CN107590770A - Image obscures encryption method, mobile terminal and storage medium - Google Patents

Image obscures encryption method, mobile terminal and storage medium Download PDF

Info

Publication number
CN107590770A
CN107590770A CN201710776659.XA CN201710776659A CN107590770A CN 107590770 A CN107590770 A CN 107590770A CN 201710776659 A CN201710776659 A CN 201710776659A CN 107590770 A CN107590770 A CN 107590770A
Authority
CN
China
Prior art keywords
fuzzy
image
blurred picture
encryption
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710776659.XA
Other languages
Chinese (zh)
Inventor
何小虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710776659.XA priority Critical patent/CN107590770A/en
Publication of CN107590770A publication Critical patent/CN107590770A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of image to obscure encryption method, mobile terminal and storage medium, and the image obscures encryption method and comprised the following steps:When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image, and shows that fuzzy parameter sets interface;When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain blurred picture, and shows the blurred picture.The present invention can protect user to need the privacy information encrypted by carrying out Fuzzy Processing to image, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, facilitate user to select again and using image.

Description

Image obscures encryption method, mobile terminal and storage medium
Technical field
The present invention relates to image encryption field, more particularly to a kind of image to obscure encryption method, mobile terminal and storage and be situated between Matter.
Background technology
Stepped up with the component performance of taking pictures of mobile terminal configuration, smart mobile phone or tablet personal computer etc. are mobile eventually End turns into daily most commonly used instrument of taking pictures.Strange hundred sample of picture material thousand of shooting, some images for containing privacy information are stayed Stay in smart mobile phone or tablet personal computer.For the image containing privacy information, it is desirable to it can be carried out efficiently to add Close and decryption is so as to not only ensure privacy information safety but also without prejudice to the use of other images.
At present, more conventional method is to utilize encryption software, it would be desirable to which the image concealing of encryption is transferred to encryption In file.After image concealing or transfer, hiding image is not shown, user easily forgets the image hidden or shifted, In addition, when need check hide or transfer image when, it is necessary to by corresponding encryption software find encryption file, pair plus The image hidden or shifted can be just checked after close file decryption, operating procedure is more, and process is cumbersome.
Therefore, existing image encryption method, exist encrypted image and non-encrypted images can not preview simultaneously, encryption conciliates Close process is cumbersome, is not easy to the problem of user uses.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill Art.
The content of the invention
It is a primary object of the present invention to provide a kind of image to obscure encryption method, mobile terminal and storage medium, it is intended to Solve encrypted image and non-encrypted images can not preview simultaneously, encryption and decryption processes are cumbersome, are not easy to the technology that user uses Problem.
To achieve the above object, the present invention provides a kind of image and obscures encryption method, and described image obscures encryption method bag Include following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould The step of pasting image includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould Paste image.
Alternatively, what the image information in the pending image determined the pending image treats confusion region The step of domain, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image Image-region is defined as treating fuzzy region.
Alternatively, what the image information in the pending image determined the pending image treats confusion region It is described the pending image to be carried out at fuzzy encryption according to the fuzzy class and the fuzzy password before the step of domain Reason, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image Image information determine the step for the treatment of fuzzy region of the pending image.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment Fuzzy class carries out fuzzy encryption to the blurred picture.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As being restored, to obtain former picture rich in detail.
Alternatively, the recovery password by the recovery request is compared with the fuzzy password of the blurred picture The step of after, described image obscure encryption method also include:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Alternatively, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain mould After the step of pasting image, and showing the blurred picture, described image, which obscures encryption method, also to be included:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The present invention also provides a kind of mobile terminal, and the mobile terminal includes:Memory, processor and it is stored in described deposit On reservoir and the image that can run on the processor obscures encipheror, and described image obscures encipheror by the processing Device realizes following steps when performing:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
The present invention also provides a kind of computer-readable recording medium, and image is stored with the computer-readable recording medium Fuzzy encipheror, described image obscure when encipheror is executed by processor and realize following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
The present invention obscures encrypted instruction acquisition according to the image and treated when the image for monitoring triggering obscures encrypted instruction Image is handled, and shows that fuzzy parameter sets interface;Receiving the fuzzy parameter based on fuzzy parameter setting interface setting When, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain blurred picture, and shows that this is fuzzy Image, this programme can protect user to need the privacy information encrypted, and user can be simultaneously by carrying out Fuzzy Processing to image Preview blurred picture and other Non-blurred images, are easy to user efficiently to find encrypted image, facilitate user to select and make again With image, without hiding or shifting the image for needing to encrypt, encryption and decryption step are significantly reduced.
Brief description of the drawings
Fig. 1 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the schematic flow sheet that image of the present invention obscures encryption method first embodiment;
Fig. 3 is effect diagram of the image after obscuring encryption in the embodiment of the present invention;
Fig. 4 is to described pending described in second embodiment of the invention according to the fuzzy class and the fuzzy password Image carries out fuzzy encryption, to obtain the refinement schematic flow sheet of blurred picture step;
Fig. 5 is to described pending described in third embodiment of the invention according to the fuzzy class and the fuzzy password Image carries out fuzzy encryption, to obtain the refinement schematic flow sheet of blurred picture step;
Fig. 6 is the schematic flow sheet that image of the present invention obscures encryption method fourth embodiment.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:When the image for monitoring triggering obscures CIPHERING REQUEST, obtaining should Fuzzy class, fuzzy password and pending image in fuzzy CIPHERING REQUEST, then according to the fuzzy class and the fuzzy password Fuzzy encryption is carried out to the pending image, to obtain blurred picture, and shows the blurred picture.
Because by after image concealing or transfer, hiding image is not shown, user easily forgets the figure hidden or shifted Picture, in addition, when need check hide or transfer image when, it is necessary to by corresponding encryption software find encryption file, The image hidden or shifted can be just checked after being decrypted to encryption folder, operating procedure is more, and process is cumbersome, therefore, existing Image encryption method, exist encrypted image and non-encrypted images can not preview simultaneously, encryption and decryption processes are cumbersome, are not easy to use The problem of family uses.
To solve the above problems, this programme can protect user's needs to encrypt hidden by carrying out Fuzzy Processing to image Personal letter ceases, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, side Just user selects and using image, without hiding or shifting the image for needing to encrypt, is significantly reduced encryption and decryption step again Suddenly.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:Display unit 106, user input unit 107, interface unit 108, memory 109, processor The part such as 110 and power supply 111.It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 1 is not formed Restriction to mobile terminal, mobile terminal can be included than illustrating more or less parts, either combine some parts or Different part arrangements.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
In the mobile terminal shown in Fig. 1, processor 110 can be used for calling the image stored in memory 109 to obscure Encipheror, and perform following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Further, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain The step of blurred picture, includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould Paste image.
Further, the image information in the pending image determines that the pending image is waited to obscure The step of region, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image Image-region is defined as treating fuzzy region.
Further, the image information in the pending image determines that the pending image is waited to obscure It is described that fuzzy encryption is carried out to the pending image according to the fuzzy class and the fuzzy password before the step of region Processing, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image Image information determine the step for the treatment of fuzzy region of the pending image.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform Following steps:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment Fuzzy class carries out fuzzy encryption to the blurred picture.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform Following steps:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As being restored, to obtain former picture rich in detail.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform Following steps:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Further, processor 1001 can call the image stored in memory 1005 to obscure encipheror, also perform Following steps:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The specific embodiment of mobile terminal of the present invention obscures the basic phase of each specific embodiment of encryption method with following images Together, therefore not to repeat here.
The present invention provides a kind of image and obscures encryption method.
Reference picture 2, Fig. 2 are the schematic flow sheet that image of the present invention obscures encryption method first embodiment.
In the present embodiment, the image obscures encryption method and included:
Step S101, when the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtained Pending image is taken, and shows that fuzzy parameter sets interface;
The image obscures encryption method and is applied to mobile terminal, and the mobile terminal includes but is not limited to smart mobile phone and flat board Computer.The controllable mobile terminal of user realizes the fuzzy encryption of image, when the image for monitoring triggering obscures encrypted instruction When, encrypted instruction is obscured according to the image and obtains pending image, and show that fuzzy parameter sets interface, the fuzzy parameter includes Fuzzy class and fuzzy password etc., the fuzzy parameter set interface fuzzy class option and fuzzy Password Input frame, user Ke Ji The fuzzy class of the pending image is set in the fuzzy class option, the fuzzy Password Input frame can be based on and set this pending The fuzzy password of image.The triggering mode that the image obscures encrypted instruction includes the triggering of long-press image and menu image triggering, In the present invention, this is not construed as limiting.When the triggering mode that the image obscures encrypted instruction triggers for long-press image, pending figure Image as being long-press, and when the triggering mode that the image obscures encrypted instruction triggers for menu image, pending image needs Want user to select, i.e., when the image that user is clicked in menu image obscures Encryption Options, show pending image selection interface, when After selecting pending image, triggering image obscures encrypted instruction.The fuzzy class is including one-level is fuzzy, two level is fuzzy, three-level mould Paste, level Four are fuzzy and Pyatyi is fuzzy etc., and fuzzy class is higher, represents that the fog-level of image is higher, image is more unintelligible.
In specific implementation, user can first set fuzzy parameter, i.e. fuzzy class and fuzzy password, and then reselection needs The image of Fuzzy Processing, it is specifically as follows when the fuzzy parameter that mobile terminal receives user's triggering sets instruction, shows mould Parameter setting interface is pasted, user can be based on the fuzzy parameter and set interface to set fuzzy parameter, i.e. fuzzy class and fuzzy password. Mobile terminal shows the choosing of pending image after the fuzzy parameter that user sets interface to set based on the fuzzy parameter is received Interface is selected, user can be based on the selection interface and select pending image, i.e. selection needs the image of Fuzzy Processing.
, can be according to the image of the pending image after the pending image of the acquisition for mobile terminal in another specific implementation Type acquiescence selection fuzzy class, whether the image type for specially judging the pending image is figure kind's type, if this is treated The image type for handling image is personage's type, then the fuzzy class of the pending image obscures for Pyatyi, if this is pending The image type of image is not personage's type, then the fuzzy class of the processing image is two level is fuzzy or three-level is fuzzy etc..
Step S102, when receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the mould Paste parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and shows the blurred picture.
The mobile terminal is when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter, according to the mould Paste parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and shows the blurred picture, specifically, Fuzzy class of the mobile terminal in the fuzzy parameter carries out Fuzzy Processing to the pending image, then fuzzy according to this Pending image after Fuzzy Processing is encrypted fuzzy password in parameter, so as to obtain blurred picture, together When show the blurred picture.The present invention can also carry out fuzzy encryption to several pending images, this several it is pending The fuzzy parameter of image can be identical, also can be different, and user can be configured.
In specific implementation, for the mobile terminal when obtaining fuzzy parameter, display is through the fuzzy parameter in the preview window Pending image after processing, fuzzy class is shown in the preview window control is set, user can be set based on the fuzzy class The fuzzy class that control adjusts the pending image is put, is easy to user to be rapidly completed the fuzzy encryption of the pending image. In another specific implementation, when the deletion for receiving the blurred picture instructs, interface for password input is shown, and receiving base When the fuzzy password of interface for password input input, this is obscured into password compared with the fuzzy password of the blurred picture, such as The fruit fuzzy password is identical with the fuzzy password of the blurred picture, then deletes the blurred picture, if the fuzzy password and the mould It is different to paste the fuzzy password of image, then sends prompt message.
It should be noted that during fuzzy encryption is carried out to pending image, pending image can be entered The fuzzy encryption of row local image region, pending image can also be carried out at the fuzzy encryption in whole image region Reason.When carrying out the fuzzy encryption of local image region to pending image, it need to determine that needs carry out fuzzy encryption Local image region, therefore, show pending image in the preview window, user can be based on the preview window determine to need into The local image region of the fuzzy encryption of row, after user determines to need to carry out the local image region of fuzzy encryption, Fuzzy encryption is carried out to the local image region, to obtain blurred picture, and the blurred picture is shown in the preview window, When mobile terminal, which receives blurred picture, completes quality, fuzzy encryption process terminates.The local image region is divided into Different zones are configured, for example, the heart sets fuzzy ranges in the picture, in another example, in image all directions area up and down Domain, which is set, needs fuzzy region.It is multiple when needing the local image region for carrying out fuzzy encryption to have in specific implementation When, it can give each local image region that one fuzzy class and fuzzy password are set, realize the Multiple Fuzzy encryption of image, have Effect ensures the security of fuzzy encryption.
Fig. 3 is effect diagram of the image after obscuring encryption in the embodiment of the present invention, as shown in figure 3, mobile Terminal shows 11 images, wherein 6 are blurred picture, 5 are picture rich in detail, and picture rich in detail and blurred picture show simultaneously Show.
The present invention can be applied not only to image, also can be applicable in text, you can fuzzy encryption is carried out to text, should Text includes Word texts, Excel texts, PPT texts, PDF texts and other texts comprising word etc..Carried out to text During fuzzy encryption, fuzzy encryption can be carried out to the full detail in text, the partial information in text can also be entered The fuzzy encryption of row.
In the present embodiment, the present invention obscures when the image for monitoring triggering obscures encrypted instruction according to the image Encrypted instruction obtains pending image, and shows that fuzzy parameter sets interface;Interface is set based on the fuzzy parameter receiving During the fuzzy parameter of setting, fuzzy encryption is carried out to the pending image according to the fuzzy parameter, to obtain fuzzy graph Picture, and the blurred picture is shown, this programme can protect user to need the privacy letter encrypted by carrying out Fuzzy Processing to image Breath, and user can preview blurred picture and other Non-blurred images simultaneously, be easy to user efficiently to find encrypted image, it is convenient to use Family selects and using image, without hiding or shifting the image for needing to encrypt, is significantly reduced encryption and decryption step again.
Further, reference picture 4, the second of the fuzzy encryption method of image of the present invention is proposed based on above-mentioned first embodiment Embodiment, the difference with previous embodiment are that step S102 includes:
Step S1021, what the image information in the pending image determined the pending image treats confusion region Domain;
The mobile terminal is treated when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter according to this Image information in processing image determines the fuzzy region for the treatment of of the pending image, and specifically, the mobile terminal judges that this waits to locate Whether the image information managed in image is human face image information, if the image information in the pending image is facial image letter Breath, then be defined as treating fuzzy region, if the image in the pending image by the image-region where the human face image information Information is not human face image information, then is defined as treating fuzzy region, it is necessary to illustrate by the upper half image-region of the pending image , the image information in the pending image is not that human face image information treats that fuzzy region can also be under pending image Half image-region and center image region etc..
Step S1022, fuzzy region, which is carried out at fuzzy encryption, to be treated to the pending image according to the fuzzy parameter Reason, to obtain blurred picture.
The mobile terminal determine determine the pending image after fuzzy region, it is pending to this according to the fuzzy parameter Image treats that fuzzy region carries out fuzzy encryption, to obtain blurred picture, i.e., according to fuzzy class and fuzzy password to this Pending image treats that fuzzy region carries out fuzzy encryption.
In the present embodiment, the present invention treats confusion region by what the image information in pending image determined pending image Automatically determining for fuzzy region is treated in domain, realization, is participated in without user, improves the fuzzy encryption speed for treating fuzzy region.
Further, reference picture 5, the 3rd of the fuzzy encryption method of image of the present invention the is proposed based on above-mentioned second embodiment Embodiment, the difference with previous embodiment are that step S102 also includes:
Step S1023, judges whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
Step S1024, if the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to described fuzzy Parameter carries out fuzzy encryption to all images region of the pending image, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, step S1021 is performed, i.e., waits to locate according to What the image information in reason image determined the pending image treats fuzzy region.
The mobile terminal judges the mould when receiving the fuzzy parameter that user sets interface to set based on the fuzzy parameter Whether the fuzzy class in paste parameter is less than or equal to predetermined level, if the fuzzy class in the fuzzy parameter is less than or equal to Predetermined level, that is, when the fog-level needed is relatively low, all images region of the pending image is entered according to the fuzzy parameter The fuzzy encryption of row, to obtain blurred picture, if the fuzzy class in the fuzzy parameter is more than predetermined level, basis should Image information in pending image determines the fuzzy region for the treatment of of the pending image, then this is waited to locate according to the fuzzy parameter Reason image treats that fuzzy region carries out fuzzy encryption, to obtain blurred picture, i.e., according to fuzzy class and fuzzy password pair The pending image treats that fuzzy region carries out fuzzy encryption.
In the present embodiment, the present invention carries out mould when fuzzy class is relatively low to all images region of pending image Encryption is pasted, and when fuzzy class is higher, fuzzy encryption is carried out to the local image region of pending image, effectively The fuzzy encryption of raising security.
Further, reference picture 6, based on above-mentioned first, second or third embodiment propose image of the present invention it is fuzzy plus The fourth embodiment of decryption method, the difference with previous embodiment are, after step S102, the image obscures encryption method also Including:
Step S103, when the fuzzy adjustment for receiving the blurred picture is asked, obtain in the fuzzy adjustment request Fuzzy password;
Step S104, when the fuzzy password is identical with the fuzzy password of the blurred picture, according to the fuzzy tune Fuzzy class in whole request carries out fuzzy encryption to the blurred picture.
The mobile terminal obtains fuzzy in fuzzy adjustment request when the fuzzy adjustment for receiving blurred picture is asked Password, and this is obscured into password compared with the fuzzy password of the blurred picture, and obscure password and the blurred picture at this Fuzzy password it is identical when, the fuzzy class in being asked according to the fuzzy adjustment carries out fuzzy encryption to the blurred picture. In specific implementation, this obscure password it is identical with the fuzzy password of the blurred picture when, obtain the current mould of the blurred picture Grade is pasted, if the current fuzzy class is less than default fuzzy class (highest fuzzy class), in the base of present Fuzzy grade Increase a fuzzy class on plinth, and after fuzzy class is increased, the blurred picture is carried out according to the fuzzy class after increase Fuzzy encryption, that is, deepen fog-level.
In the present embodiment, the present invention also can adjust the fog-level of the blurred picture, be easy to after blurred picture is obtained User needs to be adjusted when adjusting fog-level.
Further, the mobile terminal is when receiving the recovery request of the blurred picture, by answering in the recovery request Original code restores password and the blurred picture compared with the fuzzy password of the blurred picture in the recovery request When fuzzy password is identical, the blurred picture is restored, to obtain former picture rich in detail, realizes the ambiguity solution of blurred picture.
Further, the mobile terminal is when receiving the recovery request of the blurred picture, by answering in the recovery request Original code restores password and the blurred picture compared with the fuzzy password of the blurred picture in the recovery request During fuzzy password difference, increase the fuzzy class of the blurred picture, and according to the fuzzy class after increase to the pending image Fuzzy encryption is carried out, when restoring code error, deepens the fog-level of blurred picture, improves the safety of original image Property.
Further, the mobile terminal is receiving when sharing request of the blurred picture, and this is shared to the mould in request Password is pasted compared with the fuzzy password of the blurred picture, and shares fuzzy password and the blurred picture in request at this Fuzzy password it is identical when, to the blurred picture carry out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail, point Before enjoying blurred picture, fuzzy password authentification is carried out, only fuzzy password authentification is by that could carry out sharing operation, effectively protect Demonstrate,prove the security of image.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium, the computer-readable recording medium On be stored with image and obscure encipheror, described image obscures encipheror and realizes following steps when being executed by processor:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending figure Picture, and show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, according to the fuzzy parameter to institute State pending image and carry out fuzzy encryption, to obtain blurred picture, and show the blurred picture.
Further, it is described to carry out fuzzy encryption to the pending image according to the fuzzy parameter, to obtain The step of blurred picture, includes:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain mould Paste image.
Further, the image information in the pending image determines that the pending image is waited to obscure The step of region, includes:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by where the human face image information Image-region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half of the pending image Image-region is defined as treating fuzzy region.
Further, the image information in the pending image determines that the pending image is waited to obscure It is described that fuzzy encryption is carried out to the pending image according to the fuzzy class and the fuzzy password before the step of region Processing, also include the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, according to the fuzzy parameter to described The all images region of pending image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, perform described according in the pending image Image information determine the step for the treatment of fuzzy region of the pending image.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When the fuzzy adjustment for receiving the blurred picture is asked, obtain fuzzy close in the fuzzy adjustment request Code;
When the fuzzy password is identical with the fuzzy password of the blurred picture, in being asked according to the fuzzy adjustment Fuzzy class carries out fuzzy encryption to the blurred picture.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When receiving the recovery request of the blurred picture, the recovery password in the recovery request is obscured with described The fuzzy password of image is compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As being restored, to obtain former picture rich in detail.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase described fuzzy The fuzzy class of image, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
Further, described image obscures when encipheror is executed by processor and also realizes following steps:
When sharing request of the blurred picture is being received, the fuzzy password shared in request is being obscured with described The fuzzy password of image is compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, to the fuzzy graph As carrying out ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
The specific embodiment of computer-readable recording medium of the present invention obscures each specific real of encryption method with above-mentioned image It is essentially identical to apply example, therefore not to repeat here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of image obscures encryption method, it is characterised in that described image obscures encryption method and comprised the following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image, And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
2. image as claimed in claim 1 obscures encryption method, it is characterised in that it is described according to the fuzzy parameter to described Pending image carries out fuzzy encryption, includes the step of to obtain blurred picture:
What the image information in the pending image determined the pending image treats fuzzy region;
Fuzzy region, which carries out fuzzy encryption, to be treated to the pending image according to the fuzzy parameter, to obtain fuzzy graph Picture.
3. image as claimed in claim 2 obscures encryption method, it is characterised in that described according in the pending image Image information determines including the step for the treatment of fuzzy region for the pending image:
Judge whether the image information in the pending image is human face image information;
If the image information in the pending image is human face image information, by the image where the human face image information Region is defined as treating fuzzy region;
If the image information in the pending image is not human face image information, by the upper half image of the pending image Region is defined as treating fuzzy region.
4. image as claimed in claim 2 obscures encryption method, it is characterised in that described according in the pending image Image information determine the pending image the step for the treatment of fuzzy region before, it is described according to the fuzzy class and the mould Paste password carries out fuzzy encryption to the pending image, also includes the step of to obtain blurred picture:
Judge whether the fuzzy class in the fuzzy parameter is less than or equal to predetermined level;
If the fuzzy class in the fuzzy parameter is less than or equal to predetermined level, wait to locate to described according to the fuzzy parameter The all images region of reason image carries out fuzzy encryption, to obtain blurred picture;
If the fuzzy class in the fuzzy parameter is more than predetermined level, the figure in the pending image is performed As information determines the step for the treatment of fuzzy region of the pending image.
5. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture Afterwards, described image obscures encryption method and also included:
When the fuzzy adjustment for receiving the blurred picture is asked, the fuzzy password in the fuzzy adjustment request is obtained;
It is fuzzy in being asked according to the fuzzy adjustment when the fuzzy password is identical with the fuzzy password of the blurred picture Grade carries out fuzzy encryption to the blurred picture.
6. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture Afterwards, described image obscures encryption method and also included:
When receiving the recovery request of the blurred picture, by the recovery password in the recovery request and the blurred picture Fuzzy password be compared;
When the recovery password in the recovery request is identical with the fuzzy password of the blurred picture, the blurred picture is entered Row restores, to obtain former picture rich in detail.
7. image as claimed in claim 6 obscures encryption method, it is characterised in that the recovery by the recovery request After the step of password is compared with the fuzzy password of the blurred picture, described image, which obscures encryption method, also to be included:
When the fuzzy password difference for restoring password and the blurred picture in the recovery request, increase the blurred picture Fuzzy class, and fuzzy encryption is carried out to the pending image according to the fuzzy class after increase.
8. the image as any one of claim 1-4 obscures encryption method, it is characterised in that described according to described fuzzy Parameter carries out fuzzy encryption to the pending image, to obtain blurred picture, and the step of show the blurred picture Afterwards, described image obscures encryption method and also included:
When sharing request of the blurred picture is being received, by the fuzzy password shared in request and the blurred picture Fuzzy password be compared;
When the fuzzy password shared in request is identical with the fuzzy password of the blurred picture, the blurred picture is entered Row ambiguity solution, to obtain picture rich in detail, and share the picture rich in detail.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:Memory, processor and it is stored in the storage On device and the image that can run on the processor obscures encipheror, and described image obscures encipheror by the processor Following steps are realized during execution:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image, And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
10. a kind of computer-readable recording medium, it is characterised in that image mould is stored with the computer-readable recording medium Encipheror is pasted, described image obscures when encipheror is executed by processor and realizes following steps:
When the image for monitoring triggering obscures encrypted instruction, encrypted instruction is obscured according to described image and obtains pending image, And show that fuzzy parameter sets interface;
When receiving the fuzzy parameter based on fuzzy parameter setting interface setting, treated according to the fuzzy parameter to described Processing image carries out fuzzy encryption, to obtain blurred picture, and shows the blurred picture.
CN201710776659.XA 2017-08-31 2017-08-31 Image obscures encryption method, mobile terminal and storage medium Pending CN107590770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710776659.XA CN107590770A (en) 2017-08-31 2017-08-31 Image obscures encryption method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710776659.XA CN107590770A (en) 2017-08-31 2017-08-31 Image obscures encryption method, mobile terminal and storage medium

Publications (1)

Publication Number Publication Date
CN107590770A true CN107590770A (en) 2018-01-16

Family

ID=61050774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710776659.XA Pending CN107590770A (en) 2017-08-31 2017-08-31 Image obscures encryption method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107590770A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919021A (en) * 2019-01-29 2019-06-21 深圳市海派通讯科技有限公司 Face shoots image guard method
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN111443846A (en) * 2020-04-23 2020-07-24 维沃移动通信有限公司 Red packet processing method, electronic device and storage medium
ES2780323A1 (en) * 2019-02-22 2020-08-24 Sacristan Brian Montoya Intelligent image pixel (s) management system (Machine-translation by Google Translate, not legally binding)
CN112217957A (en) * 2020-08-28 2021-01-12 深圳市修远文化创意有限公司 Image encryption and decryption method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027791A1 (en) * 2007-02-14 2010-02-04 Photint Venture Group Inc. Fuzzy protection of visual content
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105447395A (en) * 2015-12-04 2016-03-30 上海斐讯数据通信技术有限公司 Picture encryption system and picture decryption system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027791A1 (en) * 2007-02-14 2010-02-04 Photint Venture Group Inc. Fuzzy protection of visual content
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105447395A (en) * 2015-12-04 2016-03-30 上海斐讯数据通信技术有限公司 Picture encryption system and picture decryption system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919021A (en) * 2019-01-29 2019-06-21 深圳市海派通讯科技有限公司 Face shoots image guard method
ES2780323A1 (en) * 2019-02-22 2020-08-24 Sacristan Brian Montoya Intelligent image pixel (s) management system (Machine-translation by Google Translate, not legally binding)
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN111443846A (en) * 2020-04-23 2020-07-24 维沃移动通信有限公司 Red packet processing method, electronic device and storage medium
CN111443846B (en) * 2020-04-23 2021-12-21 维沃移动通信有限公司 Red packet processing method, electronic device and storage medium
CN112217957A (en) * 2020-08-28 2021-01-12 深圳市修远文化创意有限公司 Image encryption and decryption method and related device

Similar Documents

Publication Publication Date Title
CN107590770A (en) Image obscures encryption method, mobile terminal and storage medium
CN107657045A (en) Information collection method, mobile terminal and computer-readable recording medium
CN107977144A (en) A kind of screenshotss processing method and mobile terminal
CN104700010A (en) Personal information protection method and protection device
CN110188524B (en) Information encryption method, information decryption method and terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN107784232A (en) A kind of image processing method and mobile terminal
CN107784089A (en) A kind of storage method of multi-medium data, processing method and mobile terminal
CN107346200A (en) One kind interval screenshot method and terminal
CN107273766A (en) A kind of method and apparatus of data encryption and decryption
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN108021470A (en) A kind of data backup method, mobile terminal and computer-readable recording medium
CN108200272A (en) A kind of method of terminal control, terminal and computer readable storage medium
CN108011887A (en) A kind of account management method and equipment
CN107526493A (en) A kind of small tool display methods, equipment and computer-readable recording medium
CN108319873A (en) Flexible screen terminal security authentication control method, terminal and computer storage media
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN110187925A (en) A kind of desktop pretrigger control method, equipment and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN108563959A (en) File encrypting method, device and computer storage media
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107864086A (en) The quick sharing method of information, mobile terminal and computer-readable recording medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN108680166A (en) Navigation information is compatible with display methods, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116