CN106657606A - Photograph processing method, device and terminal - Google Patents

Photograph processing method, device and terminal Download PDF

Info

Publication number
CN106657606A
CN106657606A CN201611009358.6A CN201611009358A CN106657606A CN 106657606 A CN106657606 A CN 106657606A CN 201611009358 A CN201611009358 A CN 201611009358A CN 106657606 A CN106657606 A CN 106657606A
Authority
CN
China
Prior art keywords
facial characteristics
database
personage
photo
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611009358.6A
Other languages
Chinese (zh)
Inventor
李敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611009358.6A priority Critical patent/CN106657606A/en
Publication of CN106657606A publication Critical patent/CN106657606A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06T3/04
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformation in the plane of the image
    • G06T3/40Scaling the whole image or part thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20112Image segmentation details
    • G06T2207/20132Image cropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/52Details of telephonic subscriber devices including functional features of a camera

Abstract

The invention discloses a photograph processing method comprises steps of: extracting the facial features of all people in a to-be-processed photograph transmitted from a first terminal; matching the extracted facial features according to the character facial features in a preset first database or a second database, wherein the first database stores character facial features provided by the first terminal, the second database stores passer facial features provided by one or more second terminals other than the first terminal; determining whether to protect the privacy of the characters according to a matching results. The invention also discloses a photograph processing device and terminal. The method, the device and the terminal solve the problem that sharing the photograph in the prior art may lead to the leakage of the privacy of the passers, determine a protection scheme for the privacy of the passers according to whether there is a passer facial feature in the database sp that the privacy of the passer cannot be easily leaked and user experience is improved.

