CN105160264A - Photograph encryption device and method - Google Patents
Photograph encryption device and method Download PDFInfo
- Publication number
- CN105160264A CN105160264A CN201510632684.1A CN201510632684A CN105160264A CN 105160264 A CN105160264 A CN 105160264A CN 201510632684 A CN201510632684 A CN 201510632684A CN 105160264 A CN105160264 A CN 105160264A
- Authority
- CN
- China
- Prior art keywords
- portrait
- photo
- encrypted
- fingerprint
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Collating Specific Patterns (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a photograph encryption device, which comprises an outline acquisition module and a portrait encryption module, wherein the outline acquisition module is used for obtaining the outline of a portrait corresponding to a selection operation when the image selection operation triggered by a user on the basis of a photograph to be triggered is obtained after a portrait encryption instruction is received; and the portrait encryption module is used for adopting a fingerprint corresponding to a photograph to be encrypted to encrypt the portrait according to the obtained outline of the portrait. The invention also provides a photograph encryption method. The fingerprint of the user can be used for simply and quickly realizing portrait encryption in the photograph.
Description
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of photo encryption device and method.
Background technology
The user of mobile terminal device is used to get more and more now; mobile terminal device has also more and more been dissolved in the life of user simultaneously; such as take a picture, chat etc.; and along with the application day-to-day of mobile phone photograph; for the photo of rear preservation of having taken pictures; user shares the social tool such as micro-letter, microblogging often; but user does not wish some personage in open photo sometimes; more existing processing modes are generally blocked personage by image processing software; but this disposal route needs to open extra application, complicated operation and process is loaded down with trivial details.
Summary of the invention
The invention provides a kind of photo encryption device and method, its fundamental purpose is to utilize the fingerprint of user to realize the encryption of portrait in photo simply, rapidly.
For achieving the above object, the invention provides a kind of photo encryption device, this photo encryption device comprises:
Profile acquisition module, for after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtains the profile of the described portrait selecting operation corresponding;
Portrait encrypting module, for the profile according to the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
Preferably, described photo encryption device also comprises:
Finger print acquisition module, during for meeting pre-conditioned when the touch control operation received, gathers the fingerprint that described touch control operation is corresponding, obtains described photo to be encrypted and judges whether described photo to be encrypted is encrypted;
Confirmation command module, for when described photo unencryption to be encrypted, judges that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
Preferably, described photo encryption device also comprises:
Fingerprint judge module, if for described photo to be encrypted through encryption, then judges whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
Portrait deciphering module, for when described fingerprint with encryption described portrait use fingerprint matching time, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
Preferably, described photo encryption device also comprises:
Instruction judge module, for judging whether described portrait encrypted instruction is bulk encryption instruction;
Described portrait encrypting module, if be not also bulk encryption instruction for described portrait encrypted instruction, then according to the profile of the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding;
Described portrait encrypting module, if be also bulk encryption instruction for described portrait encrypted instruction, then identify the facial information of described portrait, the described portrait had in the photo of described facial information is encrypted in picture library.
Preferably, described profile acquisition module comprises:
Photo disposal unit, for obtaining the image outline of described photo, obtains the image outline of black and white by described photo binary conversion treatment;
Face identification unit, for calling the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function;
Silhouette markup unit, for the image outline be connected with described facial contour is labeled as body contour, is added the described body contour of mark with described facial contour and obtains described portrait profile.
In addition, for achieving the above object, the present invention also provides a kind of photo encryption method, and this photo encryption method comprises:
After receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the profile of the described portrait selecting operation corresponding;
According to the profile of the described portrait got, adopt portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
Preferably, described after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, before obtaining the step of the profile of the described portrait selecting operation corresponding, described photo encryption method also comprises:
When the touch control operation received meets pre-conditioned, gather the fingerprint that described touch control operation is corresponding, obtain described photo to be encrypted and judge whether described photo to be encrypted is encrypted;
When described photo unencryption to be encrypted, judge that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
Preferably, when the described touch control operation when receiving meets pre-conditioned, gathering the fingerprint that described touch control operation is corresponding, obtaining described photo to be encrypted and after judging the step whether described photo to be encrypted has been encrypted, described photo encryption method also comprises:
If described photo to be encrypted is through encryption, then judge whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
When the fingerprint matching that described fingerprint uses with the described portrait of encryption, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
Preferably, described after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the step of profile and the profile of the described described portrait according to getting of the described portrait selecting operation corresponding, between the step adopting portrait described in encrypting fingerprint that described photo to be encrypted is corresponding, described photo encryption method also comprises:
Judge whether described portrait encrypted instruction is bulk encryption instruction;
If described portrait encrypted instruction is not bulk encryption instruction, then perform the described profile according to the described portrait got, adopt the step of portrait described in encrypting fingerprint that described photo to be encrypted is corresponding;
Described judge whether described portrait encrypted instruction is the step of bulk encryption instruction after, described photo encryption method also comprises step:
If described portrait encrypted instruction is bulk encryption instruction, then identify the facial information of described portrait, the described portrait had in picture library in the photo of described facial information is encrypted.
Preferably, the described step of the profile of portrait corresponding to operation of selecting of described acquisition comprises:
Obtain the image outline of described photo, described photo binary conversion treatment is obtained the image outline of black and white;
Call the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function;
The image outline be connected with described facial contour is labeled as body contour, the described body contour of mark is combined with described facial contour and obtains described portrait profile.
The photo encryption device that the present invention proposes and method, after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the profile of portrait corresponding to this selection operation, adopt fingerprint corresponding to this photo to be encrypted by portrait corresponding for the above-mentioned portrait profile in photo, the present invention encrypt portrait time, without the need to calling external software, and cryptographic operation is simple, can realize the encryption of portrait in photo rapidly.
Accompanying drawing explanation
Fig. 1 is the hardware configuration schematic diagram of the mobile terminal realizing each embodiment of the present invention;
Fig. 2 is the radio communication device schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the high-level schematic functional block diagram of photo encryption device first embodiment of the present invention;
Fig. 4 is the touch control operation scene schematic diagram in photo encryption device first embodiment of the present invention;
Fig. 5 is that scene schematic diagram chosen by the portrait in photo encryption device first embodiment of the present invention;
Fig. 6 is the high-level schematic functional block diagram of photo encryption device second embodiment of the present invention;
Fig. 7 is the refinement high-level schematic functional block diagram of profile acquisition module in photo encryption device the 4th embodiment of the present invention;
Fig. 8 is the process flow diagram of photo encryption method first embodiment of the present invention;
Fig. 9 is the process flow diagram of photo encryption method second embodiment of the present invention;
Figure 10 is the refinement process flow diagram obtaining the step of portrait profile in photo encryption method the 4th embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use the suffix of such as " module ", " parts " or " unit " for representing element only in order to be conducive to explanation of the present invention, itself is specific meaning not.Therefore, " module " and " parts " can mixedly use.
