CN112801860A - Shooting function limiting method and terminal - Google Patents

Shooting function limiting method and terminal Download PDF

Info

Publication number
CN112801860A
CN112801860A CN202110053358.0A CN202110053358A CN112801860A CN 112801860 A CN112801860 A CN 112801860A CN 202110053358 A CN202110053358 A CN 202110053358A CN 112801860 A CN112801860 A CN 112801860A
Authority
CN
China
Prior art keywords
image
camera
confidential information
information image
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110053358.0A
Other languages
Chinese (zh)
Inventor
侯怀德
戈东
吴岩
潘乐扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202110053358.0A priority Critical patent/CN112801860A/en
Publication of CN112801860A publication Critical patent/CN112801860A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • G06T3/04
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • G06T5/70
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/90Determination of colour characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/61Control of cameras or camera modules based on recognised objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/80Camera processing pipelines; Components thereof

Abstract

The embodiment of the application discloses a method for limiting a shooting function and a terminal, wherein the method is applied to the terminal which comprises a camera, and the method comprises the following steps: determining the current state of the camera, wherein the current state comprises a working state or a non-working state; when the camera is determined to be in a working state, detecting a first confidential area where the terminal is located currently; acquiring a secret information database associated with the first secret area, wherein the secret information database comprises a secret information image corresponding to the first secret area; acquiring a first image, and matching the first image with the confidential information image, wherein the first image is an image captured by a camera in a working state; and if the first image is successfully matched with the confidential information image, limiting the shooting function of the camera. By adopting the method of the embodiment of the application, the risk of secret information leakage in a specific place is reduced by limiting the shooting function of the terminal camera.

Description

Shooting function limiting method and terminal
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a method and a terminal for limiting a shooting function.
Background
With the continuous development of electronic technology, the use of terminals with shooting functions (such as mobile phones, tablet computers, cameras, etc.) is becoming more and more popular, and in daily life, people can conveniently shoot photos or record videos for things ahead of the eye as records, however, the problem that certain places requiring information confidentiality may have misuse of shooting functions to a certain extent, so that the confidentiality work is difficult is caused.
Disclosure of Invention
The embodiment of the application provides a method and a terminal for limiting a shooting function, which meet the confidentiality requirement of a specific place needing information confidentiality by limiting the shooting function of the terminal.
In a first aspect, an embodiment of the present application provides a method for limiting a shooting function, which is applied to a terminal, where the terminal includes a camera, and the method includes:
determining the current state of the camera, wherein the current state comprises a working state or a non-working state;
when the camera is determined to be in a working state, detecting a first confidential area where the terminal is located currently;
acquiring a secret information database associated with the first secret area, wherein the secret information database comprises a secret information image corresponding to the first secret area;
acquiring a first image, and matching the first image with the confidential information image, wherein the first image is an image captured by a camera in a working state;
and if the first image is successfully matched with the confidential information image, limiting the shooting function of the camera.
In a second aspect, an embodiment of the present application provides a terminal, where the terminal includes a camera, and the terminal includes:
the detection unit is used for determining the current state of the camera, wherein the current state comprises a working state or a non-working state, and when the camera is determined to be in the working state, the detection unit detects the first security area where the terminal is located;
the acquisition unit is used for acquiring a secret information database related to the first secret area, and the secret information database comprises a secret information image corresponding to the first secret area;
the matching unit is used for acquiring a first image and matching the first image with the confidential information image, wherein the first image is an image captured by the camera in a working state;
and the limiting unit is used for limiting the shooting function of the camera when the matching result of the matching unit is that the first image is successfully matched with the confidential information image.
In a third aspect, an embodiment of the present application provides a terminal, including:
the processor, the memory, the communication interface and the camera are mutually connected and complete mutual communication work;
the memory has stored thereon executable program code, a communication interface for wireless communication, a camera for capturing images;
the processor is configured to retrieve the executable program code stored in the memory, and to cause the executable program code to perform some or all of the steps described in any of the methods of the first aspect of the embodiments of the present application.
In a fourth aspect, the present application provides a computer program product, where the computer program product includes a computer program operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that in the embodiment of the application, the working state of the terminal camera is determined, the confidential area where the terminal is located is detected, the corresponding confidential information image is obtained, the image captured by the camera in the working state is obtained and matched with the confidential information image, if the matching is successful, the shooting function of the camera is limited, the safety and the intelligence of the confidential work are ensured, the risk of confidential information leakage caused by abuse of the shooting function is reduced, and the confidential requirements of specific places needing information confidentiality can be met without manpower cost.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for limiting a shooting function according to an embodiment of the present application;
FIG. 2A is a schematic diagram of a relationship between a security area and a security information image in a specific location according to an embodiment of the present application;
FIG. 2B is a schematic diagram illustrating a relationship between a confidential area and a confidential information image in a scientific research location according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating a process of matching a first image with a security information image according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another shooting function limiting method provided in an embodiment of the present application;
fig. 5A is a schematic flowchart of another method for limiting a shooting function according to an embodiment of the present application;
FIG. 5B is a schematic diagram illustrating a bilinear interpolation algorithm according to an embodiment of the present disclosure;
fig. 6A is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 6B is a detailed structure diagram of a matching unit provided in the embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps is not limited to only those steps recited, but may alternatively include other steps not recited, or may alternatively include other steps inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The terminal described in the embodiment of the present application may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile Internet device (MID, Mobile Internet Devices), a wearable device, and the like, which are examples and not exhaustive, and include but are not limited to the terminal.
With the continuous development of electronic technology, the use of terminals with shooting function (such as mobile phones, tablet computers, cameras, etc.) is becoming more and more popular, and it has become daily operation to take photos or record videos for things ahead of the eye, however, the increasing popularity of the shooting function causes trouble in the security work for some specific places where information security is required. The current shooting limiting means is mainly that a staff in a specific place needing information confidentiality reminds a visitor or sets a reminding marker, but the limiting method needs to spend much labor cost and has low efficiency.
Based on this, the present application provides a method for limiting a shooting function, specifically, limiting a shooting function of a terminal in a specific location where information security is required, and the following describes the present application in detail with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for limiting a shooting function according to an embodiment of the present application, and as shown in fig. 1, the embodiment of the present application provides a method for limiting a shooting function, where the method is applied to a terminal, and the terminal includes a camera, and the method for limiting a shooting function described in the embodiment of the present application includes the following steps:
101: and determining the current state of the camera, wherein the current state comprises a working state or a non-working state.
The camera comprises a front camera, a rear camera, a built-in camera and an external camera, and the working state means that the camera is in an open state.
102: when the camera is determined to be in the working state, a first confidential area where the terminal is located currently is detected.
The first security area is an area which needs to be restricted by the shooting function because the first security area contains the security information image.
103: and acquiring a secret information database associated with the first secret area, wherein the secret information database comprises a secret information image corresponding to the first secret area.
Wherein the confidential information database comprises at least one confidential information image, and the confidential information image comprises at least one of the following items: computer interface, design sketch, scientific research result, product sample and the like.
104: and acquiring a first image, and matching the first image with the confidential information image, wherein the first image is an image captured by the camera in a working state.
The first image is matched with the confidential information image in order to determine whether the first image contains the confidential information image which needs to be shot in a limited mode and cannot be leaked.
Wherein the first image may be a still image or a moving image.