Description

A kind of photo processing method, device and terminal
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of photo processing method, device and terminal.
Background technology
With the development and the popularization of intelligent mobile terminal of mobile Internet, the customer group of intelligent mobile terminal is increasingly Greatly, while also proposing more intelligence, the demand of hommization to software.
In existing technology, intelligent mobile terminal in fact, although by user as a game machine or television set, may be used also Can be a learning machine, it is also possible to become paradise of baby etc., to our life more enjoyment are brought.
With the fast development of mobile Internet, the use of the intelligent terminal of built-in camera is very universal, Yong Huji Can all be taken pictures daily, be collected and shared picture, on network, for from the social, picture of public accident and video, We are accustomed to.However, due to it is difficult to ensure that without others passerbys when taking pictures, thus many photos clapped have it is many not The passerby of understanding, will together upload passerby in upload pictures, share network, and to the privacy of passerby leakage is caused, Some privacy concerns are brought, the privacy of passerby may be revealed.
The problem that the privacy that may result in passerby for share photos in correlation technique is compromised, not yet proposes at present solution Certainly scheme.
The content of the invention
Present invention is primarily targeted at proposing a kind of photo processing method, device and terminal, it is intended to solve correlation technique Middle share photos may result in the problem that the privacy of passerby is compromised.
For achieving the above object, the invention provides a kind of photo processing method, including:
The all persons of the pending photo sent to first terminal carry out facial feature extraction;
Character face's feature in the first database or the second database for pre-setting is special to the face for extracting Levy and matched, wherein, character face's feature that the first terminal that is stored with first database is provided, described second Passerby's facial characteristics that one or more second terminals in addition to the first terminal that are stored with database are provided;
Determine whether to protect the privacy of personage according to the result of matching.
Alternatively, all persons in the described pending photo sent to the first terminal carry out facial feature extraction Before, methods described also includes:The pending photo is encrypted encryption policy with first terminal negotiation;According to The encryption policy consulted is decrypted to the pending photo.
Alternatively, all persons in the described pending photo sent to the first terminal carry out facial feature extraction Before, methods described also includes:Character face's feature that the first terminal sends is received, by character face's characteristic storage To in first database;Receive passerby's facial characteristics that one or more of second terminals send and with the passerby The corresponding photo disposal strategy of facial characteristics, by passerby's facial characteristics and photo corresponding with passerby's facial characteristics Process policy store is in second database.
Alternatively, determine whether that the privacy to personage carries out protection and includes according to the result of matching:Extract to described The corresponding personage of facial characteristics inquired in first database in facial characteristics abandons carrying out secret protection, to described The corresponding personage of facial characteristics not inquired in first database in the facial characteristics for extracting carries out privacy guarantor Shield;Or, to the corresponding personage of facial characteristics inquired in second database in the facial characteristics for extracting Secret protection is carried out, to the facial characteristics pair not inquired in second database in the facial characteristics for extracting The personage for answering abandons carrying out secret protection.
Alternatively, the facial characteristics correspondence to inquiring in second database in the facial characteristics for extracting Personage carry out secret protection and include:The face inquired in second database in the facial characteristics extracted described in obtaining The corresponding photo disposal strategy of portion's feature;In the case of being to carry out secret protection to personage in the photo disposal strategy, to institute Stating the corresponding personage of facial characteristics inquired in second database in the facial characteristics for extracting carries out secret protection; In the case of being to abandon carrying out secret protection to personage in the photo disposal strategy, abandon to the facial characteristics for extracting In the corresponding personage of facial characteristics that inquires in second database carry out secret protection.
Alternatively, determine whether that the privacy to personage carries out protection and includes according to the result of matching:In the following manner it One carries out secret protection:
Fuzzy Processing is carried out to the face of the personage;
A facial characteristics is chosen from first database, and the facial characteristics chosen is replaced into the face of the personage Portion's feature;
The profile of the personage is extracted, the personage is removed.
According to a further aspect in the invention, there is provided a kind of photo processing method, including:
Pending photo is encrypted by the encryption policy in advance with cloud agent negotiation;
Described pending photo after by encryption is sent to the cloud agency, acts on behalf of to the pending photo for the cloud All persons carry out facial feature extraction, according to the facial characteristics pair in the first database or the second database for pre-setting The facial characteristics for extracting is matched, and the privacy for protecting personage is determined whether according to the result of matching.
According to a further aspect in the invention, a kind of picture processing device is additionally provided, including:
Extraction module, all persons of the pending photo for sending to first terminal carry out facial feature extraction;
Matching module, for the character face's feature in the first database or the second database for pre-setting to carrying The facial characteristics got is matched, wherein, the character face that the first terminal that is stored with first database is provided Feature, the passerby face that one or more second terminals in addition to the first terminal that are stored with second database are provided Portion's feature;
Determining module, for determining whether to protect the privacy of personage according to the result of matching.
Alternatively, described device also includes:
Negotiation module, for the encryption policy being encrypted to the pending photo with first terminal negotiation;
Deciphering module, for being decrypted to the pending photo according to the encryption policy consulted.
Alternatively, described device also includes:
First receiver module, it is for receiving character face's feature that the first terminal sends, the character face is special Levy and store in first database;
Second receiver module, for receive passerby's facial characteristics that one or more of second terminals send and with institute The corresponding photo disposal strategy of passerby's facial characteristics is stated, by passerby's facial characteristics and corresponding with passerby's facial characteristics Photo disposal policy store in second database.
Alternatively, the determining module includes:
First privacy processing unit, for inquiring in first database in the facial characteristics for extracting The corresponding personage of facial characteristics abandon carrying out secret protection, in the facial characteristics for extracting in first database In the corresponding personage of facial characteristics that do not inquire carry out secret protection;Or,
Second privacy processing unit, for inquiring in second database in the facial characteristics for extracting The corresponding personage of facial characteristics carry out secret protection, to not having in second database in the facial characteristics for extracting There is the corresponding personage of the facial characteristics for inquiring to abandon carrying out secret protection.
Alternatively, the second privacy processing unit includes:
Acquiring unit, for obtaining the facial characteristics for extracting in the face that inquires in second database The corresponding photo disposal strategy of feature;
Secret protection unit, in the case of being to carry out secret protection to personage in the photo disposal strategy, to institute Stating the corresponding personage of facial characteristics inquired in second database in the facial characteristics for extracting carries out secret protection;
Protection location is abandoned, in the case of being to abandon carrying out secret protection to personage in the photo disposal strategy, Abandoning the corresponding personage of facial characteristics to inquiring in second database in the facial characteristics for extracting is carried out Secret protection.
Alternatively, the determining module includes:
Carry out secret protection one of in the following manner:
Fuzzy Processing is carried out to the face of the personage;
A facial characteristics is chosen from first database, and the facial characteristics chosen is replaced into the face of the personage Portion's feature;
The profile of the personage is extracted, the personage is removed.
According to a further aspect in the invention, a kind of photo disposal terminal is additionally provided, including:
Encrypting module, for being encrypted to pending photo by the encryption policy in advance with cloud agent negotiation;
Sending module, for the described pending photo after by encryption the cloud agency is sent to, and acts on behalf of right for the cloud The all persons of the pending photo carry out facial feature extraction, according to the first database or the second database that pre-set In facial characteristics the facial characteristics for extracting is matched, according to matching result determine whether protect personage privacy.
By the present invention, all persons of the pending photo sent to first terminal carry out facial feature extraction;According to Facial characteristics of the character face's feature in the first database for pre-setting or the second database to extracting is matched, its In, character face's feature that the first terminal that is stored with first database is provided is stored in second database There is passerby's facial characteristics that one or more second terminals in addition to the first terminal are provided;Determined according to the result of matching Whether the privacy of personage is protected, share photos in correlation technique is solved and be may result in what the privacy of passerby was compromised Problem, the protection scheme to passerby's privacy is determined according to the facial characteristics in database with the presence or absence of passerby so that passerby's is hidden Private will not be leaked easily, improve Consumer's Experience.
Description of the drawings
Fig. 1 is the hardware architecture diagram of an optional mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the flow chart one of photo processing method according to embodiments of the present invention;
Fig. 4 is the flowchart 2 of photo processing method according to embodiments of the present invention;
Fig. 5 is the schematic diagram for performing secret protection to photo based on image recognition according to embodiments of the present invention;
Fig. 6 is the flow chart that cloud agency according to embodiments of the present invention performs secret protection based on image recognition to photo;
Fig. 7 is the block diagram one of picture processing device according to embodiments of the present invention;
Fig. 8 is the block diagram one of picture processing device according to the preferred embodiment of the invention;
Fig. 9 is the block diagram two of picture processing device according to the preferred embodiment of the invention;
Figure 10 is the block diagram two of picture processing device according to embodiments of the present invention.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that specific embodiment described herein is not intended to limit the present invention only to explain the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for be conducive to the present invention explanation, itself Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram of an optional mobile terminal for realizing each embodiment of the invention.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 Etc..
Fig. 1 shows the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all showing The component for going out.More or less of component can alternatively be implemented.Will be discussed in more detail below the element of mobile terminal 1 00.
Wireless communication unit 110 can generally include one or more assemblies, and it allows mobile terminal 1 00 and radio communication Radio communication between system or network.For example, wireless communication unit 110 can include that broadcasting reception module 111, movement are logical At least one of letter module 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal generated before the server or reception of broadcast singal and/or broadcast related information and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is receiving.Broadcast singal can be present in a variety of manners, and for example, it can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), Radio Data System, the received terrestrial digital broadcasting integrated service of forward link media (MediaFLO@) Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module 115 typical case is GPS (global positioning system).According to current technology, GPS calculate from three or more satellites away from From information and correct time information and for the Information application triangulation for calculating, so as to according to longitude, latitude and height Degree calculates exactly three-dimensional current location information.Currently, the method for calculating position and temporal information uses three satellites simultaneously And the error of the position and temporal information for calculating is corrected by using an other satellite.Additionally, GPS can be by real-time Ground Continuous plus current location information carrys out calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone 122, the static images that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus Or the view data of video is processed.Picture frame after process may be displayed on display unit 151.Jing cameras 121 are processed Picture frame afterwards can be stored in memory 160 (or other storage mediums) or carry out sending out via wireless communication unit 110 Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Microphone 122 can be in telephone relation mould Sound (voice data), and energy are received in formula, logging mode, speech recognition mode etc. operational mode via microphone 122 Enough is voice data by such acoustic processing.Audio frequency (voice) data after process can be in the case of telephone calling model Being converted to can be sent to the form output of mobile communication base station via mobile communication module 112.Microphone 122 can be implemented various The noise of type eliminates (or suppression) algorithm and is being received and making an uproar of producing during sending audio signal with eliminating (or suppression) Sound or interference.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input Various operations.