CN107133603A - Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking - Google Patents

Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking Download PDF

Info

Publication number
CN107133603A
CN107133603A CN201710376316.4A CN201710376316A CN107133603A CN 107133603 A CN107133603 A CN 107133603A CN 201710376316 A CN201710376316 A CN 201710376316A CN 107133603 A CN107133603 A CN 107133603A
Authority
CN
China
Prior art keywords
fingerprint
fingerprint information
preset
picture
processed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710376316.4A
Other languages
Chinese (zh)
Inventor
徐晓利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710376316.4A priority Critical patent/CN107133603A/en
Publication of CN107133603A publication Critical patent/CN107133603A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • G06V40/1376Matching features related to ridge properties or fingerprint texture
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • G06V40/1359Extracting features related to ridge properties; Determining the fingerprint type, e.g. whorl or loop

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of method for preventing fingerprint from leaking, it includes:Judge in pending picture with the presence or absence of the finger print information with preset fingerprint information matches;When there is the finger print information of the presupposed information matching in the pending picture, the pixel value of the finger print information is obtained;When the pixel value of the finger print information is more than preset security value, anti-leak processing is carried out to the finger print information.The invention also discloses a kind of mobile terminal and computer-readable recording medium.The present invention realizes the screening to pending picture; it is determined that required processing includes the picture of protected finger print information; and then pair picture determined carries out anti-leak and handled to realize the protection to user fingerprints information, reaches the purpose for preventing that user fingerprints information from being leaked by social networks.Also, the screening by preset fingerprint information and pixel value to pending picture, reduces the quantity to pending picture processing, and then improve the efficiency of fingerprint anti-leak processing.

Description

Method for preventing fingerprint leakage, mobile terminal and computer readable storage medium
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to a method for preventing fingerprint leakage, a mobile terminal, and a computer-readable storage medium.
Background
With the popularization of networks, the life of modern people is closely related to the networks. The explosion of various social networks has also led to people becoming accustomed to sharing their photos on various social networks. In this huge network world, there are still many potential lawbreakers who conduct criminal activities by stealing the personal information of others. For example, various gestures may be attached to a user when the user takes a self-portrait, and fingerprint information of the user may be clearly captured through shooting by a mobile phone camera; when the user selects to share on social networks such as WeChat and microblog, fingerprint information of the user can be leaked through the social networks.
At present, fingerprint identification technology is widely used, and fingerprint information of a user can be collected through fingerprint identification technologies such as picture identification and the like. Lawbreakers can easily implement criminal activities such as stealing of personal information and personal property of users by acquiring the personal information of the users by identifying the fingerprint information of the users in the pictures and imitating the fingerprints of the users. A picture which is released and contains personal fingerprint information enables a plurality of lawbreakers who intend to steal the personal information of others by acquiring the fingerprint information to take advantage of the opportunity. Therefore, when a user issues a photo including personal fingerprint information, the user may be given a potential risk of fingerprint information leakage.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a method for preventing fingerprint leakage, a mobile terminal and a computer readable storage medium, aiming at solving the technical problem of fingerprint information leakage caused by a photo when a user issues the photo.
To achieve the above object, the present invention provides a method for preventing leakage of a fingerprint, comprising the steps of:
judging whether fingerprint information matched with preset fingerprint information exists in the picture to be processed;
when fingerprint information matched with the preset information exists in the picture to be processed, acquiring a pixel value of the fingerprint information;
and when the pixel value of the fingerprint information is larger than a preset safety value, performing anti-leakage treatment on the fingerprint information.
In one embodiment, the step of performing leakage prevention processing on the fingerprint information includes:
acquiring the number of pixel points of each fingerprint texture in the fingerprint information based on the picture to be processed;
acquiring the fingerprint texture with the maximum number of the pixel points in the fingerprint texture based on the number of the pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points.
In an embodiment, the step of adjusting the curvature of the fingerprint texture with the largest number of pixel points includes:
acquiring a starting point coordinate and an end point coordinate of the fingerprint texture with the largest number of pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the maximum number of pixel points.
In an embodiment, the step of adjusting the curvature of the fingerprint texture with the largest number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points includes:
acquiring a transverse intercept and a vertical intercept corresponding to the starting point coordinate and the end point coordinate;
calculating a target slope according to the transverse intercept, the vertical intercept and a preset line segment bending angle;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the target slope.
In one embodiment, the step of performing leakage prevention processing on the fingerprint information includes:
acquiring corresponding adjacent second pixel points of each first pixel point based on each first pixel point corresponding to the fingerprint information in the picture to be processed;
acquiring a first RGB gain value of the second pixel point;
calculating a second RGB gain value based on the first RGB gain value and a weight value corresponding to the first RGB gain value;
and adjusting the RGB gain value of each first pixel point based on the second RGB gain value.
In an embodiment, before the step of determining whether there is fingerprint information matching preset fingerprint information in the picture to be processed, the method for preventing fingerprint leakage further includes:
judging the operated state of the photo;
and when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, determining the photo to be a to-be-processed photo.
In an embodiment, the step of determining whether there is fingerprint information matching with preset fingerprint information in the to-be-processed picture includes:
acquiring the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information;
and determining whether the matching degree is greater than a preset matching degree, wherein when the matching degree is greater than the preset matching degree, it is determined that fingerprint information matched with preset fingerprint information exists in the picture to be processed.
In an embodiment, before the step of determining whether there is fingerprint information matching preset fingerprint information in the disconnected pending picture, the method for preventing fingerprint leakage further includes:
updating the detected detection times of the fingerprint information when the fingerprint information is detected;
and updating the preset fingerprint information based on the fingerprint information when the detection times are greater than preset times.
In addition, to achieve the above object, the present invention also provides a mobile terminal, including: the fingerprint leakage prevention method comprises a memory, a processor and a program for preventing fingerprint leakage, wherein the program for preventing fingerprint leakage is stored in the memory and can run on the processor, and when the program for preventing fingerprint leakage is executed by the processor, the steps of the method for preventing fingerprint leakage are realized.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium having a profit computation program stored thereon, the profit computation program implementing the profit computation method according to any one of the above steps when executed by a processor.
The method comprises the steps of judging whether fingerprint information matched with preset fingerprint information exists in a picture to be processed or not, then obtaining a pixel value of the fingerprint information when the fingerprint information matched with the preset information exists in the picture to be processed, and finally performing anti-leakage processing on the fingerprint information when the pixel value of the fingerprint information is larger than a preset safety value, so that the picture to be processed is screened, the picture including protected fingerprint information to be processed is determined, the determined picture is subjected to anti-leakage processing to protect the fingerprint information of a user, and the purpose of preventing the fingerprint information of the user from being leaked through a social network is achieved. Moreover, the number of the to-be-processed pictures is reduced by screening the to-be-processed pictures through the preset fingerprint information and the pixel values, and the efficiency of fingerprint anti-leakage processing is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a diagram of a communication network system architecture according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a first embodiment of a method for preventing fingerprint leakage according to the present invention;
FIG. 4 is a diagram illustrating a to-be-processed picture according to an embodiment of a method for preventing fingerprint leakage;
FIG. 5 is a flowchart illustrating a process of leakage prevention for the fingerprint information according to a second embodiment of the method for preventing leakage of a fingerprint of the present invention;
fig. 6 is a schematic view of a refining process of the step of adjusting the curvature of the fingerprint texture with the maximum number of the adjustment pixels for the finger according to the third embodiment of the method for preventing fingerprint leakage of the present invention;
fig. 7 is a schematic view of a refining process of the step of adjusting the curvature of the fingerprint texture with the largest number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points in the fourth embodiment of the method for preventing fingerprint leakage of the present invention;
FIG. 8 is a diagram illustrating fingerprint information matched with predetermined fingerprint information according to an embodiment of a method for preventing fingerprint leakage;
FIG. 9 is a schematic diagram of fingerprint information point fetching of FIG. 8;
FIG. 10 is a flowchart illustrating a process of leakage prevention for the fingerprint information according to a fifth embodiment of the method for preventing leakage of fingerprints of the present invention;
FIG. 11 is a flowchart illustrating a sixth embodiment of a method for preventing fingerprint leakage according to the present invention;
fig. 12 is a flowchart illustrating a detailed process of the step of determining whether there is fingerprint information matching the preset fingerprint information in the to-be-processed picture according to the seventh embodiment of the method for preventing fingerprint leakage of the present invention;
fig. 13 is a flowchart illustrating an eighth embodiment of a method for preventing fingerprint leakage according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex-Long Term Evolution), and TDD-LTE (Time Division duplex-Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial radio access Network) 202, an EPC (Evolved packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving GateWay) 2034, a PGW (PDN GateWay) 2035, and a PCRF (Policy and charging rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above-mentioned mobile terminal hardware structure and communication network system, various embodiments of the present invention are proposed.
Referring to fig. 3, fig. 3 is a flowchart illustrating a first embodiment of a method for preventing fingerprint leakage according to the present invention.
In this embodiment, the method of preventing fingerprint leakage includes:
step S1000, judging whether fingerprint information matched with preset fingerprint information exists in the picture to be processed;
in this embodiment, when a user selects to publish or send a certain photo, the photo is a to-be-processed photo; and then judging whether the picture to be processed comprises fingerprint information, if so, extracting the fingerprint information in the picture to be processed, and judging whether the fingerprint information and preset fingerprint information reach a certain matching degree. The preset fingerprint information can be set by a person, or the detected times reach the fingerprint information of a preset time threshold value; when the matching degree of the fingerprint information included in the picture to be processed and the preset fingerprint information is greater than the preset matching degree, successful matching is indicated, namely the fingerprint information matched with the preset fingerprint information exists in the picture to be processed.
For example, a user takes a personal photo, and when the user chooses to publish or send the photo, the photo is determined to be a pending photo. If a certain finger of the user is included in the photo, the fingerprint information on the finger can be clearly detected. At this time, corresponding matching degree detection is carried out on the fingerprint information in the photo and preset fingerprint information in a mobile phone of the user, and when the detected matching degree is greater than the preset matching degree, leakage prevention processing needs to be carried out on the fingerprint information in the photo so as to prevent the fingerprint information from being leaked.
Before step S1000, the user may also enter fingerprint information that is desired to be protected in the device used in advance. For example, if a user does not enter fingerprint information to be protected in advance on his mobile phone, the mobile phone may detect the number of times that a certain fingerprint information appears correspondingly; when the mobile phone detects that the frequency of certain fingerprint information is greater than the frequency threshold value set up before, the fingerprint information can be updated to a protected object, namely, to preset fingerprint information. Specifically, if a user performs fingerprint unlocking or fingerprint payment for the first time by using a certain fingerprint, the device used by the user can record the fingerprint; and when the user uses the fingerprint for unlocking for the second time, updating the use times of the fingerprint, and sequentially updating the detected times of the fingerprint information when the fingerprint information appears later. And when the detected times of the fingerprint are more than a preset time threshold value, updating the fingerprint information into preset fingerprint information.
In this embodiment, by performing matching degree detection on the fingerprint information in the picture to be processed and the preset fingerprint information, pictures meeting the condition of performing leak-proof processing can be screened out, so as to reduce the workload of processing the picture to be processed.
Step S2000, when the fingerprint information matched with the preset information exists in the picture to be processed, acquiring a pixel value of the fingerprint information;
fingerprint information of a plurality of different fingers may be generally included in the picture to be processed, wherein one or more pieces of fingerprint information are matched with preset fingerprint information; or the fingerprint information included in the picture to be processed is not complete, and only includes fingerprint information of a certain finger part, and the fingerprint information of the certain finger part is fingerprint information matched with the preset fingerprint information. Therefore, for a picture to be processed including fingerprint information, the fingerprint information in the picture to be processed needs to be determined. The fingerprint information matched with the preset fingerprint information exists in the picture to be processed, which means that the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information reaches a preset matching threshold value.
In this embodiment, the fingerprint information in the picture to be processed is matched with the preset fingerprint information one by comparing the fingerprint information in the picture to be processed with the preset fingerprint information. When the fingerprint information in the picture to be processed and the preset fingerprint information reach a preset matching threshold value, the matching is successful, namely the fingerprint information matched with the preset fingerprint information exists in the picture to be processed.
For example, a user takes a picture on a cell phone, in which fingerprint information of two fingers of the user exists. The fingerprint information of the two fingers needs to be matched with the fingerprint information preset in the mobile phone of the user one by one. If there are two pieces of preset fingerprint information in the user mobile phone, the two pieces of preset fingerprint information are respectively a preset fingerprint information one and a preset fingerprint information two, and the preset matching threshold values corresponding to the two pieces of preset fingerprint information are sixty percent. After comparing the fingerprint information in the picture to be processed with the two pieces of preset fingerprint information one by one, determining that the matching degree of the fingerprint information of one finger in the picture with the first piece of preset fingerprint information is eighty percent, and the matching degree of the fingerprint information of the finger with the second piece of preset fingerprint information is zero, so that the matching of the fingerprint information of the finger with the first piece of preset fingerprint information is successful. And if the matching degree of the fingerprint information of the other finger with the preset fingerprint information I and the preset fingerprint information II is zero, the matching failure is indicated. And subsequently, only the fingerprint information of the successfully matched finger needs to be processed.
In this embodiment, after the matching is successful, the pixel value of the fingerprint information in the picture to be processed is obtained. Wherein the pixel value indicates that the fingerprint information includes the number of pixels. And judging the pixel value by acquiring the pixel value of the fingerprint information, and judging whether the pixel value is above a preset pixel safety value.
And S3000, performing anti-leakage treatment on the fingerprint information when the pixel value of the fingerprint information is larger than a preset safety value.
In this embodiment, the preset security value is a picture pixel security value, and the picture pixel security value can be set reasonably or set by a user according to requirements.
In fact, not all picture leaks for which fingerprint information exists are dangerous, and only the picture leak from which a fingerprint can be extracted may cause damage to the user. When fingerprint information matched with the preset fingerprint information exists in the picture to be processed and the pixel value of the picture to be processed is higher than the preset safety value, the fingerprint information of the user person can be clearly extracted from the picture, and then the fingerprint information in the picture to be processed needs to be subjected to leakage-proof processing.
In the present embodiment, the fingerprint information can be subjected to the leakage prevention process by the fingerprint information local feature changing process or the fingerprint information blurring process.
Specifically, the fingerprint information local feature changing process is to protect the fingerprint information of the user by changing the local feature of the protected fingerprint information in the picture to be processed. The protected fingerprint information in the picture to be processed is fingerprint information, the matching degree of the fingerprint information and preset fingerprint information reaches a preset matching threshold value, and the pixel value of the fingerprint information is more than a preset safety value; the local features can be any continuous section or multiple sections of fingerprint textures in the fingerprint information, and the number of the fingerprint textures can be obtained according to the number of the fingerprint information pixel points in the picture to be processed in proportion. Then the slope between any two points of a certain section of continuous fingerprint texture can be obtained through calculation, the curvature of the section of fingerprint texture can be changed according to the obtained slope, and similarly, the curvatures of the rest of the obtained fingerprint textures can be changed in sequence. The change of the local characteristics of the protected fingerprint information in the picture to be processed is realized, so that the protected fingerprint information is protected.
The fingerprint information fuzzy processing means that the protected fingerprint information is wholly disabled by fuzzy the wholly protected fingerprint information, so that the purpose of preventing the protected fingerprint information from being leaked is achieved. Specifically, the target RGB gain value of each pixel point is calculated by counting the pixel points of the protected fingerprint information and obtaining the RGB gain value of the adjacent pixel point corresponding to each pixel point. The gain value of each pixel point is adjusted to be the target RGB gain value, so that the RGB gain value of the whole protected fingerprint information pixel point changes, and the protected fingerprint information becomes fuzzy and difficult to identify visually.
Referring to fig. 4, fingerprint information of two fingers of a user is included in fig. 4. The matching degree of the two fingerprint information is detected with the preset fingerprint information respectively, the matching degree of the fingerprint picture 2 and the preset fingerprint information is one hundred percent, and the matching degree of the fingerprint picture 1 and the preset fingerprint information is zero, so that the pixel point statistical processing is only needed to be carried out on the fingerprint picture 2. And acquiring the pixel value of the fingerprint picture 2, and determining to perform anti-leakage processing on the fingerprint picture if the pixel value of the fingerprint picture is above a preset pixel value. When the anti-leakage treatment is carried out, a user can optionally select to carry out fingerprint local characteristic changing treatment or fingerprint information blurring treatment.
The embodiment is explained with reference to the relevant modules in fig. 1, the fingerprint information in the picture to be processed in the memory is extracted by the picture processor, and the matching degree of the fingerprint information and the preset fingerprint information is compared in the picture processor; and when the fingerprint information matched with the preset information exists in the picture to be processed, acquiring the pixel value of the fingerprint information through a processor. Then, the pixel value of the fingerprint information is compared with a preset safety value in the processor, and when the pixel value of the fingerprint information is larger than the preset safety value, the anti-leakage processing is carried out on the fingerprint information in the processor. And finally, returning the pictures subjected to the anti-leakage processing to the memory.
The method for preventing fingerprint leakage provided by this embodiment includes determining whether fingerprint information matched with preset fingerprint information exists in a to-be-processed picture, acquiring a pixel value of the fingerprint information when the fingerprint information matched with the preset information exists in the to-be-processed picture, performing leakage prevention processing on the fingerprint information when the pixel value of the fingerprint information is greater than a preset safety value, screening the to-be-processed picture through the pixel value of the fingerprint information, determining the picture including protected fingerprint information to be processed, and performing leakage prevention processing on the determined picture to protect the fingerprint information of a user, so as to achieve the purpose of preventing personal fingerprint information of the user from leaking through a social network. Moreover, the number of the to-be-processed pictures is reduced by screening the to-be-processed pictures through the preset fingerprint information and the pixel values, and the efficiency of fingerprint anti-leakage processing is improved.
A second embodiment of the fingerprint information leakage prevention method of the present invention is proposed based on the first embodiment, and referring to fig. 5, in this embodiment, step S3000 includes:
step S3100, acquiring the number of pixel points of each fingerprint texture in the fingerprint information based on the picture to be processed;
in this embodiment, the fingerprint information in the picture to be processed has a plurality of different fingerprint textures, and the number of pixel points included in the picture by the different fingerprint textures is also different. Therefore, the fingerprint texture with the largest number of pixel points can be determined by obtaining the number of the pixel points of each fingerprint texture corresponding to the fingerprint information in the picture to be processed and then comparing the number of the pixel points of each fingerprint texture. Step S3200, based on the number of the pixel points, acquiring the fingerprint texture with the maximum number of the pixel points in the fingerprint texture;
in this embodiment, the number of the pixel points corresponding to each fingerprint texture is compared by the number of the pixel points corresponding to each acquired fingerprint texture, so as to determine the fingerprint texture with the largest number of the pixel points in each fingerprint texture.
And S3300, adjusting the curvature of the fingerprint texture with the largest number of pixel points.
In this embodiment, the curvature of the fingerprint texture is adjusted according to the obtained fingerprint texture with the largest number of pixel points; the local characteristics of the original fingerprint information are changed in such a way, so that the fingerprint information of the user is protected by losing the identification degree of the original fingerprint. The curvature of the fingerprint texture with the largest number of pixel points can be adjusted by acquiring coordinates of any two points on the fingerprint texture with the largest number of pixel points, calculating a target slope according to the coordinates of the two points, and adjusting the curvature of the fingerprint texture with the largest number of pixel points according to the target slope; or after the coordinates of any two points are obtained, the fingerprint texture between the two points is adjusted to be a straight line, and the local characteristics of the original fingerprint information are also changed, so that the original fingerprint loses the identification degree to protect the fingerprint information of the user.
According to the method for preventing fingerprint leakage, the number of pixel points of each fingerprint texture in the fingerprint information is acquired based on the picture to be processed, then the fingerprint texture with the largest number of pixel points in the fingerprint texture is acquired based on the number of the pixel points, and then the curvature of the fingerprint texture with the largest number of pixel points is adjusted, so that the fingerprint texture with the largest number of pixel points in the fingerprint information is acquired, and the object with the local characteristics changed by the protected fingerprint information is determined to be the fingerprint texture with the largest number of pixel points; the change of the local characteristics of the protected fingerprint information is realized by changing the curvature of the fingerprint texture with the largest number of the pixel points, so that the fingerprint information can be accurately prevented from being leaked out through a social network.
A third embodiment of the fingerprint information leakage prevention method of the present invention is proposed based on the second embodiment, and referring to fig. 6, in this embodiment, step S3300 includes:
step S3310, obtaining the starting point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points;
in this embodiment, the fingerprint texture with the largest number of pixel points, that is, the coordinates of the starting point and the end point of the fingerprint texture, that is, the coordinates corresponding to the starting point and the end point of the fingerprint texture with the largest number of pixel points are obtained, where the starting point is denoted by a and the end point is denoted by B. From the start point a and the end point B of the fingerprint texture, the x-axis and y-axis positions corresponding to A, B, respectively, can be obtained.
Step S3320, adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the maximum number of pixel points.
In the present embodiment, from the start point coordinate a and the end point coordinate B, data of x-axis and y-axis corresponding to the two points A, B, respectively, can be obtained. By calculating the formula, the degree of curvature of the fingerprint texture between the two points can be changed A, B.
Specifically, a target slope can be calculated through a starting point coordinate and an end point coordinate, and then the curvature of the fingerprint texture with the largest number of pixel points is adjusted according to the target slope. The calculation formula of the target slope is as follows:
wherein,for target slope, | AB | is the transverse intercept, | KA-KBAnd | is the longitudinal intercept.
According to the method for preventing the fingerprint leakage, the starting point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points are obtained, the curvature of the fingerprint texture with the largest number of pixel points is adjusted according to the starting point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points, the curvature of the fingerprint texture with the largest number of pixel points can be accurately adjusted according to the starting point coordinate and the end point coordinate, and therefore leakage prevention processing can be accurately performed on fingerprint information, and the protected fingerprint information is prevented from being leaked out through a social network.
Based on the third embodiment, a fourth embodiment of the method for preventing fingerprint information leakage of the present invention is proposed, and referring to fig. 7, in this embodiment, step S3320 includes:
step S3321, acquiring a transverse intercept and a vertical intercept corresponding to the starting point coordinate and the end point coordinate;
in this embodiment, from the obtained coordinates of the two points A, B, x-axis data and y-axis data corresponding to the a point and x-axis data and y-axis data corresponding to the B point can be obtained, respectively. From the x-axis data and the y-axis data obtained at A, B, the transverse intercept and the longitudinal intercept of the two points can be calculated respectively. The transverse intercept may be expressed as | AB |, representing the absolute value of the difference between the abscissa of point A and the abscissa of point B, and the longitudinal intercept may be expressed as | KA-KBAnd | represents the absolute value of the difference between the ordinate of the point a and the ordinate of the point B.
Step S3322, calculating a target slope according to the transverse intercept, the vertical intercept and a preset line segment bending angle;
in this embodiment, the user can preset or customize any angle value for changing the fingerprint texture between A, B two points, which is represented as α0
Calculating to obtain the target slope according to the formula; wherein | AB | is a transverse intercept, | KA-KBL is the longitudinal intercept, α0For any angle value, the calculated curvature is
And step S3323, adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the target slope.
Specifically, a straight line with a slope as the target slope may be drawn through the starting point a or the end point B according to the calculated target slope. And taking any point in the fingerprint texture with the largest number of pixel points as a circle center O, and taking OA as a radius to pass through the point A or taking OB as a radius to pass through the point B to make a circle. And adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the angle corresponding to the arc line of the intersection point of the obtained circle and the straight line. By adjusting the curvature of the fingerprint texture with the largest number of pixel points, the local characteristics of the fingerprint information in the picture to be processed are changed, and the fingerprint information which needs to be protected by the user is protected.
As shown in fig. 8 and 9, in fig. 8, the fingerprint texture of the highest pixel of the fingerprint information is texture a, any two points A, B on the texture a are taken to obtain A, B coordinates, and a difference is calculated to obtain A, B a horizontal intercept | AB | and a vertical intercept | K | between the two pointsA-KBAngle α with arbitrary change0Calculating the slope according to the formulaTexture a curvature is adjusted as shown in fig. 9.
According to the method for preventing the fingerprint leakage, the transverse intercept and the vertical intercept corresponding to the starting point coordinate and the end point coordinate are obtained, the target slope is calculated according to the transverse intercept, the vertical intercept and the preset line segment bending angle, then the curvature of the fingerprint texture with the largest number of pixel points is adjusted according to the target slope, the curvature of the fingerprint texture with the largest number of pixel points can be accurately adjusted according to the target slope, so that the local characteristics of the protected fingerprint information are changed, further the fingerprint information can be accurately subjected to leakage prevention processing, and the protected fingerprint information is prevented from being leaked out through a social network.
A fifth embodiment of the fingerprint information leakage prevention method of the present invention is proposed based on the first embodiment, and referring to fig. 10, in this embodiment, step S3000 includes:
step S3400, based on each first pixel point corresponding to the fingerprint information in the picture to be processed, acquiring a second pixel point corresponding to each first pixel point and adjacent to each first pixel point;
in this embodiment, the fingerprint information in the picture to be processed is subjected to the blurring processing. The fuzzy processing adopts a Gaussian algorithm, and the algorithm takes the average value of peripheral pixels of each pixel D of the fingerprint information in the picture to be processed, so that the D loses the characteristics of the pixels, and the fuzzy effect is achieved. Specifically, in the picture to be processed, the included fingerprint information corresponds to different pixel points respectively. The corresponding pixel points in the fingerprint information can be represented as first pixel points, and the adjacent pixel points of each first pixel point can be represented as second pixel points. In a picture to be processed, each pixel point of fingerprint information is represented by three basic color channels of R/G/B (Red/Green/Blue ). The gain value of each pixel is N (for example, N is 8) bit quantization, that is, the range of R/G/B gain value of each pixel is 0 to 28-1. The corresponding RGB gain values can be obtained by determining the first pixel point and the second pixel point respectively.
Step S3500, obtaining a first RGB gain value of the second pixel point;
in this embodiment, each pixel has its corresponding RGB gain value, and the target RGB gain value of the first pixel can be calculated by obtaining the RGB gain value of the pixel adjacent to the first pixel, i.e., the second pixel.
Step S3600, calculating a second RGB gain value based on the first RGB gain value and a weight value corresponding to the first RGB gain value. In this embodiment, each weight value corresponding to the first RGB gain value is multiplied by each obtained first RGB gain value corresponding to the second pixel point. Wherein, each weight value corresponding to each first RGB gain value can be calculated according to a Gaussian function. And adding the results obtained by multiplying the first RGB gain values, and finally expressing the added value as a second RGB gain value of the first pixel point. Specifically, when the weight values corresponding to the first RGB gain values are the same, the calculated second RGB gain value is the average value.
Step S3700, adjusting the RGB gain value of each of the first pixel points based on the second RGB gain value.
In this embodiment, the RGB gain value of the first pixel point obtained before is adjusted to be the corresponding second RGB gain value, and specifically, the RGB gain value obtained by calculating through the RGB gain value of the pixel point adjacent to the first pixel point is the second RGB gain value corresponding to the first pixel point. The fingerprint information in the picture to be processed can be integrally fuzzy by adjusting the RGB gain value of the first pixel point, so that the fingerprint information is integrally lost, and the purpose of preventing the protected fingerprint information from being leaked is achieved.
In the method for preventing fingerprint leakage according to this embodiment, each first pixel point corresponding to an adjacent second pixel point is obtained based on each first pixel point corresponding to fingerprint information in the picture to be processed, then, a first RGB gain value of the second pixel point is obtained, a second RGB gain value is calculated based on the first RGB gain value, then adjusting the RGB gain value of each first pixel point based on the second RGB gain value, realizing the fuzzy processing of the protected fingerprint information in the picture to be processed, leading the protected fingerprint information to lose the characteristics and be unable to be identified, the fingerprint information of the user will not be leaked out after processing by the user publishing a photo including the fingerprint information in the social network, and then can be accurate carry out anti-leakage processing to fingerprint information to prevent that protected fingerprint information from leaking away through social network.
Based on the above-described embodiment, a sixth embodiment of the fingerprint leakage prevention method of the present invention is proposed, and referring to fig. 11, in this embodiment, before step S1000, the method of preventing fingerprint leakage further includes:
step S4000, judging the operated state of the photo;
in the present embodiment, the operated state of the photo refers to the operation behavior of the photo by the user. And after the user sends a selection issuing or sending instruction, judging whether the fingerprint information matched with the preset fingerprint information exists in the photo or not, and judging the operation state of the user. If the user's photo is not for distribution on the network, the photo need not be processed.
And S5000, when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, determining the photo to be a to-be-processed picture.
In this embodiment, before the step of determining whether the fingerprint information matching the preset fingerprint information exists in the picture to be processed, the operation state of the user on the picture is determined. When a user selects to publish or send a photo, the photo can be represented as a picture to be processed. The state to be issued or the state to be sent represents an operation state when a user sends an issuing or sending instruction; the operation state when the user sends the instruction of issuing the picture means that the operated state of the photo is the state to be issued, and the operation state when the user sends the instruction of sending the picture means that the operated state of the photo is the state to be sent.
According to the method for preventing the fingerprint leakage, the operated state of the photo is judged, and then when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, the photo is determined to be the to-be-processed picture, so that the photos under different operation states are screened, and only when the operated state of the user is the to-be-released state or the to-be-sent state, the photo is determined to be the to-be-processed picture, the range of the anti-leakage processing of the photo is narrowed, the number of the pictures needing to be subjected to the anti-leakage processing is reduced, and therefore the efficiency of the fingerprint anti-leakage processing.
Based on the above-described embodiment, a seventh embodiment of the fingerprint leakage prevention method of the present invention is proposed, and referring to fig. 12, in this embodiment, step S1000 includes:
step S1100, acquiring the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information;
in this embodiment, before the step of determining whether the fingerprint information matching the preset fingerprint information exists in the picture to be processed, after determining that the picture is the picture to be processed, the fingerprint information in the picture to be processed is acquired. If a certain user selects to upload a photo and the fingerprint information of the user exists in the photo, the fingerprint information in the photo needs to be detected and compared with the fingerprint information preset in the mobile phone of the user. And determining whether the fingerprint information in the picture to be processed needs anti-leakage processing or not by judging the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information.
Step S1200, determining whether the matching degree is greater than a preset matching degree, wherein when the matching degree is greater than the preset matching degree, it is determined that the fingerprint information matched with the preset fingerprint information exists in the picture to be processed.
In this embodiment, the matching degree is represented as a similarity between the fingerprint information in the picture to be processed and the preset fingerprint information. When the fingerprint information in the picture to be processed is compared with the preset fingerprint information and the matching degree of the fingerprint information in the picture to be processed is higher than the preset matching degree threshold value, the fingerprint information matched with the preset fingerprint information exists in the picture to be processed, and anti-leakage processing is conducted on the fingerprint information in the picture to be processed.
According to the method for preventing the fingerprint leakage, the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information is obtained, and then whether the matching degree is greater than the preset matching degree is determined, wherein when the matching degree is greater than the preset matching degree, the fingerprint information matched with the preset fingerprint information exists in the picture to be processed, the judgment of the fingerprint information in the picture to be processed is achieved, the picture to be processed which does not reach the matching threshold value does not need to be subjected to the next pixel safety value comparison operation, the range of performing the leakage prevention processing on the fingerprint information in the picture to be processed is further reduced, the number of pictures which need to be subjected to the leakage prevention processing is reduced, and therefore the efficiency of the fingerprint leakage prevention processing is improved.
Based on the above-mentioned embodiment, an eighth embodiment of the fingerprint leakage prevention method of the present invention is proposed, and referring to fig. 13, in this embodiment, before step S1000, the method further includes:
step S6000, when fingerprint information is detected, updating the detection times of the detected fingerprint information;
in this embodiment, when a device used by a user receives a picture including fingerprint information or the user performs fingerprint unlocking, fingerprint payment, and the like, the number of occurrences of the received fingerprint information is updated. If the detected fingerprint information is detected by the equipment used by the user before, updating the fingerprint information times; if the detected fingerprint information is not detected in the previous device used by the user, the fingerprint information is stored newly, and then the fingerprint information is updated sequentially according to the detected times. Besides, as in the device used by the user, fingerprint information is detected to exist in the picture stored by the device, and is also recorded; when the fingerprint information is detected again, the number of times the fingerprint information appears is updated, and the number of times the fingerprint information is detected is also sequentially updated when the fingerprint information appears later.
And S7000, when the detection times are larger than the preset times, updating the preset fingerprint information based on the fingerprint information.
In this embodiment, if a certain fingerprint information is detected currently and the detected number of times of the fingerprint information exceeds a preset number threshold, the fingerprint information may be represented as preset fingerprint information. Through the preset fingerprint information, when the to-be-processed picture is detected to include the fingerprint information, the matching degree of the fingerprint information in the to-be-processed picture and the preset fingerprint information can be judged, and therefore whether the fingerprint information matched with the preset fingerprint information exists in the to-be-processed picture or not is determined.
According to the method for preventing the fingerprint leakage, when the fingerprint information is received, the detected times of the received fingerprint information are updated, then when the detected times are larger than the preset times, the preset fingerprint information is updated based on the fingerprint information, the detection of the preset fingerprint information is realized, besides the user can self-define the preset fingerprint information, the fingerprint times used by the user can be automatically detected by equipment used by the user, when the detected fingerprint times reach the preset times threshold value, the fingerprint information can be updated to the preset fingerprint information, the range of matching the fingerprint information in the picture to be processed with the preset fingerprint information is expanded, and the fingerprint information of the user is protected more comprehensively.
In addition, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes: a memory, a processor, and a fingerprint leakage prevention program stored on the memory and executable on the processor, the fingerprint leakage prevention program when executed by the processor performing the operations of:
judging whether fingerprint information matched with preset fingerprint information exists in the picture to be processed;
when fingerprint information matched with the preset information exists in the picture to be processed, acquiring a pixel value of the fingerprint information;
and when the pixel value of the fingerprint information is larger than a preset safety value, performing anti-leakage treatment on the fingerprint information.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring the number of pixel points of each fingerprint texture in the fingerprint information based on the picture to be processed;
acquiring the fingerprint texture with the maximum number of the pixel points in the fingerprint texture based on the number of the pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points.
Further, the program for preventing fingerprint leakage further realizes the following operations when executed by the processor:
acquiring a starting point coordinate and an end point coordinate of the fingerprint texture with the largest number of pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the maximum number of pixel points.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring a transverse intercept and a vertical intercept corresponding to the starting point coordinate and the end point coordinate;
calculating a target slope according to the transverse intercept, the vertical intercept and a preset line segment bending angle;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the target slope.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring corresponding adjacent second pixel points of each first pixel point based on each first pixel point corresponding to the fingerprint information in the picture to be processed;
acquiring a first RGB gain value of the second pixel point;
calculating a second RGB gain value based on the first RGB gain value and a weight value corresponding to the first RGB gain value;
and adjusting the RGB gain value of each first pixel point based on the second RGB gain value.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
judging the operated state of the photo;
and when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, determining the photo to be a to-be-processed photo.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information;
and determining whether the matching degree is greater than a preset matching degree, wherein when the matching degree is greater than the preset matching degree, it is determined that fingerprint information matched with preset fingerprint information exists in the picture to be processed.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
updating the detected detection times of the fingerprint information when the fingerprint information is detected;
and updating the preset fingerprint information based on the fingerprint information when the detection times are greater than preset times.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, on which a program for preventing fingerprint leakage is stored, where the program for preventing fingerprint leakage, when executed by a processor, implements the following operations:
judging whether fingerprint information matched with preset fingerprint information exists in the picture to be processed;
when fingerprint information matched with the preset information exists in the picture to be processed, acquiring a pixel value of the fingerprint information;
and when the pixel value of the fingerprint information is larger than a preset safety value, performing anti-leakage treatment on the fingerprint information.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring the number of pixel points of each corresponding fingerprint texture in the fingerprint information based on the picture to be processed;
acquiring the fingerprint texture with the maximum number of the pixel points in the fingerprint texture based on the number of the pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points.
Further, the program for preventing fingerprint leakage further realizes the following operations when executed by the processor:
acquiring a starting point coordinate and an end point coordinate of the fingerprint texture with the largest number of pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the maximum number of pixel points.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring a transverse intercept and a vertical intercept corresponding to the starting point coordinate and the end point coordinate;
calculating a target slope according to the transverse intercept, the vertical intercept and a preset line segment bending angle;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the target slope.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring corresponding adjacent second pixel points of each first pixel point based on each first pixel point corresponding to the fingerprint information in the picture to be processed;
acquiring a first RGB gain value of the second pixel point;
calculating a second RGB gain value based on the first RGB gain value and a weight value corresponding to the first RGB gain value;
and adjusting the RGB gain value of each first pixel point based on the second RGB gain value.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
judging the operated state of the photo;
and when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, determining the photo to be a to-be-processed photo.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
acquiring the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information;
and determining whether the matching degree is greater than a preset matching degree, wherein when the matching degree is greater than the preset matching degree, it is determined that fingerprint information matched with preset fingerprint information exists in the picture to be processed.
Further, the program for preventing fingerprint leakage further implements the following operations when executed by a processor:
updating the detected detection times of the fingerprint information when the fingerprint information is detected;
and updating the preset fingerprint information based on the fingerprint information when the detection times are greater than preset times.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A method of preventing leakage of a fingerprint, the method comprising:
judging whether fingerprint information matched with preset fingerprint information exists in the picture to be processed;
when fingerprint information matched with the preset information exists in the picture to be processed, acquiring a pixel value of the fingerprint information;
and when the pixel value of the fingerprint information is larger than a preset safety value, performing anti-leakage treatment on the fingerprint information.
2. The method of preventing fingerprint leakage according to claim 1, wherein said fingerprint information includes a plurality of fingerprint textures, said step of performing leakage prevention processing on said fingerprint information includes:
acquiring the number of pixel points of each fingerprint texture in the fingerprint information based on the picture to be processed;
acquiring the fingerprint texture with the maximum number of the pixel points in the fingerprint texture based on the number of the pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points.
3. The method for preventing fingerprint leakage according to claim 2, wherein said step of adjusting the curvature of the fingerprint texture with the largest number of pixels comprises:
acquiring a starting point coordinate and an end point coordinate of the fingerprint texture with the largest number of pixel points;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the maximum number of pixel points.
4. The method for preventing fingerprint leakage according to claim 3, wherein said step of adjusting the curvature of the fingerprint texture with the largest number of pixel points according to the start point coordinate and the end point coordinate of the fingerprint texture with the largest number of pixel points comprises:
acquiring a transverse intercept and a vertical intercept corresponding to the starting point coordinate and the end point coordinate;
calculating a target slope according to the transverse intercept, the vertical intercept and a preset line segment bending angle;
and adjusting the curvature of the fingerprint texture with the maximum number of pixel points according to the target slope.
5. The method of preventing fingerprint leakage according to claim 1, wherein said step of performing leakage prevention processing on said fingerprint information comprises:
acquiring corresponding adjacent second pixel points of each first pixel point based on each first pixel point corresponding to the fingerprint information in the picture to be processed;
acquiring a first RGB gain value of the second pixel point;
calculating a second RGB gain value based on the first RGB gain value and a weight value corresponding to the first RGB gain value;
and adjusting the RGB gain value of each first pixel point based on the second RGB gain value.
6. The method for preventing fingerprint leakage according to claim 1, wherein before the step of determining whether fingerprint information matching the preset fingerprint information exists in the picture to be processed, the method for preventing fingerprint leakage further comprises:
judging the operated state of the photo;
and when the operated state of the photo is judged to be the to-be-released state or the to-be-sent state, determining the photo to be a to-be-processed photo.
7. The method for preventing fingerprint leakage according to claim 1, wherein the step of determining whether fingerprint information matching with the preset fingerprint information exists in the picture to be processed comprises:
acquiring the matching degree of the fingerprint information in the picture to be processed and the preset fingerprint information;
and determining whether the matching degree is greater than a preset matching degree, wherein when the matching degree is greater than the preset matching degree, it is determined that fingerprint information matched with preset fingerprint information exists in the picture to be processed.
8. The method for preventing fingerprint leakage according to any one of claims 1 to 7, wherein before the step of interrupting whether fingerprint information matching preset fingerprint information exists in the picture to be processed, the method for preventing fingerprint leakage further comprises:
updating the detected detection times of the fingerprint information when the fingerprint information is detected;
and updating the preset fingerprint information based on the fingerprint information when the detection times are greater than preset times.
9. A mobile terminal, characterized in that the mobile terminal comprises: a memory, a processor and a program for preventing fingerprint leakage stored on the memory and executable on the processor, the program for preventing fingerprint leakage implementing the steps of the method for preventing fingerprint leakage according to any one of claims 1 to 8 when executed by the processor.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a program for preventing fingerprint leakage, which when executed by a processor implements the steps of the method for preventing fingerprint leakage according to any one of claims 1 to 8.
CN201710376316.4A 2017-05-24 2017-05-24 Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking Pending CN107133603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710376316.4A CN107133603A (en) 2017-05-24 2017-05-24 Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710376316.4A CN107133603A (en) 2017-05-24 2017-05-24 Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking

Publications (1)

Publication Number Publication Date
CN107133603A true CN107133603A (en) 2017-09-05

Family

ID=59732642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710376316.4A Pending CN107133603A (en) 2017-05-24 2017-05-24 Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking

Country Status (1)

Country Link
CN (1) CN107133603A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472848A (en) * 2018-10-29 2019-03-15 广东小天才科技有限公司 Picture processing method for preventing fingerprint information from being leaked and terminal equipment
JP2019074938A (en) * 2017-10-17 2019-05-16 Necプラットフォームズ株式会社 Device, system, method and program for communication relay
CN111782107A (en) * 2020-06-30 2020-10-16 联想(北京)有限公司 Information processing method, device, computer system and readable storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100097546A (en) * 2009-02-26 2010-09-03 (주)알에스넷 Fingerprint recognition device
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN104574452A (en) * 2013-10-10 2015-04-29 腾讯科技(深圳)有限公司 Generating method and device for window background
CN104765994A (en) * 2015-04-17 2015-07-08 努比亚技术有限公司 User identity recognition method and device
CN104778417A (en) * 2015-03-20 2015-07-15 惠州Tcl移动通信有限公司 Method and mobile terminal for preventing personal fingerprint information from leaking through photo
CN105426724A (en) * 2015-11-24 2016-03-23 上海斐讯数据通信技术有限公司 Electronic image encryption method and device, electronic image decryption method and device, and equipment
WO2016145624A1 (en) * 2015-03-18 2016-09-22 华为技术有限公司 Information processing method and mobile terminal
CN106127067A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of method of fileinfo anti-leak and mobile terminal
CN106250777A (en) * 2016-07-26 2016-12-21 合肥赛猊腾龙信息技术有限公司 In the leakage-preventing system of data, a kind of document fingerprint extracts and matching process
CN106295286A (en) * 2015-06-04 2017-01-04 联想移动通信软件(武汉)有限公司 A kind of encrypting fingerprint processing method, device and terminal
WO2017000829A1 (en) * 2015-07-02 2017-01-05 阿里巴巴集团控股有限公司 Method for checking security based on biological features, client and server
WO2017024667A1 (en) * 2015-08-11 2017-02-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and apparatus
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device
CN106547591A (en) * 2016-10-28 2017-03-29 珠海市魅族科技有限公司 The processing method of finger print information, processing meanss and terminal
CN106650381A (en) * 2016-12-29 2017-05-10 武汉轻工大学 Information encryption method and apparatus

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100097546A (en) * 2009-02-26 2010-09-03 (주)알에스넷 Fingerprint recognition device
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN104574452A (en) * 2013-10-10 2015-04-29 腾讯科技(深圳)有限公司 Generating method and device for window background
WO2016145624A1 (en) * 2015-03-18 2016-09-22 华为技术有限公司 Information processing method and mobile terminal
CN104778417A (en) * 2015-03-20 2015-07-15 惠州Tcl移动通信有限公司 Method and mobile terminal for preventing personal fingerprint information from leaking through photo
CN104765994A (en) * 2015-04-17 2015-07-08 努比亚技术有限公司 User identity recognition method and device
CN106295286A (en) * 2015-06-04 2017-01-04 联想移动通信软件(武汉)有限公司 A kind of encrypting fingerprint processing method, device and terminal
WO2017000829A1 (en) * 2015-07-02 2017-01-05 阿里巴巴集团控股有限公司 Method for checking security based on biological features, client and server
WO2017024667A1 (en) * 2015-08-11 2017-02-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and apparatus
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device
CN105426724A (en) * 2015-11-24 2016-03-23 上海斐讯数据通信技术有限公司 Electronic image encryption method and device, electronic image decryption method and device, and equipment
CN106127067A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of method of fileinfo anti-leak and mobile terminal
CN106250777A (en) * 2016-07-26 2016-12-21 合肥赛猊腾龙信息技术有限公司 In the leakage-preventing system of data, a kind of document fingerprint extracts and matching process
CN106547591A (en) * 2016-10-28 2017-03-29 珠海市魅族科技有限公司 The processing method of finger print information, processing meanss and terminal
CN106650381A (en) * 2016-12-29 2017-05-10 武汉轻工大学 Information encryption method and apparatus

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
JIN QI等: "A novel fingerprint matching method using a curvature-based minutia specifier", 《2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING》 *
MOHAMMED S. KHALIL等: "Fingerprint verification using fingerprint texture", 《2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT)》 *
史骏鹏: "面向版权保护和身份认证的指纹水印算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
张孝龙: "小儿指纹采集与图像处理研究", 《中国优秀硕士学位论文全文数据库 医药卫生科技辑》 *
朱道明等编著: "《建筑安防技术》", 31 January 2013, 上海:东华大学出版社 *
贺康: "隐私保护型指纹认证中的对齐和认证方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
陈小春: "基于指纹和冗余布线的版图数字水印方法研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019074938A (en) * 2017-10-17 2019-05-16 Necプラットフォームズ株式会社 Device, system, method and program for communication relay
CN109472848A (en) * 2018-10-29 2019-03-15 广东小天才科技有限公司 Picture processing method for preventing fingerprint information from being leaked and terminal equipment
CN111782107A (en) * 2020-06-30 2020-10-16 联想(北京)有限公司 Information processing method, device, computer system and readable storage medium

Similar Documents

Publication Publication Date Title
CN110086993B (en) Image processing method, image processing device, mobile terminal and computer readable storage medium
CN108198150B (en) Method for eliminating image dead pixel, terminal and storage medium
CN107832032B (en) Screen locking display method and mobile terminal
CN107896287B (en) Mobile phone number risk monitoring method, mobile terminal and computer readable storage medium
CN113179369B (en) Shot picture display method, mobile terminal and storage medium
CN110189368B (en) Image registration method, mobile terminal and computer readable storage medium
CN107680059A (en) A kind of determination methods of image rectification, terminal and computer-readable recording medium
CN107896304B (en) Image shooting method and device and computer readable storage medium
CN107241504B (en) Image processing method, mobile terminal and computer readable storage medium
CN107562343B (en) Interactive regulation and control method, equipment and computer readable storage medium
CN107610057B (en) Depth map repairing method, terminal and computer readable storage medium
CN112188058A (en) Video shooting method, mobile terminal and computer storage medium
CN107133603A (en) Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking
CN108282608B (en) Multi-region focusing method, mobile terminal and computer readable storage medium
CN114040073A (en) Starry sky image shooting processing method and equipment and computer readable storage medium
CN113222850A (en) Image processing method, device and computer readable storage medium
CN109462829B (en) Call transfer method, device and computer readable storage medium
CN111614902A (en) Video shooting method and device and computer readable storage medium
CN108876387B (en) Payment verification method, payment verification equipment and computer-readable storage medium
CN108196924B (en) Brightness adjusting method, terminal and computer readable storage medium
CN112532838B (en) Image processing method, mobile terminal and computer storage medium
CN108764261A (en) A kind of image processing method, mobile terminal and storage medium
CN109995925B (en) Crank call identification method, terminal and computer readable storage medium
CN114581504A (en) Depth image confidence calculation method and device and computer readable storage medium
CN110602708B (en) Pseudo base station identification method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170905