105: and if the first image is successfully matched with the confidential information image, limiting the shooting function of the camera.
Wherein, the first image and the security information image are successfully matched, which means that the first image contains at least one security information image.
The successful matching means that the first image contains a confidential information image which needs to be restricted from being shot and cannot be leaked, and in order to prevent the confidential information image from being shot by the terminal and being leaked, the shooting function of the camera needs to be restricted when the first image and the confidential information image are successfully matched. The restriction means that the image of the secret information contained in the first image cannot be captured by the terminal, and the secret information is guaranteed not to be leaked in the terminal.
It can be seen that in the embodiment of the application, the working state of the terminal camera is determined, the confidential area where the terminal is located is detected, the corresponding confidential information image is obtained, the image captured by the camera in the working state is obtained and matched with the confidential information image, if the matching is successful, the shooting function of the camera is limited, the safety and the intelligence of the confidential work are ensured, the risk of confidential information leakage caused by abuse of the shooting function is reduced, and the confidential requirements of specific places needing information confidentiality can be met without manpower cost.
In one possible example, the first privacy zone is one of a plurality of privacy zones in the particular location, each privacy zone in the plurality of privacy zones being associated with a privacy information database that includes the privacy information image in the privacy zone associated therewith.
The number of the confidential areas is at least one, and the number of the confidential information images in each confidential area in the confidential areas is at least one. Specifically, referring to fig. 2A, fig. 2A is a schematic diagram illustrating a relationship between a security area and a security information image in a specific location according to an embodiment of the present application, as shown in fig. 2A, the specific location includes: security area 1, security area 2 … … security area N; the security area 1 is associated with the security information database 1, the security area 2 is associated with the security information database 2 … …, and the security area N is associated with the security information database N; the secret information database 1 includes: the confidential information images 1-1, 1-2 … …, the confidential information database 2 includes: the confidential information images 2-1, 2-2 … …, the confidential information database N comprising: the security information images N-1, N-2 … ….
For example, referring to fig. 2B, fig. 2B is a schematic diagram illustrating a relationship between a confidential area and a confidential information image of a scientific research location according to an embodiment of the present application, as shown in fig. 2B, the scientific research location is divided into confidential areas including a laboratory and an office, the laboratory is associated with a confidential information database, and the confidential information database includes at least one of the following: experimental materials, equipment interfaces, equipment model specifications, and the like; the office is associated with an office security information database, and the office security information database comprises at least one of the following: filing cabinet, confidential document, computer interface etc, when the terminal got into the laboratory in scientific research place, if the terminal camera is in operating condition, then the terminal detects and is in the laboratory at present, and obtain the laboratory confidential information database that the laboratory is relevant, the terminal obtains the confidential information image in the laboratory confidential information database such as laboratory material, equipment interface, equipment model specification if the image that the camera caught under operating condition contains, the shooting function of camera will be restricted so, can't normally shoot, thereby guarantee that the confidential information image in the laboratory can not reveal.
The specific place is divided into a plurality of confidential areas, and each confidential information image of each confidential area in the confidential areas is associated with the confidential information image of the corresponding area, so that when the terminal executes the shooting function limiting method, only the confidential information image in the corresponding confidential information database needs to be taken out according to the confidential area where the terminal is located.
In one possible example, limiting the camera's shooting function includes: inhibit the camera from generating images, or inhibit the camera from generating images from being saved.
The prohibition of the camera to generate the image means that the camera cannot perform the shooting function; the image generated by the camera is forbidden to be stored, the terminal can not generate the first image shot by the camera, or the terminal can delete the first image shot by the camera and containing the confidential information image.
It can be seen that, in the embodiment of the application, the terminal cannot store the first image containing the confidential information image in the terminal, so that the security of the confidential information image is ensured.
In one possible example, limiting the camera's shooting function includes:
detecting a specific position in the first image, wherein the specific position comprises a confidential information image corresponding to the first confidential area;
the specific position is blurred, so that the first image only comprises the non-secure information image, and the non-secure information image is other images except the secure information image in the first image.
Wherein, the fuzzy processing comprises at least one of the following steps: mosaic blur, motion blur, gaussian blur, etc.
The mosaic blurring is achieved by obtaining a specific position in the first image, wherein the specific position comprises a confidential information image, dividing pixels of the confidential information image into at least one pixel region according to a fixed pixel interval, and randomly selecting a pixel color as a new color to be filled in the corresponding pixel region in each pixel region in the at least one pixel region, so that the mosaic blurring operation of the confidential information image is completed.
Exemplarily, in each pixel point region in at least one pixel point region, the color average value of all pixel points in the pixel point region is obtained, and the color average value is used as a new color to be filled in the corresponding pixel point region, and each pixel point region is covered by the color average value of all the pixel points, so that the operation of mosaic blurring on the secret information image is completed.
It can be seen that, in the embodiment of the present application, if it is detected that the specific position in the first image captured by the terminal includes the confidential information image corresponding to the first area, the specific position is blurred, so that the confidential information image in the first image captured by the terminal is blurred, the first image only includes the non-confidential information image, and a semi-open type restriction method is adopted for the terminal camera, so that the terminal can capture the non-confidential information image while ensuring the security of the confidential information image.
In a possible example, matching the first image with the secure information image further includes the following steps, please refer to fig. 3, fig. 3 is a schematic flow chart of matching the first image with the secure information image according to an embodiment of the present application, and the following detailed description of the embodiment of the present application is provided with reference to fig. 3:
301: determining the number of the characteristic points of the confidential information image, and setting a preset threshold value according to the number of the characteristic points of the confidential information image;
the preset threshold value can be adjusted according to the security level of the security information image.
Illustratively, the security information level is classified into secret, secret and secret, and if the security level of the security information image is secret, the value of the preset threshold value can be reduced; if the security level is "secret," the value of the predetermined threshold may be increased.
302: extracting feature points of the first image to obtain a corresponding feature point set;