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, Touch pad (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, shake Bar etc..Especially, when touch pad is superimposed upon in the form of layer on display unit 151, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, and (for example, mobile terminal 1 00 opens or closes shape State), the presence or absence of contact (that is, touch input), the mobile terminal of the position of mobile terminal 1 00, user for mobile terminal 1 00 100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can include proximity transducer 141.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for receive from The input (for example, data message, electric power etc.) of external device (ED) and the input for receiving is transferred in mobile terminal 1 00 One or more elements can be used for the transmission data between mobile terminal 1 00 and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing to pass through it by electricity Power from base provide to mobile terminal 1 00 path or can serve as allow from base be input into various command signals pass through its It is transferred to the path of mobile terminal 1 00.Can serve as recognizing mobile terminal 1 00 from the various command signals or electric power of base input The signal whether being accurately fitted within base.Output unit 150 is configured to the offer of vision, audio frequency and/or tactile manner Output signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include aobvious Show unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia files Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when the display unit 151 and touch pad touch-screen with formation superposed on one another in the form of layer, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user from outside viewing, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific The embodiment wanted, mobile terminal 1 00 can include two or more display units (or other display devices), for example, move Dynamic terminal 100 can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect Touch input pressure and touch input position and touch input area.
Dio Output Modules 152 can be in mobile terminal 1 00 in call signal reception pattern, call mode, record mould It is that wireless communication unit 110 is received or in memory when under the isotypes such as formula, speech recognition mode, broadcast reception mode In 160 store voice data transducing audio signal and be output as sound.And, dio Output Modules 152 can provide with (for example, call signal receives sound, message sink sound etc. to the audio output of the specific function correlation that mobile terminal 1 00 is performed Deng).Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output so that event is notified to mobile terminal 1 00.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit 153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list Unit 153 can provide tactile output (that is, vibrating) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the process and control operation performed by controller 180 etc., Huo Zheke With the data (for example, telephone directory, message, still image, video etc.) for temporarily storing own Jing outputs or will export.And And, memory 160 can be storing the vibration of various modes with regard to exporting when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data The related control of communication, video calling etc. and process.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or is so structured that and control Device 180 is separated.Controller 180 can be with execution pattern identifying processing, by the handwriting input for performing on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various embodiments described herein can be with using such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein Implementing, in some cases, such embodiment can be implemented at least one in electronic unit in controller 180. For software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implementing.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memory 160 and be performed by controller 180.
So far, own Jing describes mobile terminal 1 00 according to its function.In addition, the mobile terminal 1 00 in the embodiment of the present invention Can be such as folded form, board-type, oscillating-type, sliding-type and other various types of mobile terminals, specifically not do herein Limit.
As shown in Figure 1 mobile terminal 1 00 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system are operating.
The communication system that mobile terminal wherein of the invention is operable to is described referring now to Fig. 2.
Such communication system can use different air interface and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple intelligent terminals 100, multiple base stations (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC 280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC 280 is also structured to be formed with the BSC 275 that can be couple to base station 270 via back haul link and connects Mouthful.If any one that back haul link can be in the interface that Ganji knows is constructing, the interface can include such as Europe mark Quasi- high power capacity digital circuit/Unite States Standard high power capacity digital circuit (E1/T1), asynchronous transfer mode (ATM), procotol (IP), point-to-point protocol (PPP), frame relay, high-bit-rate digital subscriber line road (HDSL), Asymmetrical Digital Subscriber Line (ADSL) Or all kinds digital subscriber line (xDSL).It will be appreciated that as shown in Figure 2 system can include multiple BSC 275.
Each BS 270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction Each subregion that line is covered is radially away from BS 270.Or, each subregion can be by for two of diversity reception or more Multiple antennas are covered.Each BS 270 may be constructed such that the multiple frequency distribution of support, and each frequency distribution has specific frequency Spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersects can be referred to as CDMA Channel.BS 270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single BSC 275 and at least one BS 270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS 270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system 100.As shown in Figure 1 broadcasting reception module 111 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT 295 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful Location information.Location information module 115 as shown in Figure 1 is (such as:GPS) it is generally configured to coordinate to obtain with satellite 300 The location information that must be wanted.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use can track mobile whole Other technologies of the position at end.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb biography It is defeated.
Used as a typical operation of wireless communication system, BS 270 receives the reverse strand from various mobile terminal 1s 00 Road signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of certain base station reception is anti- Processed in specific BS 270 to link signal.The data of acquisition are forwarded to the BSC 275 of correlation.BSC provides logical Words resource allocation and the mobile management function of the coordination including the soft switching process between BS 270.BSC 275 will also be received Data be routed to MSC 280, its provide for PSTN 290 formed interface extra route service.Similarly, PSTN 290 form interfaces with MSC 280, and MSC and BSC 275 form interface, and BSC 275 correspondingly controls BS 270 with by forward direction Link signal is sent to mobile terminal 1 00.
Based on above-mentioned mobile terminal, a kind of photo processing method is embodiments provided, Fig. 3 is according to the present invention The flow chart one of the photo processing method of embodiment, as shown in figure 3, the method is comprised the following steps:
Step S302, all persons of the pending photo sent to first terminal carry out facial feature extraction;
Step S304, the character face's feature in the first database or the second database for pre-setting is to extracting Facial characteristics matched, wherein, character face's feature that the first terminal of being stored with first database is provided, this Passerby's facial characteristics that one or more second terminals in addition to the first terminal that are stored with two databases are provided;
Step S306, determines whether to protect the privacy of personage according to the result of matching.
By above-mentioned steps, all persons of the pending photo sent to first terminal carry out facial feature extraction;Root Match according to facial characteristics of the character face's feature in the first database or the second database for pre-setting to extracting, Wherein, be stored with character face's feature that the first terminal provides in first database, is stored with second database and removes Passerby's facial characteristics that one or more second terminals outside the first terminal are provided;It is right to be determined whether according to the result of matching The privacy of personage is protected, and solves the problems, such as that share photos in correlation technique may result in the privacy of passerby and be compromised, The protection scheme to passerby's privacy is determined according to the facial characteristics in database with the presence or absence of passerby so that the privacy of passerby will not Leaked easily, improve Consumer's Experience.
Alternatively, all persons in the pending photo sent to the first terminal carry out facial feature extraction it Before, the pending photo is encrypted encryption policy with first terminal negotiation;According to the encryption policy consulted to this Pending photo is decrypted.Character face's feature that the first terminal sends is received, by character face's characteristic storage to this In first database;Receive passerby's facial characteristics that this one or more second terminals send and with passerby's facial characteristics pair The photo disposal strategy answered, passerby's facial characteristics and photo disposal policy store corresponding with passerby's facial characteristics are arrived In second database.
Determine whether that the privacy to personage carries out protection and can include according to the result of matching:The face extracted to this is special Levy the corresponding personage of facial characteristics inquired in first database and abandon the face for carrying out secret protection, extract to this The corresponding personage of facial characteristics not inquired in first database in portion's feature carries out secret protection;Or, to this The corresponding personage of facial characteristics inquired in second database in the facial characteristics for extracting carries out secret protection, to this The corresponding personage of facial characteristics not inquired in second database in the facial characteristics for extracting abandons carrying out privacy Protection.Alternatively, the corresponding personage of facial characteristics inquired in second database in the facial characteristics for extracting to this Carrying out secret protection can include:Obtain the facial characteristics inquired in second database in the facial characteristics that this extracts Corresponding photo disposal strategy;In the case of being to carry out secret protection to personage in the photo disposal strategy, this is extracted The corresponding personage of facial characteristics inquired in second database in facial characteristics carries out secret protection;In the photo disposal Strategy is in the case of abandoning carrying out secret protection to personage, to abandon in the facial characteristics extracted to this in second database In the corresponding personage of facial characteristics that inquires carry out secret protection.
The mode more than one protected to the privacy of personage is determined whether according to the result of matching, it is optional at one In embodiment, can include:Carry out secret protection one of in the following manner:Fuzzy Processing is carried out to the face of the personage;From A facial characteristics is chosen in first database, and the facial characteristics of selection is replaced into the facial characteristics of the personage;To the people The profile of thing is extracted, and the personage is removed.
The embodiment of the present invention additionally provides a kind of photo processing method, and Fig. 4 is photo disposal according to embodiments of the present invention The flowchart 2 of method, as shown in figure 4, the method is comprised the following steps:
Step S402, is encrypted by the encryption policy in advance with cloud agent negotiation to pending photo;
Step S404, by the pending photo after encryption cloud agency is sent to, and is acted on behalf of to the pending photograph for the cloud The all persons of piece carry out facial feature extraction, according to the facial characteristics in the first database or the second database for pre-setting Facial characteristics to extracting is matched, and the privacy for protecting personage is determined whether according to the result of matching.
The embodiment of the present invention performs secret protection based on image recognition to photo, according to the privacy policy of passerby, to image Processed, to protect the privacy of user and passerby.When taking pictures, system can judge the personage that is photographed whether with nearby users Visualization feature match, if the match is successful, system can implementation strategy, picture is processed, for example obscure people object plane Portion, in order to ensure the reaction speed taken pictures, untreated image is immediately shown to user, but can not be shared, until image It is processed on backstage and finishes.Fig. 5 is the signal for performing secret protection to photo based on image recognition according to embodiments of the present invention Figure, as shown in figure 5, including:
Step S502, passerby's (also including user) periodic broadcast, the content of broadcast includes the facial characteristics of passerby oneself, And photo disposal strategy corresponding with oneself facial characteristics, i.e., for personal privacy protection policy, passerby can be periodically Ground broadcast enciphering strategy, how to process its picture when in the picture that it occurs in others, the broadcast also comprising effective information with Confirm user agent.The session key encryption that this strategy is generated by current time (every 15 minutes), and and user agent Exchange master key.Cloud agency receive and cache policy, upon receipt of photo, if a user is identified, then related Photo disposal strategy will be decrypted.Then, user initializes storage privately owned file on the local device to select correlation Context, such as based on position (office, family, supermarket, public place etc.), based on time (working time, time of having a rest Deng), for each context, appropriate photo Preservation tactics (agreeing to face or fuzzy face occur) are selected, will be corresponding Preservation tactics are transferred to cloud agency.
Step S504, photographer is that user is taken pictures, and cloud agency is transferred to after being encrypted to photo;
Step S506, with respect to each user for, have take pictures agency and passerby agency, system carries user For facial characteristics storage to take pictures agency in, by addition to a user passerby provide facial characteristics and with facial characteristics pair Answer privacy protection policy (i.e. above-mentioned photo disposal strategy).Agency is used for training and svm classifier.Users to trust agency will not let out Reveal its visual feature, communication protocol main key of interaction on agency and user equipment, also for generating session key.System The all faces of identification can be detected and attempt, this part can be using face detection and feature extraction.The feature that system encryption is extracted, and Its agency is uploaded to, while all passerbys agency also can receive, the feature that take pictures agency and passerby's agency's contrast are extracted is entered Row svm classifier, if it exceeds critical value, then session key starts the strategy of decrypted user, reveals to system.
When a session key is authorized for user, system begins to decrypt the privately owned strategy of associated user, performs required Behavior.Using OpenCV storehouses, it is possible to achieve user images are obscured, more excellent technology is exist, such as face conversion It is facial for another rather than image blurring, moreover, it is also possible to remove whole user's bodies, fill background.If photo face Portion can not the match is successful with passerby, and system can be given tacit consent to makes face blurring, can so protect the privacy of passerby, even if without intelligence Terminal is no using the system.
Fig. 6 is the flow chart that cloud agency according to embodiments of the present invention performs secret protection based on image recognition to photo, As shown in fig. 6, the method is specifically included:
Step S601, cloud agency is received after the photo of user's transmission, and face detection is carried out to photo on backstage, is extracted Go out facial characteristics;Two roles, passerby's (being photographed) and user's (taking pictures) can be shown in systems, respectively have one based on cloud Agency's (take pictures agency and passerby agency), agency provides logic computing function.System needs to realize between user and its agency Communication protocol, user broadcasts their presence using bluetooth period, when taking, face detection, feature extraction and safety Match protocol is performed, if a user is identified that system can modify according to privacy policy to picture.
Step S602, judges that the facial number for detecting, whether more than 0, in the case where judged result is no, is performed Step S604, in the case of being to be in judged result, execution step S605;
Step S603, to picture face blurring process is not carried out;
Step S604, judges whether there is passerby in the facial characteristics for detecting, in the case where judged result is no, performs Step S605, in the case of being to be in judged result, execution step S606;
Step S605, acquiescence carries out Fuzzy Processing to all faces in picture;
Step S606, the facial characteristics extracted to all passerbys carries out secure match, obtains key, is the face of matching Privately owned behavior is decrypted, the privately owned behavior is i.e. corresponding to the photo disposal strategy of facial characteristics;
Step S607, the face to having matched applies privately owned behavior, and the face not matched carries out Fuzzy Processing.
By above-mentioned steps, according to the privacy policy of passerby, photo is processed, to protect, user and passerby's is hidden It is private.
A kind of picture processing device is embodiments provided, Fig. 7 is photo disposal dress according to embodiments of the present invention The block diagram one put, as shown in fig. 7, comprises:
Extraction module 72, all persons of the pending photo for sending to first terminal carry out facial feature extraction;
Matching module 74, for the character face's feature pair in the first database or the second database for pre-setting The facial characteristics for extracting is matched, wherein, the character face that the first terminal that is stored with first database is provided is special Levy, passerby's face that one or more second terminals in addition to the first terminal that are stored with second database are provided is special Levy;
Determining module 76, for determining whether to protect the privacy of personage according to the result of matching.
Fig. 8 is the block diagram one of picture processing device according to the preferred embodiment of the invention, as shown in figure 8, the device is also wrapped Include:
Negotiation module 82, for the encryption policy being encrypted to the pending photo with first terminal negotiation;
Deciphering module 84, for being decrypted to the pending photo according to the encryption policy consulted.
Fig. 9 is the block diagram two of picture processing device according to the preferred embodiment of the invention, as shown in figure 9, the device is also wrapped Include:
First receiver module 92, for receiving character face's feature that the first terminal sends, by character face's feature In storing first database;
Second receiver module 94, for receive passerby's facial characteristics that this one or more second terminals send and with this The corresponding photo disposal strategy of passerby's facial characteristics, by passerby's facial characteristics and photo corresponding with passerby's facial characteristics Process policy store is in second database.
Alternatively, the determining module 76 includes:
First privacy processing unit, for the face inquired in first database in the facial characteristics that extracts to this Feature corresponding personage in portion's abandons carrying out secret protection, does not look in first database in the facial characteristics extract to this The corresponding personage of facial characteristics for asking carries out secret protection;Or,
Second privacy processing unit, for the face inquired in second database in the facial characteristics that extracts to this Feature corresponding personage in portion's carries out secret protection, does not inquire in second database in the facial characteristics extract to this The corresponding personage of facial characteristics abandon carrying out secret protection.
Alternatively, the second privacy processing unit includes:
Acquiring unit, for obtaining the facial characteristics that this extracts in the facial characteristics that inquires in second database Corresponding photo disposal strategy;
Secret protection unit, in the case of being to carry out secret protection to personage in the photo disposal strategy, carries to this The corresponding personage of facial characteristics inquired in second database in the facial characteristics got carries out secret protection;
Protection location is abandoned, in the case of being to abandon carrying out secret protection to personage in the photo disposal strategy, is put Abandoning the corresponding personage of facial characteristics inquired in second database in the facial characteristics extracted to this carries out privacy guarantor Shield.
Alternatively, the determining module 76 includes:Carry out secret protection one of in the following manner:The face of the personage is entered Row Fuzzy Processing;A facial characteristics is chosen from first database, and the facial characteristics of selection is replaced into the face of the personage Portion's feature;The profile of the personage is extracted, the personage is removed.
The embodiment of the present invention additionally provides a kind of photo disposal terminal, and Figure 10 is photo disposal according to embodiments of the present invention The block diagram two of device, as shown in Figure 10, including:
Encrypting module 102, for being encrypted to pending photo by the encryption policy in advance with cloud agent negotiation;
Sending module 104, for the pending photo after encryption to be sent to into cloud agency, treats for cloud agency to this Processing all persons of photo carries out facial feature extraction, according to the face in the first database or the second database for pre-setting Portion's feature is matched to the facial characteristics for extracting, and the privacy for protecting personage is determined whether according to the result of matching.
The embodiment of the present invention, all persons of the pending photo sent to first terminal carry out facial feature extraction;Root Match according to facial characteristics of the character face's feature in the first database or the second database for pre-setting to extracting, Wherein, be stored with character face's feature that the first terminal provides in first database, is stored with second database and removes Passerby's facial characteristics that one or more second terminals outside the first terminal are provided;It is right to be determined whether according to the result of matching The privacy of personage is protected, and solves the problems, such as that share photos in correlation technique may result in the privacy of passerby and be compromised, The protection scheme to passerby's privacy is determined according to the facial characteristics in database with the presence or absence of passerby so that the privacy of passerby will not Leaked easily, improve Consumer's Experience.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row His property is included, so that a series of process, method, article or device including key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer takes Business device, air-conditioner, or network equipment etc.) perform the method that each embodiment of the invention is somebody's turn to do.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realizing, they can be concentrated on single computing device, or are distributed in multiple computing devices and are constituted Network on, alternatively, they can be realized with the executable program code of computing device, it is thus possible to they are stored Performed by computing device in the storage device, and in some cases, can be shown to perform different from order herein The step of going out or describe, or they are fabricated to respectively each integrated circuit modules, or by the multiple modules in them or Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are these are only, the scope of the claims of the present invention is not thereby limited, it is every using this Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of photo processing method, it is characterised in that include:
The all persons of the pending photo sent to first terminal carry out facial feature extraction;
Facial characteristics of the character face's feature in the first database or the second database for pre-setting to extracting enters Row matching, wherein, character face's feature that the first terminal that is stored with first database is provided, second data Passerby's facial characteristics that one or more second terminals in addition to the first terminal that are stored with storehouse are provided;
Determine whether to protect the privacy of personage according to the result of matching.
2. method according to claim 1, it is characterised in that in the described pending photo sent to the first terminal All persons carry out before facial feature extraction, methods described also includes:
The pending photo is encrypted encryption policy with first terminal negotiation;
The encryption policy according to consulting is decrypted to the pending photo.
3. method according to claim 1, it is characterised in that in the described pending photo sent to the first terminal All persons carry out before facial feature extraction, methods described also includes:
Character face's feature that the first terminal sends is received, by character face's characteristic storage to first database In;
Receive passerby's facial characteristics that one or more of second terminals send and corresponding with passerby's facial characteristics Photo disposal strategy, passerby's facial characteristics and photo disposal policy store corresponding with passerby's facial characteristics are arrived In second database.
4. method according to claim 3, it is characterised in that determine whether to enter the privacy of personage according to the result of matching Row protection includes:
The corresponding personage of facial characteristics to inquiring in first database in the facial characteristics for extracting abandons Secret protection is carried out, to the facial characteristics pair not inquired in first database in the facial characteristics for extracting The personage for answering carries out secret protection;Or,
The corresponding personage of facial characteristics to inquiring in second database in the facial characteristics for extracting is carried out Secret protection, the facial characteristics to not inquiring in second database in the facial characteristics for extracting is corresponding Personage abandons carrying out secret protection.
5. method according to claim 4, it is characterised in that in the facial characteristics for extracting in the described second number Carrying out secret protection according to the corresponding personage of the facial characteristics inquired in storehouse includes:
At the corresponding photo of facial characteristics inquired in second database in the facial characteristics extracted described in obtaining Reason strategy;
In the case of being to carry out secret protection to personage in the photo disposal strategy, in the facial characteristics for extracting The corresponding personage of facial characteristics inquired in second database carries out secret protection;
In the case of being to abandon carrying out secret protection to personage in the photo disposal strategy, abandon to the face for extracting The corresponding personage of facial characteristics inquired in second database in feature carries out secret protection.
6. method according to any one of claim 1 to 5, it is characterised in that it is right to be determined whether according to the result of matching The privacy of personage carries out protection to be included:
Carry out secret protection one of in the following manner:
Fuzzy Processing is carried out to the face of the personage;
A facial characteristics is chosen from first database, and the face that the facial characteristics chosen is replaced into the personage is special Levy;
The profile of the personage is extracted, the personage is removed.
7. a kind of photo processing method, it is characterised in that include:
Pending photo is encrypted by the encryption policy in advance with cloud agent negotiation;
Described pending photo after by encryption is sent to the cloud agency, for institute of the cloud agency to the pending photo There is personage to carry out facial feature extraction, the facial characteristics in the first database or the second database for pre-setting is to extracting To facial characteristics matched, according to matching result determine whether protect personage privacy.
8. a kind of picture processing device, it is characterised in that include:
Extraction module, all persons of the pending photo for sending to first terminal carry out facial feature extraction;
Matching module, for the character face's feature in the first database or the second database for pre-setting to extracting Facial characteristics matched, wherein, character face's feature that the first terminal of being stored with first database is provided, Passerby's face that one or more second terminals in addition to the first terminal that are stored with second database are provided is special Levy;
Determining module, for determining whether to protect the privacy of personage according to the result of matching.
9. device according to claim 8, it is characterised in that described device also includes:
Negotiation module, for the encryption policy being encrypted to the pending photo with first terminal negotiation;
Deciphering module, for being decrypted to the pending photo according to the encryption policy consulted.
10. a kind of photo disposal terminal, it is characterised in that include:
Encrypting module, for being encrypted to pending photo by the encryption policy in advance with cloud agent negotiation;
Sending module, for the described pending photo after by encryption the cloud agency is sent to, and is acted on behalf of to described for the cloud The all persons of pending photo carry out facial feature extraction, according in the first database or the second database for pre-setting Facial characteristics is matched to the facial characteristics for extracting, and the privacy for protecting personage is determined whether according to the result of matching.
CN201611009358.6A 2016-11-16 2016-11-16 Photograph processing method, device and terminal Pending CN106657606A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611009358.6A CN106657606A (en) 2016-11-16 2016-11-16 Photograph processing method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611009358.6A CN106657606A (en) 2016-11-16 2016-11-16 Photograph processing method, device and terminal

Publications (1)

Publication Number Publication Date
CN106657606A true CN106657606A (en) 2017-05-10

Family

ID=58805556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611009358.6A Pending CN106657606A (en) 2016-11-16 2016-11-16 Photograph processing method, device and terminal

Country Status (1)

Country Link
CN (1) CN106657606A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107703965A (en) * 2017-10-13 2018-02-16 翔升(上海)电子技术有限公司 Control the method and system of Unmanned Aerial Vehicle Data transmission
CN107943925A (en) * 2017-11-21 2018-04-20 华中师范大学 Fuzzy method for individual information in privacy information issue of anonymity system
CN108961302A (en) * 2018-07-16 2018-12-07 Oppo广东移动通信有限公司 Image processing method, device, mobile terminal and computer readable storage medium
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor
CN109118454A (en) * 2018-08-30 2019-01-01 北京旷视科技有限公司 Image processing method, device, system, computer readable storage medium
CN109145707A (en) * 2018-06-20 2019-01-04 北京市商汤科技开发有限公司 Image processing method and device, electronic equipment and storage medium
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device
CN110580754A (en) * 2018-06-11 2019-12-17 杭州海康威视系统技术有限公司 Face authentication method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105528549A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Figure recognition based photo encryption/decryption method and system and mobile terminal
CN105550592A (en) * 2015-12-09 2016-05-04 上海斐讯数据通信技术有限公司 Face image protection method and system and mobile terminal
CN105957001A (en) * 2016-04-18 2016-09-21 深圳感官密码科技有限公司 Privacy protecting method and privacy protecting device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105528549A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Figure recognition based photo encryption/decryption method and system and mobile terminal
CN105550592A (en) * 2015-12-09 2016-05-04 上海斐讯数据通信技术有限公司 Face image protection method and system and mobile terminal
CN105957001A (en) * 2016-04-18 2016-09-21 深圳感官密码科技有限公司 Privacy protecting method and privacy protecting device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor
CN108989736B (en) * 2017-06-05 2021-07-20 中兴通讯股份有限公司 Multimedia resource encryption method, device, system, storage medium and processor
CN107703965A (en) * 2017-10-13 2018-02-16 翔升(上海)电子技术有限公司 Control the method and system of Unmanned Aerial Vehicle Data transmission
CN107943925A (en) * 2017-11-21 2018-04-20 华中师范大学 Fuzzy method for individual information in privacy information issue of anonymity system
CN107943925B (en) * 2017-11-21 2021-06-01 华中师范大学 Fuzzification method for individual information in anonymous private information publishing system
CN110580754A (en) * 2018-06-11 2019-12-17 杭州海康威视系统技术有限公司 Face authentication method, device and system
CN109145707A (en) * 2018-06-20 2019-01-04 北京市商汤科技开发有限公司 Image processing method and device, electronic equipment and storage medium
CN109145707B (en) * 2018-06-20 2021-09-14 北京市商汤科技开发有限公司 Image processing method and device, electronic equipment and storage medium
CN108961302A (en) * 2018-07-16 2018-12-07 Oppo广东移动通信有限公司 Image processing method, device, mobile terminal and computer readable storage medium
CN109118454A (en) * 2018-08-30 2019-01-01 北京旷视科技有限公司 Image processing method, device, system, computer readable storage medium
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device

Similar Documents

Publication Publication Date Title
CN106657606A (en) Photograph processing method, device and terminal
CN106341817A (en) Access control system, access control method, mobile terminals and access server
CN105160264B (en) Photo encryption device and method
CN106817377A (en) A kind of data encryption device, decryption device and method
CN106453056A (en) Mobile terminal and method for safely sharing picture
CN105099669A (en) Recording encryption and decryption method and device
CN106570945A (en) Terminal, check-in machine and check-in method
CN107360214A (en) A kind of message push processing method, message sink processing method and processing device
CN104820797B (en) Using the management method and device of account
CN105101187A (en) Method and system for processing encrypted information
CN106850080A (en) The sending method and mobile terminal of a kind of associated person information
CN105095705B (en) A kind of information processing method and device
CN107133508A (en) Application management method and mobile terminal
CN106791016A (en) A kind of photographic method and terminal
CN106454842A (en) Method for preventing disturbance of pseudo base stations and terminal
CN106548081A (en) A kind of end message display packing and device
CN106657950A (en) Projection device management device, method and projection data sharing device
CN105282155A (en) Authority control method, device and system for interaction among terminals
CN106790126A (en) A kind of method of the account mandate of application program, device and terminal
CN106792644A (en) Mobile terminal, server and information processing method
CN106131318A (en) A kind of incoming information hidden method and device
CN106650347A (en) Synchronous unblocking method, device and terminals
CN105184131B (en) A kind of apparatus and method for carrying out unlocking screen by connecting WI FI
CN106529353A (en) Method and apparatus for performing anti-eavesdropping processing on key input information
CN106604271A (en) Mobile terminal and message check method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication