CN107133993A - A kind of image processing method and device - Google Patents

A kind of image processing method and device Download PDF

Info

Publication number
CN107133993A
CN107133993A CN201710258394.4A CN201710258394A CN107133993A CN 107133993 A CN107133993 A CN 107133993A CN 201710258394 A CN201710258394 A CN 201710258394A CN 107133993 A CN107133993 A CN 107133993A
Authority
CN
China
Prior art keywords
picture
region
concealed
control operation
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710258394.4A
Other languages
Chinese (zh)
Inventor
罗绮琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201710258394.4A priority Critical patent/CN107133993A/en
Publication of CN107133993A publication Critical patent/CN107133993A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a kind of image processing method and device, the image processing method includes:Detect the control operation acted on the picture of the terminal;If the control operation meets preparatory condition, the region to be concealed of the picture is determined according to control operation and processing is hidden to the region to be concealed of the picture;It is encrypted according to preset rules for hiding the region to be concealed of processing.Implement technical scheme; when user needs to carry out secret protection to some regions on picture; to the picture can meet the control operation of preparatory condition, then just can be automatically to determining region to be concealed according to the control operation and processing and encryption can be hidden to the region.So, other personnel just can not see clear image content, improve the secret protection dynamics of picture.

Description

A kind of image processing method and device
Technical field
The present invention relates to terminal applies field, more particularly to a kind of image processing method and device.
Background technology
Nowadays user increasingly values for the secret protection of terminal (such as mobile phone, PAD), for example, it is desirable to being related to Picture to privacy of user is protected, and privacy picture is seen by others' during preventing that mobile phone from losing.
At present, the processing method of privacy picture is usually that the picture for being involved in privacy moves to specific photograph album, or right The access of photograph album sets various passwords, but this only only accounts for the management of photograph album secret entrance, and protection is far from enough.
The content of the invention
The technical problem to be solved in the present invention is existing drawbacks described above, and there is provided a kind of image processing method and device.
The technical solution adopted for the present invention to solve the technical problems is:The present invention provides a kind of image processing method, should For terminal, the image processing method includes:
Detect the control operation acted on the picture of the terminal;
If the control operation meets preparatory condition, the region to be concealed of the picture is determined and right according to control operation The region to be concealed of the picture is hidden processing;
It is encrypted according to preset rules for hiding the region to be concealed of processing.
Preferably, it is described according to preset rules for hide processing region to be concealed be encrypted including:
Obtain the corresponding finger print information of the control operation or the terminal is obtained according to the control operation and stored Finger print information;
Encryption key is generated according to the finger print information;
The region to be concealed for hiding processing is encrypted using the encryption key;Or
Obtain the corresponding finger print information of the control operation or the terminal is obtained according to the control operation and stored Finger print information;
Encryption key is generated according to the identity of the finger print information and the terminal;
The region to be concealed for hiding processing is encrypted using the encryption key.
Preferably, the region to be concealed to the picture, which is hidden processing, includes:
Mosaic processing is carried out to the region to be concealed of the picture;Or
Fuzzy Processing is carried out to the region to be concealed of the picture.
Preferably, the image processing method also includes:
Share request if receiving, point out validation information;
Receive the checking information for the prompting input;
If the region to be concealed encrypted is decrypted, and is shared according to described by checking for the checking information The picture after decryption is shared in request.
Preferably, the image processing method also includes:
Request is checked if receiving, validation information is pointed out;
Receive the checking information for the prompting input;
If the region to be concealed encrypted is decrypted by checking for the checking information, and is shown after decryption Picture.
Preferably, obtaining the corresponding finger print information of the control operation includes:
The finger print information is obtained according to the fingerprint recognition region of the control operation control terminal.
The present invention also constructs a kind of picture processing device, and applied to terminal, the picture processing device includes:
Detection module, for detecting the control operation acted on the picture of the terminal;
Processing module is hidden, for when the control operation meets preparatory condition, the figure to be determined according to control operation The region to be concealed of piece and region to be concealed to the picture is hidden processing;
Encrypting module, for being encrypted according to preset rules for hiding the region to be concealed of processing.
Preferably, the encrypting module includes:
Fingerprint acquiring unit, for obtaining the corresponding finger print information of the control operation or being obtained according to the control operation Obtain the finger print information that the terminal is stored;
Key generating unit, for generating encryption key according to the finger print information, or, according to the finger print information and The identity generation encryption key of the terminal;
Cryptographic processing unit, for the region to be concealed for hiding processing to be encrypted using the encryption key.
Preferably, the hiding processing module includes:
Mosaic processing unit, mosaic processing is carried out for the region to be concealed to the picture;Or,
Fuzzy Processing unit, Fuzzy Processing is carried out for the region to be concealed to the picture.
Preferably, in addition to:
Reminding module, for sharing request or when checking request receiving, points out validation information;
Input module, for receiving the checking information for the prompting input;
Deciphering module, for when the checking information is by verifying, the region to be concealed encrypted to be decrypted, and According to it is described share request by the picture after decryption shared or according to it is described check request display decrypt after picture.
Implement technical scheme, can be right when user needs to carry out secret protection to some regions on picture The picture carries out meeting the control operation of preparatory condition, then just can automatically to according to the control operation determine region to be concealed and Processing can be hidden to the region and is encrypted.So, other personnel just can not see clear image content, improve picture Secret protection dynamics.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the first embodiment for image processing method that the present invention is provided.
Fig. 2 is a kind of structural representation of the first embodiment for picture processing device that the present invention is provided.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow sheet of the first embodiment for image processing method that the present invention is provided, The image processing method of the embodiment can apply in terminal.Wherein, terminal includes but is not limited to mobile phone, tablet personal computer, intelligence Energy wrist-watch, Intelligent bracelet, MP3, MP4 etc..The operating system of terminal may include but be not limited to Flyme operating systems, Android behaviour Make system, IOS, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone operating systems etc..As shown in figure 1, the image processing method of the embodiment comprises the following steps:
S10. the control operation acted on the picture of the terminal is detected;
In this step, first, the picture of terminal can be user's current shooting picture, or download picture or connect The picture of receipts, can also be the picture at a certain interface.On control operation of the user to picture, it can be to act on terminal screen Operation such as click, pressing, slip for screen display picture etc., wherein, clicking operation can include clicking, double-click or repeatedly Click on etc., pressing operation can include short-press, long-press and the pressing operation (for example press again, flicking) with different pressures value Deng slide can also slide out specific symbol etc. along linear slide.
If S20. the control operation meets preparatory condition, the region to be concealed of the picture is determined according to control operation And processing is hidden to the region to be concealed of the picture;
In this step, after terminal detects the control operation of user, control operation information may be output in terminal The master controller put or other there is the processor or controller of data operation processing function, including but not limited to microprocessor, Microcontroller, digital signal processor, micro calculator, central processing unit, field programming gate array, programmable logic device, shape State device, logic circuit, analog circuit, digital circuit and/or any based on operational order operation signal (analog and/or digital) Equipment.Then, judge whether control operation meets preparatory condition by the processor or controller.
On preparatory condition, the condition of its default setting that can be provided for device can also be pre-set condition, example by user Such as, user can set preparatory condition, or terminal in use by inputting a certain preset mouth when terminal is first powered on Be configured after order, etc., the embodiment of the present invention is not limited.For example, set preparatory condition when, can be set it is following in one Individual or multiple combination:The pressure threshold of control operation, the duration threshold value of control operation, the specific region of control operation, slip Direction etc..
The present invention can store set preparatory condition by various memory devices.Each memory device can be by one or many Individual storage assembly is realized.In this, storage assembly can be internal memory or buffer etc., but herein and not limit it.It is interior Depositing can such as read-only storage (Read-Only Memory;ROM), random access memory (Random Access Memory; RAM), non-permanent internal memory, permanent memory, static memory, volatile memory, flash memory and/or any storage digital information Equipment.
In addition, judging that the step of whether control operation meets preparatory condition comprises determining whether to meet in following condition Any one or more combinations:The corresponding pressure value of control operation is more than or equal to preset pressure threshold value;Control operation is Slide;The touch glide direction of control operation is consistent with default glide direction;The touch duration value of control operation is more than Or equal to preset duration threshold value;The touch frequency of control operation is more than or equal to predetermined registration operation frequency threshold.Preferably, control Operation meets preparatory condition and is:Control operation is slide and corresponding pressure value is more than or equal to preset pressure threshold value.
In other embodiments, control operation meets preparatory condition and is:Control operation is slide, slide correspondence Pressure value be more than or equal to preset pressure threshold value, and the finger print information that is inputted of slide is preset fingerprint information. When preset fingerprint information is the finger print information that terminal user prestores, only the user of terminal just can be by picture Carry out slide and be hidden processing come the picture region covered to slide.
When judging that control operation meets preparatory condition, the area to be concealed of picture can be further determined according to control operation Domain.It is determined that picture region to be concealed when, can be directly true by the touch area of control operation in a kind of specific implementation It is set to the region to be concealed of picture.In another specific implementation, picture can be determined according to the sliding trace of control operation Region to be concealed, for example, determine the region covered using sliding trace as region to be concealed, or, determination sliding trace is enclosed Into closed area be region to be concealed.In another specific implementation, after control operation is triggered, picture is entered automatically Row image recognition, to identify the sensitizing range in picture, for example, account information region, encrypted message region, the privacy of portrait Area etc..
When treating hidden area and being hidden processing, in a kind of specific implementation, it can treat hidden to the picture Tibetan area domain carries out mosaic processing, and in the implementation, mosaic is carried out using default mosaic size and/or dynamics Processing, user can also change mosaic size and/or dynamics.In another specific implementation, the picture can be treated Hidden area carries out Fuzzy Processing.
In above-mentioned other embodiment, when preset fingerprint information is the finger print information that terminal user prestores, only The user of terminal just can be by being hidden in the enterprising line slip operation of picture come the picture region covered to slide Processing.
S30. it is encrypted according to preset rules for hiding the region to be concealed of processing.
In this step, except the specific hidden area to picture is hidden processing, user is made not check clearly The hidden area of picture, also further hidden area can be encrypted, for example, treat the above-mentioned hiding processing of hidden area Solution division operation is encrypted, further to improve the secret protection dynamics of picture.In addition, when being encrypted, can basis Password, finger print information, face characteristic information, iris information etc. are encrypted.
In a specific embodiment, step S30 may particularly include:
S31. obtain the corresponding finger print information of the control operation or the terminal institute is obtained according to the control operation The finger print information of storage;
In this step, obtaining the corresponding finger print information of the control operation includes:
Obtain the finger print information of control operation input.The control operation of preparatory condition is met with the slip with certain dynamics Exemplified by operation, terminal supports the full frame fingerprint recognition of display screen, and cunning on display screen on picture viewing area is acted on when receiving During dynamic operation, the finger print information of slide input is obtained.
Or, obtaining the corresponding finger print information of the control operation includes:
The finger print information is obtained according to the fingerprint recognition region of control operation control terminal.
Terminal is by taking mobile phone as an example, and its fingerprint recognition region can be HOME keys, some predeterminable area on display screen, side Fingerprint recognition region, the fingerprint recognition region at the back side.When control operation meets preparatory condition, the fingerprint recognition of triggering terminal Region obtains finger print information.
Or, obtaining the corresponding finger print information of the control operation includes:
The finger print information that the terminal is stored is obtained according to the control operation.
When control operation meets preparatory condition, the finger print information that user prestores is obtained.
S32. encryption key is generated according to the finger print information.
S33. the region to be concealed for hiding processing is encrypted using the encryption key.
In this embodiment, because the hidden area of picture is close by encryption, and used in encryption Key is obtained according to the finger print information of user, so, also can not be to the covert of picture even if other people get the picture The region to be concealed of reason is correctly decrypted, so as to can not see the content in the region of this in picture.
In another alternative embodiment, step S30 is specifically included:
S34. obtain the corresponding finger print information of the control operation or the terminal institute is obtained according to the control operation The finger print information of storage;
S35. encryption key is generated according to the identity of the finger print information and the terminal;
S36. the region to be concealed for hiding processing is encrypted using the encryption key.
In this embodiment, because the hidden area of the picture is by encryption, and used in encryption Key is obtained according to the finger print information of user and the identity of terminal, so, even if other people get the picture, also without Method is correctly decrypted to the region to be concealed for hiding processing of picture, so as to can not see the image content in the region. In one alternative embodiment, image processing method of the invention also includes:
Share request if receiving, point out validation information;
Receive the checking information for the prompting input;
If the region to be concealed encrypted is decrypted, and is shared according to described by checking for the checking information The picture after decryption is shared in request.
In this embodiment, after user is hidden processing and encryption to picture, picture can also be shared, But, it is necessary to the hidden area of the picture be decrypted, specifically before sharing:First according to prompting validation information, The checking information is, for example, finger print information.After terminal receives checking information, verified, can be to adding after being verified Close hidden area is decrypted, and asks to eliminate the hiding processing to the region so as to for this share, then will decryption Picture afterwards is shared.When checking the picture, the region is still hidden processing.
In one alternate embodiment, image processing method of the invention also includes:
Request is checked if receiving, validation information is pointed out;
Receive the checking information for the prompting input;
If the region to be concealed encrypted is decrypted by checking for the checking information, and is shown after decryption Picture.
In this embodiment, after user is hidden processing and encryption to picture, picture can also be checked, But, it is necessary to the hidden area of the picture be decrypted, specifically before checking:First according to prompting validation information, The checking information is, for example, finger print information.After terminal receives checking information, verified, can be to adding after being verified Close hidden area is decrypted, so that check that request eliminates the hiding processing to the region for this, then just can be clear See image content to Chu.When checking next time, the region is still hidden processing.
Referring to Fig. 2, Fig. 1 is a kind of schematic flow sheet of the first embodiment for picture processing device that the present invention is provided, The picture processing device of the embodiment can apply in terminal.Wherein, terminal includes but is not limited to mobile phone, tablet personal computer, intelligence Energy wrist-watch, Intelligent bracelet, MP3, MP4 etc..The operating system of terminal may include but be not limited to Flyme operating systems, Android behaviour Make system, IOS, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone operating systems etc..As shown in figure 1, the picture processing system of the embodiment includes detection module 11, hides processing module 12 and encrypting module 13, the logical construction of each module is illustrated separately below.
Detection module 11 is used to detect the control operation acted on the picture of the terminal.
Specifically, first, the picture of terminal can be the picture of user current shooting, or the picture downloaded or reception Picture, can also be the picture at a certain interface.On control operation of the user to picture, its can for the click on touch-screen, pressing, Slide etc. operation etc., wherein, clicking operation can include click, double-click or repeatedly click on etc., pressing operation can include short-press, Long-press and pressing operation (such as again as, flicking) with different pressures value, slide can also may be used along linear slide To slide out specific symbol etc..
Hiding processing module 12 is used for when the control operation meets preparatory condition, and the figure is determined according to control operation The region to be concealed of piece and region to be concealed to the picture is hidden processing.
Specifically, after terminal detects the control operation of user, control operation information may be output in terminal built-in Master controller or other there is the processor or controller of data operation processing function, including but not limited to microprocessor, micro-control Device processed, digital signal processor, micro calculator, central processing unit, field programming gate array, programmable logic device, stater, Logic circuit, analog circuit, digital circuit and/or any equipment based on operational order operation signal (analog and/or digital). Then, judge whether control operation meets preparatory condition by the processor or controller.
On preparatory condition, its default setting that can be provided by device can also be pre-set by user, for example, user can Preparatory condition, or terminal are set when terminal is first powered in use by being set after inputting a certain preset password Put, etc., the embodiment of the present invention is not limited.For example, when setting preparatory condition, it can be set one or more of following Combination:The pressure threshold of control operation, the duration threshold value of control operation, the specific region of control operation, glide direction etc..
The present invention can store set preparatory condition by various memory devices.Each memory device can be by one or many Individual storage assembly is realized.In this, storage assembly can be internal memory or buffer etc., but herein and not limit it.It is interior Depositing can such as read-only storage (Read-Only Memory;ROM), random access memory (Random Access Memory; RAM), non-permanent internal memory, permanent memory, static memory, volatile memory, flash memory and/or any storage digital information Equipment.
In addition, judging that the step of whether control operation meets preparatory condition comprises determining whether to meet in following condition Any one or more combinations:The corresponding pressure value of control operation is more than or equal to preset pressure threshold value;Control operation is Slide;The touch glide direction of control operation is consistent with default glide direction;The touch duration value of control operation is more than Or equal to preset duration threshold value;The touch frequency of control operation is more than or equal to predetermined registration operation frequency threshold.Preferably, control Operation meets preparatory condition and is:Control operation is slide and corresponding pressure value is more than or equal to preset pressure threshold value.
In other embodiments, control operation meets preparatory condition and is:Control operation is slide, slide correspondence Pressure value be more than or equal to preset pressure threshold value, and the finger print information that is inputted of slide is preset fingerprint information. When preset fingerprint information is the finger print information that terminal user prestores, only the user of terminal just can be by picture Carry out slide and be hidden processing come the picture region covered to slide.
When judging that control operation meets preparatory condition, the area to be concealed of picture can be further determined according to control operation Domain.It is determined that picture region to be concealed when, can be directly true by the touch area of control operation in a kind of specific implementation It is set to the region to be concealed of picture.In another specific implementation, picture can be determined according to the sliding trace of control operation Region to be concealed, for example, determine the region covered using sliding trace as region to be concealed, or, determination sliding trace is enclosed Into closed area be region to be concealed.In another specific implementation, image recognition can be carried out to picture automatically, to know The sensitizing range not gone out in picture, for example, account information region, encrypted message region, privacy places of portrait etc..
When treating hidden area and being hidden processing, in a kind of specific implementation, hiding processing module 12 includes Mosaic processing unit, the mosaic processing unit is used to carry out mosaic processing to the region to be concealed of the picture, at this In implementation, mosaic processing is carried out using default mosaic size and/or dynamics, it is big that user can also change mosaic Small and/or dynamics.In another specific implementation, hiding processing module 12 includes Fuzzy Processing unit, the Fuzzy Processing Unit is used to carry out Fuzzy Processing to the region to be concealed of the picture.Encrypting module 13 is used for according to preset rules for hidden The region to be concealed for hiding processing is encrypted.
Specifically, except the specific region to picture is hidden processing, user is made can not clearly to check the hidden of picture Tibetan area domain, also further hidden area can be encrypted, for example, treat the solution division operation of the above-mentioned hiding processing of hidden area It is encrypted, further to improve the secret protection dynamics of picture.In addition, when being encrypted, can be according to password, fingerprint Information, face characteristic information, iris information etc. are encrypted.
In a specific embodiment, encrypting module may particularly include fingerprint acquiring unit, Key generating unit and encryption Processing unit.Wherein, fingerprint acquiring unit is used to obtain the corresponding finger print information of the control operation or according to the control Operation obtains the finger print information that the terminal is stored;Key generating unit is used for close according to finger print information generation encryption Key, or, encryption key is generated according to the identity of the finger print information and the terminal;Cryptographic processing unit is used to utilize The region to be concealed for hiding processing is encrypted the encryption key.
On fingerprint acquiring unit, in a specific implementation, fingerprint acquiring unit is defeated for obtaining control operation The finger print information entered.The control operation of preparatory condition is met by taking the slide with certain dynamics as an example, terminal supports display Shield full frame fingerprint recognition, when receive act on the slide on display screen on picture viewing area when, obtain the slip behaviour Make the finger print information inputted.In another specific implementation, fingerprint acquiring unit is used for according to control operation control terminal Fingerprint recognition region obtain the finger print information.Terminal is by taking mobile phone as an example, and its fingerprint recognition region can be HOME keys, display The fingerprint recognition region, the fingerprint recognition region at the back side of some predeterminable area, side on screen.When control operation meets default bar During part, the fingerprint recognition region of triggering terminal obtains finger print information.In another specific implementation, fingerprint acquiring unit For obtaining the finger print information that the terminal is stored according to the control operation.When control operation meets preparatory condition, obtain Take the finger print information that family is prestored.
In this embodiment, except the specific region to picture is hidden processing, user is made can not clearly to check figure The hidden area of piece, also further hidden area can be encrypted, further to improve the secret protection dynamics of picture.Separately Outside, when being encrypted, it can be encrypted according to finger print information, face characteristic information, iris information etc..
In one alternate embodiment, picture processing device of the invention also includes reminding module, input module and decryption Module, wherein, reminding module is used to share request or when checking request receiving, and points out validation information;Input module For receiving the checking information for the prompting input;Deciphering module is used for when the checking information is by verifying, to The region to be concealed of encryption is decrypted, and shares request according to described and share the picture after decryption or looked into according to described The picture seen after request display decryption.
After user is hidden processing and encryption to picture, also picture can be shared or be checked, still, , it is necessary to the hidden area of the picture be decrypted, specifically before sharing or checking:First according to prompting validation information, The checking information is, for example, finger print information.Terminal is verified after checking information is received, after being verified, can be to adding Close hidden area is decrypted, so that share or check the hiding processing eliminated to the region for this, then will solution Picture after close is shared or checked, when checking the picture again, the region is still hidden processing.
Step in the method for the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.This Module or unit or subelement in the device of inventive embodiments can be combined, divided and deleted according to actual needs.This The all or part of step that field those of ordinary skill is appreciated that in the various methods of above-described embodiment can be by program Carry out the device-dependent hardware of command terminal to complete, the program can be stored in a computer-readable recording medium, storage is situated between Matter can include:Flash disk, read only memory ROM, random access device RAM, disk or CD etc..
Above disclosed is only presently preferred embodiments of the present invention, can not limit the right of the present invention with this certainly Scope, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and according to right of the present invention It is required that the equivalent variations made, still fall within and invent covered scope.

Claims (10)

1. a kind of image processing method, applied to terminal, it is characterised in that the image processing method includes:
Detect the control operation acted on the picture of the terminal;
If the control operation meets preparatory condition, the region to be concealed of the picture is determined and to described according to control operation The region to be concealed of picture is hidden processing;
It is encrypted according to preset rules for hiding the region to be concealed of processing.
2. image processing method according to claim 1, it is characterised in that described to be directed to covert according to preset rules Reason region to be concealed be encrypted including:
Obtain the corresponding finger print information of the control operation or the finger that the terminal is stored is obtained according to the control operation Line information;
Encryption key is generated according to the finger print information;
The region to be concealed for hiding processing is encrypted using the encryption key;Or
Obtain the corresponding finger print information of the control operation or the finger that the terminal is stored is obtained according to the control operation Line information;
Encryption key is generated according to the identity of the finger print information and the terminal;
The region to be concealed for hiding processing is encrypted using the encryption key.
3. image processing method according to claim 1, it is characterised in that the region to be concealed to the picture is entered The hiding processing of row includes:
Mosaic processing is carried out to the region to be concealed of the picture;Or
Fuzzy Processing is carried out to the region to be concealed of the picture.
4. image processing method according to claim 1, it is characterised in that the image processing method also includes:
Share request if receiving, point out validation information;
Receive the checking information for the prompting input;
If the checking information region to be concealed encrypted is decrypted, and share request according to described by checking Picture after decryption is shared.
5. image processing method according to claim 1, it is characterised in that the image processing method also includes:
Request is checked if receiving, validation information is pointed out;
Receive the checking information for the prompting input;
If the region to be concealed encrypted is decrypted by checking for the checking information, and shows the picture after decryption.
6. image processing method according to claim 2, it is characterised in that obtain the corresponding fingerprint letter of the control operation Breath includes:
The finger print information is obtained according to the fingerprint recognition region of the control operation control terminal.
7. a kind of picture processing device, applied to terminal, it is characterised in that the picture processing device includes:
Detection module, for detecting the control operation acted on the picture of the terminal;
Processing module is hidden, for when the control operation meets preparatory condition, the picture to be determined according to control operation Region to be concealed and region to be concealed to the picture is hidden processing;
Encrypting module, for being encrypted according to preset rules for hiding the region to be concealed of processing.
8. picture processing device according to claim 7, it is characterised in that the encrypting module includes:
Fingerprint acquiring unit, for obtaining the corresponding finger print information of the control operation or obtaining institute according to the control operation State the finger print information that terminal is stored;
Key generating unit, for generating encryption key according to the finger print information, or, according to the finger print information and described The identity generation encryption key of terminal;
Cryptographic processing unit, for the region to be concealed for hiding processing to be encrypted using the encryption key.
9. picture processing device according to claim 7, it is characterised in that the hiding processing module includes:
Mosaic processing unit, mosaic processing is carried out for the region to be concealed to the picture;Or,
Fuzzy Processing unit, Fuzzy Processing is carried out for the region to be concealed to the picture.
10. picture processing device according to claim 7, it is characterised in that also include:
Reminding module, for sharing request or when checking request receiving, points out validation information;
Input module, for receiving the checking information for the prompting input;
Deciphering module, for when the checking information is by verifying, the region to be concealed encrypted to be decrypted, and according to It is described share request by the picture after decryption shared or according to it is described check request display decrypt after picture.
CN201710258394.4A 2017-04-19 2017-04-19 A kind of image processing method and device Pending CN107133993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710258394.4A CN107133993A (en) 2017-04-19 2017-04-19 A kind of image processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710258394.4A CN107133993A (en) 2017-04-19 2017-04-19 A kind of image processing method and device

Publications (1)

Publication Number Publication Date
CN107133993A true CN107133993A (en) 2017-09-05

Family

ID=59715932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710258394.4A Pending CN107133993A (en) 2017-04-19 2017-04-19 A kind of image processing method and device

Country Status (1)

Country Link
CN (1) CN107133993A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770443A (en) * 2017-10-26 2018-03-06 努比亚技术有限公司 A kind of image processing method, mobile terminal and computer-readable recording medium
CN107784232A (en) * 2017-10-18 2018-03-09 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 A kind of picture hidden method and device
CN108304563A (en) * 2018-02-08 2018-07-20 百度在线网络技术(北京)有限公司 Image processing method, device and equipment
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device
CN110598421A (en) * 2018-06-13 2019-12-20 杭州海康威视数字技术股份有限公司 Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN110881033A (en) * 2019-11-07 2020-03-13 腾讯科技(深圳)有限公司 Data encryption method, device, equipment and readable storage medium
CN114679518A (en) * 2022-03-31 2022-06-28 维沃移动通信有限公司 Image display method and device and electronic equipment
CN115037711A (en) * 2022-06-07 2022-09-09 元心信息科技集团有限公司 Data processing method and device, electronic equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426721A (en) * 2015-11-10 2016-03-23 广东欧珀移动通信有限公司 Picture encryption method and device
CN105809042A (en) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 Information protection method and device, information display method and device, and terminal
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809042A (en) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 Information protection method and device, information display method and device, and terminal
CN105426721A (en) * 2015-11-10 2016-03-23 广东欧珀移动通信有限公司 Picture encryption method and device
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784232A (en) * 2017-10-18 2018-03-09 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN107770443A (en) * 2017-10-26 2018-03-06 努比亚技术有限公司 A kind of image processing method, mobile terminal and computer-readable recording medium
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 A kind of picture hidden method and device
CN108304563A (en) * 2018-02-08 2018-07-20 百度在线网络技术(北京)有限公司 Image processing method, device and equipment
CN110598421A (en) * 2018-06-13 2019-12-20 杭州海康威视数字技术股份有限公司 Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN109063504B (en) * 2018-07-02 2024-02-23 北京珠穆朗玛移动通信有限公司 Private file access method, mobile terminal and storage medium
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device
CN110881033A (en) * 2019-11-07 2020-03-13 腾讯科技(深圳)有限公司 Data encryption method, device, equipment and readable storage medium
WO2021088571A1 (en) * 2019-11-07 2021-05-14 腾讯科技(深圳)有限公司 Data encryption method and apparatus, and device and readable storage medium
CN114679518A (en) * 2022-03-31 2022-06-28 维沃移动通信有限公司 Image display method and device and electronic equipment
CN115037711A (en) * 2022-06-07 2022-09-09 元心信息科技集团有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN115037711B (en) * 2022-06-07 2024-03-29 元心信息科技集团有限公司 Data processing method, device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN107133993A (en) A kind of image processing method and device
US10311278B2 (en) Method for encrypting application and terminal
US8752146B1 (en) Providing authentication codes which include token codes and biometric factors
JP6887956B2 (en) Secure biometric data capture, processing and management
CN103916233B (en) A kind of information ciphering method and device
WO2016192165A1 (en) Data encryption method and apparatus
CN110659512B (en) Picture management method, device, terminal and storage medium
US10203864B2 (en) Information processing method and electronic apparatus
CN101529366A (en) Identification and visualization of trusted user interface objects
CN105281907B (en) Encrypted data processing method and device
TW201539247A (en) Password input and verification method and system thereof
KR102474243B1 (en) A Method and Apparatus For Providing a Secure Mode for User Device
CN108027853B (en) Multi-user strong authentication token
CN105653924A (en) Touch screen operation method and device
CN105447357A (en) Application processing method and terminal
CN106648583B (en) Information processing method and terminal
US8875263B1 (en) Controlling a soft token running within an electronic apparatus
CN106951757A (en) A kind of method and apparatus for operating application program
CN106203163A (en) A kind of abnormality eliminating method, device and terminal unit
CN106170794A (en) A kind of information processing method and mobile terminal
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN111027077B (en) Encryption method and device for storage equipment and storage medium
Schaffer Expanding continuous authentication with mobile devices
WO2023046104A1 (en) Object moving method and device
WO2016165537A1 (en) Method for controlling intelligent terminal and apparatus for controlling intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170905