wherein the position of the feature point of the first image comprises at least one of the following: the image acquisition device is positioned on the boundary between the secret information image in the first image and other objects, at the vertex of the secret information image in the first image and the like.
303: matching the number of the characteristic points of the confidential information image with the characteristic point set;
illustratively, the number of the feature points of the confidential information image is matched with the feature point set, pixel color average value calculation is performed on the feature points of the confidential information image and the feature points in the feature point set corresponding to the first image, if the pixel color average value error between the feature points of the confidential information image and the feature points of the first image is within a specified error range, the matching result between the feature points of the confidential information image and the feature points of the first image is judged to be successful, and the specified error range can be adjusted according to the confidentiality grade of the confidential information image.
304: and if the characteristic point set reaches a preset threshold value, determining that the first image contains the confidential information image.
Therefore, in the embodiment of the application, the preset threshold is set according to the number of the feature points of the confidential information image, the corresponding feature point set is obtained after the feature points of the first image are extracted, the number of the feature points of the confidential information image is matched with the feature point set, and whether the confidential information image is included in the first image is determined according to the relationship between the feature point set and the preset threshold. It can be seen that by setting the number of the feature points of the confidential information image and the preset threshold value and then matching the feature point set of the first image, when the confidential information image appears in the first image in a local or non-positive form, the first image and the confidential information image can be successfully matched, so that the shooting function of the camera is limited, the situation that the confidential information image is mistakenly regarded as an image which does not need to be limited because the confidential information image is not completely presented in the camera is prevented, and the accuracy of confidential work is further ensured.
In a possible example, the method for limiting a shooting function further includes the following steps, please refer to fig. 4, fig. 4 is a schematic flowchart of another method for limiting a shooting function provided in the embodiment of the present application, and the embodiment of the present application is described in detail below with reference to fig. 4:
401: determining whether the terminal is located at the edge position of the first secure area according to the first image;
402: if yes, determining a second privacy zone adjacent to the edge position;
403: acquiring a confidential information image corresponding to the second confidential area;
404: acquiring a second image, wherein the second image is an image captured by the camera in a working state according to a first preset time interval, and matching the second image with a confidential information image corresponding to a second confidential area;
405: and determining whether to continue to limit the shooting function of the camera according to the matching result of the second image and the confidential information image corresponding to the second confidential area.
And if the matching result of the second image and the confidential information image corresponding to the second confidential area is successful, continuing to limit the shooting function of the camera.
In order to prevent the situation that the terminal is located in the second confidential area which also needs to be subjected to the shooting function limitation when the terminal leaves the first confidential area and just enters the second confidential area, and therefore the shooting function of the terminal is not limited in time, the terminal can continue to limit the shooting function of the camera if the second confidential area contains the corresponding confidential information image by pre-calling the confidential information image corresponding to the second confidential area when the terminal is about to leave the first confidential area and does not enter the second confidential area.
Therefore, in the embodiment of the application, when the area where the terminal is located is about to change, when the terminal does not enter the second confidential area yet, it can be predicted that the area where the terminal is about to enter is the second confidential area which also needs to be subjected to shooting function limitation through the second image, the situation that whether the shooting function of the camera needs to be limited continuously or not is judged according to the matching result of the second image and the confidential information image after the terminal enters the second confidential area and is detected again is avoided in advance, the situation that the shooting function of the camera is not limited timely due to the fact that the area detection result is not timely is avoided, and therefore the confidential information image of the second confidential area is shot carelessly by the camera, and the confidential effect is further guaranteed.
In a possible example, the method for limiting a shooting function further includes the following steps, please refer to fig. 5A, fig. 5A is a schematic flow chart of another method for limiting a shooting function provided in the embodiment of the present application, and the embodiment of the present application is described in detail below with reference to fig. 5A:
501: if the first image is unsuccessfully matched with the confidential information image, performing amplification operation on the first image, and performing image enhancement operation on the first image subjected to the amplification operation to obtain a first amplified enhanced image;
the method comprises the following steps of carrying out amplification operation on a first image by adopting an image amplification algorithm, wherein the image amplification algorithm comprises at least one of the following steps: a bilinear interpolation algorithm, a nearest point interpolation algorithm, etc.
Illustratively, a bilinear interpolation algorithm is adopted to perform an amplification operation on the image. The bilinear interpolation algorithm is widely applied to the aspect of image processing, mathematically, the bilinear interpolation is linear interpolation expansion of an interpolation function with two variables, and the core idea is to perform linear interpolation in two directions respectively. After the image is amplified, pixels are correspondingly increased, the bilinear interpolation algorithm is a method for increasing the size of the pixels of the image under the condition that the pixels are not generated, and on the basis of the color of the pixels around the amplified unknown pixels, the bilinear interpolation algorithm is used for calculating the color of the pixel lost area after the image is amplified.
Referring to fig. 5B, fig. 5B is a schematic diagram illustrating a bilinear interpolation algorithm according to an embodiment of the present disclosure, as shown in fig. 5B, coordinate axes include an X axis in a horizontal direction, a Y axis in a vertical direction, and an origin O, Q11, Q12, Q21, and Q22 are known 4 data points, and a P point is an enlarged unknown pixel point, and a pixel value of the P point needs to be calculated.
At this time, the function f is known as a value at four points, Q11 ═ x1, y1, Q12 ═ x1, y2, Q21 ═ x2, y1, and Q22 ═ x2, y 2. First, linear interpolation is performed in the x direction to obtain the values of the point R1 and the point R2 on the function f, and then linear interpolation is performed in the y direction to obtain the value of the point P on the function f, so that the desired result f (x, y) is obtained.
The first step is as follows: linear interpolation in the x direction is performed, a point R1 is inserted between Q11 and Q21, a point R2 is inserted between Q12 and Q22, the pixel value of the R1-x, y1 pixel is calculated from the pixel values of two pixels, i.e., Q11-x 1, y1 and Q21-x 2, y1, and the pixel value of the R2-x (x, y2) pixel is calculated from the pixel values of two pixels, i.e., Q12-x 1, y2 and Q22-x 2, y 2.
f (R1) ≈ f (Q11) — x2-x)/(x2-x1) + f (Q21) — x-x1)/(x2-x1), yielding R1 ═ x, y1)
f (R2) ≈ f (Q12) — x2-x)/(x2-x1) + f (Q22) — x-x1)/(x2-x1), yielding R2 ═ x, y2)
The second step is that: and performing linear interpolation in the y direction, and interpolating the pixel values of two pixel points, namely R1 (x, y1) and R2 (x, y2), obtained by the first step of calculation in the y direction to calculate the pixel value of a pixel point, namely (x, y), as the final result P.
