CN107864313A - A kind of image processing method, terminal and computer-readable recording medium - Google Patents

A kind of image processing method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107864313A
CN107864313A CN201710895944.3A CN201710895944A CN107864313A CN 107864313 A CN107864313 A CN 107864313A CN 201710895944 A CN201710895944 A CN 201710895944A CN 107864313 A CN107864313 A CN 107864313A
Authority
CN
China
Prior art keywords
image
identification information
encrypted
terminal
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710895944.3A
Other languages
Chinese (zh)
Inventor
苏净
陈小欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710895944.3A priority Critical patent/CN107864313A/en
Publication of CN107864313A publication Critical patent/CN107864313A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of image processing method, terminal and computer-readable recording medium, wherein method includes:The data message at least one image that extraction terminal is got;Detect at least one image data message whether each encrypted image with having stored data message it is identical;If testing result is yes, at least one image got is encrypted.The embodiment of the present invention is by the way that at least one image got with encrypted image has identical data message is encrypted, it can realize and rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, simplify user's operation, meet user to the automating of non-encrypted images, intelligent demand.

Description

A kind of image processing method, terminal and computer-readable recording medium
Technical field
The present invention relates to field of computer technology, more particularly to a kind of image processing method, terminal and computer-readable deposit Storage media.
Background technology
In life/work of people, everyone has the privacy of oneself, it is necessary to be maintained secrecy, respected.Mobile terminal is set The standby personal electric product high as privacy, is loaded with the information of individual subscriber, the wherein image such as photo, picture is information Amount is maximum, most intuitively content, had unavoidably in mobile terminal device picture library user picture, work data picture, Private Banking, Prove information picture information etc..When mobile terminal device not user by the side of when or when other people are set using the mobile terminal of oneself When standby, the extremely strong content of these privacy is easily compromised under these scenes, and adverse consequences is caused to individual.For these feelings Condition, many mobile terminal device manufacturers provide relative solution, and such as application program encryption, picture is directly encrypted, even It is to establish independent private space application program, picture for needing to be encrypted etc. is deposited to user.
But current technology scheme needs active user actively to initiate cryptographic operation, it is necessary to need to enter it in user every time During row encryption, individually it is encrypted one by one respectively, it is complex for operation step, especially when user needs that multiple pictures are encrypted When, it is necessary to carry out multiple clicks on selection one by one, then unify encryption, cumbersome complexity.When user is not convenient or not timely When the image encrypted to needs is encrypted, privacy content is having not enough time to encrypt or used still in being in normally present condition During encryption is forgotten at family, if mobile terminal device is used by others, it is likely that the leakage problem of individual privacy can be caused.
The content of the invention
The embodiments of the invention provide a kind of image processing method, terminal and computer-readable recording medium, can be achieved fast Non-encrypted images are encrypted on fast ground, avoid information leakage, improve encryption efficiency.
In a first aspect, the embodiments of the invention provide a kind of image processing method, this method includes:
The data message at least one image that extraction terminal is got;
Detect at least one image data message whether with the data message phase of each encrypted image stored Together;
If testing result is yes, at least one image got is encrypted.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
The data message at least one image that the embodiment of the present invention is got by extracting terminal, if detecting acquisition The data message matched with the identical data message of each encrypted image stored, then to described in getting at least One image is encrypted, it is possible to achieve rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption Efficiency, meet user to the automating of non-encrypted images, intelligent demand.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of image processing method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow diagram of another image processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is another terminal schematic block diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of interface schematic diagram of terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
At present, for the personal picture privacy of protection terminal user the problem of, equipment vendors provide much Solution, such as set screen-lock password, picture/application program and individually encrypt, or even to be also provided with independent privacy storage empty Between, there is provided ecret protection application program, user can need to picture to be protected be put into the program and be encrypted, the individual of user While privacy obtains protection, it also avoid finding there be the awkward of privacy encryption function on the mobile terminal device of oneself by other people A word used for translation, the individual privacy of user and information security is set to have obtained good protection.To these content-encrypts, give user and completely lead Control power, user are required for actively in time one by one entering content when needing to encrypt content (image such as picture, photo) every time Row is encrypted to private space., can be to needing content to be protected when user is busy, scene is inconvenient, forgets encryption Encryption is caused to forget.During not encryption in time, if other people use the mobile terminal device product of oneself, easily careless In the case of cause individual privacy to reveal, cause adverse consequences.Therefore, the embodiment of the present invention is forgotten to image for above user The situation for being encrypted or not being encrypted in time, it is proposed that a kind of image processing method, terminal and computer-readable storage medium Matter, it can be achieved that rapidly non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, meet user couple The automating of non-encrypted images, intelligent demand.
A kind of image processing method provided in an embodiment of the present invention can be performed by terminal, the terminal that the present invention relates to The first identification information and/or the second identification information can be added to the image got, wherein, second identification information is pair First identification information carries out obtaining for classification, and second identification information belongs to the son of first identification information Collection, first identification information and/or the second identification information can be made up of various labels.Specifically can be for example, for example, working as When the terminal gets photo (image) by camera device shooting, the first identification information is added to the photo, wherein, first Identification information includes exposal model (U.S. face, more people's self-timers, night scene, business card scan, text are taken pictures), photo opporunity, takes pictures ground The labels such as point, photo form, photo specification, photo content (text, personage, landscape etc.);When the image got is text, Terminal can add the second identification information on the basis of the first identification information, wherein, the second identification information can be refined as beating The labels such as printed text part, hand-written record, poster, when image is personage, the second identification information can refine to one or more people, specific Recognition of face record, the preposition or label such as rearmounted.
It should be noted that when the terminal receives the images such as photo, its first identification information and the second identification information In addition to the labels such as photo form, photo specification, photo content, in addition to delivering path (such as wechat, QQ, computer), biography The labels such as defeated source (with specific transmission from which people or which group), for the first identification information and the second identification information Can be including listed above, but this is not limited to, more rich identification record, this hair can be carried out according to the development of technology Bright embodiment does not limit.The image processing method applied to terminal is illustrated below.
The embodiment of the present invention, a kind of image procossing is proposed for how reasonably to help user that image is encrypted automatically Method, this method can be performed by terminal.When terminal gets at least one image, the terminal can extract described at least one The data message of individual image, and detect at least one image data message whether with the phase of each encrypted image stored Same data message matching, if testing result is identical, at least one image got is encrypted.
In one embodiment, when the terminal receives at least one image, the terminal can pass through polynary point first Analysis, the first identification information of each encrypted image and/or the second identification information (data message) stored is analyzed.Its In, the correspondence analysis (Correspondence analysis) is also referred to as association analysis, R-Q type factorial analyses, is in recent years new A kind of Multivariate Dependent statistics of variable analytical technology to grow up, it can help us to study the interaction being made up of qualitative variable Summary sheet discloses association between variables.The information of interaction summary sheet is graphically shown, has been primarily adapted for use in multiple classes Other nominal level variable, it can reveal that between the difference between each classification of same variable, and each classification of different variables Corresponding relation.Suitable for two or more nominal level variables.With the increase of the quantity of encrypted image, classification and its corresponding relation It is more reasonable to divide, and more has directiveness to subsequent operation.
Further, the first identification information of each encrypted image of the terminal first to having stored is analyzed, and is obtained The identification information of identical first of each encrypted image of storage, judges to whether there is identical second between each encrypted image Identification information, if it does not exist, then the terminal using the identification information of identical first as foundation, detects at least one got First identification information of individual image whether with the identification information match of identical first of each encrypted image stored.If deposit , then the identification information of identical second between each encrypted image stored described in acquisition, and marked with the identical first It is foundation to know information and the identification information of identical second, detect at least one image got the first identification information whether with The identification information match of identical first of each encrypted image stored, if it does, then judging that at least one image is It is no the second identification information to be present, if it is present detecting the second of at least one image encryption for identifying whether and having stored The identification information match of identical second of image.The first identification information of at least one image for being got by detecting and/or Second identification information whether the identification information of identical first and/or the identification information match of identical second with encrypted image, can To improve detection efficiency, power consumption of terminal is reduced.
Further, if the terminal detects the first identification information of at least one image got and each encryption figure The identification information match of identical first of picture, and be not present and each encrypted image at least one image got The identification information match of identical second the second identification information, then terminal can export prompting interface automatically, if the terminal The confirmation encrypted instruction for prompting interface input is received, then according to the identification information of identical first, to obtaining To at least one image be encrypted.Or if the terminal detects the second of at least one image Identification information and the identification information match of identical second of each encrypted image stored, then terminal can export prompting automatically Interface;Wherein, the prompting interface is used to prompt the user whether to confirm at least one image is encrypted, if the end Termination receives the confirmation encrypted instruction for prompting interface input, then according to the identification information of identical first and identical The second identification information, at least one image got is encrypted.It can be seen that the embodiment is to have stored Encrypted image the identification information of identical first and/or the identification information of identical second be standard, to get with it is described At least one image of the identification information of identical first and/or the identification information match of identical second is encrypted, so as to Rapidly non-encrypted images are encrypted for realization, avoid information leakage, simplify user's operating process, save terminal work( Consumption.
In one embodiment, if the terminal is by Multiple Correspondence Analysis, detection finds each encryption figure stored The identification information of identical first be present as between, wherein, first identification information is the transmission source of image, and the transmission source is equal It is the same user from wechat, and the second identification information is not present between at least one encrypted image for having stored, Then terminal is when receiving at least one picture (image), can according to first identification information, detect receive this at least Whether the identical of each encrypted image with having stored transmits source in the transmission source (the first identification information) of one picture Match somebody with somebody, that is, be all from the same user (the first identification information) of wechat, if it is, output prompting interface, is prompted the user whether The picture is encrypted or is saved in private space (encryption), after user selects " confirmation ", terminal can receive pin The instruction that confirmation to prompting interface input is encrypted, at least one image got is encrypted, i.e., The picture is encrypted or is saved in private space.
In one embodiment, if the terminal gets at least one encryption stored by Multiple Correspondence Analysis The identification information of identical first of image, wherein, first identification information is the exposal model of image, is clapped on the exposal model That take the photograph is portrait photographs, therefore, face information (the second identification information) between the encrypted image be present, if detecting that this adds Identical face information between close image be present, then terminal can according to the identical exposal model and identical face information, Detect the exposal model of at least one image received and face information whether with least one encrypted image for having stored Identical exposal model and identical face information matching, if it is, output prompting interface, prompt the user whether the figure Piece is encrypted or is saved in private space (encryption), and after user selects " confirmation ", terminal can be received for described The instruction of the confirmation encryption of prompting interface input, at least one image got is encrypted, will the figure Piece is encrypted or is saved in private space.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of image processing method provided in an embodiment of the present invention, such as Fig. 1 institutes Show, this method may include:
S101:The data message at least one image that extraction terminal is got.
In the embodiment of the present invention, terminal can extract the number of at least one image when getting at least one image It is believed that breath.For example, terminal is got at least by camera device shooting, portrait photographs's (image), the terminal can be from acquisitions To an at least portrait photographs in extract photo opporunity, shooting places, photo form, photo specification, photo content etc. Data message.In another example terminal can receive an at least pictures for other users terminal transmission, and can be from receiving Got in an at least pictures picture format, image content, picture specification, delivering path, transmission source, etc. data letter Breath, if object picture is text, can also get the data that mimeograph documents, hand-written record, poster etc. further refine Information.
S102:Detect at least one image data message whether with the data message of each encrypted image stored It is identical.
In the embodiment of the present invention, terminal can detect at least one image data message whether with stored it is each The data message of encrypted image is identical.Specifically, terminal can obtain the identical number of each encrypted image stored first It is believed that breath, and detect at least one image data message whether the identical data with the encrypted image stored Information matches.If specifically can be for example, for example, the terminal transmission source that gets each encrypted image stored be equal From " Zhang San " wechat (identical data message), when terminal receives an at least pictures, the terminal can detect acquisition To the transmission sources of an at least pictures whether match with the identical transmission source of the encrypted image that has stored, i.e., From the wechat of " Zhang San ".
S103:If testing result is yes, at least one image got is encrypted.
In the embodiment of the present invention, if terminal detect the data message of at least one image with this stored it is each The identical data message matching of encrypted image, then at least one image that got can be encrypted.Specifically, eventually End is after the identical data message of each encrypted image stored is got, if detecting at least one image Data message matches with the identical data message of each encrypted image stored, then the terminal can be according to the identical number It is believed that breath, is encrypted at least one image got, non-encrypted images is encrypted so as to improve Efficiency.
In one embodiment, if the terminal detects that the data message of at least one image is each with having stored The identical data message matching of individual encrypted image, then terminal can export prompting interface, wherein, the prompting interface is used to carry Show whether user confirms at least one image is encrypted, if terminal is received for prompting interface input Confirm encrypted instruction, then at least one image that got can be encrypted for terminal.Specifically can be by taking Fig. 5 as an example Illustrating, Fig. 5 is a kind of interface schematic diagram of terminal provided in an embodiment of the present invention, and 501 show confirming button in figure, 502 show cancel button.For example, if terminal detects that the data message of at least one image is each with having stored The identical data message matching of encrypted image, then terminal can export prompting interface as shown in Figure 5, if user clicks on ACK button shown in 501, then terminal can receive the confirmation encrypted instruction inputted for prompting interface described in Fig. 5, and can So that at least one image got to be encrypted, if user clicks on the cancel button shown in 502, terminal The encryption of at least one image to getting can be cancelled.
In the embodiment of the present invention, the data message at least one image that terminal is got by extraction, if detected The data message matches with the identical data message of each encrypted image stored, then to described in getting at least one Individual image is encrypted, and rapidly non-encrypted images are encrypted so as to realize, avoids information leakage, is improved and is added Close efficiency, simplify user's operation, meet user to the automating of non-encrypted images, intelligent demand.
Refer to Fig. 2, Fig. 2 is the schematic flow diagram of another image processing method provided in an embodiment of the present invention, such as Fig. 2 Shown, the difference of this method and Fig. 1 methods described embodiments is, data message is divided into the first mark and believed by this method embodiment Breath and the second identification information, the terminal obtains the identification information of identical first of each encrypted image first, then judge it is described It whether there is the identification information of identical second between each encrypted image of storage, if it is present according to the identical the One identification information and the identification information of identical second, are detected at least one image got, if it does not exist, then root According to the identification information of identical first, at least one image got is detected.Specifically, this method includes:
S201:The data message at least one image that extraction terminal is got.
In the embodiment of the present invention, terminal can extract the number of at least one image when getting at least one image It is believed that breath.Specifically illustrate as described in above-mentioned Fig. 1 embodiments, be no longer described in detail herein.
S202:Obtain the identification information of identical first of each encrypted image stored.
In the embodiment of the present invention, terminal can obtain the identification information of identical first of each encrypted image stored. Specifically, each encrypted image that the terminal has stored includes data message, the data with least one image got Information includes the first identification information and/or the second identification information.The terminal can detect and obtain each encryption figure stored The identification information of identical first of picture.If for example, the terminal detects that each encrypted image stored has identical biography Defeated source, that is, the wechat of " Zhang San " is all from, then the terminal can obtain the identical transmission source of each encrypted image, i.e., The transmission source that the terminal can get each encrypted image is all from the wechat of same user " Zhang San ".
S203:It whether there is the identification information of identical second between each encrypted image for judging to have stored.
In the embodiment of the present invention, terminal whether there is identical second between may determine that each encrypted image stored Identification information, wherein, second identification information carries out classification to first identification information and obtained.Specifically, If the terminal detects between each encrypted image stored identical exposal model (such as U.S. face, more people's self-timers, night be present Scape, business card scan, text are taken pictures), photo opporunity, shooting places, photo form, photo specification, photo content (text, people Thing, landscape etc.), photo form, photo specification, photo content, delivering path (such as wechat, QQ, computer), in transmission source etc. The identification information of one or more first, then the terminal can determine whether between each encrypted image with the presence or absence of identical The second identification information, such as when the encrypted image object is text, the second identification information can be refined as mimeograph documents, hand-written Record, poster etc.;When the encrypted image object is personage, the second identification information can refine to one or more people, specific It is recognition of face record, preposition or rearmounted etc..Assuming that the terminal detects that each encrypted image stored is all from same take pictures Place (the first identification information), then whether the terminal each encrypted image that a judgement has stored that can improve is single humanoid figure picture (the second identification information).
S204:If it is judged that being yes, then the identical second obtained between each encrypted image stored identifies Information.
In the embodiment of the present invention, terminal is marked if it is judged that identical second between each encrypted image stored be present Know information, then can obtain the identification information of identical second between each encrypted image stored.If for example, terminal Identical transmission source (the first identification information) between each encrypted image for judging to have stored be present, then can obtain and deposit The transmission source (the first identification information) of each encrypted image of storage, that is, the wechat of same user " Zhang San " is all from, should The encrypted image that terminal can determine whether to have stored whether there is the identification information of identical second, if the terminal is judged There is each encrypted image identical recognition of face to record (the second identification information), then the terminal can obtain the identical Recognition of face records.
S205:Whether the first identification information for detecting at least one image is identical with each encrypted image for having stored The first identification information match.
In the embodiment of the present invention, terminal can detect at least one image got the first identification information whether with The identification information match of identical first of each encrypted image of storage.If for example, the terminal get stored it is each There is encrypted image identical to transmit source, and be all from the wechat of same user " Zhang San ", then the terminal is being got at least During one character image, can detect at least one character image got transmission source (the first identification information) whether Identical transmission source (the first identification information) with each encrypted image stored matches, that is, is all from same user The wechat of " Zhang San ".
S206:If testing result is yes, judge that at least one image whether there is the second identification information.
In the embodiment of the present invention, if terminal detects the first identification information of at least one image got with having deposited The identification information match of identical first of each encrypted image of storage, then it may determine that at least one image whether there is second Identification information.For example, if the terminal detects that the transmission source of at least one character image got is each with having stored The identical transmission source matching of individual encrypted image, and be all from the wechat of " Zhang San ", then the terminal may determine that what is got At least one character image whether there is face information (the second identification information).
S207:If it is present detect at least one image the second identification information whether with stored each plus The identification information match of identical second of close image.
In the embodiment of the present invention, terminal, then can be then if it is judged that at least one image has the second identification information Whether the second identification information for detecting at least one image identifies with the identical second of each encrypted image stored and believes Breath matching.For example, terminal is if it is judged that the transmission source of at least one character image got is each with having stored The identical transmission source matching of encrypted image, that is, be all from the wechat of " Zhang San ", and face information (the second mark letter be present Breath), then the terminal can detect at least one character image face information whether with each encrypted image for having stored Identical face information (the second identification information) matches.
S208:If it is judged that the second identification information is not present at least one image, then according to stored each plus The identification information of identical first of close image, at least one image got is encrypted.
In the embodiment of the present invention, terminal is if it is judged that the second identification information is not present at least one image, then basis The identification information of identical first of each encrypted image stored, place is encrypted at least one image got Reason.For example, the terminal if it is judged that the transmission source of at least one character image got and stored each plus The identical transmission source matching of close image, that is, be all from the wechat of " Zhang San ", and the second identification information is not present, then the terminal When getting at least one image, at least one image of the wechat from " Zhang San " to getting is encrypted.
In one embodiment, if terminal detects that the first identification information of at least one image is each with having stored The identification information match of identical first of individual encrypted image, and the second mark is not present at least one image for judging to get Know information, then the terminal can export prompting interface, wherein, the prompting interface be used for prompt the user whether confirm to it is described extremely A few image is encrypted.If terminal receives the confirmation encrypted instruction for prompting interface input, terminal can So that at least one image including the identification information of identical first got to be encrypted.If for example, should Terminal detects that the transmission source (the first identification information) of at least one image is identical with each encrypted image stored The matching of transmission source, that is, be all from the same user " Zhang San " of wechat, if the terminal judge to get this at least The second identification information is not present in one image, then the terminal can export prompting interface, and the prompting interface is used to prompt user Whether confirm to be encrypted or be saved in private space at least one image, if terminal is received for the prompting The confirmation encrypted instruction of interface input, then at least one image transmitted by " Zhang San " wechat that terminal will can be got It is encrypted or preserves to private space.It can be seen that the embodiment is by obtaining the identification information of identical first of encrypted image, When terminal receives the image with the identification information of identical first again, terminal can export prompting interface automatically, prompt The user encryption image, so as to improve encryption efficiency, the situation that avoids user from not encrypting in time also avoids causing privacy leakage Harmful effect produce, the personal information privacy of user is preferably protected and saved power consumption.
S209:If detect the phase of the second identification information and each encrypted image stored of at least one image With the second identification information match, then according to the identification information of identical first and the second identification information, to get this extremely A few image is encrypted.
In the embodiment of the present invention, if terminal detects that the second identification information of at least one image is each with having stored The identification information match of identical second of individual encrypted image, then according to the identification information of identical first and the second identification information, At least one image got is encrypted.For example, the terminal is if it is judged that this got is at least one The transmission source of character image matches with the identical transmission source of each encrypted image stored, that is, is all from " Zhang San " Wechat, and the face information (the second identification information) of the identical " Zhang San " of each encrypted image with having stored be present, then should Terminal when getting at least one image, to get wechat from " Zhang San " and object picture be " Zhang San " people At least one image of face information is encrypted.
In one embodiment, if terminal detects that the first identification information of at least one image is each with having stored The identification information match of identical first of individual encrypted image, and the second mark be present at least one image for judging to get Information, and detect the identical second of the second identification information of at least one image and each encrypted image stored Identification information match, then the terminal can export prompting interface, the prompting interface is used to prompt the user whether to confirm to described At least one image is encrypted, if terminal receives the confirmation encrypted instruction for prompting interface input, terminal At least one image for including the identification information of identical first and the second identification information got can be encrypted Processing.
If specifically can be for example, the terminal detects the spot for photography (first of at least one image got Identification information) each encrypted image with having stored spot for photography it is identical, that is, be all from library, and judge what is got At least one image is single humanoid figure picture (the second identification information), and detects each encrypted image stored with this extremely A few image is single humanoid figure picture, and therefore, the terminal can export prompting interface, and after user selects " confirmation ", the terminal can To receive the confirmation encrypted instruction for being directed to prompting interface input, then terminal can be to getting in library's shooting At least one single humanoid figure picture is encrypted.It can be seen that the embodiment is by by the first of at least one image got Identification information and the second identification information identification information of identical first and the identification information of identical second with encrypted image respectively Matched, a key encryption is carried out at least one image that the match is successful, so that user only needs an operating procedure, It is not required to be encrypted respectively for different content, reduces interactive step, makes content-encrypt experience more efficiently convenient, while Make the experience of mobile terminal device product more intelligent.
In the embodiment of the present invention, the identification information of identical first for each encrypted image that terminal has been stored by acquisition And/or second identification information, the first identification information and/or the second identification information for detecting at least one image got are The no identification information of identical first and/or the second identification information match of each encrypted image with having stored, if it does, then Place is encrypted at least one image got according to the identification information of identical first and/or the second identification information pair Non-encrypted images are rapidly encrypted by reason so as to realize, avoid information leakage, improve encryption efficiency, are simplified User operates, and meets user to the automating of non-encrypted images, intelligent demand.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal is used for the list for performing the method described in foregoing any one Member.Specifically, referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.The terminal bag of the present embodiment Include:Extraction unit 301, detection unit 302, ciphering unit 303.
Extraction unit 301, the data message of at least one image got for extracting terminal;
Detection unit 302, for detect at least one image data message whether with each encryption for having stored The data message of image is identical;
Ciphering unit 303, if being yes for testing result, at least one image got is added It is close.
Specifically, the ciphering unit 303, specifically for exporting prompting interface;Wherein, the prompting interface is used to prompt Whether user confirms at least one image is encrypted;If the confirmation received for prompting interface input adds Close instruction, then at least one image got is encrypted.
Specifically, the detection unit 302, for obtaining the identical data message of each encrypted image stored; Whether the data message for detecting at least one image matches with the identical data message.
Specifically, the data message includes the first identification information and/or the second identification information;The detection unit 302, It is additionally operable to obtain the identification information of identical first of each encrypted image stored;The each encryption figure stored described in judging It whether there is the identification information of identical second as between;Wherein, second identification information is that first identification information is entered Row classification obtains;If it is judged that it is yes, the then identical between each encrypted image stored described in acquisition Second identification information.
Specifically, the detection unit 302, be additionally operable to detect at least one image the first identification information whether with The identification information match of identical first of each encrypted image stored;If testing result is yes, described in judgement at least One image whether there is the second identification information;If it is present the second identification information of detection at least one image is The no identification information match of identical second of each encrypted image with having stored.
Specifically, the ciphering unit 303, for if it is judged that the second mark letter is not present at least one image Breath, the then identification information of identical first of each encrypted image stored according to are described at least one to what is got Image is encrypted.
Specifically, the ciphering unit 303, if for detect the second identification information of at least one image with The identification information match of identical second of each encrypted image stored, then according to the identification information of identical first and Two identification informations, at least one image got is encrypted.
In the embodiment of the present invention, terminal extracts the data at least one image that terminal is got by extraction unit 301 Information, if detection unit 302 detects the data message of acquisition and the identical number of each encrypted image stored According to information matches, then at least one image got is encrypted by ciphering unit 303, it is possible to achieve rapidly Non-encrypted images are encrypted, avoid information leakage, improve encryption efficiency, simplifies user's operation, meets user to not The automating of encrypted image, intelligent demand.
Fig. 4 is referred to, Fig. 4 is another terminal schematic block diagram provided in an embodiment of the present invention.This implementation as shown in Figure 4 Terminal in example can include:One or more processors 401;One or more input equipments 402, one or more output are set Standby 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 pass through bus 405 Connection.Memory 402 is used to store computer program, and the computer program includes programmed instruction, and processor 401 is used to perform The programmed instruction that memory 402 stores.Wherein, processor 401 is arranged to call described program instruction to perform following steps:
The data message at least one image that extraction terminal is got;
Detect at least one image data message whether with the data message phase of each encrypted image stored Together;
If testing result is yes, at least one image got is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Export prompting interface;Wherein, the prompting interface is used to prompt the user whether to confirm at least one image It is encrypted;
It is described at least one to what is got if receiving the confirmation encrypted instruction for prompting interface input Image is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Obtain the identical data message of each encrypted image stored;
Whether the data message for detecting at least one image matches with the identical data message.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Obtain the identification information of identical first of each encrypted image stored;
It whether there is the identification information of identical second between each encrypted image stored described in judging;Wherein, it is described Second identification information carries out classification to first identification information and obtained;
If it is judged that it is yes, the then mark letter of identical second between each encrypted image stored described in acquisition Breath.
Further, processor 401 is arranged to call described program instruction to perform following steps:
Detect at least one image the first identification information whether with the identical of each encrypted image stored First identification information match;
If testing result is yes, judge that at least one image whether there is the second identification information;
If it is present the second identification information of detection at least one image whether with each encryption figure for having stored The identification information match of identical second of picture.
Further, processor 401 is arranged to call described program instruction to perform following steps:
If it is judged that the second identification information is not present at least one image, then according to it is described stored each add The identification information of identical first of close image, at least one image got is encrypted.
Further, processor 401 is arranged to call described program instruction to perform following steps:
If detect that the second identification information of at least one image is identical with each encrypted image stored The second identification information match, then according to the identification information of identical first and the second identification information, described in getting At least one image is encrypted.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, microphone etc., output equipment 403 can include display (LCD etc.), Loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the output equipment 403 described in the embodiment of the present invention can Perform the reality described in embodiment described in embodiment described in Fig. 1 of image processing method provided in an embodiment of the present invention and Fig. 2 Existing mode, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable recording medium are additionally provided in embodiments of the present invention Computer program is stored with, realizes when the computer program is executed by processor and is retouched such as Fig. 1 or as described in Figure 2 in embodiment The implementation stated, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication connection by some interfaces or unit.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. image processing method, it is characterised in that including:
    The data message at least one image that extraction terminal is got;
    Detect at least one image data message whether each encrypted image with having stored data message it is identical;
    If testing result is yes, at least one image got is encrypted.
  2. 2. according to the method for claim 1, it is characterised in that the described pair of at least one image got adds It is close, including:
    Export prompting interface;Wherein, the prompting interface is used to prompt the user whether to confirm to carry out at least one image Encryption;
    If the confirmation encrypted instruction for prompting interface input is received, at least one image got It is encrypted.
  3. 3. according to the method for claim 1, it is characterised in that the data message of the detection at least one image is The data message of no each encrypted image with having stored is identical, including:
    Obtain the identical data message of each encrypted image stored;
    Whether the data message for detecting at least one image matches with the identical data message.
  4. 4. according to the method for claim 3, it is characterised in that the data message includes the first identification information and/or the Two identification informations;The identical data message for obtaining each encrypted image stored, including:
    Obtain the identification information of identical first of each encrypted image stored;
    It whether there is the identification information of identical second between each encrypted image stored described in judging;Wherein, described second Identification information carries out classification to first identification information and obtained;
    If it is judged that it is yes, the then identification information of identical second between each encrypted image stored described in acquisition.
  5. 5. according to the method for claim 4, it is characterised in that the data message of the detection at least one image is It is no to be matched with the identical data message, including:
    Detect at least one image the first identification information whether with the identical first of each encrypted image stored Identification information match;
    If testing result is yes, judge that at least one image whether there is the second identification information;
    If it is present the second identification information of detection at least one image whether with each encrypted image for having stored The identification information match of identical second.
  6. 6. according to the method for claim 5, it is characterised in that the described pair of at least one image got adds It is close, including:
    If it is judged that the second identification information is not present at least one image, then each encryption figure stored according to The identification information of identical first of picture, at least one image got is encrypted.
  7. 7. according to the method for claim 5, it is characterised in that the described pair of at least one image got adds It is close, in addition to:
    If detect the identical the of the second identification information of at least one image and each encrypted image stored Two identification information match, then according to the identification information of identical first and the second identification information, to described in getting at least One image is encrypted.
  8. 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
  9. 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
CN201710895944.3A 2017-09-27 2017-09-27 A kind of image processing method, terminal and computer-readable recording medium Withdrawn CN107864313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710895944.3A CN107864313A (en) 2017-09-27 2017-09-27 A kind of image processing method, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710895944.3A CN107864313A (en) 2017-09-27 2017-09-27 A kind of image processing method, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107864313A true CN107864313A (en) 2018-03-30

Family

ID=61698309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710895944.3A Withdrawn CN107864313A (en) 2017-09-27 2017-09-27 A kind of image processing method, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107864313A (en)

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CA2755286C (en) Systems and methods for document management transformation and security
CN108961157B (en) Picture processing method, picture processing device and terminal equipment
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN107609508A (en) A kind of face identification method, terminal and computer-readable recording medium
KR20210003224A (en) Direct input from remote device
CN107704613A (en) A kind of approaches to IM, terminal and computer-readable recording medium
CN107341378A (en) For the method for the access right for setting application
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
US9021389B1 (en) Systems and methods for end-user initiated data-loss-prevention content analysis
US20140208194A1 (en) Device and system for securely executing electronic documents
CN108845732A (en) A kind of information display method and terminal device
CN103729583B (en) Data guard method and electronic installation
CN107368735A (en) One kind applies installation method, mobile terminal and computer-readable recording medium
CN108092795A (en) A kind of reminding method, terminal device and computer-readable medium
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN107301236A (en) Application searches method, mobile terminal, server and computer-readable recording medium
WO2016188079A1 (en) Data storage method for terminal device and terminal device
WO2023030309A1 (en) Message sharing method and apparatus and electronic device
CN107864313A (en) A kind of image processing method, terminal and computer-readable recording medium
CN109324843A (en) A kind of finger prints processing system, method and fingerprint equipment
CN111766993B (en) Information display method and device, electronic equipment and readable storage medium
CN107592398A (en) A kind of intelligent information storage method and system
CN111125742B (en) File management method, intelligent terminal and device with storage function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180330

WW01 Invention patent application withdrawn after publication