CN105354501A - Photo processing method and processing system - Google Patents

Photo processing method and processing system Download PDF

Info

Publication number
CN105354501A
CN105354501A CN201510719082.XA CN201510719082A CN105354501A CN 105354501 A CN105354501 A CN 105354501A CN 201510719082 A CN201510719082 A CN 201510719082A CN 105354501 A CN105354501 A CN 105354501A
Authority
CN
China
Prior art keywords
photo
deciphering
encryption
encryption section
submodule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510719082.XA
Other languages
Chinese (zh)
Other versions
CN105354501B (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510719082.XA priority Critical patent/CN105354501B/en
Publication of CN105354501A publication Critical patent/CN105354501A/en
Application granted granted Critical
Publication of CN105354501B publication Critical patent/CN105354501B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The present invention provides a photo processing method and processing system. The method comprises: planning a plurality of encryption regions in an original photo; separately acquiring a face image or an iris image in the plurality of encryption regions, to generate a plurality of encryption keys; and encrypting the original photo by using the plurality of encryption keys. According to the photo processing method and processing system provided by the present invention, encryption regions are planned in the original photo, and encryption keys are generated from the encryption regions to encrypt the original photo. Therefore, the present invention has the advantages of being strong in pertinence, real-time in encryption, high in safety, and difficult in cracking.

Description

The disposal route of photo and disposal system
Technical field
The invention belongs to computer safety field, particularly relate to a kind of disposal route and disposal system of photo.
Background technology
Popularizing of intelligent terminal, the life for user brings great enjoyment, such as, can take pictures anywhere or anytime, to preserve or to share the fine moment.But in today that individual privacy receives publicity day by day, the improper process of photo is very likely the huge puzzlement of user.
Current photo encryption method, is normally encrypted by the file (Photo Library) of software to storage picture of mobile phone house keeper class, even if make other people acquisition mobile phone also cannot check the photo of user.
There are the following problems for the method that above-mentioned comparison film picture library is encrypted:
The first, without specific aim, all photos in picture library are encrypted, and non-designated photo;
The second, non real-time encryption, needs user to arrange the photo taken or store; And
3rd, by traditional numerical ciphers, easily crack.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of disposal route and disposal system of photo, can solve in prior art to encryption target without specific aim, cannot the technical matters that easily cracks of real-time encrypted and poor safety performance.
For solving the problems of the technologies described above, embodiments providing a kind of disposal route of photo, comprising:
Multiple encryption section is planned in original photo;
Obtain the facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key; And
By described multiple encryption key, described original photo is encrypted.
For solving the problems of the technologies described above, the embodiment of the present invention additionally provides a kind of disposal route of photo, comprising:
Planning module, for planning multiple encryption section in original photo;
Key module, for obtaining facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key; And
Encrypting module, for being encrypted described original photo by described multiple encryption key.
Relative to prior art, the disposal route of photo provided by the invention and disposal system, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention two provides;
Fig. 3 is the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention three provides;
Fig. 4 is the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention four provides;
Fig. 5 is the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention five provides;
Fig. 6 A ~ 6F be respectively plan schematic diagram in original photo in the embodiment of the present invention one, the display schematic diagram of the 4th photo that the schematic diagram of the 3rd photo that the schematic diagram of the schematic diagram of original photo that embodiment two provides, the first photo that embodiment three provides and the second photo, embodiment four provide and embodiment five provide;
Fig. 7 is the module diagram of the disposal system of the photo that the embodiment of the present invention six provides;
Fig. 8 is the module diagram of the disposal system of the photo that the embodiment of the present invention seven provides;
Fig. 9 is the module diagram of the disposal system of the photo that the embodiment of the present invention eight provides;
Figure 10 is the module diagram of the disposal system of the photo that the embodiment of the present invention nine provides;
Figure 11 is the module diagram of the disposal system of the photo that the embodiment of the present invention ten provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing ring mirror.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.
The disposal route of photo of the present invention provided by the invention and disposal system, can be applicable to, in the terminal device such as smart mobile phone, digital camera, not enumerate one by one herein.
In addition, the present invention can also be applied to deciphering and the deciphering of video file, and its principle is identical.
Embodiment one
Refer to Fig. 1, be depicted as the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention provides.
Specifically, the disposal route of described photo, comprising:
In step S101, in original photo, plan multiple encryption section.Described planning specifically comprises:
(1) in shooting original photo or when checking original photo, judge whether original photo belongs to personage's group photo.That is, described method can perform when taking, and also can carry out in the view procedure after having taken.
(2) when belonging to personage and taking a group photo, described original photo plans multiple encryption section.Wherein, can being planned by touch screen when taking, can be planned by touch screen or mouse when checking.
As shown in Figure 6A for planning the schematic diagram of encryption section in original photo.Wherein, described original photo 60 comprises: the first encryption section 62, encryption section 61, second and the 3rd encryption section 63 and do not plan region 64.
Be understandable that, described encryption section comprises: the polygon of character contour as described in the elliptical region of character contour as described in the character contour as shown in the first encryption section 61, comprising as shown in the second encryption section 62 or comprising as shown in the 3rd encryption section 63, wherein polygon is good with rectangle, and other also can.