f(P)≈f(R1)*(y2-y)/(y2-y1)+f(R2)*(y-y1)/(y2-y1)
By the bilinear interpolation algorithm, the pixels of the first image can not be lost while the first image is amplified, and the quality of the amplified image is ensured.
Wherein, the image enhancement operation may include at least one of the following image parameter adjustments: contrast adjustment, brightness adjustment, sharpness adjustment, and the like.
Illustratively, a linear transformation algorithm may be used to achieve image contrast adjustment, where contrast refers to the measurement of different brightness levels between the brightest white and darkest black regions in an image, i.e. the magnitude of the gray contrast of an image. The linear transformation is one of gray scale transformation, and the gray scale transformation of the image achieves the purpose of image enhancement by establishing gray scale mapping to adjust the gray scale of the image. The following is a specific algorithm for image contrast adjustment,
let r be the gray value before the contrast adjustment of the first amplified image, s be the gray value after the contrast adjustment of the first amplified image, let a be the slope of the straight line, and let b be the intercept of the straight line on the s-axis, then the functional formula of the linear transformation algorithm is as follows: and (b) because the range of the gray value is 0-255, correspondingly, the range of the gray value r before the contrast adjustment of the amplified first image meets the following requirements: r is more than or equal to 0 and less than or equal to 255; the value range of the gray value s after the contrast adjustment of the amplified first image meets the following requirements: s is not less than 0 and not more than 255, and s is 0 when s is a · r + b <0, and s is 255 when s is a · r + b > 255.
Specifically, choosing different values of a, b will have different effects:
if a is greater than 1, the contrast of the image is increased, and the pixel values of the image are all increased after conversion, so that the overall display effect of the image is enhanced;
if 0< a <1, the pixel values of the contrast image of the reduced image are all reduced after conversion, so that the overall display effect of the image is weakened;
if a is equal to 1 and b is not equal to 0, the gray value of the whole image is moved up or down, namely the whole image is lightened or darkened, the contrast of the image is not changed, and the gray value can be used for adjusting the brightness of the image;
if a is less than 0 and b is 0, the bright area of the image becomes dark and the dark area becomes bright;
if a is 1 and b is 0, the contrast of the image is unchanged;
and if a is equal to-1 and b is equal to 255, reversing between the bright area and the dark area of the image, wherein the original bright area is changed into the dark area after being adjusted, and the original dark area is changed into the bright area after being adjusted, so that the color reversal effect of the image is realized.
Illustratively, a bilinear interpolation algorithm is adopted to perform amplification operation on a first image, and then a linear transformation algorithm is used to perform contrast adjustment, namely image enhancement, on the first image subjected to amplification operation, so as to obtain a first amplified enhanced image, wherein the first amplified enhanced image has both higher pixels and more obvious image characteristics, so that matching judgment can be performed on the first amplified enhanced image better in the subsequent method steps.
502: matching the first amplified enhanced image with the confidential information image again;
the purpose of re-matching the first amplified enhanced image with the confidential information image is to prevent the first image from containing the confidential information image which is difficult to identify and from not being subjected to matching processing. The first amplified and enhanced image is the image subjected to the amplification operation and the image enhancement operation, and the confidential information image contained in the image subjected to the amplification operation and the image enhancement operation and difficult to identify originally is also subjected to the corresponding amplification operation and the corresponding image enhancement operation, so that the size of the confidential information image subjected to the amplification operation and the image enhancement operation is amplified, pixels are not lost, image features such as contrast are enhanced to be more obvious, and the image features are easier to identify compared with the image features before processing, so that the image features can be smoothly matched, and the shooting function of the camera is limited.
503: and if the first amplified enhanced image is successfully matched with the confidential information image, limiting the shooting function of the camera.
Therefore, in the embodiment of the application, when the first image is unsuccessfully matched with the confidential information image, the first image is amplified and then subjected to image enhancement operation to obtain the first amplified enhanced image, the first amplified enhanced image is matched with the confidential information image again, and if the matching result is successful, the shooting function of the camera is limited. The first image which is not successfully matched with the confidential information image is amplified and subjected to image enhancement operation, and then further matching is carried out, so that the problems that the confidential information image occupies a small area in the image, the light irradiation is not uniform during shooting and the like can be avoided, the confidential information image cannot be identified, the shooting function of the camera is not limited, the confidential information image is leaked carelessly, and the security of confidential work is further ensured.
Referring to fig. 6A, please refer to fig. 6A in accordance with the embodiment shown in fig. 1, where fig. 6A is a schematic structural diagram of a terminal according to an embodiment of the present application, as shown in fig. 6A:
a terminal comprises a camera, and the terminal further comprises:
601: the detection unit is used for determining the current state of the camera, wherein the current state comprises a working state or a non-working state, and when the camera is determined to be in the working state, the detection unit detects the first security area where the terminal is located;
602: the acquisition unit is used for acquiring a secret information database related to the first secret area, and the secret information database comprises a secret information image corresponding to the first secret area;
603: the matching unit is used for acquiring a first image and matching the first image with the confidential information image, wherein the first image is an image captured by the camera in a working state;
604: and the limiting unit is used for limiting the shooting function of the camera when the matching result of the matching unit is that the first image is successfully matched with the confidential information image.
It can be seen that the terminal described in this embodiment of the application may determine, by the detection unit, a first confidential area where the camera in the working state is located, then obtain, by the obtaining unit, a confidential information database associated with the first confidential area and including a confidential information image corresponding to the first confidential area, then obtain, by the matching unit, a first image captured by the camera in the working state and match the first image with the confidential information image, and finally, when a matching result of the matching unit is that the first image and the confidential information image are successfully matched, limit, by the limiting unit, a shooting function of the camera. The terminal described in the embodiment of the application can effectively avoid the risk of leakage of the confidential information image caused by the fact that the confidential information image is shot and recorded in the terminal.
Specifically, in the embodiment of the present application, the terminal may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In a possible example, please refer to fig. 6B, where fig. 6B is a detailed structure diagram of a matching unit provided in an embodiment of the present application, and as shown in fig. 6B, the matching unit includes:
6031: the preset module is used for determining the number of the characteristic points of the confidential information image and setting a preset threshold value according to the number of the characteristic points of the confidential information image;
the preset threshold value can be adjusted according to the security level of the security information image.
Illustratively, the security information level is classified into secret, secret and secret, and if the security level of the security information image is secret, the value of the preset threshold value can be reduced; if the security level is "secret," the value of the predetermined threshold may be increased.
6032: the extraction module is used for extracting the feature points of the first image to obtain a corresponding feature point set;
wherein the position of the feature point of the first image comprises at least one of the following: the image acquisition device is positioned on the boundary between the secret information image in the first image and other objects, at the vertex of the secret information image in the first image and the like.
6033: and the judging module is used for matching the number of the characteristic points of the confidential information image with the characteristic point set, and if the characteristic point set reaches a preset threshold value, determining that the first image contains the confidential information image.
The number of the feature points of the confidential information image is matched with the feature point set, pixel point color average value calculation is carried out on the feature points of the confidential information image and the feature points in the feature point set corresponding to the first image, if the pixel point color average value error of the feature points of the confidential information image and the feature points of the first image is within a specified error range, the matching result of the feature points of the confidential information image and the feature points of the first image is judged to be successful, and the specified error range can be adjusted according to the confidentiality grade of the confidential information image.
In this embodiment, the matching unit is divided into a preset module, an extraction module, and a determination module, a preset threshold is set by the preset module according to the number of feature points of the confidential information image, the extraction module extracts feature points of the first image to obtain a corresponding feature point set, the determination module matches the number of feature points of the confidential information image with the feature point set, and whether the first image includes the confidential information image is determined according to the relationship between the feature point set and the preset threshold. The preset module can be used for dividing the vigilance degree of the confidential work of different confidential information images according to the corresponding confidential grades of the confidential information; through the extraction module, even if the confidential information image appears in the first image in a local or non-positive mode, the feature points of the confidential information image can be intelligently extracted to obtain a corresponding feature point set; through the judgment module, whether the first image contains the confidential information image or not can be accurately judged. Through the cooperation work among each module, even if secret information image appears in first image with local or non-positive form, also can match between first image and the secret information image and succeed to restrict the shooting function of camera, prevent to appear because secret information image does not appear in the camera completely and be regarded as the condition that need not restrict the image of shooing, further guaranteed secret work's accuracy.
Referring to fig. 7, in accordance with the embodiment shown in fig. 1, fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application, as shown in fig. 7:
a terminal, comprising:
the processor, the memory, the communication interface and the camera are mutually connected and complete mutual communication work;
the memory has stored thereon executable program code, a communication interface for wireless communication, a camera for capturing images;
the processor is configured to retrieve executable program code stored in the memory, the executable program code being operable to cause a computer to perform some or all of the steps of any of the photographing function limiting methods as recited in the above method embodiments, the computer including an electronic terminal device.
The memory may be a volatile memory such as a dynamic random access memory DRAM, or a non-volatile memory such as a mechanical hard disk. The memory is used for storing a set of executable program codes, and the processor is used for calling the executable program codes stored in the memory, and can execute the following operations:
determining the current state of the camera, wherein the current state comprises a working state or a non-working state;
when the camera is determined to be in a working state, detecting a first confidential area where the terminal is located currently;
acquiring a secret information database associated with the first secret area, wherein the secret information database comprises a secret information image corresponding to the first secret area;
acquiring a first image, and matching the first image with the confidential information image, wherein the first image is an image captured by a camera in a working state;
and if the first image is successfully matched with the confidential information image, limiting the shooting function of the camera.
In one possible example, the memory is configured to store a set of executable program code, and the processor is configured to call the executable program code stored in the memory to divide the specific location into a plurality of security areas, the first security area is one of the plurality of security areas, each of the plurality of security areas is associated with a security information database, and the security information database includes the security information image in the security area associated therewith.
In one possible example, the memory is configured to store a set of executable program code, and the processor is configured to call the executable program code stored in the memory to limit a shooting function of the camera, including:
inhibit the camera from generating images, or inhibit the camera from generating images from being saved.
In one possible example, the memory is configured to store a set of executable program code, and the processor is configured to call the executable program code stored in the memory to limit a shooting function of the camera, including:
detecting a specific position in the first image, wherein the specific position comprises a confidential information image corresponding to the first confidential area;
the specific position is blurred, so that the first image only comprises the non-secure information image, and the non-secure information image is other images except the secure information image in the first image.
In one possible example, the memory is configured to store a set of executable program code, and the processor is configured to call the executable program code stored in the memory to match the first image with the secure information image, including:
determining the number of the characteristic points of the confidential information image, and setting a preset threshold value according to the number of the characteristic points of the confidential information image;
extracting feature points of the first image to obtain a corresponding feature point set;
matching the number of the characteristic points of the confidential information image with the characteristic point set;
and if the characteristic point set reaches a preset threshold value, determining that the first image contains the confidential information image.
In one possible example, the memory is configured to store a set of executable program code, and the processor is configured to call the executable program code stored in the memory to determine whether the terminal is located at an edge position of the first secure area based on the first image;
if yes, determining a second privacy zone adjacent to the edge position;
acquiring a confidential information image corresponding to the second confidential area;
acquiring a second image, wherein the second image is an image captured by the camera in a working state according to a first preset time interval, and matching the second image with a confidential information image corresponding to a second confidential area;
and determining whether to continue to limit the shooting function of the camera according to the matching result of the second image and the confidential information image corresponding to the second confidential area.
In one possible example, the memory is configured to store a set of executable program codes, and the processor is configured to call the executable program codes stored in the memory, so that when the first image is unsuccessfully matched with the confidential information image, the first image is amplified, and then the first image subjected to the amplification operation is subjected to an image enhancement operation to obtain a first amplified enhanced image;
matching the first amplified enhanced image with the confidential information image again;
and if the first amplified enhanced image is successfully matched with the confidential information image, limiting the shooting function of the camera.
The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex-Long Term Evolution), and TDD-LTE (Time Division duplex-Long Term Evolution).
The present application provides a computer program product, wherein the computer program product includes a computer program operable to make a computer perform part or all of the steps of any one of the shooting function limitation methods as described in the above method embodiments, and the computer program product may be a software installation package.
It should be noted that, for the sake of simplicity, any of the foregoing embodiments of the method for limiting the shooting function are described as a series of combinations of actions, but those skilled in the art should understand that the present application is not limited by the described order of actions, because some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
It will be understood by those skilled in the art that all or part of the steps in the various methods of any of the above-described method embodiments of the shooting function limitation method may be implemented by instructing associated hardware by a program, which may be stored in a computer-readable memory, and the memory may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present application are introduced in detail, and the specific examples are applied in this document to explain the principle and implementation of a method for limiting a shooting function and a terminal of the present application, and the description of the above embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific implementation and the application range may be changed, and in summary, the content of the present specification should not be construed as a limitation to the present application.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, hardware products and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is understood that all products of the processing methods of the flowcharts described in the method embodiments of the photographing function limiting method of the present application, such as the terminal of the flowcharts described above and the computer program product, fall within the scope of the related products described herein.
It is apparent that those skilled in the art can make various changes and modifications to a photographing function limiting method and a terminal provided in the present application without departing from the spirit and scope of the present application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A shooting function limiting method is applied to a terminal, the terminal comprises a camera, and the method comprises the following steps:
determining the current state of the camera, wherein the current state comprises a working state or a non-working state;
when the camera is determined to be in a working state, detecting a first confidential area where the terminal is located currently;
acquiring a secret information database associated with the first secret area, wherein the secret information database comprises a secret information image corresponding to the first secret area;
acquiring a first image, and matching the first image with the confidential information image, wherein the first image is an image captured by the camera in the working state;
and if the first image is successfully matched with the confidential information image, limiting the shooting function of the camera.
2. The method of claim 1, wherein the first secure area is one of a plurality of secure areas in a particular location, each of the plurality of secure areas being associated with a secure information database that includes the secure information image in the secure area associated therewith.
3. The method of claim 1 or 2, wherein the limiting the camera's capture function comprises:
and forbidding the camera to generate the image, or forbidding the image generated by the camera to be stored.
4. The method of claim 1 or 2, wherein the limiting the camera's capture function comprises:
detecting a specific position in the first image, wherein the specific position comprises a confidential information image corresponding to the first confidential area;
and blurring the specific position to enable the first image to only comprise a non-secure information image, wherein the non-secure information image is other images except the secure information image in the first image.
5. The method of any of claims 1-4, wherein said matching said first image with said secure information image comprises:
determining the number of the characteristic points of the confidential information image, and setting a preset threshold value according to the number of the characteristic points of the confidential information image;
extracting feature points of the first image to obtain a corresponding feature point set;
matching the number of the characteristic points of the confidential information image with the characteristic point set;
and if the characteristic point set reaches the preset threshold value, determining that the first image contains a confidential information image.
6. The method of claim 2, further comprising:
determining whether the terminal is located at the edge position of the first secure area according to the first image;
if yes, determining a second privacy zone adjacent to the edge position;
acquiring a confidential information image corresponding to the second confidential area;
acquiring a second image, wherein the second image is an image captured by the camera in the working state according to a first preset time interval, and matching the second image with a confidential information image corresponding to a second confidential area;
and determining whether to continue to limit the shooting function of the camera according to the matching result of the second image and the confidential information image corresponding to the second confidential area.
7. The method of claim 1, further comprising:
if the first image is unsuccessfully matched with the confidential information image, performing amplification operation on the first image, and performing image enhancement operation on the first image subjected to the amplification operation to obtain a first amplified enhanced image;
matching the first amplified enhanced image with the confidential information image again;
and if the first amplified enhanced image is successfully matched with the confidential information image, limiting the shooting function of the camera.
8. The utility model provides a terminal, including the camera in the terminal, its characterized in that includes:
the detection unit is used for determining the current state of the camera, wherein the current state comprises a working state or a non-working state, and when the camera is determined to be in the working state, the detection unit detects a first security area where the terminal is located;
an obtaining unit, configured to obtain a secret information database associated with the first secret area, where the secret information database includes a secret information image corresponding to the first secret area;
the matching unit is used for acquiring a first image and matching the first image with the confidential information image, wherein the first image is an image captured by the camera in the working state;
and the limiting unit is used for limiting the shooting function of the camera when the matching result of the matching unit is that the first image is successfully matched with the confidential information image.
9. The terminal of claim 8, wherein the matching unit comprises:
the preset module is used for determining the number of the characteristic points of the confidential information image and setting a preset threshold value according to the number of the characteristic points of the confidential information image;
the extraction module is used for extracting the feature points of the first image to obtain a corresponding feature point set;
and the judging module is used for matching the number of the characteristic points of the confidential information image with the characteristic point set, and if the characteristic point set reaches the preset threshold value, determining that the first image contains the confidential information image.
10. A terminal, comprising:
the system comprises a processor, a memory, a communication interface and a camera, wherein the processor, the memory, the communication interface and the camera are connected with each other and finish the communication work among the processors;
the memory having stored thereon executable program code, the communication interface for wireless communication, the camera for capturing images;
the processor is configured to retrieve the executable program code stored on the memory and execute the method of any of claims 1-7.
CN202110053358.0A 2021-01-14 2021-01-14 Shooting function limiting method and terminal Pending CN112801860A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110053358.0A CN112801860A (en) 2021-01-14 2021-01-14 Shooting function limiting method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110053358.0A CN112801860A (en) 2021-01-14 2021-01-14 Shooting function limiting method and terminal

