CN107864313A - A kind of image processing method, terminal and computer-readable recording medium - Google Patents
A kind of image processing method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107864313A CN107864313A CN201710895944.3A CN201710895944A CN107864313A CN 107864313 A CN107864313 A CN 107864313A CN 201710895944 A CN201710895944 A CN 201710895944A CN 107864313 A CN107864313 A CN 107864313A
- Authority
- CN
- China
- Prior art keywords
- image
- identification information
- encrypted
- terminal
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of image processing method, terminal and computer-readable recording medium, wherein method includes:The data message at least one image that extraction terminal is got;Detect at least one image data message whether each encrypted image with having stored data message it is identical;If testing result is yes, at least one image got is encrypted.The embodiment of the present invention is by the way that at least one image got with encrypted image has identical data message is encrypted, it can realize and rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, simplify user's operation, meet user to the automating of non-encrypted images, intelligent demand.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of image processing method, terminal and computer-readable deposit
Storage media.
Background technology
In life/work of people, everyone has the privacy of oneself, it is necessary to be maintained secrecy, respected.Mobile terminal is set
The standby personal electric product high as privacy, is loaded with the information of individual subscriber, the wherein image such as photo, picture is information
Amount is maximum, most intuitively content, had unavoidably in mobile terminal device picture library user picture, work data picture, Private Banking,
Prove information picture information etc..When mobile terminal device not user by the side of when or when other people are set using the mobile terminal of oneself
When standby, the extremely strong content of these privacy is easily compromised under these scenes, and adverse consequences is caused to individual.For these feelings
Condition, many mobile terminal device manufacturers provide relative solution, and such as application program encryption, picture is directly encrypted, even
It is to establish independent private space application program, picture for needing to be encrypted etc. is deposited to user.
But current technology scheme needs active user actively to initiate cryptographic operation, it is necessary to need to enter it in user every time
During row encryption, individually it is encrypted one by one respectively, it is complex for operation step, especially when user needs that multiple pictures are encrypted
When, it is necessary to carry out multiple clicks on selection one by one, then unify encryption, cumbersome complexity.When user is not convenient or not timely
When the image encrypted to needs is encrypted, privacy content is having not enough time to encrypt or used still in being in normally present condition
During encryption is forgotten at family, if mobile terminal device is used by others, it is likely that the leakage problem of individual privacy can be caused.
The content of the invention
The embodiments of the invention provide a kind of image processing method, terminal and computer-readable recording medium, can be achieved fast
Non-encrypted images are encrypted on fast ground, avoid information leakage, improve encryption efficiency.
In a first aspect, the embodiments of the invention provide a kind of image processing method, this method includes:
The data message at least one image that extraction terminal is got;
Detect at least one image data message whether with the data message phase of each encrypted image stored
Together;
If testing result is yes, at least one image got is encrypted.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect
The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch
The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use
In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
The data message at least one image that the embodiment of the present invention is got by extracting terminal, if detecting acquisition
The data message matched with the identical data message of each encrypted image stored, then to described in getting at least
One image is encrypted, it is possible to achieve rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption
Efficiency, meet user to the automating of non-encrypted images, intelligent demand.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of image processing method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow diagram of another image processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is another terminal schematic block diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of interface schematic diagram of terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
At present, for the personal picture privacy of protection terminal user the problem of, equipment vendors provide much
Solution, such as set screen-lock password, picture/application program and individually encrypt, or even to be also provided with independent privacy storage empty
Between, there is provided ecret protection application program, user can need to picture to be protected be put into the program and be encrypted, the individual of user
While privacy obtains protection, it also avoid finding there be the awkward of privacy encryption function on the mobile terminal device of oneself by other people
A word used for translation, the individual privacy of user and information security is set to have obtained good protection.To these content-encrypts, give user and completely lead
Control power, user are required for actively in time one by one entering content when needing to encrypt content (image such as picture, photo) every time
Row is encrypted to private space., can be to needing content to be protected when user is busy, scene is inconvenient, forgets encryption
Encryption is caused to forget.During not encryption in time, if other people use the mobile terminal device product of oneself, easily careless
In the case of cause individual privacy to reveal, cause adverse consequences.Therefore, the embodiment of the present invention is forgotten to image for above user
The situation for being encrypted or not being encrypted in time, it is proposed that a kind of image processing method, terminal and computer-readable storage medium
Matter, it can be achieved that rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, meet user couple
The automating of non-encrypted images, intelligent demand.
A kind of image processing method provided in an embodiment of the present invention can be performed by terminal, the terminal that the present invention relates to
The first identification information and/or the second identification information can be added to the image got, wherein, second identification information is pair
First identification information carries out obtaining for classification, and second identification information belongs to the son of first identification information
Collection, first identification information and/or the second identification information can be made up of various labels.Specifically can be for example, for example, working as
When the terminal gets photo (image) by camera device shooting, the first identification information is added to the photo, wherein, first
Identification information includes exposal model (U.S. face, more people's self-timers, night scene, business card scan, text are taken pictures), photo opporunity, takes pictures ground
The labels such as point, photo form, photo specification, photo content (text, personage, landscape etc.);When the image got is text,
Terminal can add the second identification information on the basis of the first identification information, wherein, the second identification information can be refined as beating
The labels such as printed text part, hand-written record, poster, when image is personage, the second identification information can refine to one or more people, specific
Recognition of face record, the preposition or label such as rearmounted.
It should be noted that when the terminal receives the images such as photo, its first identification information and the second identification information
In addition to the labels such as photo form, photo specification, photo content, in addition to delivering path (such as wechat, QQ, computer), biography
The labels such as defeated source (with specific transmission from which people or which group), for the first identification information and the second identification information
Can be including listed above, but this is not limited to, more rich identification record, this hair can be carried out according to the development of technology
Bright embodiment does not limit.The image processing method applied to terminal is illustrated below.
The embodiment of the present invention, a kind of image procossing is proposed for how reasonably to help user that image is encrypted automatically
Method, this method can be performed by terminal.When terminal gets at least one image, the terminal can extract described at least one
The data message of individual image, and detect at least one image data message whether with the phase of each encrypted image stored
Same data message matching, if testing result is identical, at least one image got is encrypted.
In one embodiment, when the terminal receives at least one image, the terminal can pass through polynary point first
Analysis, the first identification information of each encrypted image and/or the second identification information (data message) stored is analyzed.Its
In, the correspondence analysis (Correspondence analysis) is also referred to as association analysis, R-Q type factorial analyses, is in recent years new
A kind of Multivariate Dependent statistics of variable analytical technology to grow up, it can help us to study the interaction being made up of qualitative variable
Summary sheet discloses association between variables.The information of interaction summary sheet is graphically shown, has been primarily adapted for use in multiple classes
Other nominal level variable, it can reveal that between the difference between each classification of same variable, and each classification of different variables
Corresponding relation.Suitable for two or more nominal level variables.With the increase of the quantity of encrypted image, classification and its corresponding relation
It is more reasonable to divide, and more has directiveness to subsequent operation.
Further, the first identification information of each encrypted image of the terminal first to having stored is analyzed, and is obtained
The identification information of identical first of each encrypted image of storage, judges to whether there is identical second between each encrypted image
Identification information, if it does not exist, then the terminal using the identification information of identical first as foundation, detects at least one got
First identification information of individual image whether with the identification information match of identical first of each encrypted image stored.If deposit
, then the identification information of identical second between each encrypted image stored described in acquisition, and marked with the identical first
It is foundation to know information and the identification information of identical second, detect at least one image got the first identification information whether with
The identification information match of identical first of each encrypted image stored, if it does, then judging that at least one image is
It is no the second identification information to be present, if it is present detecting the second of at least one image encryption for identifying whether and having stored
The identification information match of identical second of image.The first identification information of at least one image for being got by detecting and/or
Second identification information whether the identification information of identical first and/or the identification information match of identical second with encrypted image, can
To improve detection efficiency, power consumption of terminal is reduced.
Further, if the terminal detects the first identification information of at least one image got and each encryption figure
The identification information match of identical first of picture, and be not present and each encrypted image at least one image got
The identification information match of identical second the second identification information, then terminal can export prompting interface automatically, if the terminal
The confirmation encrypted instruction for prompting interface input is received, then according to the identification information of identical first, to obtaining
To at least one image be encrypted.Or if the terminal detects the second of at least one image
Identification information and the identification information match of identical second of each encrypted image stored, then terminal can export prompting automatically
Interface;Wherein, the prompting interface is used to prompt the user whether to confirm at least one image is encrypted, if the end
Termination receives the confirmation encrypted instruction for prompting interface input, then according to the identification information of identical first and identical
The second identification information, at least one image got is encrypted.It can be seen that the embodiment is to have stored
Encrypted image the identification information of identical first and/or the identification information of identical second be standard, to get with it is described
At least one image of the identification information of identical first and/or the identification information match of identical second is encrypted, so as to
Rapidly non-encrypted images are encrypted for realization, avoid information leakage, simplify user's operating process, save terminal work(
Consumption.
In one embodiment, if the terminal is by Multiple Correspondence Analysis, detection finds each encryption figure stored
The identification information of identical first be present as between, wherein, first identification information is the transmission source of image, and the transmission source is equal
It is the same user from wechat, and the second identification information is not present between at least one encrypted image for having stored,
Then terminal is when receiving at least one picture (image), can according to first identification information, detect receive this at least
Whether the identical of each encrypted image with having stored transmits source in the transmission source (the first identification information) of one picture
Match somebody with somebody, that is, be all from the same user (the first identification information) of wechat, if it is, output prompting interface, is prompted the user whether
The picture is encrypted or is saved in private space (encryption), after user selects " confirmation ", terminal can receive pin
The instruction that confirmation to prompting interface input is encrypted, at least one image got is encrypted, i.e.,
The picture is encrypted or is saved in private space.
In one embodiment, if the terminal gets at least one encryption stored by Multiple Correspondence Analysis
The identification information of identical first of image, wherein, first identification information is the exposal model of image, is clapped on the exposal model
That take the photograph is portrait photographs, therefore, face information (the second identification information) between the encrypted image be present, if detecting that this adds
Identical face information between close image be present, then terminal can according to the identical exposal model and identical face information,
Detect the exposal model of at least one image received and face information whether with least one encrypted image for having stored
Identical exposal model and identical face information matching, if it is, output prompting interface, prompt the user whether the figure
Piece is encrypted or is saved in private space (encryption), and after user selects " confirmation ", terminal can be received for described
The instruction of the confirmation encryption of prompting interface input, at least one image got is encrypted, will the figure
Piece is encrypted or is saved in private space.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of image processing method provided in an embodiment of the present invention, such as Fig. 1 institutes
Show, this method may include:
S101:The data message at least one image that extraction terminal is got.
In the embodiment of the present invention, terminal can extract the number of at least one image when getting at least one image
It is believed that breath.For example, terminal is got at least by camera device shooting, portrait photographs's (image), the terminal can be from acquisitions
To an at least portrait photographs in extract photo opporunity, shooting places, photo form, photo specification, photo content etc.
Data message.In another example terminal can receive an at least pictures for other users terminal transmission, and can be from receiving
Got in an at least pictures picture format, image content, picture specification, delivering path, transmission source, etc. data letter
Breath, if object picture is text, can also get the data that mimeograph documents, hand-written record, poster etc. further refine
Information.
S102:Detect at least one image data message whether with the data message of each encrypted image stored
It is identical.
In the embodiment of the present invention, terminal can detect at least one image data message whether with stored it is each
The data message of encrypted image is identical.Specifically, terminal can obtain the identical number of each encrypted image stored first
It is believed that breath, and detect at least one image data message whether the identical data with the encrypted image stored
Information matches.If specifically can be for example, for example, the terminal transmission source that gets each encrypted image stored be equal
From " Zhang San " wechat (identical data message), when terminal receives an at least pictures, the terminal can detect acquisition
To the transmission sources of an at least pictures whether match with the identical transmission source of the encrypted image that has stored, i.e.,
From the wechat of " Zhang San ".
S103:If testing result is yes, at least one image got is encrypted.
In the embodiment of the present invention, if terminal detect the data message of at least one image with this stored it is each
The identical data message matching of encrypted image, then at least one image that got can be encrypted.Specifically, eventually
End is after the identical data message of each encrypted image stored is got, if detecting at least one image
Data message matches with the identical data message of each encrypted image stored, then the terminal can be according to the identical number
It is believed that breath, is encrypted at least one image got, non-encrypted images is encrypted so as to improve
Efficiency.
In one embodiment, if the terminal detects that the data message of at least one image is each with having stored
The identical data message matching of individual encrypted image, then terminal can export prompting interface, wherein, the prompting interface is used to carry
Show whether user confirms at least one image is encrypted, if terminal is received for prompting interface input
Confirm encrypted instruction, then at least one image that got can be encrypted for terminal.Specifically can be by taking Fig. 5 as an example
Illustrating, Fig. 5 is a kind of interface schematic diagram of terminal provided in an embodiment of the present invention, and 501 show confirming button in figure,
502 show cancel button.For example, if terminal detects that the data message of at least one image is each with having stored
The identical data message matching of encrypted image, then terminal can export prompting interface as shown in Figure 5, if user clicks on
ACK button shown in 501, then terminal can receive the confirmation encrypted instruction inputted for prompting interface described in Fig. 5, and can
So that at least one image got to be encrypted, if user clicks on the cancel button shown in 502, terminal
The encryption of at least one image to getting can be cancelled.
In the embodiment of the present invention, the data message at least one image that terminal is got by extraction, if detected
The data message matches with the identical data message of each encrypted image stored, then to described in getting at least one
Individual image is encrypted, and rapidly non-encrypted images are encrypted so as to realize, avoids information leakage, is improved and is added
Close efficiency, simplify user's operation, meet user to the automating of non-encrypted images, intelligent demand.
Refer to Fig. 2, Fig. 2 is the schematic flow diagram of another image processing method provided in an embodiment of the present invention, such as Fig. 2
Shown, the difference of this method and Fig. 1 methods described embodiments is, data message is divided into the first mark and believed by this method embodiment
Breath and the second identification information, the terminal obtains the identification information of identical first of each encrypted image first, then judge it is described
It whether there is the identification information of identical second between each encrypted image of storage, if it is present according to the identical the
One identification information and the identification information of identical second, are detected at least one image got, if it does not exist, then root
According to the identification information of identical first, at least one image got is detected.Specifically, this method includes:
S201:The data message at least one image that extraction terminal is got.
In the embodiment of the present invention, terminal can extract the number of at least one image when getting at least one image
It is believed that breath.Specifically illustrate as described in above-mentioned Fig. 1 embodiments, be no longer described in detail herein.
S202:Obtain the identification information of identical first of each encrypted image stored.
In the embodiment of the present invention, terminal can obtain the identification information of identical first of each encrypted image stored.
Specifically, each encrypted image that the terminal has stored includes data message, the data with least one image got
Information includes the first identification information and/or the second identification information.The terminal can detect and obtain each encryption figure stored
The identification information of identical first of picture.If for example, the terminal detects that each encrypted image stored has identical biography
Defeated source, that is, the wechat of " Zhang San " is all from, then the terminal can obtain the identical transmission source of each encrypted image, i.e.,
The transmission source that the terminal can get each encrypted image is all from the wechat of same user " Zhang San ".
S203:It whether there is the identification information of identical second between each encrypted image for judging to have stored.
In the embodiment of the present invention, terminal whether there is identical second between may determine that each encrypted image stored
Identification information, wherein, second identification information carries out classification to first identification information and obtained.Specifically,
If the terminal detects between each encrypted image stored identical exposal model (such as U.S. face, more people's self-timers, night be present
Scape, business card scan, text are taken pictures), photo opporunity, shooting places, photo form, photo specification, photo content (text, people
Thing, landscape etc.), photo form, photo specification, photo content, delivering path (such as wechat, QQ, computer), in transmission source etc.
The identification information of one or more first, then the terminal can determine whether between each encrypted image with the presence or absence of identical
The second identification information, such as when the encrypted image object is text, the second identification information can be refined as mimeograph documents, hand-written
Record, poster etc.;When the encrypted image object is personage, the second identification information can refine to one or more people, specific
It is recognition of face record, preposition or rearmounted etc..Assuming that the terminal detects that each encrypted image stored is all from same take pictures
Place (the first identification information), then whether the terminal each encrypted image that a judgement has stored that can improve is single humanoid figure picture
(the second identification information).
S204:If it is judged that being yes, then the identical second obtained between each encrypted image stored identifies
Information.
In the embodiment of the present invention, terminal is marked if it is judged that identical second between each encrypted image stored be present
Know information, then can obtain the identification information of identical second between each encrypted image stored.If for example, terminal
Identical transmission source (the first identification information) between each encrypted image for judging to have stored be present, then can obtain and deposit
The transmission source (the first identification information) of each encrypted image of storage, that is, the wechat of same user " Zhang San " is all from, should
The encrypted image that terminal can determine whether to have stored whether there is the identification information of identical second, if the terminal is judged
There is each encrypted image identical recognition of face to record (the second identification information), then the terminal can obtain the identical
Recognition of face records.
S205:Whether the first identification information for detecting at least one image is identical with each encrypted image for having stored
The first identification information match.
In the embodiment of the present invention, terminal can detect at least one image got the first identification information whether with
The identification information match of identical first of each encrypted image of storage.If for example, the terminal get stored it is each
There is encrypted image identical to transmit source, and be all from the wechat of same user " Zhang San ", then the terminal is being got at least
During one character image, can detect at least one character image got transmission source (the first identification information) whether
Identical transmission source (the first identification information) with each encrypted image stored matches, that is, is all from same user
The wechat of " Zhang San ".
S206:If testing result is yes, judge that at least one image whether there is the second identification information.
In the embodiment of the present invention, if terminal detects the first identification information of at least one image got with having deposited
The identification information match of identical first of each encrypted image of storage, then it may determine that at least one image whether there is second
Identification information.For example, if the terminal detects that the transmission source of at least one character image got is each with having stored
The identical transmission source matching of individual encrypted image, and be all from the wechat of " Zhang San ", then the terminal may determine that what is got
At least one character image whether there is face information (the second identification information).
S207:If it is present detect at least one image the second identification information whether with stored each plus
The identification information match of identical second of close image.
In the embodiment of the present invention, terminal, then can be then if it is judged that at least one image has the second identification information
Whether the second identification information for detecting at least one image identifies with the identical second of each encrypted image stored and believes
Breath matching.For example, terminal is if it is judged that the transmission source of at least one character image got is each with having stored
The identical transmission source matching of encrypted image, that is, be all from the wechat of " Zhang San ", and face information (the second mark letter be present
Breath), then the terminal can detect at least one character image face information whether with each encrypted image for having stored
Identical face information (the second identification information) matches.
S208:If it is judged that the second identification information is not present at least one image, then according to stored each plus
The identification information of identical first of close image, at least one image got is encrypted.
In the embodiment of the present invention, terminal is if it is judged that the second identification information is not present at least one image, then basis
The identification information of identical first of each encrypted image stored, place is encrypted at least one image got
Reason.For example, the terminal if it is judged that the transmission source of at least one character image got and stored each plus
The identical transmission source matching of close image, that is, be all from the wechat of " Zhang San ", and the second identification information is not present, then the terminal
When getting at least one image, at least one image of the wechat from " Zhang San " to getting is encrypted.
In one embodiment, if terminal detects that the first identification information of at least one image is each with having stored
The identification information match of identical first of individual encrypted image, and the second mark is not present at least one image for judging to get
Know information, then the terminal can export prompting interface, wherein, the prompting interface be used for prompt the user whether confirm to it is described extremely
A few image is encrypted.If terminal receives the confirmation encrypted instruction for prompting interface input, terminal can
So that at least one image including the identification information of identical first got to be encrypted.If for example, should
Terminal detects that the transmission source (the first identification information) of at least one image is identical with each encrypted image stored
The matching of transmission source, that is, be all from the same user " Zhang San " of wechat, if the terminal judge to get this at least
The second identification information is not present in one image, then the terminal can export prompting interface, and the prompting interface is used to prompt user
Whether confirm to be encrypted or be saved in private space at least one image, if terminal is received for the prompting
The confirmation encrypted instruction of interface input, then at least one image transmitted by " Zhang San " wechat that terminal will can be got
It is encrypted or preserves to private space.It can be seen that the embodiment is by obtaining the identification information of identical first of encrypted image,
When terminal receives the image with the identification information of identical first again, terminal can export prompting interface automatically, prompt
The user encryption image, so as to improve encryption efficiency, the situation that avoids user from not encrypting in time also avoids causing privacy leakage
Harmful effect produce, the personal information privacy of user is preferably protected and saved power consumption.
S209:If detect the phase of the second identification information and each encrypted image stored of at least one image
With the second identification information match, then according to the identification information of identical first and the second identification information, to get this extremely
A few image is encrypted.
In the embodiment of the present invention, if terminal detects that the second identification information of at least one image is each with having stored
The identification information match of identical second of individual encrypted image, then according to the identification information of identical first and the second identification information,
At least one image got is encrypted.For example, the terminal is if it is judged that this got is at least one
The transmission source of character image matches with the identical transmission source of each encrypted image stored, that is, is all from " Zhang San "
Wechat, and the face information (the second identification information) of the identical " Zhang San " of each encrypted image with having stored be present, then should
Terminal when getting at least one image, to get wechat from " Zhang San " and object picture be " Zhang San " people
At least one image of face information is encrypted.
In one embodiment, if terminal detects that the first identification information of at least one image is each with having stored
The identification information match of identical first of individual encrypted image, and the second mark be present at least one image for judging to get
Information, and detect the identical second of the second identification information of at least one image and each encrypted image stored
Identification information match, then the terminal can export prompting interface, the prompting interface is used to prompt the user whether to confirm to described
At least one image is encrypted, if terminal receives the confirmation encrypted instruction for prompting interface input, terminal
At least one image for including the identification information of identical first and the second identification information got can be encrypted
Processing.
If specifically can be for example, the terminal detects the spot for photography (first of at least one image got
Identification information) each encrypted image with having stored spot for photography it is identical, that is, be all from library, and judge what is got
At least one image is single humanoid figure picture (the second identification information), and detects each encrypted image stored with this extremely
A few image is single humanoid figure picture, and therefore, the terminal can export prompting interface, and after user selects " confirmation ", the terminal can
To receive the confirmation encrypted instruction for being directed to prompting interface input, then terminal can be to getting in library's shooting
At least one single humanoid figure picture is encrypted.It can be seen that the embodiment is by by the first of at least one image got
Identification information and the second identification information identification information of identical first and the identification information of identical second with encrypted image respectively
Matched, a key encryption is carried out at least one image that the match is successful, so that user only needs an operating procedure,
It is not required to be encrypted respectively for different content, reduces interactive step, makes content-encrypt experience more efficiently convenient, while
Make the experience of mobile terminal device product more intelligent.
In the embodiment of the present invention, the identification information of identical first for each encrypted image that terminal has been stored by acquisition
And/or second identification information, the first identification information and/or the second identification information for detecting at least one image got are
The no identification information of identical first and/or the second identification information match of each encrypted image with having stored, if it does, then
Place is encrypted at least one image got according to the identification information of identical first and/or the second identification information pair
Non-encrypted images are rapidly encrypted by reason so as to realize, avoid information leakage, improve encryption efficiency, are simplified
User operates, and meets user to the automating of non-encrypted images, intelligent demand.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal is used for the list for performing the method described in foregoing any one
Member.Specifically, referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.The terminal bag of the present embodiment
Include:Extraction unit 301, detection unit 302, ciphering unit 303.
Extraction unit 301, the data message of at least one image got for extracting terminal;
Detection unit 302, for detect at least one image data message whether with each encryption for having stored
The data message of image is identical;
Ciphering unit 303, if being yes for testing result, at least one image got is added
It is close.
Specifically, the ciphering unit 303, specifically for exporting prompting interface;Wherein, the prompting interface is used to prompt
Whether user confirms at least one image is encrypted;If the confirmation received for prompting interface input adds
Close instruction, then at least one image got is encrypted.
Specifically, the detection unit 302, for obtaining the identical data message of each encrypted image stored;
Whether the data message for detecting at least one image matches with the identical data message.
Specifically, the data message includes the first identification information and/or the second identification information;The detection unit 302,
It is additionally operable to obtain the identification information of identical first of each encrypted image stored;The each encryption figure stored described in judging
It whether there is the identification information of identical second as between;Wherein, second identification information is that first identification information is entered
Row classification obtains;If it is judged that it is yes, the then identical between each encrypted image stored described in acquisition
Second identification information.
Specifically, the detection unit 302, be additionally operable to detect at least one image the first identification information whether with
The identification information match of identical first of each encrypted image stored;If testing result is yes, described in judgement at least
One image whether there is the second identification information;If it is present the second identification information of detection at least one image is
The no identification information match of identical second of each encrypted image with having stored.
Specifically, the ciphering unit 303, for if it is judged that the second mark letter is not present at least one image
Breath, the then identification information of identical first of each encrypted image stored according to are described at least one to what is got
Image is encrypted.
Specifically, the ciphering unit 303, if for detect the second identification information of at least one image with
The identification information match of identical second of each encrypted image stored, then according to the identification information of identical first and
Two identification informations, at least one image got is encrypted.
In the embodiment of the present invention, terminal extracts the data at least one image that terminal is got by extraction unit 301
Information, if detection unit 302 detects the data message of acquisition and the identical number of each encrypted image stored
According to information matches, then at least one image got is encrypted by ciphering unit 303, it is possible to achieve rapidly
Non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, simplifies user's operation, meets user to not
The automating of encrypted image, intelligent demand.
Fig. 4 is referred to, Fig. 4 is another terminal schematic block diagram provided in an embodiment of the present invention.This implementation as shown in Figure 4
Terminal in example can include:One or more processors 401;One or more input equipments 402, one or more output are set
Standby 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 pass through bus 405
Connection.Memory 402 is used to store computer program, and the computer program includes programmed instruction, and processor 401 is used to perform
The programmed instruction that memory 402 stores.Wherein, processor 401 is arranged to call described program instruction to perform following steps:
The data message at least one image that extraction terminal is got;
Detect at least one image data message whether with the data message phase of each encrypted image stored
Together;
If testing result is yes, at least one image got is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Export prompting interface;Wherein, the prompting interface is used to prompt the user whether to confirm at least one image
It is encrypted;
It is described at least one to what is got if receiving the confirmation encrypted instruction for prompting interface input
Image is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Obtain the identical data message of each encrypted image stored;
Whether the data message for detecting at least one image matches with the identical data message.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Obtain the identification information of identical first of each encrypted image stored;
It whether there is the identification information of identical second between each encrypted image stored described in judging;Wherein, it is described
Second identification information carries out classification to first identification information and obtained;
If it is judged that it is yes, the then mark letter of identical second between each encrypted image stored described in acquisition
Breath.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Detect at least one image the first identification information whether with the identical of each encrypted image stored
First identification information match;
If testing result is yes, judge that at least one image whether there is the second identification information;
If it is present the second identification information of detection at least one image whether with each encryption figure for having stored
The identification information match of identical second of picture.
Further, processor 401 is arranged to call described program instruction to perform following steps:
If it is judged that the second identification information is not present at least one image, then according to it is described stored each add
The identification information of identical first of close image, at least one image got is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
If detect that the second identification information of at least one image is identical with each encrypted image stored
The second identification information match, then according to the identification information of identical first and the second identification information, described in getting
At least one image is encrypted.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, microphone etc., output equipment 403 can include display (LCD etc.),
Loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the output equipment 403 described in the embodiment of the present invention can
Perform the reality described in embodiment described in embodiment described in Fig. 1 of image processing method provided in an embodiment of the present invention and Fig. 2
Existing mode, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable recording medium are additionally provided in embodiments of the present invention
Computer program is stored with, realizes when the computer program is executed by processor and is retouched such as Fig. 1 or as described in Figure 2 in embodiment
The implementation stated, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication connection by some interfaces or unit.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
- A kind of 1. image processing method, it is characterised in that including:The data message at least one image that extraction terminal is got;Detect at least one image data message whether each encrypted image with having stored data message it is identical;If testing result is yes, at least one image got is encrypted.
- 2. according to the method for claim 1, it is characterised in that the described pair of at least one image got adds It is close, including:Export prompting interface;Wherein, the prompting interface is used to prompt the user whether to confirm to carry out at least one image Encryption;If the confirmation encrypted instruction for prompting interface input is received, at least one image got It is encrypted.
- 3. according to the method for claim 1, it is characterised in that the data message of the detection at least one image is The data message of no each encrypted image with having stored is identical, including:Obtain the identical data message of each encrypted image stored;Whether the data message for detecting at least one image matches with the identical data message.
- 4. according to the method for claim 3, it is characterised in that the data message includes the first identification information and/or the Two identification informations;The identical data message for obtaining each encrypted image stored, including:Obtain the identification information of identical first of each encrypted image stored;It whether there is the identification information of identical second between each encrypted image stored described in judging;Wherein, described second Identification information carries out classification to first identification information and obtained;If it is judged that it is yes, the then identification information of identical second between each encrypted image stored described in acquisition.
- 5. according to the method for claim 4, it is characterised in that the data message of the detection at least one image is It is no to be matched with the identical data message, including:Detect at least one image the first identification information whether with the identical first of each encrypted image stored Identification information match;If testing result is yes, judge that at least one image whether there is the second identification information;If it is present the second identification information of detection at least one image whether with each encrypted image for having stored The identification information match of identical second.
- 6. according to the method for claim 5, it is characterised in that the described pair of at least one image got adds It is close, including:If it is judged that the second identification information is not present at least one image, then each encryption figure stored according to The identification information of identical first of picture, at least one image got is encrypted.
- 7. according to the method for claim 5, it is characterised in that the described pair of at least one image got adds It is close, in addition to:If detect the identical the of the second identification information of at least one image and each encrypted image stored Two identification information match, then according to the identification information of identical first and the second identification information, to described in getting at least One image is encrypted.
- 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
- 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710895944.3A CN107864313A (en) | 2017-09-27 | 2017-09-27 | A kind of image processing method, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710895944.3A CN107864313A (en) | 2017-09-27 | 2017-09-27 | A kind of image processing method, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107864313A true CN107864313A (en) | 2018-03-30 |
Family
ID=61698309
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710895944.3A Withdrawn CN107864313A (en) | 2017-09-27 | 2017-09-27 | A kind of image processing method, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107864313A (en) |
-
2017
- 2017-09-27 CN CN201710895944.3A patent/CN107864313A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CA2755286C (en) | Systems and methods for document management transformation and security | |
CN108961157B (en) | Picture processing method, picture processing device and terminal equipment | |
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN107609508A (en) | A kind of face identification method, terminal and computer-readable recording medium | |
KR20210003224A (en) | Direct input from remote device | |
CN107704613A (en) | A kind of approaches to IM, terminal and computer-readable recording medium | |
CN107341378A (en) | For the method for the access right for setting application | |
CN112800401B (en) | Privacy processing method, privacy processing device and terminal | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
US9021389B1 (en) | Systems and methods for end-user initiated data-loss-prevention content analysis | |
US20140208194A1 (en) | Device and system for securely executing electronic documents | |
CN108845732A (en) | A kind of information display method and terminal device | |
CN103729583B (en) | Data guard method and electronic installation | |
CN107368735A (en) | One kind applies installation method, mobile terminal and computer-readable recording medium | |
CN108092795A (en) | A kind of reminding method, terminal device and computer-readable medium | |
CN107742073A (en) | Information displaying method, device, computer installation and computer-readable recording medium | |
CN107301236A (en) | Application searches method, mobile terminal, server and computer-readable recording medium | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
WO2023030309A1 (en) | Message sharing method and apparatus and electronic device | |
CN107864313A (en) | A kind of image processing method, terminal and computer-readable recording medium | |
CN109324843A (en) | A kind of finger prints processing system, method and fingerprint equipment | |
CN111766993B (en) | Information display method and device, electronic equipment and readable storage medium | |
CN107592398A (en) | A kind of intelligent information storage method and system | |
CN111125742B (en) | File management method, intelligent terminal and device with storage function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180330 |
|
WW01 | Invention patent application withdrawn after publication |