In step s 102, obtain the facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.
Comprise between the first encryption section and the second encrypted area for described encryption section.Specifically, the multiple encryption key of described generation, comprising:
(1) facial image in the first encryption section or iris image is obtained;
(2) pre-service is carried out to described facial image or iris image, wherein:
The pre-service of facial image is comprised: position and the size of demarcating face; Light compensation, greyscale transformation, histogram equalization, normalization, geometry correction, filtering and sharpening are carried out to facial image; Or
The pre-service of iris image is comprised: by determining inner circle (border of iris and pupil), cylindrical (border of iris and sclera) and quafric curve (border of iris and upper lower eyelid) position in the picture, to carry out Iris Location; Iris size in iris image is normalized, to adjust to default fixed measure; For iris image after normalization, carry out the process such as brightness, contrast and smoothness, to improve the resolution of iris feature in image.
(3) unique point in described facial image or iris image is extracted;
(4) described unique point is encoded, to generate the first encryption key; And
(5) facial image or the iris image of the second encryption section is obtained successively, to generate the second encryption key.
In step s 103, by described multiple encryption key, described original photo is encrypted, to form encryption photo.
In step S104, do not show described encryption photo.
Wherein, described display comprises: hide, maybe cannot open, e.g., in mess code after opening.
The disposal route of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment two
Refer to Fig. 2, be depicted as the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention provides.Step identical with Fig. 1 in Fig. 2 is still with S1 beginning, and the step different from Fig. 1 starts with S2, to show its difference.
Specifically, the disposal route of described photo, comprising:
In step S101, in original photo, plan multiple encryption section.
Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour.Wherein, described polygon is good with rectangle, and other also can.
In step s 102, obtain the facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.
Comprise between the first encryption section and the second encrypted area for described encryption section.Specifically, the multiple encryption key of described generation, comprising:
(1) facial image in the first encryption section or iris image is obtained;
(2) pre-service is carried out to described facial image or iris image;
(3) unique point in described facial image or iris image is extracted;
(4) described unique point is encoded, to generate the first encryption key; And
(5) facial image or the iris image of the second encryption section is obtained successively, to generate the second encryption key.
In step s 201, using described multiple encryption key as combined ciphering password, described original photo is encrypted, to form encryption photo.
In step S104, do not show described encryption photo.
Be understandable that, describedly do not show, comprising: hide described encryption photo, maybe cannot open described encryption photo, e.g., in mess code after opening.
In step S202, gather multiple facial image and/or iris image simultaneously, with generating solution decryption key, and described decruption key is carried out combine to form combination clear crytpographic key.
Be understandable that, describedly refer in a preset time period simultaneously, as 30 seconds, namely complete collection in 30 seconds and be considered as simultaneously.
In step S203, be decrypted according to described combination clear crytpographic key.
Specifically, the step of described deciphering comprises:
(1) judge whether described combination clear crytpographic key mates with described Crypted password;
(2) when described combination clear crytpographic key mates with described Crypted password, described deciphering photo is decrypted, to generate deciphering photo.
In step S204, show described deciphering photo.
Described deciphering photo, is equivalent to show the original photo 60 in Fig. 6 A, as shown in Figure 6B.
The disposal route of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment three
Refer to Fig. 3, be depicted as the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention provides.The step that Fig. 3 and Fig. 1 is identical starts with S1, and the step different from Fig. 1 starts with S3, to show its difference.
Specifically, the disposal route of described photo, comprising:
In step S101, in original photo, plan multiple encryption section.
Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour, and wherein, described polygon is good with rectangle, and other also can.
In step s 102, obtain the facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.
In step S301, by described multiple encryption key, described original photo is encrypted.
Specifically, the step of described encryption comprises:
(1) each encryption key is corresponded to the encryption section in original photo; And
(2) described original photo is divided into does not plan region and encryption section, and only the encryption section in described original photo is encrypted.
In step s 302, Area generation first photo will do not planned in described original photo, and show.
Refer to Fig. 6 C, be depicted as the schematic diagram of the first photo, comprise and do not plan region 64 in picture as shown in Figure 6A, being that rectangle carries out cutting and generates for the first photo, can be other shapes in addition.
In step S303, gather at least one facial image and/or iris image, with generating solution decryption key.
In step s 304, by described decruption key, described encryption section is decrypted, to generate the planning region after deciphering.
Be understandable that, if receive a decruption key, decipher an encryption section, if receive all solutions decryption key, decipher whole encryption section.
In step S305, judge in described original photo, whether there is the encryption section of not deciphering.
Wherein, if without the encryption section of not deciphering, then perform step S306, the encryption section of not deciphering if having, then perform step S307.
In step S306, show described original photo, as shown in Figure 6B.
In step S307, according to the planning region of not planning after region and deciphering in described original photo, generate the second photo and show.
Refer to Fig. 6 D, be depicted as the schematic diagram of the second photo, comprise: the planning region of not planning after region 64 and deciphering as shown in Figure 6A in picture, decrypted for the second encryption section 62.
The disposal route of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment four
Refer to Fig. 4, be depicted as the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention provides.With the difference of Fig. 3 in Fig. 4, be only to substituted for step S307 with step S401.
In step S401, the encryption section of not deciphering if having, then carry out cutting to described original photo, to cut out except described encryption section of not deciphering, to generate the 3rd photo and to show.
Referring to Fig. 6 E, be depicted as the schematic diagram of the 3rd photo, comprise: cutting out the encryption section except not deciphering as shown in Figure 6A in picture, wherein, for described encryption section of not deciphering for 61.That is, by cutting to synthesize new photo, to cut out except the encryption section of not deciphering, and generate new photo.The disposal route of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment five
Refer to Fig. 5, be depicted as the schematic flow sheet of the disposal route of the photo that the embodiment of the present invention provides.With the difference of Fig. 3 in Fig. 5, be only to substituted for step S307 with step S501 ~ S504.
In step S501, the encryption section of not deciphering if having, then connection hanging piece storehouse.
Wherein, the structure in described suspension member storehouse with reference to such as QQ space, beautiful figure show show etc., can repeat no more herein.In addition, presenting sequentially of suspension member, comprising:
(1) shape of not deciphering region is obtained;
(2) the multiple suspension members in suspension member storehouse are sorted according to the similarity with described shape; And
(3) the multiple suspension members after sequence are presented.
In step S502, from described suspension member storehouse, select a suspension member according to selection instruction.
In step S503, the encryption section of not deciphering described in being substituted by described suspension member.
Be understandable that, by the size of the described suspension member of adjustment, direction and even sensing locally, to generate exclusive suspension member, and described encryption section can be substituted by described exclusive suspension member.
In step S504, by not planning the planning region after region, deciphering and described suspension member in described original photo, generating the 4th photo and showing.
Refer to Fig. 6 F, be depicted as the schematic diagram of the 4th photo.Wherein continue for the first encryption section 61 not decrypted, wherein, the suspension member chosen is that a Little Bear is to substitute described first encryption section.Be understandable that, wherein the four limbs, head, tail etc. of Little Bear all can carry out accommodation according to the shape in the planning region of not deciphering.The disposal route of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
In addition, it should be noted that, in Fig. 6 C ~ 6F, for newly-generated photo, by the judgement to the continuity of lines, can delete, revise or adjust unnecessary lines, such as, outer unnecessary clothing angle, the second encryption section 62, and for example, the hair etc. flown upward outside the first encryption section 61.
Embodiment six
Refer to Fig. 7, be depicted as the module diagram of the disposal system of the photo that the embodiment of the present invention provides.
Specifically, the disposal system 700 of described photo, comprising: planning module 71, key module 72, encrypting module 73 and display module 74.
Planning module 71, for planning multiple encryption section in original photo.Wherein, described planning module 71, comprising: type judges submodule 711 and planning submodule 712.Specifically:
Described type judges submodule 711, in the described original photo of shooting or when checking described original photo, judges whether described original photo belongs to personage's group photo.
Described planning submodule 712, is connected to described type and judges submodule 711, for when belonging to personage and taking a group photo, described original photo plans multiple encryption section.Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour.Wherein polygon is good with rectangle, and other also can.
Key module 72, is connected to described planning module 71, for obtaining facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.
For the first encryption section.Wherein, described key module 72, comprising: obtain submodule 721, pre-service submodule 722, extract submodule 723 and key submodule 724.Specifically:
Described acquisition submodule 721, for obtaining facial image in the first encryption section or iris image.
Described pre-service submodule 722, for carrying out pre-service to described facial image or iris image.
The pre-service of facial image is comprised: position and the size of demarcating face; Light compensation, greyscale transformation, histogram equalization, normalization, geometry correction, filtering and sharpening are carried out to facial image; Or
The pre-service of iris image is comprised: by determining inner circle (border of iris and pupil), cylindrical (border of iris and sclera) and quafric curve (border of iris and upper lower eyelid) position in the picture, to carry out Iris Location; Iris size in iris image is normalized, to adjust to default fixed measure; For iris image after normalization, carry out the process such as brightness, contrast and smoothness, to improve the resolution of iris feature in image.
Described extraction submodule 723, for extracting the unique point in described facial image or iris image.
Described key submodule 724, for encoding to described unique point, to generate the first encryption key.
Encrypting module 73, is connected to described key module 72, for being encrypted described original photo by described multiple encryption key, to form encryption photo.
Display module 74, is connected to described encrypting module 73, for not showing described encryption photo.
Wherein, described display comprises: hide, maybe cannot open, e.g., in mess code after opening.
The disposal system of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment seven
Refer to Fig. 8, be depicted as the module diagram of the disposal system of the photo that the embodiment of the present invention provides.Module identical with Fig. 7 in Fig. 8 is still with 7 beginnings, and the module different from Fig. 7 starts with 8, to show its difference.
Specifically, the disposal system 800 of described photo, comprising: planning module 71, key module 72, encrypting module 81, deciphering module 82 and display module 83.
Planning module 71, for planning multiple encryption section in original photo.Planning module 71 comprises:
Type judges submodule 711, in the described original photo of shooting or when checking described original photo, judges whether described original photo belongs to personage's group photo.
Described planning submodule 712, is connected to described type and judges submodule 711, for when belonging to personage and taking a group photo, described original photo plans multiple encryption section.Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour.Wherein polygon is good with rectangle, and other also can.
Key module 72, for obtaining facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.For the first encryption section, described key module 72, specifically comprises:
Obtain submodule 721, for obtaining facial image in the first encryption section or iris image;
Pre-service submodule 722, for carrying out pre-service to described facial image or iris image;
Extract submodule 723, for extracting the unique point in described facial image or iris image; And
Encoding submodule 724, for encoding to described unique point, to generate the first encryption key.
Encrypting module 81, is connected to described key module 72, for being encrypted described original photo by described multiple encryption key, to form encryption photo.Specifically, described encrypting module 81, comprising:
Combined ciphering submodule 811, for passing through described multiple encryption key as combined ciphering password, is encrypted by original photo described in described combined ciphering codon pair, to form encryption photo.
Deciphering module 82, for gathering multiple facial image and/or iris image simultaneously, with generating solution decryption key, and is undertaken described decruption key combining to form combination clear crytpographic key.Described deciphering module 82 comprises:
Gather submodule 821, for gathering multiple facial image and/or iris image simultaneously, with generating solution decryption key;
Combination deciphering submodule 822, for combining to form combination clear crytpographic key to described decruption key;
Matched sub-block 823, for judging whether described combination clear crytpographic key mates with described Crypted password;
Combination deciphering submodule 824, for when described combination clear crytpographic key mates with described Crypted password, is decrypted described deciphering photo, to generate deciphering photo.
Describedly refer in a preset time period simultaneously, as 30 seconds, namely complete collection in 30 seconds and be considered as simultaneously.
Display module 83, is connected to described encrypting module 82, for not showing described encryption photo.Wherein, describedly not show, comprising: hide described encryption photo, maybe cannot open described encryption photo, e.g., in mess code after opening.
Display module 83, is also connected to described combination deciphering submodule 834, for showing described deciphering photo.Wherein, display deciphering photo, is equivalent to show original photo, as shown in Figure 6B.
The disposal system of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment eight
Refer to Fig. 9, be depicted as the module diagram of the disposal system of the photo that the embodiment of the present invention provides.Module identical with Fig. 7 in Fig. 9 is still with 7 beginnings, and the module different from Fig. 7 starts with 9, to show its difference.
The disposal system 900 of described photo, comprising: planning module 71, key module 72, encrypting module 91, deciphering module 92 and display module 93.
Planning module 71, for planning multiple encryption section in original photo.
Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour, and wherein, described polygon is good with rectangle, and other also can.
Key module 72, for obtaining facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key.
Encrypting module 91, for being encrypted described original photo by described multiple encryption key.Specifically, described encrypting module 91 comprises:
Corresponding submodule 911, for corresponding to the encryption section in original photo by each encryption key;
Local refinement submodule 912, does not plan region and encryption section for described original photo being divided into, and is only encrypted the encryption section in described original photo; And
First generates submodule 913, for not planning Area generation first photo in described original photo.
Wherein, in the first photo, do not plan region, usually carry out cutting with rectangle, rhombus etc. and generate.
Deciphering module 92, is connected to described encrypting module 91, for being decrypted described first photo.Specifically, described deciphering module 92 comprises:
Gather submodule 921, for gathering at least one facial image and/or iris image, with generating solution decryption key;
Local deciphering submodule 922, for being decrypted described encryption section by described decruption key, to generate the planning region after deciphering;
Integrality judges submodule 923, whether has the encryption section of not deciphering for judging in described original photo; And
Second generates submodule 924, for when there being the encryption section of not deciphering, according to the planning region of not planning after region and deciphering in described original photo, generates the second photo.
Display module 93, is connected to described encrypting module 91, to show described first photo, as Fig. 6 C, and is connected to described deciphering module 92, for when without the encryption section of not deciphering, shows described original photo, as Fig. 6 B; Or show described second photo, as Fig. 6 D.
The disposal system of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment nine
Refer to Figure 10, be depicted as the module diagram of the disposal system of the photo that the embodiment of the present invention provides.With the difference of Fig. 9 in Figure 10, be only the deciphering module 101 in the disposal system 100 of described photo, substituted for second in Fig. 9 with the 3rd generation submodule 1011 and generate submodule 924.
3rd generates submodule 1011, being connected to described integrality and judging submodule 923, for when there being the encryption section of not deciphering, carrying out cutting to described original photo, to cut out except described encryption section of not deciphering, to generate the 3rd photo, as Fig. 6 E.
The disposal system of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
Embodiment ten
Refer to Figure 11, be depicted as the module diagram of the disposal system of the photo that the embodiment of the present invention provides.With the difference of Fig. 9 in Figure 11, be only the deciphering module 111 in the disposal system 110 of described photo, substituted for second in Fig. 9 with four module 1111 and generate submodule 924.
4th generates submodule 1111, is connected to described integrality and judges submodule 923, and for generating the 4th photo when there being the encryption section of not deciphering, the described 4th generates submodule 1111 comprises:
Suspension member submodule 11, for when there being the encryption section of not deciphering, connection hanging piece storehouse.
Wherein, described suspension member storehouse with reference to such as QQ space, beautiful figure show show etc., can repeat no more herein.
Chooser module 12, for selecting a suspension member according to selection instruction from described suspension member storehouse.
Substitute submodule 13, for the encryption section of not deciphering described in being substituted by described suspension member.
Be understandable that, by the size of the described suspension member of adjustment, direction and even sensing locally, to generate exclusive suspension member, and described encryption section can be substituted by described exclusive suspension member.
Splicing submodule 14, for by not planning the planning region after region, deciphering and described suspension member in described original photo, splices generation the 4th photo, as Fig. 6 F.
The disposal system of photo provided by the invention, by planning encryption section in original photo, and generate encryption key to be encrypted described original photo from encryption section, thus the advantage that pointed strong, real-time encrypted and security height is not easily cracked.
The disposal route of the photo that the embodiment of the present invention provides and disposal system belong to same design, and its specific implementation process refers to instructions in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.

Claims (18)

1. a disposal route for photo, is characterized in that, comprising:
Multiple encryption section is planned in original photo;
Obtain the facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key; And
By described multiple encryption key, described original photo is encrypted.
2. disposal route as claimed in claim 1, be is characterized in that, be encrypted, specifically comprise by described multiple encryption key to described original photo:
By described multiple encryption key as combined ciphering password, described original photo is encrypted, to form encryption photo; And
Do not show described encryption photo.
3. disposal route as claimed in claim 2, is characterized in that, does not describedly show described encryption photo, also comprises afterwards:
Gather multiple facial image and/or iris image, with generating solution decryption key simultaneously;
Combine to form combination clear crytpographic key to described decruption key;
Judge whether described combination clear crytpographic key mates with described Crypted password;
When described combination clear crytpographic key mates with described Crypted password, described deciphering photo is decrypted, to generate deciphering photo; And
Show described deciphering photo.
4. disposal route as claimed in claim 1, is characterized in that, is describedly encrypted described original photo by described multiple encryption key, specifically comprises:
Each encryption key is corresponded to the encryption section in original photo; And
Described original photo is divided into and does not plan region and encryption section, and only the encryption section in described original photo is encrypted; And
Area generation first photo will do not planned in described original photo, and show.
5. disposal route as claimed in claim 4, is characterized in that, is describedly only encrypted the encryption section in described original photo, also comprises afterwards:
Gather at least one facial image and/or iris image, with generating solution decryption key;
By described decruption key, described encryption section is decrypted, to generate the planning region after deciphering;
Judge in described original photo, whether there is the encryption section of not deciphering; And
If without the encryption section of not deciphering, then show described original photo;
The encryption section of not deciphering if having, then according to the planning region of not planning after region and deciphering in original photo, generate the second photo and show.
6. disposal route as claimed in claim 5, is characterized in that, describedly judges whether there is the encryption section of not deciphering in described original photo, also comprise afterwards:
The encryption section of not deciphering if having, then carry out cutting to described original photo, to cut out except described encryption section of not deciphering, to generate the 3rd photo and to show.
7. disposal route as claimed in claim 5, is characterized in that, describedly judges whether there is the encryption section of not deciphering in described original photo, also comprise afterwards:
The encryption section of not deciphering if having, then connection hanging piece storehouse;
From described suspension member storehouse, a suspension member is selected according to selection instruction;
The encryption section of not deciphering described in being substituted by described suspension member; And
By not planning the planning region after region, deciphering and described suspension member in described original photo, generating the 4th photo and showing.
8. disposal route as claimed in claim 1, is characterized in that, describedly in original photo, plans multiple encryption section, specifically comprises:
In the described original photo of shooting or when checking described original photo, judge whether described original photo belongs to personage's group photo;
When belonging to personage and taking a group photo, described original photo plans multiple encryption section;
Wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour.
9. disposal route as claimed in claim 1, is characterized in that, describedly obtains facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key, specifically comprises:
Obtain the facial image in the first encryption section or iris image;
Pre-service is carried out to described facial image or iris image;
Extract the unique point in described facial image or iris image;
Described unique point is encoded, to generate the first encryption key; And
Obtain the facial image in the second encryption section or iris image successively, to generate the second encryption key.
10. a disposal system for photo, is characterized in that, comprising:
Planning module, for planning multiple encryption section in original photo;
Key module, for obtaining facial image in described multiple encryption section or iris image respectively, to generate multiple encryption key; And
Encrypting module, for being encrypted described original photo by described multiple encryption key.
11. disposal systems as claimed in claim 10, it is characterized in that, described encrypting module comprises:
Combined ciphering submodule, for passing through described multiple encryption key as combined ciphering password, being encrypted by original photo described in described combined ciphering codon pair, to form encryption photo, not showing described encryption photo.
12. disposal systems as claimed in claim 11, is characterized in that, also comprise:
Deciphering module, for being decrypted described encryption photo, described deciphering module comprises:
Gather submodule, for gathering multiple facial image and/or iris image simultaneously, with generating solution decryption key;
Combination deciphering submodule, for combining to form combination clear crytpographic key to described decruption key;
Matched sub-block, for judging whether described combination clear crytpographic key mates with described Crypted password;
Combination deciphering submodule, for when described combination clear crytpographic key mates with described Crypted password, is decrypted described deciphering photo, to generate deciphering photo.
13. disposal systems as claimed in claim 10, it is characterized in that, described encrypting module comprises:
Corresponding submodule, for corresponding to the encryption section in original photo by each encryption key;
Local refinement submodule, does not plan region and encryption section for described original photo being divided into, and is only encrypted the encryption section in described original photo; And
First generates submodule, for not planning Area generation first photo in described original photo.
14. disposal systems as claimed in claim 13, is characterized in that, also comprise: deciphering module, and for being decrypted described first photo, described deciphering module comprises:
Gather submodule, for gathering at least one facial image and/or iris image, with generating solution decryption key;
Submodule is deciphered, for being decrypted described encryption section by described decruption key, to generate the planning region after deciphering in local; And
Integrality judges submodule, whether has the encryption section of not deciphering for judging in described original photo;
Second generates submodule, for when without the encryption section of not deciphering, shows described original photo; Maybe when there being the encryption section of not deciphering, according to the planning region of not planning after region and deciphering in described original photo, generate the second photo.
15. disposal systems as claimed in claim 14, it is characterized in that, described deciphering module also comprises:
3rd generates submodule, being connected to described integrality and judging submodule, for when there being the encryption section of not deciphering, carrying out cutting to described original photo, to cut out except described encryption section of not deciphering, to generate the 3rd photo.
16. disposal systems as claimed in claim 14, it is characterized in that, described deciphering module also comprises:
4th generates submodule, is connected to described integrality and judges submodule, and for generating the 4th photo when there being the encryption section of not deciphering, the described 4th generates submodule comprises:
Suspension member submodule, for when there being the encryption section of not deciphering, connection hanging piece storehouse;
Chooser module, for selecting a suspension member according to selection instruction from described suspension member storehouse;
Substitute submodule, for the encryption section of not deciphering described in being substituted by described suspension member; And
Splicing submodule, for by not planning the planning region after region, deciphering and described suspension member in described original photo, splices generation the 4th photo.
17. disposal systems as claimed in claim 10, it is characterized in that, described planning module comprises:
Type judges submodule, in the described original photo of shooting or when checking described original photo, judges whether described original photo belongs to personage's group photo;
Planning submodule, for when belonging to personage and taking a group photo, described original photo plans multiple encryption section, wherein, described encryption section comprises: character contour, comprise the elliptical region of described character contour or comprise the polygon of described character contour.
18. disposal systems as claimed in claim 10, it is characterized in that, described key module comprises:
Obtain submodule, for obtaining facial image in encryption section or iris image;
Pre-service submodule, for carrying out pre-service to described facial image or iris image;
Extract submodule, for extracting the unique point in described facial image or iris image; And
Key submodule, for encoding to described unique point, to generate the first encryption key.
CN201510719082.XA 2015-10-28 2015-10-28 The processing method and processing system of photo Expired - Fee Related CN105354501B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510719082.XA CN105354501B (en) 2015-10-28 2015-10-28 The processing method and processing system of photo

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510719082.XA CN105354501B (en) 2015-10-28 2015-10-28 The processing method and processing system of photo

Publications (2)

Publication Number Publication Date
CN105354501A true CN105354501A (en) 2016-02-24
CN105354501B CN105354501B (en) 2017-09-12

Family

ID=55330472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510719082.XA Expired - Fee Related CN105354501B (en) 2015-10-28 2015-10-28 The processing method and processing system of photo

Country Status (1)

Country Link
CN (1) CN105354501B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209381A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of photo encipher-decipher method and system thereof
CN106791542A (en) * 2017-01-20 2017-05-31 维沃移动通信有限公司 A kind of panoramic picture image pickup method and mobile terminal
CN107302706A (en) * 2017-06-21 2017-10-27 北京奇艺世纪科技有限公司 Image anti-stealing link method, device and electronic equipment
CN107330395A (en) * 2017-06-27 2017-11-07 中国矿业大学 A kind of iris image encryption method based on convolutional neural networks
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN110598421A (en) * 2018-06-13 2019-12-20 杭州海康威视数字技术股份有限公司 Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN111292224A (en) * 2020-02-18 2020-06-16 维沃移动通信有限公司 Image processing method and electronic equipment
TWI757001B (en) * 2020-12-21 2022-03-01 緯創資通股份有限公司 Data protection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146168A (en) * 2006-06-30 2008-03-19 株式会社理光 Image processing apparatus and image processing method
CN101682503A (en) * 2007-05-30 2010-03-24 富士通株式会社 Image encrypting device, image decrypting device, method and program
CN102724552A (en) * 2012-05-30 2012-10-10 华为技术有限公司 Image coding method, image decoding method and device
CN104992120A (en) * 2015-06-18 2015-10-21 广东欧珀移动通信有限公司 Picture encryption method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146168A (en) * 2006-06-30 2008-03-19 株式会社理光 Image processing apparatus and image processing method
CN101682503A (en) * 2007-05-30 2010-03-24 富士通株式会社 Image encrypting device, image decrypting device, method and program
CN102724552A (en) * 2012-05-30 2012-10-10 华为技术有限公司 Image coding method, image decoding method and device
CN104992120A (en) * 2015-06-18 2015-10-21 广东欧珀移动通信有限公司 Picture encryption method and mobile terminal

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209381A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of photo encipher-decipher method and system thereof
CN106209381B (en) * 2016-07-12 2019-04-26 深圳市中易通安全芯科技有限公司 A kind of photo encipher-decipher method and its system
CN106791542A (en) * 2017-01-20 2017-05-31 维沃移动通信有限公司 A kind of panoramic picture image pickup method and mobile terminal
CN107302706A (en) * 2017-06-21 2017-10-27 北京奇艺世纪科技有限公司 Image anti-stealing link method, device and electronic equipment
CN107330395A (en) * 2017-06-27 2017-11-07 中国矿业大学 A kind of iris image encryption method based on convolutional neural networks
CN107330395B (en) * 2017-06-27 2018-11-09 中国矿业大学 A kind of iris image encryption method based on convolutional neural networks
CN110598421A (en) * 2018-06-13 2019-12-20 杭州海康威视数字技术股份有限公司 Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN111292224A (en) * 2020-02-18 2020-06-16 维沃移动通信有限公司 Image processing method and electronic equipment
CN111292224B (en) * 2020-02-18 2024-01-16 维沃移动通信有限公司 Image processing method and electronic equipment
TWI757001B (en) * 2020-12-21 2022-03-01 緯創資通股份有限公司 Data protection method
US11604887B2 (en) 2020-12-21 2023-03-14 Wistron Corporation Data protection method

Also Published As

Publication number Publication date
CN105354501B (en) 2017-09-12

Similar Documents

Publication Publication Date Title
CN105354501A (en) Photo processing method and processing system
US11444774B2 (en) Method and system for biometric verification
EP3692461B1 (en) Removing personally identifiable data before transmission from a device
CN105260669B (en) The transmission method and Transmission system of photo
US10929849B2 (en) Method and a system for performing 3D-based identity verification of individuals with mobile devices
CN103400082A (en) File encryption/decryption method and system
WO2016024173A1 (en) Image processing apparatus and method, and electronic device
CN104125210A (en) Head-mounted display apparatus with enhanced security and method for accessing encrypted information by same
CN105354509A (en) Picture processing method and processing system
CN104899825A (en) Method and device for modeling picture figure
CN105335643A (en) Processing method and processing system of files
US10574668B2 (en) Analog security for digital data
CN105335642A (en) Processing method and processing system of pictures
CN106296559A (en) Image processing method and device
CN103532960B (en) Decrypt device
JP2023111974A (en) Image masking device and image masking method
US20210342967A1 (en) Method for securing image and electronic device performing same
CN105335665B (en) Encryption method, encryption system, decryption method and the decryption system of photo
Wei et al. AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo
CN106650395B (en) A kind of confidential information display methods based on Morie fringe
CN105354502A (en) Photo display method and display system
US11921868B2 (en) Data access control for user devices using a blockchain
CN112800452B (en) Method and device for processing and identifying user identity image
JP5718757B2 (en) Image management apparatus, image management program, and image management method
US20220100989A1 (en) Identifying partially covered objects utilizing machine learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170912

CF01 Termination of patent right due to non-payment of annual fee