Publications (1)

Publication Number Publication Date
CN112801860A true CN112801860A (en) 2021-05-14

Family

ID=75809532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110053358.0A Pending CN112801860A (en) 2021-01-14 2021-01-14 Shooting function limiting method and terminal

Country Status (1)

Country Link
CN (1) CN112801860A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060028558A1 (en) * 2003-05-20 2006-02-09 Satoshi Sato Image capturing system
WO2006060283A2 (en) * 2004-12-03 2006-06-08 Interdigital Technology Corporation Method and apparatus for generating, sensing and adjusting watermarks
JP2007266882A (en) * 2006-03-28 2007-10-11 Casio Comput Co Ltd Imaging apparatus, photography restricting method, and photographing restricting program
US20080297586A1 (en) * 2007-05-31 2008-12-04 Kurtz Andrew F Personal controls for personal video communications
CN103248825A (en) * 2013-05-14 2013-08-14 杭州亿脑智能科技有限公司 Computer vision based candid camera prevention device and method
CN103890779A (en) * 2011-10-10 2014-06-25 礼元通信株式会社 Device and method for automatically identifying a QR code
CN104469127A (en) * 2013-09-22 2015-03-25 中兴通讯股份有限公司 Photographing method and photographing device
CN106851091A (en) * 2016-12-23 2017-06-13 深圳众思科技有限公司 Control method of electronic device, device and electronic equipment
CN107197104A (en) * 2017-07-14 2017-09-22 维沃移动通信有限公司 A kind of camera control method and mobile terminal

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060028558A1 (en) * 2003-05-20 2006-02-09 Satoshi Sato Image capturing system
CN101127834A (en) * 2003-05-20 2008-02-20 松下电器产业株式会社 Image capturing system
CN101242493A (en) * 2003-05-20 2008-08-13 松下电器产业株式会社 Image capturing system
WO2006060283A2 (en) * 2004-12-03 2006-06-08 Interdigital Technology Corporation Method and apparatus for generating, sensing and adjusting watermarks
JP2007266882A (en) * 2006-03-28 2007-10-11 Casio Comput Co Ltd Imaging apparatus, photography restricting method, and photographing restricting program
US20080297586A1 (en) * 2007-05-31 2008-12-04 Kurtz Andrew F Personal controls for personal video communications
CN103890779A (en) * 2011-10-10 2014-06-25 礼元通信株式会社 Device and method for automatically identifying a QR code
CN103248825A (en) * 2013-05-14 2013-08-14 杭州亿脑智能科技有限公司 Computer vision based candid camera prevention device and method
CN104469127A (en) * 2013-09-22 2015-03-25 中兴通讯股份有限公司 Photographing method and photographing device
CN106851091A (en) * 2016-12-23 2017-06-13 深圳众思科技有限公司 Control method of electronic device, device and electronic equipment
CN107197104A (en) * 2017-07-14 2017-09-22 维沃移动通信有限公司 A kind of camera control method and mobile terminal

Similar Documents

Publication Publication Date Title
US11729514B2 (en) Image processing method and apparatus
KR100556856B1 (en) Screen control method and apparatus in mobile telecommunication terminal equipment
US11138695B2 (en) Method and device for video processing, electronic device, and storage medium
EP3163504B1 (en) Method, device and computer-readable medium for region extraction
CN105095881B (en) Face recognition method, face recognition device and terminal
US20170124386A1 (en) Method, device and computer-readable medium for region recognition
CN106127751B (en) Image detection method, device and system
US20170124419A1 (en) Method, apparatus, and computer-readable storage medium for area identification
CN110796600B (en) Image super-resolution reconstruction method, image super-resolution reconstruction device and electronic equipment
CN106295638A (en) Certificate image sloped correcting method and device
US9785850B2 (en) Real time object measurement
CN104899490A (en) Terminal positioning method and user terminal
CN107690804B (en) Image processing method and user terminal
CN111626163B (en) Human face living body detection method and device and computer equipment
CN106599758A (en) Image quality processing method and terminal
CN107256543A (en) Image processing method, device, electronic equipment and storage medium
CN111090384B (en) Soft keyboard display method and device
CN107770487B (en) Feature extraction and optimization method, system and terminal equipment
US20170352170A1 (en) Nearsighted camera object detection
CN108270973B (en) Photographing processing method, mobile terminal and computer readable storage medium
CN112801860A (en) Shooting function limiting method and terminal
CN110889470B (en) Method and apparatus for processing image
CN108805838B (en) Image processing method, mobile terminal and computer readable storage medium
CN106778744A (en) A kind of method and apparatus of the information of ID card
CN114764839A (en) Dynamic video generation method and device, readable storage medium and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination