CN107590770A - Image obscures encryption method, mobile terminal and storage medium - Google Patents
Image obscures encryption method, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN107590770A CN107590770A CN201710776659.XA CN201710776659A CN107590770A CN 107590770 A CN107590770 A CN 107590770A CN 201710776659 A CN201710776659 A CN 201710776659A CN 107590770 A CN107590770 A CN 107590770A
- Authority
- CN
- China
- Prior art keywords
- fuzzy
- image
- blurred picture
- encryption
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of image to obscure encryption method, mobile terminal and storage medium, and the image obscures encryption method and comprised the following steps:When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image, and shows that fuzzy parameter sets interface;When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain blurred picture, and shows the blurred picture.The present invention can protect user to need the privacy information encrypted by carrying out Fuzzy Processing to image, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, facilitate user to select again and using image.
Description
Technical field
The present invention relates to image encryption field, more particularly to a kind of image to obscure encryption method, mobile terminal and storage and be situated between
Matter.
Background technology
Stepped up with the component performance of taking pictures of mobile terminal configuration, smart mobile phone or tablet personal computer etc. are mobile eventually
End turns into daily most commonly used instrument of taking pictures.Strange hundred sample of picture material thousand of shooting, some images for containing privacy information are stayed
Stay in smart mobile phone or tablet personal computer.For the image containing privacy information, it is desirable to it can be carried out efficiently to add
Close and decryption is so as to not only ensure privacy information safety but also without prejudice to the use of other images.
At present, more conventional method is to utilize encryption software, it would be desirable to which the image concealing of encryption is transferred to encryption
In file.After image concealing or transfer, hiding image is not shown, user easily forgets the image hidden or shifted,
In addition, when need check hide or transfer image when, it is necessary to by corresponding encryption software find encryption file, pair plus
The image hidden or shifted can be just checked after close file decryption, operating procedure is more, and process is cumbersome.
Therefore, existing image encryption method, exist encrypted image and non-encrypted images can not preview simultaneously, encryption conciliates
Close process is cumbersome, is not easy to the problem of user uses.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill
Art.
The content of the invention
It is a primary object of the present invention to provide a kind of image to obscure encryption method, mobile terminal and storage medium, it is intended to
Solve encrypted image and non-encrypted images can not preview simultaneously, encryption and decryption processes are cumbersome, are not easy to the technology that user uses
Problem.
To achieve the above object, the present invention provides a kind of image and obscures encryption method, and described image obscures encryption method bag
Include following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure
Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute
State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould
The step of pasting image includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould
Paste image.
Alternatively, what the image information in the pending image determined the pending image treats confusion region
The step of domain, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information
Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image
Image-region is defined as treating fuzzy region.
Alternatively, what the image information in the pending image determined the pending image treats confusion region
It is described the pending image to be carried out at fuzzy encryption according to the fuzzy class and the fuzzy password before the step of domain
Reason, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described
The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image
Image information determine the step for the treatment of fuzzy region of the pending image.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould
After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request
Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment
Fuzzy class carries out fuzzy encryption to the blurred picture.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould
After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described
The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As being restored, to obtain former picture rich in detail.
Alternatively, the recovery password by the recovery request is compared with the fuzzy password of the blurred picture
The step of after, described image obscure encryption method also include:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy
The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould
After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described
The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The present invention also provides a kind of mobile terminal, and the mobile terminal includes:Memory, processor and it is stored in described deposit
On reservoir and the image that can run on the processor obscures encipheror, and described image obscures encipheror by the processing
Device realizes following steps when performing:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure
Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute
State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
The present invention also provides a kind of computer-readable recording medium, and image is stored with the computer-readable recording medium
Fuzzy encipheror, described image obscure when encipheror is executed by processor and realize following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure
Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute
State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
The present invention obscures encrypted instruction acquisition according to the image and treated when the image for monitoring triggering obscures encrypted instruction
Image is handled, and shows that fuzzy parameter sets interface;Receiving the fuzzy parameter based on fuzzy parameter setting interface setting
When, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain blurred picture, and shows that this is fuzzy
Image, this programme can protect user to need the privacy information encrypted, and user can be simultaneously by carrying out Fuzzy Processing to image
Preview blurred picture and other Non-blurred images, are easy to user efficiently to find encrypted image, facilitate user to select and make again
With image, without hiding or shifting the image for needing to encrypt, encryption and decryption step are significantly reduced.
Brief description of the drawings
Fig. 1 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the schematic flow sheet that image of the present invention obscures encryption method first embodiment;
Fig. 3 is effect diagram of the image after obscuring encryption in the embodiment of the present invention;
Fig. 4 is to described pending described in second embodiment of the invention according to the fuzzy class and the fuzzy password
Image carries out fuzzy encryption, to obtain the refinement schematic flow sheet of blurred picture step;
Fig. 5 is to described pending described in third embodiment of the invention according to the fuzzy class and the fuzzy password
Image carries out fuzzy encryption, to obtain the refinement schematic flow sheet of blurred picture step;
Fig. 6 is the schematic flow sheet that image of the present invention obscures encryption method fourth embodiment.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:When the image for monitoring triggering obscures CIPHERING REQUEST, obtaining should
Fuzzy class, fuzzy password and pending image in fuzzy CIPHERING REQUEST, then according to the fuzzy class and the fuzzy password
Fuzzy encryption is carried out to the pending image, to obtain blurred picture, and shows the blurred picture.
Because by after image concealing or transfer, hiding image is not shown, user easily forgets the figure hidden or shifted
Picture, in addition, when need check hide or transfer image when, it is necessary to by corresponding encryption software find encryption file,
The image hidden or shifted can be just checked after being decrypted to encryption folder, operating procedure is more, and process is cumbersome, therefore, existing
Image encryption method, exist encrypted image and non-encrypted images can not preview simultaneously, encryption and decryption processes are cumbersome, are not easy to use
The problem of family uses.
To solve the above problems, this programme can protect user's needs to encrypt hidden by carrying out Fuzzy Processing to image
Personal letter ceases, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, side
Just user selects and using image, without hiding or shifting the image for needing to encrypt, is significantly reduced encryption and decryption step again
Suddenly.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:Display unit 106, user input unit 107, interface unit 108, memory 109, processor
The part such as 110 and power supply 111.It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 1 is not formed
Restriction to mobile terminal, mobile terminal can be included than illustrating more or less parts, either combine some parts or
Different part arrangements.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
In the mobile terminal shown in Fig. 1, processor 110 can be used for calling the image stored in memory 109 to obscure
Encipheror, and perform following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure
Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute
State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Further, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain
The step of blurred picture, includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould
Paste image.
Further, the image information in the pending image determines that the pending image is waited to obscure
The step of region, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information
Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image
Image-region is defined as treating fuzzy region.
Further, the image information in the pending image determines that the pending image is waited to obscure
It is described that fuzzy encryption is carried out to the pending image according to the fuzzy class and the fuzzy password before the step of region
Processing, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described
The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image
Image information determine the step for the treatment of fuzzy region of the pending image.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform
Following steps:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request
Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment
Fuzzy class carries out fuzzy encryption to the blurred picture.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform
Following steps:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described
The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As being restored, to obtain former picture rich in detail.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform
Following steps:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy
The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform
Following steps:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described
The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The specific embodiment of mobile terminal of the present invention obscures the basic phase of each specific embodiment of encryption method with following images
Together, therefore not to repeat here.
The present invention provides a kind of image and obscures encryption method.
Reference picture 2, Fig. 2 are the schematic flow sheet that image of the present invention obscures encryption method first embodiment.
In the present embodiment, the image obscures encryption method and included:
Step S101, when the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtained
Pending image is taken, and shows that fuzzy parameter sets interface;
The image obscures encryption method and is applied to mobile terminal, and the mobile terminal includes but is not limited to smart mobile phone and flat board
Computer.The controllable mobile terminal of user realizes the fuzzy encryption of image, when the image for monitoring triggering obscures encrypted instruction
When, encrypted instruction is obscured according to the image and obtains pending image, and show that fuzzy parameter sets interface, the fuzzy parameter includes
Fuzzy class and fuzzy password etc., the fuzzy parameter set interface fuzzy class option and fuzzy Password Input frame, user Ke Ji
The fuzzy class of the pending image is set in the fuzzy class option, the fuzzy Password Input frame can be based on and set this pending
The fuzzy password of image.The triggering mode that the image obscures encrypted instruction includes the triggering of long-press image and menu image triggering,
In the present invention, this is not construed as limiting.When the triggering mode that the image obscures encrypted instruction triggers for long-press image, pending figure
Image as being long-press, and when the triggering mode that the image obscures encrypted instruction triggers for menu image, pending image needs
Want user to select, i.e., when the image that user is clicked in menu image obscures Encryption Options, show pending image selection interface, when
After selecting pending image, triggering image obscures encrypted instruction.The fuzzy class is including one-level is fuzzy, two level is fuzzy, three-level mould
Paste, level Four are fuzzy and Pyatyi is fuzzy etc., and fuzzy class is higher, represents that the fog-level of image is higher, image is more unintelligible.
In specific implementation, user can first set fuzzy parameter, i.e. fuzzy class and fuzzy password, and then reselection needs
The image of Fuzzy Processing, it is specifically as follows when the fuzzy parameter that mobile terminal receives user's triggering sets instruction, shows mould
Parameter setting interface is pasted, user can be based on the fuzzy parameter and set interface to set fuzzy parameter, i.e. fuzzy class and fuzzy password.
Mobile terminal shows the choosing of pending image after the fuzzy parameter that user sets interface to set based on the fuzzy parameter is received
Interface is selected, user can be based on the selection interface and select pending image, i.e. selection needs the image of Fuzzy Processing.
, can be according to the image of the pending image after the pending image of the acquisition for mobile terminal in another specific implementation
Type acquiescence selection fuzzy class, whether the image type for specially judging the pending image is figure kind's type, if this is treated
The image type for handling image is personage's type, then the fuzzy class of the pending image obscures for Pyatyi, if this is pending
The image type of image is not personage's type, then the fuzzy class of the processing image is two level is fuzzy or three-level is fuzzy etc..
Step S102, when receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the mould
Paste parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and shows the blurred picture.
The mobile terminal is when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter, according to the mould
Paste parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and shows the blurred picture, specifically,
Fuzzy class of the mobile terminal in the fuzzy parameter carries out Fuzzy Processing to the pending image, then fuzzy according to this
Pending image after Fuzzy Processing is encrypted fuzzy password in parameter, so as to obtain blurred picture, together
When show the blurred picture.The present invention can also carry out fuzzy encryption to several pending images, this several it is pending
The fuzzy parameter of image can be identical, also can be different, and user can be configured.
In specific implementation, for the mobile terminal when obtaining fuzzy parameter, display is through the fuzzy parameter in the preview window
Pending image after processing, fuzzy class is shown in the preview window control is set, user can be set based on the fuzzy class
The fuzzy class that control adjusts the pending image is put, is easy to user to be rapidly completed the fuzzy encryption of the pending image.
In another specific implementation, when the deletion for receiving the blurred picture instructs, interface for password input is shown, and receiving base
When the fuzzy password of interface for password input input, this is obscured into password compared with the fuzzy password of the blurred picture, such as
The fruit fuzzy password is identical with the fuzzy password of the blurred picture, then deletes the blurred picture, if the fuzzy password and the mould
It is different to paste the fuzzy password of image, then sends prompt message.
It should be noted that during fuzzy encryption is carried out to pending image, pending image can be entered
The fuzzy encryption of row local image region, pending image can also be carried out at the fuzzy encryption in whole image region
Reason.When carrying out the fuzzy encryption of local image region to pending image, it need to determine that needs carry out fuzzy encryption
Local image region, therefore, show pending image in the preview window, user can be based on the preview window determine to need into
The local image region of the fuzzy encryption of row, after user determines to need to carry out the local image region of fuzzy encryption,
Fuzzy encryption is carried out to the local image region, to obtain blurred picture, and the blurred picture is shown in the preview window,
When mobile terminal, which receives blurred picture, completes quality, fuzzy encryption process terminates.The local image region is divided into
Different zones are configured, for example, the heart sets fuzzy ranges in the picture, in another example, in image all directions area up and down
Domain, which is set, needs fuzzy region.It is multiple when needing the local image region for carrying out fuzzy encryption to have in specific implementation
When, it can give each local image region that one fuzzy class and fuzzy password are set, realize the Multiple Fuzzy encryption of image, have
Effect ensures the security of fuzzy encryption.
Fig. 3 is effect diagram of the image after obscuring encryption in the embodiment of the present invention, as shown in figure 3, mobile
Terminal shows 11 images, wherein 6 are blurred picture, 5 are picture rich in detail, and picture rich in detail and blurred picture show simultaneously
Show.
The present invention can be applied not only to image, also can be applicable in text, you can fuzzy encryption is carried out to text, should
Text includes Word texts, Excel texts, PPT texts, PDF texts and other texts comprising word etc..Carried out to text
During fuzzy encryption, fuzzy encryption can be carried out to the full detail in text, the partial information in text can also be entered
The fuzzy encryption of row.
In the present embodiment, the present invention obscures when the image for monitoring triggering obscures encrypted instruction according to the image
Encrypted instruction obtains pending image, and shows that fuzzy parameter sets interface;Interface is set based on the fuzzy parameter receiving
During the fuzzy parameter of setting, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain fuzzy graph
Picture, and the blurred picture is shown, this programme can protect user to need the privacy letter encrypted by carrying out Fuzzy Processing to image
Breath, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, it is convenient to use
Family selects and using image, without hiding or shifting the image for needing to encrypt, is significantly reduced encryption and decryption step again.
Further, reference picture 4, the second of the fuzzy encryption method of image of the present invention is proposed based on above-mentioned first embodiment
Embodiment, the difference with previous embodiment are that step S102 includes:
Step S1021, what the image information in the pending image determined the pending image treats confusion region
Domain;
The mobile terminal is treated when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter according to this
Image information in processing image determines the fuzzy region for the treatment of of the pending image, and specifically, the mobile terminal judges that this waits to locate
Whether the image information managed in image is human face image information, if the image information in the pending image is facial image letter
Breath, then be defined as treating fuzzy region, if the image in the pending image by the image-region where the human face image information
Information is not human face image information, then is defined as treating fuzzy region, it is necessary to illustrate by the upper half image-region of the pending image
, the image information in the pending image is not that human face image information treats that fuzzy region can also be under pending image
Half image-region and center image region etc..
Step S1022, fuzzy region, which is carried out at fuzzy encryption, to be treated to the pending image according to the fuzzy parameter
Reason, to obtain blurred picture.
The mobile terminal determine determine the pending image after fuzzy region, it is pending to this according to the fuzzy parameter
Image treats that fuzzy region carries out fuzzy encryption, to obtain blurred picture, i.e., according to fuzzy class and fuzzy password to this
Pending image treats that fuzzy region carries out fuzzy encryption.
In the present embodiment, the present invention treats confusion region by what the image information in pending image determined pending image
Automatically determining for fuzzy region is treated in domain, realization, is participated in without user, improves the fuzzy encryption speed for treating fuzzy region.
Further, reference picture 5, the 3rd of the fuzzy encryption method of image of the present invention the is proposed based on above-mentioned second embodiment
Embodiment, the difference with previous embodiment are that step S102 also includes:
Step S1023, judges whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
Step S1024, if the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to described fuzzy
Parameter carries out fuzzy encryption to all images region of the pending image, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, step S1021 is performed, i.e., waits to locate according to
What the image information in reason image determined the pending image treats fuzzy region.
The mobile terminal judges the mould when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter
Whether the fuzzy class in paste parameter is less than or equal to predetermined level, if the fuzzy class in the fuzzy parameter is less than or equal to
Predetermined level, that is, when the fog-level needed is relatively low, all images region of the pending image is entered according to the fuzzy parameter
The fuzzy encryption of row, to obtain blurred picture, if the fuzzy class in the fuzzy parameter is more than predetermined level, basis should
Image information in pending image determines the fuzzy region for the treatment of of the pending image, then this is waited to locate according to the fuzzy parameter
Reason image treats that fuzzy region carries out fuzzy encryption, to obtain blurred picture, i.e., according to fuzzy class and fuzzy password pair
The pending image treats that fuzzy region carries out fuzzy encryption.
In the present embodiment, the present invention carries out mould when fuzzy class is relatively low to all images region of pending image
Encryption is pasted, and when fuzzy class is higher, fuzzy encryption is carried out to the local image region of pending image, effectively
The fuzzy encryption of raising security.
Further, reference picture 6, based on above-mentioned first, second or third embodiment propose image of the present invention it is fuzzy plus
The fourth embodiment of decryption method, the difference with previous embodiment are, after step S102, the image obscures encryption method also
Including:
Step S103, when the fuzzy adjustment for receiving the blurred picture is asked, obtain in the fuzzy adjustment request
Fuzzy password;
Step S104, when the fuzzy password is identical with the fuzzy password of the blurred picture, according to the fuzzy tune
Fuzzy class in whole request carries out fuzzy encryption to the blurred picture.
The mobile terminal obtains fuzzy in fuzzy adjustment request when the fuzzy adjustment for receiving blurred picture is asked
Password, and this is obscured into password compared with the fuzzy password of the blurred picture, and obscure password and the blurred picture at this
Fuzzy password it is identical when, the fuzzy class in being asked according to the fuzzy adjustment carries out fuzzy encryption to the blurred picture.
In specific implementation, this obscure password it is identical with the fuzzy password of the blurred picture when, obtain the current mould of the blurred picture
Grade is pasted, if the current fuzzy class is less than default fuzzy class (highest fuzzy class), in the base of present Fuzzy grade
Increase a fuzzy class on plinth, and after fuzzy class is increased, the blurred picture is carried out according to the fuzzy class after increase
Fuzzy encryption, that is, deepen fog-level.
In the present embodiment, the present invention also can adjust the fog-level of the blurred picture, be easy to after blurred picture is obtained
User needs to be adjusted when adjusting fog-level.
Further, the mobile terminal is when receiving the recovery request of the blurred picture, by answering in the recovery request
Original code restores password and the blurred picture compared with the fuzzy password of the blurred picture in the recovery request
When fuzzy password is identical, the blurred picture is restored, to obtain former picture rich in detail, realizes the ambiguity solution of blurred picture.
Further, the mobile terminal is when receiving the recovery request of the blurred picture, by answering in the recovery request
Original code restores password and the blurred picture compared with the fuzzy password of the blurred picture in the recovery request
During fuzzy password difference, increase the fuzzy class of the blurred picture, and according to the fuzzy class after increase to the pending image
Fuzzy encryption is carried out, when restoring code error, deepens the fog-level of blurred picture, improves the safety of original image
Property.
Further, the mobile terminal is receiving when sharing request of the blurred picture, and this is shared to the mould in request
Password is pasted compared with the fuzzy password of the blurred picture, and shares fuzzy password and the blurred picture in request at this
Fuzzy password it is identical when, to the blurred picture carry out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail, point
Before enjoying blurred picture, fuzzy password authentification is carried out, only fuzzy password authentification is by that could carry out sharing operation, effectively protect
Demonstrate,prove the security of image.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium, the computer-readable recording medium
On be stored with image and obscure encipheror, described image obscures encipheror and realizes following steps when being executed by processor:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure
Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute
State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Further, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain
The step of blurred picture, includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould
Paste image.
Further, the image information in the pending image determines that the pending image is waited to obscure
The step of region, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information
Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image
Image-region is defined as treating fuzzy region.
Further, the image information in the pending image determines that the pending image is waited to obscure
It is described that fuzzy encryption is carried out to the pending image according to the fuzzy class and the fuzzy password before the step of region
Processing, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described
The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image
Image information determine the step for the treatment of fuzzy region of the pending image.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request
Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment
Fuzzy class carries out fuzzy encryption to the blurred picture.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described
The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As being restored, to obtain former picture rich in detail.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy
The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described
The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph
As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The specific embodiment of computer-readable recording medium of the present invention obscures each specific real of encryption method with above-mentioned image
It is essentially identical to apply example, therefore not to repeat here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or system including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone,
Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of image obscures encryption method, it is characterised in that described image obscures encryption method and comprised the following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image,
And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described
Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
2. image as claimed in claim 1 obscures encryption method, it is characterised in that it is described according to the fuzzy parameter to described
Pending image carries out fuzzy encryption, includes the step of to obtain blurred picture:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain fuzzy graph
Picture.
3. image as claimed in claim 2 obscures encryption method, it is characterised in that described according in the pending image
Image information determines including the step for the treatment of fuzzy region for the pending image:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by the image where the human face image information
Region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half image of the pending image
Region is defined as treating fuzzy region.
4. image as claimed in claim 2 obscures encryption method, it is characterised in that described according in the pending image
Image information determine the pending image the step for the treatment of fuzzy region before, it is described according to the fuzzy class and the mould
Paste password carries out fuzzy encryption to the pending image, also includes the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, wait to locate to described according to the fuzzy parameter
The all images region of reason image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, the figure in the pending image is performed
As information determines the step for the treatment of fuzzy region of the pending image.
5. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy
Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture
Afterwards, described image obscures encryption method and also included:
When the fuzzy adjustment for receiving the blurred picture is asked, the fuzzy password in the fuzzy adjustment request is obtained;
It is fuzzy in being asked according to the fuzzy adjustment when the fuzzy password is identical with the fuzzy password of the blurred picture
Grade carries out fuzzy encryption to the blurred picture.
6. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy
Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture
Afterwards, described image obscures encryption method and also included:
When receiving the recovery request of the blurred picture, by the recovery password in the recovery request and the blurred picture
Fuzzy password be compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, the blurred picture is entered
Row restores, to obtain former picture rich in detail.
7. image as claimed in claim 6 obscures encryption method, it is characterised in that the recovery by the recovery request
After the step of password is compared with the fuzzy password of the blurred picture, described image, which obscures encryption method, also to be included:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase the blurred picture
Fuzzy class, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
8. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy
Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture
Afterwards, described image obscures encryption method and also included:
When sharing request of the blurred picture is being received, by the fuzzy password shared in request and the blurred picture
Fuzzy password be compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, the blurred picture is entered
Row ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:Memory, processor and it is stored in the storage
On device and the image that can run on the processor obscures encipheror, and described image obscures encipheror by the processor
Following steps are realized during execution:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image,
And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described
Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
10. a kind of computer-readable recording medium, it is characterised in that image mould is stored with the computer-readable recording medium
Encipheror is pasted, described image obscures when encipheror is executed by processor and realizes following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image,
And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described
Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710776659.XA CN107590770A (en) | 2017-08-31 | 2017-08-31 | Image obscures encryption method, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710776659.XA CN107590770A (en) | 2017-08-31 | 2017-08-31 | Image obscures encryption method, mobile terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107590770A true CN107590770A (en) | 2018-01-16 |
Family
ID=61050774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710776659.XA Pending CN107590770A (en) | 2017-08-31 | 2017-08-31 | Image obscures encryption method, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107590770A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109919021A (en) * | 2019-01-29 | 2019-06-21 | 深圳市海派通讯科技有限公司 | Face shoots image guard method |
CN110659512A (en) * | 2019-09-27 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Picture management method, device, terminal and storage medium |
CN111443846A (en) * | 2020-04-23 | 2020-07-24 | 维沃移动通信有限公司 | Red packet processing method, electronic device and storage medium |
ES2780323A1 (en) * | 2019-02-22 | 2020-08-24 | Sacristan Brian Montoya | Intelligent image pixel (s) management system (Machine-translation by Google Translate, not legally binding) |
CN112217957A (en) * | 2020-08-28 | 2021-01-12 | 深圳市修远文化创意有限公司 | Image encryption and decryption method and related device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100027791A1 (en) * | 2007-02-14 | 2010-02-04 | Photint Venture Group Inc. | Fuzzy protection of visual content |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN105447395A (en) * | 2015-12-04 | 2016-03-30 | 上海斐讯数据通信技术有限公司 | Picture encryption system and picture decryption system |
-
2017
- 2017-08-31 CN CN201710776659.XA patent/CN107590770A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100027791A1 (en) * | 2007-02-14 | 2010-02-04 | Photint Venture Group Inc. | Fuzzy protection of visual content |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN105447395A (en) * | 2015-12-04 | 2016-03-30 | 上海斐讯数据通信技术有限公司 | Picture encryption system and picture decryption system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109919021A (en) * | 2019-01-29 | 2019-06-21 | 深圳市海派通讯科技有限公司 | Face shoots image guard method |
ES2780323A1 (en) * | 2019-02-22 | 2020-08-24 | Sacristan Brian Montoya | Intelligent image pixel (s) management system (Machine-translation by Google Translate, not legally binding) |
CN110659512A (en) * | 2019-09-27 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Picture management method, device, terminal and storage medium |
CN111443846A (en) * | 2020-04-23 | 2020-07-24 | 维沃移动通信有限公司 | Red packet processing method, electronic device and storage medium |
CN111443846B (en) * | 2020-04-23 | 2021-12-21 | 维沃移动通信有限公司 | Red packet processing method, electronic device and storage medium |
CN112217957A (en) * | 2020-08-28 | 2021-01-12 | 深圳市修远文化创意有限公司 | Image encryption and decryption method and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107590770A (en) | Image obscures encryption method, mobile terminal and storage medium | |
CN107657045A (en) | Information collection method, mobile terminal and computer-readable recording medium | |
CN107977144A (en) | A kind of screenshotss processing method and mobile terminal | |
CN104700010A (en) | Personal information protection method and protection device | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN107808084A (en) | A kind of touch operation method and mobile terminal | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN107784232A (en) | A kind of image processing method and mobile terminal | |
CN107784089A (en) | A kind of storage method of multi-medium data, processing method and mobile terminal | |
CN107346200A (en) | One kind interval screenshot method and terminal | |
CN107273766A (en) | A kind of method and apparatus of data encryption and decryption | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN108021470A (en) | A kind of data backup method, mobile terminal and computer-readable recording medium | |
CN108200272A (en) | A kind of method of terminal control, terminal and computer readable storage medium | |
CN108011887A (en) | A kind of account management method and equipment | |
CN107526493A (en) | A kind of small tool display methods, equipment and computer-readable recording medium | |
CN108319873A (en) | Flexible screen terminal security authentication control method, terminal and computer storage media | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN110187925A (en) | A kind of desktop pretrigger control method, equipment and computer readable storage medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108563959A (en) | File encrypting method, device and computer storage media | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107864086A (en) | The quick sharing method of information, mobile terminal and computer-readable recording medium | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN108680166A (en) | Navigation information is compatible with display methods, terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180116 |