and after the encryption processing is finished, displaying an encryption mark on the thumbnail of the at least one picture.
In a second aspect, an embodiment of the present application provides an image processing apparatus, including:
the selection module is used for selecting at least one picture in the folder based on a selection instruction of a user;
the encryption module is used for encrypting the at least one picture;
and the display module is used for displaying an encryption mark on the thumbnail of the at least one picture after the encryption processing is finished.
In a third aspect, embodiments of the present application provide a computer storage medium having a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
In a fourth aspect, an embodiment of the present application provides a terminal, which may include: a memory and a processor; wherein the memory stores a computer program adapted to be loaded by the memory and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
when the scheme of the embodiment of the application is executed, at least one picture is selected from the folder based on a selection instruction of a user, the at least one picture is encrypted, and after the encryption is completed, an encryption mark is displayed on the thumbnail of the at least one picture. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a terminal provided in an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an operating system and a user space provided in an embodiment of the present application;
FIG. 3 is an architectural diagram of the android operating system of FIG. 1;
FIG. 4 is an architecture diagram of the IOS operating system of FIG. 1;
fig. 5 is a schematic flowchart of an image processing method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of an image processing method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an image processing apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the embodiments of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Referring to fig. 1, a block diagram of a terminal according to an exemplary embodiment of the present application is shown. A terminal in the present application may include one or more of the following components: a processor 110, a memory 120, an input device 130, an output device 140, and a bus 150. The processor 110, memory 120, input device 130, and output device 140 may be connected by a bus 150.
Processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall terminal using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and calling data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), field-programmable gate array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a read-only Memory (ROM). Optionally, the memory 120 includes a non-transitory computer-readable medium. The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like, and the operating system may be an Android (Android) system (including a system based on Android system depth development), an IOS system developed by apple inc (including a system based on IOS system depth development), or other systems. The storage data area may also store data created by the terminal in use, such as a phonebook, audio-video data, chat log data, and the like.
Referring to fig. 2, the memory 120 may be divided into an operating system space, in which an operating system runs, and a user space, in which native and third-party applications run. In order to ensure that different third-party application programs can achieve a better operation effect, the operating system allocates corresponding system resources for the different third-party application programs. However, the requirements of different application scenarios in the same third-party application program on system resources are different, for example, in a local resource loading scenario, the third-party application program has a higher requirement on the disk reading speed; in the animation rendering scene, the third-party application program has a high requirement on the performance of the GPU. The operating system and the third-party application program are independent from each other, and the operating system cannot sense the current application scene of the third-party application program in time, so that the operating system cannot perform targeted system resource adaptation according to the specific application scene of the third-party application program.
In order to enable the operating system to distinguish a specific application scenario of the third-party application program, data communication between the third-party application program and the operating system needs to be opened, so that the operating system can acquire current scenario information of the third-party application program at any time, and further perform targeted system resource adaptation based on the current scenario.
Taking an operating system as an Android system as an example, programs and data stored in the memory 120 are as shown in fig. 3, and a Linux kernel layer 320, a system runtime library layer 340, an application framework layer 360, and an application layer 380 may be stored in the memory 120, where the Linux kernel layer 320, the system runtime library layer 340, and the application framework layer 360 belong to an operating system space, and the application layer 380 belongs to a user space. The Linux kernel layer 320 provides underlying drivers for various hardware of the terminal, such as a display driver, an audio driver, a camera driver, a bluetooth driver, a Wi-Fi driver, a power management, and the like. The system runtime library layer 340 provides a main feature support for the Android system through some C/C + + libraries. For example, the SQLite library provides support for a database, the OpenGL/ES library provides support for 3D drawing, the Webkit library provides support for a browser kernel, and the like. Also provided in the system runtime library layer 340 is an Android runtime library (Android runtime), which mainly provides some core libraries that can allow developers to write Android applications using the Java language. The application framework layer 360 provides various APIs that may be used in building an application, and developers may build their own applications by using these APIs, such as activity management, window management, view management, notification management, content provider, package management, session management, resource management, and location management. At least one application program runs in the application layer 380, and the application programs may be native application programs carried by the operating system, such as a contact program, a short message program, a clock program, a camera application, and the like; or a third-party application developed by a third-party developer, such as a game-like application, an instant messaging program, a photo beautification program, a shopping program, and the like.
Taking an operating system as an IOS system as an example, programs and data stored in the memory 120 are shown in fig. 4, and the IOS system includes: a Core operating system Layer 420(Core OS Layer), a Core Services Layer 440(Core Services Layer), a Media Layer 460(Media Layer), and a touchable Layer 480(CocoaTouch Layer). The kernel operating system layer 420 includes an operating system kernel, drivers, and underlying program frameworks that provide functionality closer to hardware for use by program frameworks located in the core services layer 440. The core services layer 440 provides system services and/or program frameworks, such as a Foundation framework, an account framework, an advertisement framework, a data storage framework, a network connection framework, a geographic location framework, a motion framework, and so forth, as required by the application. The media layer 460 provides audiovisual related interfaces for applications, such as graphics image related interfaces, audio technology related interfaces, video technology related interfaces, audio video transmission technology wireless playback (AirPlay) interfaces, and the like. Touchable layer 480 provides various common interface-related frameworks for application development, and touchable layer 480 is responsible for user touch interaction operations on the terminal. Such as a local notification service, a remote push service, an advertising framework, a game tool framework, a messaging User Interface (UI) framework, a User Interface UIKit framework, a map framework, and so forth.
In the framework shown in FIG. 4, the framework associated with most applications includes, but is not limited to: a base framework in the core services layer 440 and a UIKit framework in the touchable layer 480. The base framework provides many basic object classes and data types, provides the most basic system services for all applications, and is UI independent. While the class provided by the UIKit framework is a basic library of UI classes for creating touch-based user interfaces, iOS applications can provide UIs based on the UIKit framework, so it provides an infrastructure for applications for building user interfaces, drawing, processing and user interaction events, responding to gestures, and the like.
The Android system can be referred to as a mode and a principle for realizing data communication between the third-party application program and the operating system in the IOS system, and details are not repeated herein.
The input device 130 is used for receiving input instructions or data, and the input device 130 includes, but is not limited to, a keyboard, a mouse, a camera, a microphone, or a touch device. The output device 140 is used for outputting instructions or data, and the output device 140 includes, but is not limited to, a display device, a speaker, and the like. In one example, the input device 130 and the output device 140 may be combined, and the input device 130 and the output device 140 are touch display screens for receiving touch operations of a user on or near the touch display screens by using any suitable object such as a finger, a touch pen, and the like, and displaying user interfaces of various applications. The touch display screen is generally provided at a front panel of the terminal. The touch display screen may be designed as a full-face screen, a curved screen, or a profiled screen. The touch display screen can also be designed to be a combination of a full-face screen and a curved-face screen, and a combination of a special-shaped screen and a curved-face screen, which is not limited in the embodiment of the present application.
In addition, those skilled in the art will appreciate that the configurations of the terminals illustrated in the above-described figures do not constitute limitations on the terminals, as the terminals may include more or less components than those illustrated, or some components may be combined, or a different arrangement of components may be used. For example, the terminal further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a wireless fidelity (WiFi) module, a power supply, a bluetooth module, and other components, which are not described herein again.
In the embodiment of the present application, the main body of execution of each step may be the terminal described above. Optionally, the execution subject of each step is an operating system of the terminal. The operating system may be an android system, an IOS system, or another operating system, which is not limited in this embodiment of the present application.
The terminal of the embodiment of the application can also be provided with a display device, and the display device can be various devices capable of realizing a display function, for example: a cathode ray tube display (CR), a light-emitting diode display (LED), an electronic ink panel, a Liquid Crystal Display (LCD), a Plasma Display Panel (PDP), and the like. The user can view information such as displayed text, images, video, etc. using the display device on the terminal 101. The terminal may be a smart phone, a tablet computer, a gaming device, an AR (Augmented Reality) device, an automobile, a data storage device, an audio playing device, a video playing device, a notebook, a desktop computing device, a wearable device such as an electronic watch, an electronic glasses, an electronic helmet, an electronic bracelet, an electronic necklace, an electronic garment, or the like.
In the terminal shown in fig. 1, the processor 110 may be configured to call an application program stored in the memory 120 and specifically execute the image processing method according to the embodiment of the present application.
When the scheme of the embodiment of the application is executed, at least one picture is selected from the folder based on a selection instruction of a user, the at least one picture is encrypted, and after the encryption is completed, an encryption mark is displayed on the thumbnail of the at least one picture. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.
In the following method embodiments, for convenience of description, only the main execution body of each step is described as a terminal.
Fig. 5 is a schematic flow chart of an image processing method according to an embodiment of the present disclosure. As shown in fig. 5, the method of the embodiment of the present application may include the steps of:
s501, selecting at least one picture in the folder based on a selection instruction of a user.
The selection instruction is used for indicating the terminal user to operate a single picture or multiple pictures in the folder.
Generally, thumbnails of multiple pictures are displayed on an album display interface or a folder display interface of a terminal, a user clicks a selection button on a touch screen to select a single picture or multiple thumbnails of the pictures on the touch screen, further, the terminal identifies a finger sliding track of the user on the touch screen, determines the thumbnails selected by the user according to the sliding track, and takes the pictures corresponding to the thumbnails as the selected pictures.
S502, encrypting at least one picture.
Generally, after a user selects at least one picture, the user performs a preset touch operation, the terminal displays an encryption mode selection interface through the display interface, the user selects an encryption mode, the terminal identifies the encryption mode selected by the user, and the picture is encrypted based on the encryption mode. The encryption mode is commonly used by a gesture password, a digital password, a voice password, a fingerprint encryption, a face password and the like. The preset touch operation is used for indicating a terminal user to encrypt and store the picture, and the preset touch operation can be that the user clicks a setting bar on a touch screen and selects an encryption storage button; or a touch operation in which the user presses the touch screen for a long time, or the like.
And S503, after the encryption processing is finished, displaying an encryption mark on the thumbnail of at least one picture.
And according to the encryption mode selected by the user, after the terminal performs corresponding encryption processing on the selected pictures, generating encryption marks on the thumbnails corresponding to the pictures, and displaying the encryption marks on the thumbnails.
When the scheme of the embodiment of the application is executed, at least one picture is selected from the folder based on a selection instruction of a user, the at least one picture is encrypted, and after the encryption is completed, an encryption mark is displayed on the thumbnail of the at least one picture. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.
Fig. 6 is a schematic flow chart of an image processing method according to an embodiment of the present disclosure. As shown in fig. 6, the method of the embodiment of the present application may include the steps of:
s601, acquiring a sliding track of the user based on a selection instruction of the user.
The sliding track is a track which is slid when a user selects a thumbnail of a picture on the touch screen by using a finger. The sliding track may be a sliding track composed of a plurality of individual points, a sliding track composed of a continuous closed curve, or a sliding track composed of a continuous non-closed curve.
Generally, a terminal recognizes a selection instruction executed by a user, where the selection instruction may be a touch operation instruction for the user to click a selection button in a folder, and the terminal receives the touch operation instruction and further obtains a sliding track of the user on a touch screen.
And S602, fitting the selection frame according to the sliding track of the user.
And the terminal fits a selection frame by identifying the sliding track of the user on the touch screen to the thumbnail.
And S603, taking the picture corresponding to the thumbnail in the selection frame as the selected picture.
And taking the picture corresponding to the thumbnail in the fitted selection frame as a selected picture. The number of thumbnails in the selection frame is not fixed, and the thumbnails may be a single thumbnail of a single picture or multiple thumbnails of multiple pictures.
S604, displaying an encryption mode selection interface through the display unit when a first preset touch operation executed by the user on the thumbnail of the at least one picture is received.
The first preset touch operation refers to a preset touch operation executed on the thumbnail after the user selects the thumbnail, for example, the touch operation may be that the user clicks a setting button on a touch screen, pops up a setting frame, the user selects an encryption button, and the display unit pops up a reminding message of whether to encrypt the picture, and when the user clicks the yes button, the terminal receives the touch operation and displays an encryption mode selection interface through the display unit; the touch operation can also be that a user presses the touch screen for a long time, pops up a setting frame, the user selects an encryption button, the display unit pops up a reminding message of whether to encrypt the picture, and when the user clicks the 'yes' button, the terminal receives the touch operation and displays an encryption mode selection interface through the display unit. The display interface has encryption modes such as password encryption, gesture encryption, face encryption, voice encryption, fingerprint encryption and the like.