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can comprise the such as mobile terminal of mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider etc. and the fixed terminal of such as digital TV, desk-top computer etc.Below, suppose that terminal is mobile terminal.But it will be appreciated by those skilled in the art that except the element except being used in particular for mobile object, structure according to the embodiment of the present invention also can be applied to the terminal of fixed type.
Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention.
Mobile terminal 100 can comprise wireless communication unit 110, A/V (audio/video) input block 120, user input unit 130, sensing cell 140, output unit 150, storer 160, interface unit 170, controller 180 and power supply unit 190 etc.Fig. 1 shows the mobile terminal with various assembly, it should be understood that, does not require to implement all assemblies illustrated.Can alternatively implement more or less assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows the wireless communication between mobile terminal 100 and radio communication device or network.Such as, wireless communication unit can comprise at least one in broadcast reception module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114 and positional information module 115.
Broadcast reception module 111 via broadcast channel from external broadcasting management server receiving broadcast signal and/or broadcast related information.Broadcast channel can comprise satellite channel and/or terrestrial channel.Broadcast management server can be generate and send the server of broadcast singal and/or broadcast related information or the broadcast singal generated before receiving and/or broadcast related information and send it to the server of terminal.Broadcast singal can comprise TV broadcast singal, radio signals, data broadcasting signal etc.And broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast related information also can provide via mobile communications network, and in this case, broadcast related information can be received by mobile communication module 112.Broadcast singal can exist in a variety of manners, such as, it can exist with the form of the electronic service guidebooks (ESG) of the electronic program guides of DMB (DMB) (EPG), digital video broadcast-handheld (DVB-H) etc.Broadcast reception module 111 can by using the broadcast of various types of broadcaster Received signal strength.Especially, broadcast reception module 111 can by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video broadcasting-hand-held (DVB-H), forward link media (MediaFLO
) data broadcast device, received terrestrial digital broadcasting integrated service (ISDB-T) etc. digital broadcast apparatus receive digital broadcasting.Broadcast reception module 111 can be constructed to be applicable to providing the various broadcaster of broadcast singal and above-mentioned digital broadcast apparatus.The broadcast singal received via broadcast reception module 111 and/or broadcast related information can be stored in storer 160 (or storage medium of other type).
Radio signal is sent at least one in base station (such as, access point, Node B etc.), exterior terminal and server and/or receives radio signals from it by mobile communication module 112.Various types of data that such radio signal can comprise voice call signal, video calling signal or send according to text and/or Multimedia Message and/or receive.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be inner or be externally couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can comprise WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc.
Short range communication module 114 is the modules for supporting junction service.Some examples of short-range communication technology comprise bluetooth
tM, radio-frequency (RF) identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee
tMetc..
Positional information module 115 is the modules of positional information for checking or obtain mobile terminal.The typical case of positional information module is GPS (global pick device).According to current technology, GPS module 115 calculates from the range information of three or more satellite and correct time information and for the Information application triangulation calculated, thus calculates three-dimensional current location information according to longitude, latitude and pin-point accuracy.Current, the method for calculating position and temporal information uses three satellites and by using the error of the position that goes out of an other satellite correction calculation and temporal information.In addition, GPS module 115 can carry out computing velocity information by Continuous plus current location information in real time.
A/V input block 120 is for audio reception or vision signal.A/V input block 120 can comprise camera 121 and microphone 122, and the view data of camera 121 to the static images obtained by image capture apparatus in Video Capture pattern or image capture mode or video processes.Picture frame after process may be displayed on display unit 151.Picture frame after camera 121 processes can be stored in storer 160 (or other storage medium) or via wireless communication unit 110 and send, and can provide two or more cameras 121 according to the structure of mobile terminal.Such acoustic processing can via microphones sound (voice data) in telephone calling model, logging mode, speech recognition mode etc. operational mode, and can be voice data by microphone 122.Audio frequency (voice) data after process can be converted to the formatted output that can be sent to mobile communication base station via mobile communication module 112 when telephone calling model.Microphone 122 can be implemented various types of noise and eliminate (or suppress) algorithm and receiving and sending to eliminate (or suppression) noise or interference that produce in the process of sound signal.
User input unit 130 can generate key input data to control the various operations of mobile terminal according to the order of user's input.User input unit 130 allows user to input various types of information, and keyboard, the young sheet of pot, touch pad (such as, detecting the touch-sensitive assembly of the change of the resistance, pressure, electric capacity etc. that cause owing to being touched), roller, rocking bar etc. can be comprised.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch-screen can be formed.
Sensing cell 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (namely, touch input) presence or absence, the orientation of mobile terminal 100, the acceleration of mobile terminal 100 or speed is moved and direction etc., and generate order or the signal of the operation for controlling mobile terminal 100.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing cell 140 can sense this sliding-type phone and open or close.In addition, whether whether sensing cell 140 can detect power supply unit 190 provides electric power or interface unit 170 to couple with external device (ED).Sensing cell 140 can comprise proximity transducer 1410 and will be described this in conjunction with touch-screen below.
Interface unit 170 is used as at least one external device (ED) and is connected the interface that can pass through with mobile terminal 100.Such as, external device (ED) can comprise wired or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, memory card port, for connecting the port, audio frequency I/O (I/O) port, video i/o port, ear port etc. of the device with identification module.Identification module can be that storage uses the various information of mobile terminal 100 for authentication of users and can comprise subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc.In addition, the device (hereinafter referred to " recognition device ") with identification module can take the form of smart card, and therefore, recognition device can be connected with mobile terminal 100 via port or other coupling arrangement.Interface unit 170 may be used for receive from external device (ED) input (such as, data message, electric power etc.) and the input received be transferred to the one or more element in mobile terminal 100 or may be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 can be used as to allow by it electric power to be provided to the path of mobile terminal 100 from base or can be used as the path that allows to be transferred to mobile terminal by it from the various command signals of base input.The various command signal inputted from base or electric power can be used as and identify whether mobile terminal is arranged on the signal base exactly.Output unit 150 is constructed to provide output signal (such as, sound signal, vision signal, alarm signal, vibration signal etc.) with vision, audio frequency and/or tactile manner.Output unit 150 can comprise display unit 151, dio Output Modules 152, alarm unit 153 etc.
Display unit 151 may be displayed on the information of process in mobile terminal 100.Such as, when mobile terminal 100 is in telephone calling model, display unit 151 can show with call or other communicate (such as, text messaging, multimedia file are downloaded etc.) be correlated with user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern or image capture mode, display unit 151 can the image of display capture and/or the image of reception, UI or GUI that video or image and correlation function are shown etc.
Meanwhile, when display unit 151 and touch pad as a layer superposed on one another to form touch-screen time, display unit 151 can be used as input media and output unit.Display unit 151 can comprise at least one in liquid crystal display (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc.Some in these displays can be constructed to transparence and watch from outside to allow user, and this can be called transparent display, and typical transparent display can be such as TOLED (transparent organic light emitting diode) display etc.According to the specific embodiment wanted, mobile terminal 100 can comprise two or more display units (or other display device), such as, mobile terminal can comprise outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for detecting touch input pressure and touch input position and touch and inputs area.
When dio Output Modules 152 can be under the isotypes such as call signal receiving mode, call mode, logging mode, speech recognition mode, broadcast reception mode at mobile terminal, voice data convert audio signals that is that wireless communication unit 110 is received or that store in storer 160 and exporting as sound.And dio Output Modules 152 can provide the audio frequency relevant to the specific function that mobile terminal 100 performs to export (such as, call signal receives sound, message sink sound etc.).Dio Output Modules 152 can comprise acoustic pickup, hummer etc.
Alarm unit 153 can provide and export that event informed to mobile terminal 100.Typical event can comprise calling reception, message sink, key signals input, touch input etc.Except audio or video exports, alarm unit 153 can provide in a different manner and export with the generation of notification event.Such as, alarm unit 153 can provide output with the form of vibration, when receive calling, message or some other enter communication (incomingcommunication) time, alarm unit 153 can provide sense of touch to export (that is, vibrating) to notify to user.By providing such sense of touch to export, even if when the mobile phone of user is in the pocket of user, user also can identify the generation of various event.Alarm unit 153 also can provide the output of the generation of notification event via display unit 151 or dio Output Modules 152.
Storer 160 software program that can store process and the control operation performed by controller 180 etc., or temporarily can store oneself through exporting the data (such as, telephone directory, message, still image, video etc.) that maybe will export.And, storer 160 can store about when touch be applied to touch-screen time the vibration of various modes that exports and the data of sound signal.
Storer 160 can comprise the storage medium of at least one type, described storage medium comprises flash memory, hard disk, multimedia card, card-type storer (such as, SD or DX storer etc.), random access storage device (RAM), static random-access memory (SRAM), ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc.And mobile terminal 100 can be connected the memory function of execute store 160 network storage device with by network cooperates.
Controller 180 controls the overall operation of mobile terminal usually.Such as, controller 180 performs the control relevant to voice call, data communication, video calling etc. and process.In addition, controller 180 can comprise the multi-media module 181 for reproducing (or playback) multi-medium data, and multi-media module 181 can be configured in controller 180, or can be configured to be separated with controller 180.Controller 180 can pattern recognition process, is identified as character or image so that input is drawn in the handwriting input performed on the touchscreen or picture.
Power supply unit 190 receives external power or internal power and provides each element of operation and the suitable electric power needed for assembly under the control of controller 180.
Various embodiment described herein can to use such as computer software, the computer-readable medium of hardware or its any combination implements.For hardware implementation, embodiment described herein can by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, being designed at least one performed in the electronic unit of function described herein and implementing, in some cases, such embodiment can be implemented in controller 180.For implement software, the embodiment of such as process or function can be implemented with allowing the independent software module performing at least one function or operation.Software code can be implemented by the software application (or program) write with any suitable programming language, and software code can be stored in storer 160 and to be performed by controller 180.
So far, oneself is through the mobile terminal according to its functional description.Below, for the sake of brevity, by the slide type mobile terminal that describes in various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc. exemplarily.Therefore, the present invention can be applied to the mobile terminal of any type, and is not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 can be constructed to utilize and send the such as wired and radio communication device of data via frame or grouping and satellite-based communicator operates.
Describe wherein according to the communicator that mobile terminal of the present invention can operate referring now to Fig. 2.
Such communicator can use different air interfaces and/or Physical layer.Such as, the air interface used by communicator comprises such as frequency division multiple access (FDMA), time division multiple access (TDMA) (TDMA), CDMA (CDMA) and universal mobile communications device (UMTS) (especially, Long Term Evolution (LTE)), global mobile communication device (GSM) etc.As non-limiting example, description below relates to cdma communication device, but such instruction is equally applicable to the device of other type.
With reference to figure 2, cdma wireless communication device can comprise multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is constructed to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also constructed to form interface with the BSC275 that can be couple to base station 270 via back haul link.Back haul link can construct according to any one in some interfaces that oneself knows, described interface comprises such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.Will be appreciated that device as shown in Figure 2 can comprise multiple BSC2750.
Each BS270 can serve one or more subregion (or region), by multidirectional antenna or point to specific direction each subregion of antenna cover radially away from BS270.Or each subregion can by two or more antenna covers for diversity reception.Each BS270 can be constructed to support multiple parallel compensate, and each parallel compensate has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Subregion can be called as CDMA Channel with intersecting of parallel compensate.BS270 also can be called as the sub-device of base station transceiver (BTS) or other equivalent terms.Under these circumstances, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station also can be called as " cellular station ".Or each subregion of particular B S270 can be called as multiple cellular station.
As shown in Figure 2, broadcast singal is sent to the mobile terminal 100 operated in device by broadcsting transmitter (BT) 295.Broadcast reception module 111 as shown in Figure 1 is arranged on mobile terminal 100 and sentences the broadcast singal receiving and sent by BT295.In fig. 2, several global pick device (GPS) satellite 300 is shown.Satellite 300 helps at least one in the multiple mobile terminal 100 in location.
In fig. 2, depict multiple satellite 300, but be understandable that, the satellite of any number can be utilized to obtain useful locating information.GPS module 115 as shown in Figure 1 is constructed to coordinate to obtain the locating information wanted with satellite 300 usually.Substitute GPS tracking technique or outside GPS tracking technique, can use can other technology of position of tracking mobile terminal.In addition, at least one gps satellite 300 optionally or extraly can process satellite dmb transmission.
As a typical operation of radio communication device, BS270 receives the reverse link signal from various mobile terminal 100.Mobile terminal 100 participates in call usually, information receiving and transmitting communicates with other type.Each reverse link signal that certain base station 270 receives is processed by particular B S270.The data obtained are forwarded to relevant BSC275.BSC provides call Resourse Distribute and comprises the mobile management function of coordination of the soft switching process between BS270.The data received also are routed to MSC280 by BSC275, and it is provided for the extra route service forming interface with PSTN290.Similarly, PSTN290 and MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly control BS270 so that forward link signals is sent to mobile terminal 100.
Based on the structure of above-mentioned mobile terminal hardware configuration, communicator, each embodiment of the inventive method is proposed.
The present invention proposes a kind of photo encryption device.
With reference to shown in Fig. 3, it is the high-level schematic functional block diagram of photo encryption device first embodiment of the present invention.
In this embodiment, this photo encryption device comprises:
Profile acquisition module 10, for after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtains the profile of the described portrait selecting operation corresponding.
User before being encrypted the photo in the mobile terminal such as mobile phone or panel computer, can pre-set trigger condition, and such as, length exceedes certain time length according to sheet, or the force value pressing this photo is greater than the conditions such as certain value, with reference to shown in Fig. 4; Or arrange trigger control, when user triggers portrait encrypted instruction based on this trigger control, then open the function of portrait encryption, concrete triggering mode can be arranged in advance by user.
When user needs one or more portrait in comparison film to be encrypted, touch control operation can be carried out to this photo, or select operation based on control promoter pictures such as the button in terminal, touch pads.
Portrait encrypting module 20, for the profile according to the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
When operation selected by the above-mentioned portrait receiving user, profile acquisition module 10 obtains the portrait profile of this operation correspondence, and such as, user can click the portrait needing encryption, when receiving the touch control operation based on portrait, portrait encrypting module 20 by touch control operation based on portrait encryption.The portrait be encrypted can be one, also can be multiple, if desired encrypt multiple portrait, then click the portrait that each needs encryption, with reference to shown in Fig. 5; Or the scope of this touch control operation relates to the multiple portraits needing encryption, such as, in the enterprising line slip operation of screen, the portrait that this slide relates to is encrypted, portrait encrypting module 20 is when carrying out portrait encryption, can numerous embodiments be had, such as mosaic, filling, by portrait Fuzzy Processing etc.It should be noted that, this cipher mode is that interpolation information is encrypted on original photo, is reversible cipher mode, namely the information of interpolation can be removed, the virgin state before making photo return to encryption.
The fingerprint that above-mentioned photo to be encrypted is corresponding, can be when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, the fingerprint corresponding with this operation got, also can be the fingerprint of the user prestored, when portrait encrypting module 20 comparison film is encrypted, can arrange according to user or adopt the portrait that the choice for use encrypting fingerprint user of acquiescence selects.
Be understandable that, when user uses portrait in encrypting fingerprint photo first, first gather the fingerprint of user.Such as, after user triggers portrait encrypted instruction, profile acquisition module 10 judges whether the fingerprint prestored, and when can't detect the fingerprint of storage, then thinks that user uses this function first; Or when the portrait selected with the encrypting fingerprint user stored, can't detect the fingerprint of storage, then think that user uses this function first, now the fingerprint of user that arrives of profile acquisition module 10 storage of collected, the portrait that the encrypting fingerprint user that portrait encrypting module 20 collects selects.In other embodiments, can when user trigger portrait encrypted instruction first, display fingerprint acquisition interface inputs fingerprint for user, and stores the fingerprint of user's input.
Further, in this embodiment, user can use the multiple portraits in same encrypting fingerprint photo, also can use the multiple portraits in no encrypting fingerprint photo, such as, uses different fingers to click different people picture in photo.Or when the portrait that the fingerprint stored has encrypting fingerprint user that is multiple and that use stored to select, portrait encrypting module 20 can point out user to make a choice in the multiple fingerprints stored.Be understandable that, when using the multiple portrait in different encrypting fingerprint photo, the fingerprint of use and corresponding portrait carry out associating by portrait encrypting module 20 to be preserved, so that the same fingerprint of follow-up use is decrypted.
The photo encryption device that the present embodiment proposes, after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the profile of portrait corresponding to this selection operation, adopt fingerprint corresponding to this photo to be encrypted by portrait corresponding for the above-mentioned portrait profile in photo, the present invention encrypt portrait time, without the need to calling external software, and cryptographic operation is simple, can realize the encryption of portrait in photo rapidly.
With reference to shown in Fig. 6, the first embodiment based on invention photo encryption device proposes the second embodiment of photo encryption device of the present invention.In the present embodiment, the difference of described device and the first embodiment is, this photo encryption device also comprises:
Finger print acquisition module 30, during for meeting pre-conditioned when the touch control operation received, gathers the fingerprint that described touch control operation is corresponding, obtains described photo to be encrypted and judges whether described photo to be encrypted is encrypted.
This is pre-conditioned can be pre-set by user, can be such as trigger icon corresponding to portrait encryption mode, or length exceedes certain time length according to sheet, or the force value pressing this photo is greater than the conditions such as certain value, and concrete condition all can be arranged by user in advance.When the touch control operation received meets pre-conditioned, finger print acquisition module 30 gathers the fingerprint of this operation correspondence, if user triggers icon etc. corresponding to portrait encryption mode when opening the function of encrypting fingerprint portrait, user can be pointed out to select photo or directly open photograph album and select for user, to obtain photo to be encrypted, if user is the touch control operation carried out based on photo, then judge that this photo is photo to be encrypted.After finger print acquisition module 30 gets photo to be encrypted, detect in this photo and whether have passed through portrait encryption, such as, this photo can be detected and whether have passed through the mosaic, fuzzy or block process etc. meeting portrait profile.
Confirmation command module 40, for when described photo unencryption to be encrypted, judges that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
If this photo is not through portrait encryption, then confirmation command module 40 judges that the touch control operation of user triggers portrait encrypted instruction, now enters the process of portrait encryption, and the fingerprint of this operation correspondence collected is encrypted as follow-up portrait the fingerprint used.
Further, this photo encryption device also comprises:
Fingerprint judge module, if for described photo to be encrypted through encryption, then judges whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
Portrait deciphering module, for when described fingerprint with encryption described portrait use fingerprint matching time, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
If this photo is encrypted through portrait, then confirmation command module 40 judges that the touch control operation of user triggers the instruction of portrait encryption and decryption, now enter the process of portrait deciphering, fingerprint judge module judges whether the fingerprint collected mates with the fingerprint that portrait in this photo of encryption uses.
If the fingerprint collected and the fingerprint matching of to encrypt portrait before and using, then the photo using this fingerprint to be encrypted in photo is decrypted by portrait deciphering module, particularly, the information that can be attached on photo is removed, the virgin state before making photo return to encryption.
Further, when there being multiple portrait to have passed through encryption in photo, multiple fingerprints corresponding with the portrait of encryption for the fingerprint collected are carried out comparison one by one by portrait deciphering module, when having fingerprint and the fingerprint matching collected, then by portrait corresponding for the fingerprint of coupling deciphering, when user needs the portrait deciphering other encryptions in photo, the portrait area in the finger comparison film used during encryption can be used to carry out touch control operation, during the fingerprint matching that the portrait corresponding with touch control operation when the fingerprint of the finger used associates, portrait deciphering module deciphers this portrait.
Further, in other embodiments, when deciphering portrait, also can in the following way:
When having fingerprint and the described fingerprint matching collected in the described fingerprint stored, portrait deciphering module is by encrypted portrait deciphering all in described photo; Or when having fingerprint corresponding to encrypted portrait and the described fingerprint matching collected in described photo, portrait deciphering module is by portrait deciphering encrypted in described photo.
If there is the fingerprint with the fingerprint matching collected in multiple fingerprints of the user stored before, then portrait deciphering module is decrypted this photo, simplify the operation steps of deciphering, when there being multiple portrait to need deciphering, everyone picture encrypted in photo just can be deciphered by single job, need not operate one by one everyone picture.
The photo encryption device that the present embodiment proposes, when user carries out touch control operation and this touch control operation is default touch control operation, gather the fingerprint of user, if this photo is through the encryption of portrait, then judge the fingerprint that collects whether with the fingerprint matching of encrypting fingerprint or the storage used, if mate, then by the portrait deciphering in photo, the photo encrypted through portrait can be returned to unencrypted virgin state fast, simple to operate, the deciphering of portrait in photo can be realized rapidly.
The first embodiment based on invention photo encryption device proposes the 3rd embodiment of photo encryption device of the present invention.In the present embodiment, the difference of described device and the first embodiment is, this photo encryption device also comprises:
Instruction judge module, for judging whether described portrait encrypted instruction is bulk encryption instruction.
If described portrait encrypted instruction is not bulk encryption instruction, then portrait encrypting module 20 is according to the profile of the described portrait got, and adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
If described portrait encrypted instruction is bulk encryption instruction, then portrait encrypting module 20 identifies the facial information of described portrait, the described portrait had in the photo of described facial information is encrypted in picture library.
When user needs the encryption realizing same portrait in multiple pictures fast, touch control operation can be carried out to having a certain photo of this portrait, such as, by long by this portrait in this photo, when terminal determines that the operation of user is based on this portrait in photo, the interface of display bulk encryption is selected to select for user for user, or the control providing triggers bulk to encrypt, and directly enters the pattern of bulk encryption for user based on this control.
If what user triggered is bulk encryption instruction, then portrait encrypting module 20 identifies the facial information of this portrait, and at the profile according to the described portrait got, after adopting portrait described in encrypting fingerprint that described photo to be encrypted is corresponding, the portrait had in picture library in the photo of this facial information is encrypted, in one embodiment, photo in picture library can be carried out information scanning by portrait encrypting module 20 one by one, to identify whether that there is this facial information, in another embodiment, portrait encrypting module 20 first can filter out the photo of portrait, then in these photos, carry out the comparison of facial information one by one, find out the photo with this facial information, the portrait in photo with this facial information is encrypted.
Further, in other embodiments, after user have selected bulk encryption, the multiple pictures needing encryption can be selected, when portrait encrypting module 20 receives the selection instruction of described multiple pictures, identify the facial information of described portrait, and the described portrait had in described multiple pictures in the described photo of described facial information is encrypted.
The photo encryption device that the present embodiment proposes, provides a kind of mode of bulk encryption multiple pictures, and terminal can according to the interface of the operation of user display bulk encryption, after user makes a choice, can disposable realization to the encryption of multiple pictures.
With reference to shown in Fig. 7, the first embodiment based on invention photo encryption device proposes the 4th embodiment of photo encryption device of the present invention.In the present embodiment, the difference of described device and the first embodiment is, profile acquisition module 10 comprises with lower unit:
Photo disposal unit 11, for obtaining the image outline of described photo, obtains the image outline of black and white by described photo binary conversion treatment.
Face identification unit 12, for calling the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function.
Profile acquiring unit 13, for the image outline be connected with described facial contour is labeled as body contour, is added the described body contour of mark with described facial contour and obtains described portrait profile.
First the image outline of whole pictures is extracted, then photo disposal unit 11 is by photo binary conversion treatment, obtain the image outline of black and white, face identification unit 12 calls recognition of face function in black and white profile, after identifying facial contour, it is body contour that profile acquiring unit 13 marks the profile be connected with face again, and facial contour is added with body contour and is complete portrait profile.
Further, profile acquisition module 10 also comprises:
Information Tip element, if can not identify described facial contour for described recognition of face function in described photo, then sends information, cannot be encrypted to point out this photo of user.
The photo encryption device that the present embodiment proposes, utilizes Identification of Images function to obtain facial contour, is obtaining body contour further, facial contour and body contour is carried out superposing obtaining complete portrait profile.
The present invention also provides a kind of photo encryption method.
With reference to shown in Fig. 8, it is the process flow diagram of the first embodiment of photo encryption method of the present invention.
In a first embodiment, the method comprises:
Step S10, after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtains the profile of the described portrait selecting operation corresponding.
User before being encrypted the photo in the mobile terminal such as mobile phone or panel computer, can pre-set trigger condition, and such as, length exceedes certain time length according to sheet, or the force value pressing this photo is greater than the conditions such as certain value, with reference to shown in Fig. 4; Or arrange trigger control, when user triggers portrait encrypted instruction based on this trigger control, then open the function of portrait encryption, concrete triggering mode can be arranged in advance by user.
When user needs one or more portrait in comparison film to be encrypted, touch control operation can be carried out to this photo, or select operation based on control promoter pictures such as the button in terminal, touch pads.
Step S20, according to the profile of the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
When operation selected by the above-mentioned portrait receiving user, obtain the portrait profile of this operation correspondence, such as, user can click the portrait needing encryption, when receiving the touch control operation based on portrait, by touch control operation institute based on portrait encrypt.The portrait be encrypted can be one, also can be multiple, if desired encrypt multiple portrait, then click the portrait that each needs encryption, with reference to shown in Fig. 5; Or the scope of this touch control operation relates to the multiple portraits needing encryption, such as, in the enterprising line slip operation of screen, the portrait that this slide relates to is encrypted, when carrying out portrait encryption, can numerous embodiments be had, such as mosaic, filling, by portrait Fuzzy Processing etc.It should be noted that, this encryption method is that interpolation information is encrypted on original photo, is reversible cipher mode, namely the information of interpolation can be removed, the virgin state before making photo return to encryption.
The fingerprint that above-mentioned photo to be encrypted is corresponding, can be when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, the fingerprint corresponding with this operation got, also can be the fingerprint of the user prestored, when encrypting, can arrange according to user or adopt the portrait that the choice for use encrypting fingerprint user of acquiescence selects.
Be understandable that, when user uses portrait in encrypting fingerprint photo first, first gather the fingerprint of user.Such as, after user triggers portrait encrypted instruction, judging whether the fingerprint prestored, when can't detect the fingerprint of storage, then thinking that user uses this function first; Or when the portrait selected with the encrypting fingerprint user stored, can't detect the fingerprint of storage, then think that user uses this function first, now the fingerprint of user that arrives of storage of collected, and the portrait of the encrypting fingerprint user collected selection.In other embodiments, can when user trigger portrait encrypted instruction first, display fingerprint acquisition interface inputs fingerprint for user, and stores the fingerprint of user's input.
Further, in this embodiment, user can use the multiple portraits in same encrypting fingerprint photo, also can use the multiple portraits in no encrypting fingerprint photo, such as, uses different fingers to click different people picture in photo.Or, when the portrait that the fingerprint stored has encrypting fingerprint user that is multiple and that use stored to select, user can be pointed out to make a choice in the multiple fingerprints stored.Be understandable that, when using the multiple portrait in different encrypting fingerprint photo, the fingerprint of use and corresponding portrait carried out associating and preserves, so that the same fingerprint of follow-up use is decrypted.
The photo encryption method that the present embodiment proposes, after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the profile of portrait corresponding to this selection operation, adopt fingerprint corresponding to this photo to be encrypted by portrait corresponding for the above-mentioned portrait profile in photo, the present invention encrypt portrait time, without the need to calling external software, and cryptographic operation is simple, can realize the encryption of portrait in photo rapidly.
With reference to shown in Fig. 9, the first embodiment based on invention photo encryption method proposes the second embodiment of photo encryption method of the present invention.In the present embodiment, the difference of described method and the first embodiment is, before step S10, this photo encryption method also comprises:
Step S30, when the touch control operation received meets pre-conditioned, gathers the fingerprint that described touch control operation is corresponding, obtains described photo to be encrypted and judges whether described photo to be encrypted is encrypted.
This is pre-conditioned can be pre-set by user, can be such as trigger icon corresponding to portrait encryption mode, or length exceedes certain time length according to sheet, or the force value pressing this photo is greater than the conditions such as certain value, and concrete condition all can be arranged by user in advance.When the touch control operation received meets pre-conditioned, gather the fingerprint of this operation correspondence, if user triggers icon etc. corresponding to portrait encryption mode when opening the function of encrypting fingerprint portrait, user can be pointed out to select photo or directly open photograph album and select for user, to obtain photo to be encrypted, if user is the touch control operation carried out based on photo, then judge that this photo is photo to be encrypted.After getting photo to be encrypted, detect in this photo and whether have passed through portrait encryption, such as, this photo can be detected and whether have passed through the mosaic, fuzzy or block process etc. meeting portrait profile.
Step S40, when described photo unencryption to be encrypted, judges that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
If this photo through portrait encryption, does not then judge that the touch control operation of user triggers portrait encrypted instruction, now enter the process of portrait encryption, and the fingerprint of this operation correspondence collected is encrypted as follow-up portrait the fingerprint used.
Further, after step S30, this photo encryption method also comprises:
If described photo to be encrypted is through encryption, then judge whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
When the fingerprint matching that described fingerprint uses with the described portrait of encryption, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
If this photo through portrait encryption, then judges that the touch control operation of user triggers the instruction of portrait encryption and decryption, now enter the process of portrait deciphering, judge whether the fingerprint collected mates with the fingerprint that portrait in this photo of encryption uses.
If the fingerprint collected and the fingerprint matching of encrypt portrait before and using, be then decrypted the photo using this fingerprint to be encrypted in photo, particularly, can be attached to the information removal on photo, the virgin state before making photo return to encryption.
Further, when there being multiple portrait to have passed through encryption in photo, multiple fingerprints corresponding with the portrait of encryption for the fingerprint collected are carried out comparison one by one, when having fingerprint and the fingerprint matching collected, then by portrait corresponding for the fingerprint of coupling deciphering, when user needs the portrait deciphering other encryptions in photo, the portrait area in the finger comparison film used during encryption can be used to carry out touch control operation, during the fingerprint matching that the portrait corresponding with touch control operation when the fingerprint of the finger used associates, then decipher this portrait.
Further, in other embodiments, when deciphering portrait, also can in the following way:
When having fingerprint and the described fingerprint matching collected in the described fingerprint stored, by encrypted portrait deciphering all in described photo; Or, when having fingerprint corresponding to encrypted portrait and the described fingerprint matching collected in described photo, by portrait deciphering encrypted in described photo.
If there is the fingerprint with the fingerprint matching collected in multiple fingerprints of the user stored before, then this photo is decrypted, simplify the operation steps of deciphering, when there being multiple portrait to need deciphering, everyone picture encrypted in photo just can be deciphered by single job, need not operate one by one everyone picture.
The photo encryption method that the present embodiment proposes, when user carries out touch control operation and this touch control operation is default touch control operation, gather the fingerprint of user, if this photo is through the encryption of portrait, then judge the fingerprint that collects whether with the fingerprint matching of encrypting fingerprint or the storage used, if mate, then by the portrait deciphering in photo, the photo encrypted through portrait can be returned to unencrypted virgin state fast, simple to operate, the deciphering of portrait in photo can be realized rapidly.
The first embodiment based on invention photo encryption method proposes the 3rd embodiment of photo encryption method of the present invention.In the present embodiment, the difference of described method and the first embodiment is, between step S10 and step S20, this photo encryption method also comprises:
Judge whether described portrait encrypted instruction is bulk encryption instruction.
If described portrait encrypted instruction is not bulk encryption instruction, then perform step S20.
If described portrait encrypted instruction is bulk encryption instruction, then identify the facial information of described portrait, the described portrait had in picture library in the photo of described facial information is encrypted.
When user needs the encryption realizing same portrait in multiple pictures fast, touch control operation can be carried out to having a certain photo of this portrait, such as, by long by this portrait in this photo, when terminal determines that the operation of user is based on this portrait in photo, the interface of display bulk encryption is selected to select for user for user, or the control providing triggers bulk to encrypt, and directly enters the pattern of bulk encryption for user based on this control.
If what user triggered is bulk encryption instruction, then identify the facial information of this portrait, and at the profile according to the described portrait got, after adopting portrait described in encrypting fingerprint that described photo to be encrypted is corresponding, the portrait had in picture library in the photo of this facial information is encrypted, in one embodiment, photo in picture library can be carried out information scanning one by one, to identify whether that there is this facial information, in another embodiment, first can filter out the photo of portrait, then in these photos, carry out the comparison of facial information one by one, find out the photo with this facial information, the portrait in photo with this facial information is encrypted.
Further, in other embodiments, after user have selected bulk encryption, the multiple pictures needing encryption can be selected, when terminal receives the selection instruction of described multiple pictures, identify the facial information of described portrait, and the described portrait had in described multiple pictures in the described photo of described facial information is encrypted.
The photo encryption method that the present embodiment proposes, provides a kind of mode of bulk encryption multiple pictures, and terminal can according to the interface of the operation of user display bulk encryption, after user makes a choice, can disposable realization to the encryption of multiple pictures.
With reference to shown in Figure 10, the first embodiment based on invention photo encryption method proposes the 4th embodiment of photo encryption method of the present invention.In the present embodiment, the difference of described method and the first embodiment is, step S10 comprises following refinement step:
Step S11, obtains the image outline of described photo, described photo binary conversion treatment is obtained the image outline of black and white.
Step S12, calls the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function.
Step S13, is labeled as body contour by the image outline be connected with described facial contour, is added by the described body contour of mark obtains described portrait profile with described facial contour.
First the image outline of whole pictures is extracted, then by photo binary conversion treatment, obtain the image outline of black and white, recognition of face function is called in black and white profile, after identifying facial contour, marking the profile be connected with face is again body contour, and facial contour is added with body contour and is complete portrait profile.
Further, after step s 12, this photo encryption method also comprises:
If described recognition of face function can not identify described facial contour in described photo, then send information, cannot be encrypted to point out this photo of user.
The photo encryption method that the present embodiment proposes, utilizes Identification of Images function to obtain facial contour, is obtaining body contour further, facial contour and body contour is carried out superposing obtaining complete portrait profile.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.
Claims (10)
1. a photo encryption device, is characterized in that, described photo encryption device comprises:
Profile acquisition module, for after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtains the profile of the described portrait selecting operation corresponding;
Portrait encrypting module, for the profile according to the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
2. photo encryption device according to claim 1, is characterized in that, described photo encryption device also comprises:
Finger print acquisition module, during for meeting pre-conditioned when the touch control operation received, gathers the fingerprint that described touch control operation is corresponding, obtains described photo to be encrypted and judges whether described photo to be encrypted is encrypted;
Confirmation command module, for when described photo unencryption to be encrypted, judges that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
3. photo encryption device according to claim 2, is characterized in that, described photo encryption device also comprises:
Fingerprint judge module, if for described photo to be encrypted through encryption, then judges whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
Portrait deciphering module, for when described fingerprint with encryption described portrait use fingerprint matching time, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
4. photo encryption device according to claim 1, is characterized in that, described photo encryption device also comprises:
Instruction judge module, for judging whether described portrait encrypted instruction is bulk encryption instruction;
Described portrait encrypting module, if be not also bulk encryption instruction for described portrait encrypted instruction, then according to the profile of the described portrait got, adopts portrait described in encrypting fingerprint that described photo to be encrypted is corresponding;
Described portrait encrypting module, if be also bulk encryption instruction for described portrait encrypted instruction, then identify the facial information of described portrait, the described portrait had in the photo of described facial information is encrypted in picture library.
5. photo encryption device according to claim 1, is characterized in that, described profile acquisition module comprises:
Photo disposal unit, for obtaining the image outline of described photo, obtains the image outline of black and white by described photo binary conversion treatment;
Face identification unit, for calling the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function;
Profile acquiring unit, for the image outline be connected with described facial contour is labeled as body contour, is added the described body contour of mark with described facial contour and obtains described portrait profile.
6. a photo encryption method, is characterized in that, described photo encryption method comprises:
After receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the profile of the described portrait selecting operation corresponding;
According to the profile of the described portrait got, adopt portrait described in encrypting fingerprint that described photo to be encrypted is corresponding.
7. photo encryption method according to claim 6, it is characterized in that, described after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, before obtaining the step of the profile of the described portrait selecting operation corresponding, described photo encryption method also comprises:
When the touch control operation received meets pre-conditioned, gather the fingerprint that described touch control operation is corresponding, obtain described photo to be encrypted and judge whether described photo to be encrypted is encrypted;
When described photo unencryption to be encrypted, judge that described touch control operation triggers described portrait encrypted instruction, and using the described fingerprint that gathers as fingerprint corresponding to described photo to be encrypted.
8. photo encryption method according to claim 7, it is characterized in that, when the described touch control operation when receiving meets pre-conditioned, gather the fingerprint that described touch control operation is corresponding, obtain described photo to be encrypted and after judging the step whether described photo to be encrypted has been encrypted, described photo encryption method also comprises:
If described photo to be encrypted is through encryption, then judge whether the described fingerprint collected mates with the fingerprint that the described portrait of encryption uses;
When the fingerprint matching that described fingerprint uses with the described portrait of encryption, the described portrait encrypted corresponding for fingerprint described in described photo is decrypted.
9. photo encryption method according to claim 6, it is characterized in that, described after receiving portrait encrypted instruction, when receiving user and selecting to operate based on the portrait that photo to be encrypted triggers, obtain the step of profile and the profile of the described described portrait according to getting of the described portrait selecting operation corresponding, between the step adopting portrait described in encrypting fingerprint that described photo to be encrypted is corresponding, described photo encryption method also comprises:
Judge whether described portrait encrypted instruction is bulk encryption instruction;
If described portrait encrypted instruction is not bulk encryption instruction, then perform the described profile according to the described portrait got, adopt the step of portrait described in encrypting fingerprint that described photo to be encrypted is corresponding;
Described judge whether described portrait encrypted instruction is the step of bulk encryption instruction after, described photo encryption method also comprises step:
If described portrait encrypted instruction is bulk encryption instruction, then identify the facial information of described portrait, the described portrait had in picture library in the photo of described facial information is encrypted.
10. photo encryption method according to claim 6, is characterized in that, the described step of the profile of portrait corresponding to operation of selecting of described acquisition comprises:
Obtain the image outline of described photo, described photo binary conversion treatment is obtained the image outline of black and white;
Call the facial contour of the portrait selecting operation corresponding described in the identification of recognition of face function;
The image outline be connected with described facial contour is labeled as body contour, the described body contour of mark is combined with described facial contour and obtains described portrait profile.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510632684.1A CN105160264B (en) | 2015-09-29 | 2015-09-29 | Photo encryption device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510632684.1A CN105160264B (en) | 2015-09-29 | 2015-09-29 | Photo encryption device and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105160264A true CN105160264A (en) | 2015-12-16 |
CN105160264B CN105160264B (en) | 2019-03-29 |
Family
ID=54801116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510632684.1A Active CN105160264B (en) | 2015-09-29 | 2015-09-29 | Photo encryption device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105160264B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701413A (en) * | 2015-12-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for protecting personal key information by intelligent device |
CN106209381A (en) * | 2016-07-12 | 2016-12-07 | 深圳市中易通安全芯科技有限公司 | A kind of photo encipher-decipher method and system thereof |
CN106326712A (en) * | 2016-08-31 | 2017-01-11 | 维沃移动通信有限公司 | Method for processing pictures and mobile terminal |
CN107220534A (en) * | 2017-05-18 | 2017-09-29 | 北京小米移动软件有限公司 | Photo processing method and device applied to terminal device |
CN108459788A (en) * | 2018-03-15 | 2018-08-28 | 维沃移动通信有限公司 | A kind of image display method and terminal |
CN108696355A (en) * | 2017-04-10 | 2018-10-23 | Tcl集团股份有限公司 | A kind of method and system for preventing user's head portrait from usurping |
CN109240559A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
CN110187821A (en) * | 2019-05-24 | 2019-08-30 | 维沃移动通信有限公司 | A kind of processing method and terminal device showing content |
CN111931145A (en) * | 2020-06-29 | 2020-11-13 | 北京爱芯科技有限公司 | Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium |
CN114676441A (en) * | 2022-03-18 | 2022-06-28 | 上海电力大学 | Multi-dimensional information privacy protection outline query method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN203070303U (en) * | 2012-12-03 | 2013-07-17 | 鹤山世达光电科技有限公司 | Picture management system based on fingerprint authentication |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
CN103699847A (en) * | 2013-11-29 | 2014-04-02 | 上海合合信息科技发展有限公司 | Fingerprint encryption method and device, and encrypted shooting method and device |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN104299186A (en) * | 2014-09-30 | 2015-01-21 | 珠海市君天电子科技有限公司 | Method and device for conducting mosaic processing on picture |
-
2015
- 2015-09-29 CN CN201510632684.1A patent/CN105160264B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
CN203070303U (en) * | 2012-12-03 | 2013-07-17 | 鹤山世达光电科技有限公司 | Picture management system based on fingerprint authentication |
CN103699847A (en) * | 2013-11-29 | 2014-04-02 | 上海合合信息科技发展有限公司 | Fingerprint encryption method and device, and encrypted shooting method and device |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN104299186A (en) * | 2014-09-30 | 2015-01-21 | 珠海市君天电子科技有限公司 | Method and device for conducting mosaic processing on picture |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701413A (en) * | 2015-12-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for protecting personal key information by intelligent device |
CN106209381B (en) * | 2016-07-12 | 2019-04-26 | 深圳市中易通安全芯科技有限公司 | A kind of photo encipher-decipher method and its system |
CN106209381A (en) * | 2016-07-12 | 2016-12-07 | 深圳市中易通安全芯科技有限公司 | A kind of photo encipher-decipher method and system thereof |
CN106326712A (en) * | 2016-08-31 | 2017-01-11 | 维沃移动通信有限公司 | Method for processing pictures and mobile terminal |
CN108696355B (en) * | 2017-04-10 | 2021-06-22 | Tcl科技集团股份有限公司 | Method and system for preventing head portrait of user from being embezzled |
CN108696355A (en) * | 2017-04-10 | 2018-10-23 | Tcl集团股份有限公司 | A kind of method and system for preventing user's head portrait from usurping |
CN107220534A (en) * | 2017-05-18 | 2017-09-29 | 北京小米移动软件有限公司 | Photo processing method and device applied to terminal device |
CN108459788B (en) * | 2018-03-15 | 2020-05-22 | 维沃移动通信有限公司 | Picture display method and terminal |
CN108459788A (en) * | 2018-03-15 | 2018-08-28 | 维沃移动通信有限公司 | A kind of image display method and terminal |
CN109240559A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
CN110187821A (en) * | 2019-05-24 | 2019-08-30 | 维沃移动通信有限公司 | A kind of processing method and terminal device showing content |
CN111931145A (en) * | 2020-06-29 | 2020-11-13 | 北京爱芯科技有限公司 | Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium |
CN114676441A (en) * | 2022-03-18 | 2022-06-28 | 上海电力大学 | Multi-dimensional information privacy protection outline query method |
Also Published As
Publication number | Publication date |
---|---|
CN105160264B (en) | 2019-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105160264A (en) | Photograph encryption device and method | |
CN104951206A (en) | Icon hiding method and device | |
CN105117123A (en) | Device and method for displaying hidden object | |
CN104765994A (en) | User identity recognition method and device | |
CN104750420A (en) | Screen capturing method and device | |
CN104834462A (en) | Unlocking method for terminal equipment and terminal equipment | |
CN104660912A (en) | Photographing method and photographing device | |
CN104808912A (en) | Input interface adjusting method and device | |
CN104793849A (en) | Application icon display method and device | |
CN105159594A (en) | Touch photographing device and method based on pressure sensor, and mobile terminal | |
CN104992101A (en) | Mobile terminal desktop icon display method and device | |
CN105095790A (en) | Hidden object view method and device | |
CN105094555A (en) | Method and device for switching application program through swipe gesture | |
CN105487802A (en) | Screen projection management method, device and system | |
CN105184183A (en) | Chatting record encryption method and mobile terminal | |
CN105243126A (en) | Cross-screen screen capture method and apparatus | |
CN104915119A (en) | Regulation method and device of terminal desktop icon | |
CN104915606A (en) | File encryption and decryption methods and devices | |
CN105893866A (en) | Screen capture method and device | |
CN104951236A (en) | Wallpaper configuration method for terminal device, and terminal device | |
CN104850343A (en) | Method and device for starting one-hand operation mode | |
CN104834863A (en) | Wi-Fi password storage method and apparatus | |
CN104898940A (en) | Picture processing method and device | |
CN105138880A (en) | Processing apparatus and method for terminal operation data | |
CN105138871A (en) | Unlocking method and apparatus for mobile terminal and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |