CN105426721A - Picture encryption method and device - Google Patents
Picture encryption method and device Download PDFInfo
- Publication number
- CN105426721A CN105426721A CN201510760669.5A CN201510760669A CN105426721A CN 105426721 A CN105426721 A CN 105426721A CN 201510760669 A CN201510760669 A CN 201510760669A CN 105426721 A CN105426721 A CN 105426721A
- Authority
- CN
- China
- Prior art keywords
- encrypted
- picture
- subregion
- encryption
- user fingerprints
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The invention discloses a picture encryption method and device. The picture encryption method specifically comprises the following steps: selecting at least one picture to be encrypted; determining an area to be encrypted in the picture to be encrypted, wherein the area to be encrypted is part of the picture to be encrypted and comprises at least one sub-area to be encrypted; and encrypting the area to be encrypted to obtain an encrypted picture. According to the method, the picture to be encrypted can be encrypted directly, and partial area of the picture to be encrypted can be encrypted, so that the operation is simple and convenient, and user experience is improved.
Description
Technical field
The present invention relates to image ciphering technical field, particularly relate to a kind of method and device of image ciphering.
Background technology
Along with the fast development of mobile terminal, user is more and more stronger for the dependence of mobile terminal.User uses mobile terminal to realize all kinds of demand usually, such as does shopping, books tickets or inquire about map etc.Therefore mobile terminal carries a large amount of client-aware information, needs enough safety prevention measures.Because finger print data has uniqueness, be therefore widely used in the security protection of mobile terminal.
At present, the fingerprint identification technology on mobile terminal is often applied to unlocking screen, terminal pays, application logs in and data encryption etc.When being encrypted the privacy picture of user, usually adopting and encrypting fingerprint is carried out to the application program (APP) at picture place.
Not only there is the picture of user encryption in APP, also may there is the picture that user does not encrypt.User check at every turn do not encrypt picture time, also to unlock APP.In addition, user, when routine use APP, also needs first to unlock APP.Namely there is the problem can not encrypted separately picture, cause application program use procedure loaded down with trivial details, reduce Consumer's Experience.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and device of image ciphering, to solve the technical matters can not encrypting separately picture in prior art.
First aspect, embodiments provides a kind of method of image ciphering, comprising:
Select at least one picture to be encrypted;
Determine the region to be encrypted in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted;
Described region to be encrypted is encrypted, obtains encrypting picture.
Second aspect, the embodiment of the present invention additionally provides a kind of device of image ciphering, comprising:
Module selected by picture to be encrypted, for selecting at least one picture to be encrypted;
Area determination module to be encrypted, for determining the region to be encrypted in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted;
Encrypting module, for being encrypted described region to be encrypted, obtains encrypting picture.
The method of the image ciphering that the embodiment of the present invention provides and device, by selecting at least one picture to be encrypted, and determine the region to be encrypted of picture to be encrypted, obtains encrypting picture to described region to be encrypted after being encrypted.By adopting method and the device of above-mentioned image ciphering, directly can be encrypted needing the picture of encryption, need not be encrypted the application program at picture place, make operation more simple, and can be encrypted the regional area of picture to be encrypted, be convenient to user and recognize encryption picture, promote Consumer's Experience.
Accompanying drawing explanation
By reading the detailed description done non-limiting example done with reference to the following drawings, other features, objects and advantages of the present invention will become more obvious:
The process flow diagram of the method for a kind of image ciphering that Fig. 1 provides for the embodiment of the present invention one;
The front schematic diagram of pixel encryption that Fig. 2 provides for the embodiment of the present invention one;
The rear schematic diagram of pixel encryption that Fig. 3 provides for the embodiment of the present invention one;
The process flow diagram of the method for a kind of image ciphering that Fig. 4 provides for the embodiment of the present invention two;
The process flow diagram of the method for a kind of image ciphering that Fig. 5 provides for the embodiment of the present invention three;
The structural drawing of the device of a kind of image ciphering that Fig. 6 provides for the embodiment of the present invention four.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not full content.