And S605, acquiring the encryption mode selected by the user on the selection interface.
The user clicks any one encryption mode on the touch screen, the terminal receives clicking operation of the user, after the user selects the encryption mode, the terminal pops up a prompt message of 'please input the password again' through the display unit, and after the terminal confirms that the password input again by the user is the same as the password input for the first time, the terminal further confirms and obtains the encryption mode selected by the user.
S606, at least one picture is encrypted according to the encryption mode.
Generally, the common encryption methods include gesture encryption, password encryption, voice encryption, face encryption, fingerprint encryption, and the like, or a combination of any of these encryption methods. From a cryptographic point of view, the encryption of image data and the encryption of text data are the same, i.e., a process of converting image data information into an unrecognizable form.
And S607, after the encryption processing is finished, carrying out gray scale processing on the thumbnail of at least one picture to obtain a gray scale thumbnail, and displaying the encryption mark on the gray scale thumbnail.
The encryption mark is used for reminding a user that the picture corresponding to the thumbnail is encrypted when the user browses the thumbnail of the picture in the folder.
And S609, selecting a target thumbnail from the grayscale thumbnails based on a selection instruction of the user.
Generally, when a user browses thumbnails in a folder, the user clicks a selection button on a touch screen, and a terminal recognizes a single thumbnail or multiple thumbnails selected by the user as a target thumbnail by recognizing a sliding track of the user on the touch screen.
And S610, displaying a password input interface through the display unit when receiving a second preset touch operation executed by the user on the target thumbnail.
The second preset touch operation refers to a preset touch operation executed on the target thumbnail by the user after the user selects the target thumbnail, for example, the touch operation may be that the user clicks a setting button on the touch screen, pops up a setting frame, the user selects a decryption button, the display unit pops up a reminding message of whether to unlock the picture, and when the user clicks a yes button, the terminal receives the touch operation and displays a password input interface through the display unit; the touch operation can also be that a user presses the touch screen for a long time, pops up a setting frame, the user selects a decryption button, the display unit pops up a reminding message whether to unlock the picture, and when the user clicks the 'yes' button, the terminal receives the touch operation and displays a password input interface through the display unit. And unlocking modes such as password unlocking, gesture unlocking, face unlocking, voice unlocking, fingerprint unlocking and the like are arranged on the display interface.
S611, acquiring the password input by the user on the password input interface, and verifying whether the password is correct.
And S612, after the password passes the verification, unlocking the picture associated with the target thumbnail and removing the encrypted mark on the target thumbnail.
Generally, a password input by a user is verified based on an unlocking mode selected by the user, when the password passes the verification verified by a terminal, the picture corresponding to a target thumbnail is unlocked, an encryption mark on the target thumbnail is removed, and the thumbnail of the picture which is not encrypted is displayed through a display unit.
And S613, displaying a screen locking password input interface through the display unit when the failure times of password verification within the preset time exceed a preset threshold value.
It can be understood that, in order to protect the privacy of the user, the user can set a preset time and a preset threshold value during unlocking, when the failure times of the password for verifying the unlocking picture in the preset time by the terminal exceed the preset threshold value, the screen locking password input interface can be displayed through the display unit, and the encrypted picture can be unlocked only after the screen locking password is verified.
And S614, acquiring the screen locking password input by the user on the screen locking password input interface.
S615, when the screen locking password passes verification, unlocking the picture related to the target thumbnail and removing the encryption mark on the target thumbnail.
And the terminal identifies the screen locking password input by the user, unlocks the picture corresponding to the target thumbnail when the screen locking password is verified to be used, removes the encrypted mark on the target thumbnail and displays the thumbnail of the unencrypted picture through the display unit.
When the scheme of the embodiment of the application is executed, at least one picture is selected from the folder based on a selection instruction of a user, the at least one picture is encrypted, and after the encryption is completed, an encryption mark is displayed on the thumbnail of the at least one picture. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.
Fig. 7 is a schematic structural diagram of an image processing apparatus according to an embodiment of the present disclosure. The recorded interactive lesson generation device 700 can be implemented by software, hardware or a combination of the two to form all or part of a server. The apparatus 700 comprises:
a selection module 710, configured to select at least one picture in the folder based on a selection instruction of a user;
an encryption module 720, configured to encrypt the at least one picture;
a display module 730, configured to display an encryption mark on the thumbnail of the at least one picture after the encryption processing is completed.
Optionally, the selecting module 710 includes:
a track acquisition unit, configured to acquire a sliding track of the user based on a selection instruction of the user;
a track fitting unit for fitting a selection frame according to the sliding track of the user;
and the picture selection unit takes the picture corresponding to the thumbnail in the selection frame as the selected picture.
Optionally, the encryption module 720 includes:
the first unit is used for displaying an encryption mode selection interface through a display unit when receiving a first preset touch operation executed by the user on the thumbnail of the at least one picture;
the second unit is used for acquiring the encryption mode selected by the user on the selection interface;
and the third unit is used for encrypting the at least one picture according to the encryption mode.
Optionally, the display module 730 includes:
and the gray processing unit is used for carrying out gray processing on the thumbnail of the at least one picture to obtain a gray thumbnail.
Optionally, the display module 730 further comprises:
the thumbnail selecting unit is used for selecting a target thumbnail from the grayscale thumbnails based on the selection instruction of the user;
the password input unit is used for displaying a password input interface through the display unit when receiving a second preset touch operation executed on the target thumbnail by the user;
the password obtaining unit is used for obtaining the password input by the user on the password input interface;
and the password verification unit is used for unlocking the picture associated with the target thumbnail after the password is verified, and removing the encrypted mark on the target thumbnail.
Optionally, the apparatus 700 further comprises:
the second password input unit is used for displaying a screen locking password input interface through the display unit when the failure times of verifying the password in the preset time exceed a preset threshold value;
the second password acquisition unit is used for acquiring the screen locking password input by the user on the screen locking password input interface;
and the second password verification unit is used for unlocking the picture associated with the target thumbnail and removing the encrypted mark on the target thumbnail when the screen locking password is verified to pass.
When the scheme of the embodiment of the application is executed, at least one picture is selected from the folder based on a selection instruction of a user, the at least one picture is encrypted, and after the encryption is completed, an encryption mark is displayed on the thumbnail of the at least one picture. According to the method and the device, the picture selected by the user in the folder is directly encrypted, so that the convenience and the flexibility of encrypting the picture operated by the user in the related technology are improved.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the above method steps, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 5 and fig. 6, which are not described herein again.
The application also provides a terminal, which comprises a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the above-mentioned method steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. An image processing method, characterized in that the method comprises:
selecting at least one picture in the folder based on a selection instruction of a user;
encrypting the at least one picture;
and after the encryption processing is finished, displaying an encryption mark on the thumbnail of the at least one picture.
2. The method of claim 1, wherein the selecting at least one picture in the folder based on the user's selection instruction comprises:
acquiring a sliding track of the user based on a selection instruction of the user;
fitting a selection frame according to the sliding track of the user;
and taking the picture corresponding to the thumbnail in the selection frame as the selected picture.
3. The method according to claim 1, wherein said encrypting the at least one picture comprises:
displaying an encryption mode selection interface through a display unit when a first preset touch operation executed by the user on the thumbnail of the at least one picture is received;
acquiring the encryption mode selected by the user on the selection interface;
and encrypting the at least one picture according to the encryption mode.
4. The method of claim 1, wherein displaying an encryption mark on the thumbnail of the at least one picture after the encryption process is completed further comprises:
and carrying out gray processing on the thumbnail of the at least one picture to obtain a gray thumbnail.
5. The method according to claim 4, wherein after the encryption processing is completed and after an encryption mark is displayed on the thumbnail of the at least one picture, the method further comprises:
selecting a target thumbnail from the grayscale thumbnails based on a selection instruction of the user;
displaying a password input interface through a display unit when a second preset touch operation executed on the target thumbnail by the user is received;
acquiring a password input by the user on the password input interface;
and after the password is verified, unlocking the picture associated with the target thumbnail and removing the encrypted mark on the target thumbnail.
6. The method of claim 5, further comprising:
displaying a screen locking password input interface through a display unit when the failure times of verifying the password in the preset time exceed a preset threshold value;
acquiring a screen locking password input by the user on the screen locking password input interface;
and when the screen locking password passes verification, unlocking the picture associated with the target thumbnail and removing the encrypted mark on the target thumbnail.
7. An image processing apparatus, characterized in that the apparatus comprises:
the selection module is used for selecting at least one picture in the folder based on a selection instruction of a user;
the encryption module is used for encrypting the at least one picture;
and the display module is used for displaying an encryption mark on the thumbnail of the at least one picture after the encryption processing is finished.
8. The apparatus of claim 7, wherein the encryption module comprises:
the first unit is used for displaying an encryption mode selection interface through a display unit when receiving a first preset touch operation executed by the user on the thumbnail of the at least one picture;
the second unit is used for acquiring the encryption mode selected by the user on the selection interface;
and the third unit is used for encrypting the at least one picture according to the encryption mode.
9. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to perform the method steps according to any of claims 1 to 6.
10. A terminal, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1 to 6.
CN202010241894.9A 2020-03-31 2020-03-31 Image processing method, image processing device, storage medium and terminal Withdrawn CN111538997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010241894.9A CN111538997A (en) 2020-03-31 2020-03-31 Image processing method, image processing device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010241894.9A CN111538997A (en) 2020-03-31 2020-03-31 Image processing method, image processing device, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN111538997A true CN111538997A (en) 2020-08-14

Family

ID=71974877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010241894.9A Withdrawn CN111538997A (en) 2020-03-31 2020-03-31 Image processing method, image processing device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN111538997A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804445A (en) * 2020-12-30 2021-05-14 维沃移动通信有限公司 Display method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810555A (en) * 2018-06-15 2018-11-13 南开大学 Thumbnail image method for secret protection based on compression of images with elastic resolution ratio
CN110543579A (en) * 2019-07-26 2019-12-06 华为技术有限公司 Image display method and electronic equipment
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
WO2021088881A1 (en) * 2019-11-04 2021-05-14 华为技术有限公司 Picture selecting method and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810555A (en) * 2018-06-15 2018-11-13 南开大学 Thumbnail image method for secret protection based on compression of images with elastic resolution ratio
CN110543579A (en) * 2019-07-26 2019-12-06 华为技术有限公司 Image display method and electronic equipment
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
WO2021088881A1 (en) * 2019-11-04 2021-05-14 华为技术有限公司 Picture selecting method and electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804445A (en) * 2020-12-30 2021-05-14 维沃移动通信有限公司 Display method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN107889070B (en) Picture processing method, device, terminal and computer readable storage medium
CN107491683B (en) Application decryption method and device, terminal and computer readable storage medium
WO2020156308A1 (en) Message processing method, device, terminal, and storage medium
US20170357432A1 (en) Image creation app in messaging app
US20230035047A1 (en) Remote assistance method, device, storage medium, and terminal
CN111125663B (en) Control method and device for child mode, storage medium and terminal
CN111767554A (en) Screen sharing method and device, storage medium and electronic equipment
CN110413347A (en) The processing method of advertisement, device, storage medium and terminal in application program
CN111198724A (en) Application program starting method and device, storage medium and terminal
CN113268212A (en) Screen projection method and device, storage medium and electronic equipment
CN111124668A (en) Memory release method and device, storage medium and terminal
CN112214653A (en) Character string recognition method and device, storage medium and electronic equipment
CN110702346B (en) Vibration testing method and device, storage medium and terminal
CN112218130A (en) Control method and device for interactive video, storage medium and terminal
CN111127469A (en) Thumbnail display method, device, storage medium and terminal
CN111913614B (en) Multi-picture display control method and device, storage medium and display
CN111538997A (en) Image processing method, image processing device, storage medium and terminal
CN112995562A (en) Camera calling method and device, storage medium and terminal
CN113126859A (en) Contextual model control method, contextual model control device, storage medium and terminal
CN113419650A (en) Data moving method and device, storage medium and electronic equipment
CN113490028A (en) Video processing method, device, storage medium and terminal
CN113114849A (en) Alarm clock reminding method and device, storage medium and terminal
CN111859999A (en) Message translation method, device, storage medium and electronic equipment
WO2024067319A1 (en) Method and system for creating stickers from user-generated content
CN115314588B (en) Background synchronization method, device, terminal, equipment, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200814

WW01 Invention patent application withdrawn after publication