Embodiment one
The process flow diagram of the method for a kind of image ciphering that Fig. 1 provides for the embodiment of the present invention one.The situation of method specifically for being encrypted the picture of needs encryption of the present embodiment.The method of the present embodiment can be performed by the device of image ciphering, and this device can be realized by software and/or hardware, is integrated in the terminal of carrying out image ciphering.As shown in Figure 1, the method comprises:
Step 110, select at least one picture to be encrypted.
Exemplary, terminal can select at least one width to need the picture of encryption according to the demand of user, and the picture such as user selected is as the picture needing encryption.Described picture can be the picture of user's shooting, the picture of download or the picture etc. of collection.Described terminal can be mobile phone, panel computer or notebook computer etc.
Step 120, the region to be encrypted determined in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted.
Exemplary, determine the region to be encrypted of picture to be encrypted, determine that mode can for determine region to be encrypted according to the selection of user, or in setting picture stator region as region to be encrypted, can also be determine region to be encrypted according to preset rules, concrete determination mode can in the light of actual conditions set.Such as, set with the center picture point of terminal screen display as the center of circle, the border circular areas being radius with 5 pixels is region to be encrypted, then the region to be encrypted of at least one that selects in terminal picture to be encrypted is all set as this border circular areas.Or after having selected picture to be encrypted, terminal as region to be encrypted, or identifies that the region at the human body information place in picture is as region to be encrypted according to the region at the numerical information place in preset rules identification picture.Region to be encrypted is the subregion of picture to be encrypted but not Zone Full, and region to be encrypted can comprise at least one subregion to be encrypted, and subregion to be encrypted can comprise at least one sensitive information, such as numerical information, or head image information etc.Such as, identity information and the head image information of user is comprised in a picture to be encrypted, terminal is a subregion to be encrypted according to the region that the selection of user determines identity information place, the region at head image information place is another subregion to be encrypted, only need when being encrypted picture to be encrypted this two sub regions, not picture in its entirety is encrypted, encrypted work amount can be reduced.
Step 130, described region to be encrypted to be encrypted, to obtain encrypting picture.
Exemplary, after determining the region to be encrypted of picture to be encrypted, be encrypted the subregion to be encrypted that described region to be encrypted comprises, concrete cipher mode can set according to actual conditions, such as Gaussian Blur process, picture Edge contrast or the process of picture filter etc.The subregion each to be encrypted preferably comprised described region to be encrypted respectively carries out Gaussian Blur process encryption, the method of Gaussian Blur process is: the mean value pixel value of each pending pixel being updated to the pixel value of neighboring pixel point, to carry out Fuzzy Processing.Further, that determines each subregion to be encrypted adds density, wherein each subregion to be encrypted to add density identical or different.The described density that adds is the encryption fog-level that terminal is arranged each subregion to be encrypted, namely the range size when carrying out Gaussian Blur process being the neighboring pixel point that the pending pixel in each subregion to be encrypted is chosen is different, make the level of encryption of each subregion to be encrypted different, density can be added to each subregion setting to be encrypted according to the actual demand of user, also can treat unified setting the in encryption section and identical add density, namely each subregion to be encrypted adds density and can be the same or different.The front schematic diagram of pixel encryption that Fig. 2 provides for the embodiment of the present invention one, as shown in Figure 2, pixel 21 is pending pixel, all the other points are the neighboring pixel point of pixel 21, wherein the pixel value of pixel 21 is 2, the pixel value of all the other each points is 1, and the mean value that the value that is averaged obtains after calculating is 1, and the pixel value namely after pixel 21 encryption is 1.The rear schematic diagram of pixel encryption that Fig. 3 provides for the embodiment of the present invention one, as shown in Figure 3, pixel 31 is the pixel in Fig. 2 after pixel 21 encryption, and its pixel value is 1.After being encrypted each subregion to be encrypted, obtain encrypting picture, described encryption picture replaces original image display in the terminal.
The method of a kind of image ciphering that the embodiment of the present invention one provides, by selecting at least one picture to be encrypted, determine the region to be encrypted of picture to be encrypted, described region to be encrypted comprises at least one subregion to be encrypted, treats after encryption section is encrypted and obtains encrypting picture.Adopt the method for the present embodiment can encrypt separately picture, do not need to be encrypted the application program at picture place, make operation more simple, and the subregion of picture can be selected to be encrypted, reduce encrypted work amount, and be convenient to user according to unencryption domain identification encryption picture, promote Consumer's Experience.
Embodiment two
The process flow diagram of the method for a kind of image ciphering that Fig. 4 provides for the embodiment of the present invention two.The present embodiment is on the basis of embodiment one, do further optimization.
Further, before user selects at least one picture to be encrypted, obtain encrypted instruction, gather user fingerprints, described user fingerprints is mated with sample fingerprint in local fingerprint base, if the match is successful, then described user fingerprints is set to decrypt fingerprint, the idiographic flow of the method comprises:
Step 410, acquisition encrypted instruction.
Exemplary, terminal starts to perform encrypting step after obtaining encrypted instruction.Encrypted instruction can be the Encryption Options in the setting options of terminal or application program, starts to perform encrypting step when opening Encryption Options or selected Encryption Options.
Step 420, collection user fingerprints, mate described user fingerprints with sample fingerprint in local fingerprint base.
Exemplary, after obtaining encrypted instruction, encryption key is set.Encryption key can be the user fingerprints data that terminal obtains, or inputs password etc. according to the curriculum offering of user's input, is preferably finger print data.Gather user fingerprints, user fingerprints is mated with sample fingerprint in local fingerprint base, if the match is successful, illustrate that the user sending encrypted instruction is the legitimate user of terminal, if mate unsuccessful, may be that other users use this terminal to carry out image ciphering, now can send prompt tone prompting user has other users to use terminal to perform image ciphering operation, improves security.
If the match is successful for step 430, then described user fingerprints is set to decrypt fingerprint.
Exemplary, if the match is successful for the sample fingerprint in user fingerprints and local fingerprint base, then user fingerprints terminal gathered, as the decrypt fingerprint of encryption picture, namely only having when input decrypt fingerprint, just can be decrypted encrypting picture.
Step 440, select at least one picture to be encrypted.
Step 450, the region to be encrypted determined in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted.
Step 460, described region to be encrypted to be encrypted, to obtain encrypting picture.
The method of a kind of image ciphering that the embodiment of the present invention two provides, acquisition encrypted instruction after, gather user fingerprints mate with the sample fingerprint in local fingerprint base, if the match is successful, then using described fingerprint as decrypt fingerprint.By arranging decrypt fingerprint to encryption picture, the uniqueness of finger print data can be utilized to improve the security of image ciphering, protect the security privacy of user better.
Embodiment three
The process flow diagram of the method for a kind of image ciphering that Fig. 5 provides for the embodiment of the present invention three.The present embodiment does further to optimize on the basis of embodiment two, is further limited the deciphering of encryption picture.
Further, choose encryption picture, gather user fingerprints, the user fingerprints of current collection is mated with described decrypt fingerprint, if the match is successful, then shows the original image that the encryption picture chosen is corresponding, if mate unsuccessful, then show described encryption picture, the flow process of the method specifically comprises:
Step 510, choose encryption picture.
Exemplary, encryption picture is the picture having carried out local refinement, the encryption picture needed can be selected as picture to be decrypted according to unencrypted region prompting user.Terminal can choose at least one width encryption picture according to the demand of user, if the encryption key of the encryption picture chosen current, with to choose the encryption key encrypting picture not identical, can point out user's current crypto picture can not be decrypted operation with the encryption picture chosen simultaneously.
Step 520, collection user fingerprints, mate the user fingerprints of current collection with described decrypt fingerprint.
Exemplary, point out user to input encryption key after choosing encryption picture, be preferably prompting user and input decrypt fingerprint.After terminal gathers the fingerprint of user's input, the user fingerprints of current collection is mated with the decrypt fingerprint set.
If the match is successful for step 530, then show the original image that the encryption picture chosen is corresponding, if mate unsuccessful, then show described encryption picture.
Exemplary, if the match is successful for the user fingerprints gathered and described decrypt fingerprint, then show the original image that the encryption picture chosen is corresponding, now terminal can directly Show Picture in information, if mate unsuccessful, then show encryption picture, namely terminal cannot Show Picture directly to user in information.
The method of a kind of image ciphering that the embodiment of the present invention three provides, by choosing encryption picture, gathering user fingerprints and mating with described decrypt fingerprint, if the match is successful, then original image corresponding to encryption picture is chosen in display, if mate unsuccessful, then shows described encryption picture.Encryption picture can be quick and precisely shown by fingerprint matching.Only needing to be decrypted picture when deciphering, not needing to be decrypted the application program at picture place, making encryption picture decrypting process become simple, and then promote Consumer's Experience.
Embodiment four
The structural drawing of the device of a kind of image ciphering that Fig. 6 provides for the embodiment of the present invention four.As shown in Figure 6, this device comprises: module 601 selected by picture to be encrypted, area determination module 602 to be encrypted and encrypting module 603.
Wherein, module 601 selected by picture to be encrypted, for selecting at least one picture to be encrypted; Area determination module 602 to be encrypted, for determining the region to be encrypted in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted; Encrypting module 603, for being encrypted described region to be encrypted, obtains encrypting picture.
Further, described device can also comprise: acquisition module, and acquisition module and decrypt fingerprint arrange module.
Wherein, acquisition module, for obtaining encrypted instruction; Acquisition module, for gathering user fingerprints, mates described user fingerprints with sample fingerprint in local fingerprint base; Decrypt fingerprint arranges module, if the match is successful for sample fingerprint in described user fingerprints and local fingerprint base, then described user fingerprints is set to decrypt fingerprint.
Preferably, described device can also comprise: encryption picture chooses module, matching module and picture display module.
Wherein, encrypt picture and choose module, for choosing encryption picture; Matching module, for gathering user fingerprints, mates the user fingerprints of current collection with described decrypt fingerprint; Picture display module, if the match is successful for the user fingerprints of current collection and described decrypt fingerprint, then shows the original image that the encryption picture chosen is corresponding, if mate unsuccessful, then shows described encryption picture.
Further, encrypting module carries out Gaussian Blur process encryption specifically for the subregion each to be encrypted comprised described region to be encrypted respectively.
On the basis of above-described embodiment, described encrypting module can comprise: add density setting unit and Gauss's ciphering unit.
Wherein, add density setting unit, add density for what determine each subregion to be encrypted; Wherein each subregion to be encrypted to add density identical or different; Gauss's ciphering unit, adopts Gaussian Blur Processing Algorithm to be encrypted corresponding subregion to be encrypted for the density that adds according to each subregion to be encrypted.
The device of a kind of image ciphering that the embodiment of the present invention four provides, by selecting at least one picture to be encrypted, determine the region to be encrypted of picture to be encrypted, described region to be encrypted comprises at least one subregion to be encrypted, obtains encrypting picture to described region to be encrypted after being encrypted.Adopt the device of the present embodiment can encrypt separately picture, do not need to be encrypted the application program at picture place, make operation more simple, promote Consumer's Experience, and can be encrypted the regional area of picture to be encrypted, reduce encrypted work amount.
The device of the image ciphering that the embodiment of the present invention provides, for the method for image ciphering performing the embodiment of the present invention and provide, possesses corresponding function and beneficial effect.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.
Claims (10)
1. a method for image ciphering, is characterized in that, comprising:
Select at least one picture to be encrypted;
Determine the region to be encrypted in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted;
Described region to be encrypted is encrypted, obtains encrypting picture.
2. method according to claim 1, is characterized in that, before selecting at least one picture to be encrypted, also comprises:
Obtain encrypted instruction;
Gather user fingerprints, described user fingerprints is mated with sample fingerprint in local fingerprint base;
If the match is successful, then described user fingerprints is set to decrypt fingerprint.
3. method according to claim 2, is characterized in that, is encrypted described region to be encrypted, after obtaining encryption picture, also comprises:
Choose encryption picture;
Gather user fingerprints, the user fingerprints of current collection is mated with described decrypt fingerprint;
If the match is successful, then show the original image that the encryption picture chosen is corresponding, if mate unsuccessful, then show described encryption picture.
4. the method according to any one of claim 1-3, is characterized in that, is encrypted comprises described region to be encrypted:
The subregion each to be encrypted comprised described region to be encrypted respectively carries out Gaussian Blur process encryption.
5. method according to claim 4, is characterized in that, the described subregion each to be encrypted comprised described region to be encrypted respectively carries out Gaussian Blur process encryption and comprises:
That determines each subregion to be encrypted adds density; Wherein each subregion to be encrypted to add density identical or different;
The density that adds according to each subregion to be encrypted adopts Gaussian Blur Processing Algorithm to be encrypted corresponding subregion to be encrypted.
6. a device for image ciphering, is characterized in that, comprising:
Module selected by picture to be encrypted, for selecting at least one picture to be encrypted;
Area determination module to be encrypted, for determining the region to be encrypted in described picture to be encrypted, described region to be encrypted is the subregion of described picture to be encrypted and comprises at least one subregion to be encrypted;
Encrypting module, for being encrypted described region to be encrypted, obtains encrypting picture.
7. device according to claim 6, is characterized in that, also comprises:
Acquisition module, for obtaining encrypted instruction;
Acquisition module, for gathering user fingerprints, mates described user fingerprints with sample fingerprint in local fingerprint base;
Decrypt fingerprint arranges module, if the match is successful for sample fingerprint in described user fingerprints and local fingerprint base, then described user fingerprints is set to decrypt fingerprint.
8. device according to claim 7, is characterized in that, also comprises:
Encryption picture chooses module, for choosing encryption picture;
Matching module, for gathering user fingerprints, mates the user fingerprints of current collection with described decrypt fingerprint;
Picture display module, if the match is successful for the user fingerprints of current collection and described decrypt fingerprint, then shows the original image that the encryption picture chosen is corresponding, if mate unsuccessful, then shows described encryption picture.
9. the device according to any one of claim 6-8, is characterized in that, encrypting module specifically for:
The subregion each to be encrypted comprised described region to be encrypted respectively carries out Gaussian Blur process encryption.
10. method according to claim 9, is characterized in that, encrypting module comprises:
Add density setting unit, add density for what determine each subregion to be encrypted; Wherein each subregion to be encrypted to add density identical or different;
Gauss's ciphering unit, adopts Gaussian Blur Processing Algorithm to be encrypted corresponding subregion to be encrypted for the density that adds according to each subregion to be encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510760669.5A CN105426721A (en) | 2015-11-10 | 2015-11-10 | Picture encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510760669.5A CN105426721A (en) | 2015-11-10 | 2015-11-10 | Picture encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105426721A true CN105426721A (en) | 2016-03-23 |
Family
ID=55504926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510760669.5A Pending CN105426721A (en) | 2015-11-10 | 2015-11-10 | Picture encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426721A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106326712A (en) * | 2016-08-31 | 2017-01-11 | 维沃移动通信有限公司 | Method for processing pictures and mobile terminal |
CN107092842A (en) * | 2017-04-14 | 2017-08-25 | 苏州三星电子电脑有限公司 | Secrecy display method and private display device |
CN107133993A (en) * | 2017-04-19 | 2017-09-05 | 珠海市魅族科技有限公司 | A kind of image processing method and device |
WO2017215436A1 (en) * | 2016-06-14 | 2017-12-21 | 中兴通讯股份有限公司 | Information encryption and decryption method, device and terminal |
CN108875393A (en) * | 2018-06-11 | 2018-11-23 | 北京京东金融科技控股有限公司 | Client data is by the safety implementation method, device and medium of screenshotss |
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103605928A (en) * | 2013-11-18 | 2014-02-26 | 清华大学 | Method and system for protecting privacy of images |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
US9094204B2 (en) * | 2010-09-30 | 2015-07-28 | Fujitsu Limited | Image encryption system and image decryption system |
CN104992120A (en) * | 2015-06-18 | 2015-10-21 | 广东欧珀移动通信有限公司 | Picture encryption method and mobile terminal |
-
2015
- 2015-11-10 CN CN201510760669.5A patent/CN105426721A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9094204B2 (en) * | 2010-09-30 | 2015-07-28 | Fujitsu Limited | Image encryption system and image decryption system |
CN103605928A (en) * | 2013-11-18 | 2014-02-26 | 清华大学 | Method and system for protecting privacy of images |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN104992120A (en) * | 2015-06-18 | 2015-10-21 | 广东欧珀移动通信有限公司 | Picture encryption method and mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017215436A1 (en) * | 2016-06-14 | 2017-12-21 | 中兴通讯股份有限公司 | Information encryption and decryption method, device and terminal |
CN106326712A (en) * | 2016-08-31 | 2017-01-11 | 维沃移动通信有限公司 | Method for processing pictures and mobile terminal |
CN107092842A (en) * | 2017-04-14 | 2017-08-25 | 苏州三星电子电脑有限公司 | Secrecy display method and private display device |
CN107133993A (en) * | 2017-04-19 | 2017-09-05 | 珠海市魅族科技有限公司 | A kind of image processing method and device |
CN108875393A (en) * | 2018-06-11 | 2018-11-23 | 北京京东金融科技控股有限公司 | Client data is by the safety implementation method, device and medium of screenshotss |
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
CN114817938B (en) * | 2021-01-28 | 2024-05-17 | 海信集团控股股份有限公司 | Method and equipment for accessing shared album and protecting private pictures of shared album |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105426721A (en) | Picture encryption method and device | |
JP5237483B2 (en) | Computer-implemented authentication method | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN107133993A (en) | A kind of image processing method and device | |
CN105429761A (en) | Key generation method and device | |
CN103246850A (en) | Method and device for processing file | |
WO2020018182A1 (en) | Public-private key pair protected password manager | |
KR20170009933A (en) | Fingerprint decryption method and device | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
CN103400082A (en) | File encryption/decryption method and system | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN107180203A (en) | Image encryption, decryption method, mobile terminal and computer-readable recording medium | |
US11405782B2 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
CN105243331A (en) | Encryption device and encryption method, and decryption device and decryption method | |
CN111079170B (en) | Control method and control device of solid state disk | |
WO2018166484A1 (en) | Data encryption and decryption methods and apparatuses, electronic device and readable storage medium | |
CN106788996A (en) | A kind of operating system password remapping method and system | |
CN106850215B (en) | Data encryption and decryption method and device | |
CN105022965A (en) | Data encryption method and apparatus | |
KR101364859B1 (en) | System and method for processing scanned images | |
CN108696355B (en) | Method and system for preventing head portrait of user from being embezzled | |
CN111259407A (en) | Picture processing method and device, storage medium and terminal | |
CN106326712B (en) | Picture processing method and mobile terminal | |
CN116306519A (en) | File signing method, device and storage medium | |
US20150020165A1 (en) | System of executing application and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160323 |
|
RJ01 | Rejection of invention patent application after publication |