CN108256360A - The display methods and terminal of a kind of sensitive information - Google Patents

The display methods and terminal of a kind of sensitive information Download PDF

Info

Publication number
CN108256360A
CN108256360A CN201711403158.3A CN201711403158A CN108256360A CN 108256360 A CN108256360 A CN 108256360A CN 201711403158 A CN201711403158 A CN 201711403158A CN 108256360 A CN108256360 A CN 108256360A
Authority
CN
China
Prior art keywords
picture
pictures
sub
dimension code
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711403158.3A
Other languages
Chinese (zh)
Other versions
CN108256360B (en
Inventor
刘德建
朱澈
黄纪旺
蔡专锡
郭玉湖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN201711403158.3A priority Critical patent/CN108256360B/en
Publication of CN108256360A publication Critical patent/CN108256360A/en
Application granted granted Critical
Publication of CN108256360B publication Critical patent/CN108256360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Abstract

The invention discloses the display methods and terminal of a kind of sensitive information, and sensitive information to be shown is carried out figure pretreatment, obtains the first picture;The theme color of first picture is extracted, color is negated to the theme color, obtains background colour;First picture is divided into the sub-pictures of M square, therefrom chooses N number of sub-pictures as key area, 0<N≤M;User identifier is generated into two-dimension code image, the user identifier checks that the user of the sensitive information corresponds with having permission, and the two-dimension code image size is identical with the sub-pictures size;First picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, the two-dimension code image is included per frame incompleteness picture, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate, the union of several frame incompleteness pictures is first picture, the leakage of sensitive information can be effectively prevented from, improves the safety of sensitive information.

Description

The display methods and terminal of a kind of sensitive information
Technical field
The present invention relates to image processing field more particularly to the display methods and terminal of a kind of sensitive information.
Background technology
With the continuous development of Internet technology, more and more information are transmitted by network between end and end, for Sensitive informations, the sender such as some enterprises secret or individual privacy often only want to share in controllable range.
In the prior art, generally by way of file encryption help information sender by information security be sent to it is specified Recipient, and ensure that information is only possessed the personnel of permission and checked, but after this does not ensure that the personnel for possessing permission check These information leakages are not gone out, for example, by screenshotss, take pictures, record a video, in this way, sensitive information will be detached from the limit of existing platform System is leaked out.Also have and interfere screenshotss and acquisition information of taking pictures by increasing dynamic covering layer when presentation of information, But it can not still fight the mode steal information of video recording.
Invention content
The technical problems to be solved by the invention are:The display methods and terminal of a kind of sensitive information are provided, effectively avoided Information leakage.
In order to solve the above-mentioned technical problem, a kind of technical solution for using of the present invention for:
A kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of several frame incompleteness pictures is first picture.
In order to solve the above-mentioned technical problem, the another technical solution that uses of the present invention for:
A kind of display terminal of sensitive information including memory, processor and is stored on the memory and can be The computer program run on the processor, the processor realize following steps when performing the computer program:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of several frame incompleteness pictures is first picture.
The beneficial effects of the present invention are:Picture comprising sensitive information is changed from the complete figure static display of a frame Contain the Dynamic Display of the incomplete figure of two-dimension code image for multiframe, due to the time delay characteristic of human eye, such processing is not Can receive information to human eye and impact, when leakage person using screenshotss or take pictures come it is illegal obtain information when, cannot be complete Information if leakage person captures dynamic picture using video recording, can be chased after by revealing the 2 D code information included in information It traces back and reveals source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve the safety of sensitive information.
Description of the drawings
Fig. 1 is a kind of flow chart of the display methods of sensitive information of the embodiment of the present invention;
Fig. 2 is a kind of structure diagram of the display terminal of sensitive information of the embodiment of the present invention;
Label declaration:
1st, a kind of display terminal of sensitive information;2nd, memory;3rd, processor.
Specific embodiment
For the technology contents that the present invention will be described in detail, the objects and the effects, below in conjunction with embodiment and coordinate attached Figure is explained.
The design of most critical of the present invention is:By the picture comprising sensitive information and the Quick Response Code figure comprising user identifier Piece synthesizes several frame incompleteness pictures, per frame incompleteness picture comprising the two-dimension code image, and by several frame incompleteness pictures It is rendered frame by frame with a scheduled rate.
Please refer to Fig. 1, a kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of several frame incompleteness pictures is first picture.
Seen from the above description, the beneficial effects of the present invention are:Picture comprising sensitive information is complete from a frame Figure static display is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image, since the time delay of human eye is special Property, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures illegally to obtain information When, it cannot get complete information, if leakage person captures dynamic picture using video recording, can be included by revealing in information 2 D code information retrospect leakage source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve sensitive information Safety.
Further, N number of sub-pictures are therefrom chosen described in the step S3 to specifically include as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures As key area.
Seen from the above description, figure entropy is bigger, then its corresponding sub-pictures contains more information content, chooses information content More sub-pictures ensure that the number for the key area chosen meets a default size as key area, ensure that figure The dispersibility and reasonability of piece segmentation, further reduced sensitive information is leaked rate.
Further, the step S5 is specifically included:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from described It is cut out coming in one picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames Picture ultimately generates 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
Seen from the above description, through the above way by the picture comprising sensitive information from the complete figure static state exhibition of a frame Show the Dynamic Display for being changed into the incomplete figure that multiframe contains two-dimension code image, and filled in the first picture and cut with background colour The part cut away so that contrast enhances after the picture carries out gray proces, facilitates identification.
Further, step is further included:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
Further, the step S63 is specifically included:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square shape and color The corresponding position of block according to the position, is cut out a picture, as two-dimension code image.
Seen from the above description, gray proces are carried out, and identify two by the picture comprising sensitive information to acquisition Code picture is tieed up, the corresponding user identifier of two-dimension code image is obtained, using the superior redundant correcting performance of Quick Response Code, can believe It effectively traces to the source after breath leakage, navigates to the user of leakage sensitive information, solve the problems, such as not tracing to the source in the prior art.
Fig. 2 is please referred to, a kind of display terminal of sensitive information including memory, processor and is stored in the storage On device and the computer program that can run on the processor, the processor are realized following when performing the computer program Step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area Domain, 0<N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission User correspond, the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of several frame incompleteness pictures is first picture.
Seen from the above description, the beneficial effects of the present invention are:Picture comprising sensitive information is complete from a frame Figure static display is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image, since the time delay of human eye is special Property, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures illegally to obtain information When, it cannot get complete information, if leakage person captures dynamic picture using video recording, can be included by revealing in information 2 D code information retrospect leakage source, leakage person can be frightened, be effectively prevented from the leakage of sensitive information, improve sensitive information Safety.
Further, N number of sub-pictures are therefrom chosen described in the step S3 to specifically include as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures As key area.
Seen from the above description, figure entropy is bigger, then its corresponding sub-pictures contains more information content, chooses information content More sub-pictures ensure that the number for the key area chosen meets a default size as key area, ensure that figure The dispersibility and reasonability of piece segmentation, further reduced sensitive information is leaked rate.
Further, the step S5 is specifically included:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from described It is cut out coming in one picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames Picture ultimately generates 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
Seen from the above description, through the above way by the picture comprising sensitive information from the complete figure static state exhibition of a frame Show the Dynamic Display for being changed into the incomplete figure that multiframe contains two-dimension code image, and filled in the first picture and cut with background colour The part cut away so that contrast enhances after the picture carries out gray proces, facilitates identification.
Further, step is further included:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
Further, the step S63 is specifically included:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square shape and color The corresponding position of block according to the position, is cut out a picture, as two-dimension code image.
Seen from the above description, gray proces are carried out, and identify two by the picture comprising sensitive information to acquisition Code picture is tieed up, the corresponding user identifier of two-dimension code image is obtained, using the superior redundant correcting performance of Quick Response Code, can believe It effectively traces to the source after breath leakage, navigates to the user of leakage sensitive information, solve the problems, such as not tracing to the source in the prior art.
Embodiment one
Please refer to Fig. 1, a kind of display methods of sensitive information, including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
Wherein, figure pretreatment includes text rasterizing, picture format decoding and rich text typesetting etc.;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
In order to obtain the theme color, color quantizing method, cluster, color modeling etc. may be used, specifically, to color sky Between counted, obtain high-frequency tone, using the high-frequency tone as theme color;
S3, the sub-pictures that first picture is divided into M square, therefrom choose N number of sub-pictures as key area Domain, 0<N≤M;
First picture can be divided into lateral X, the square word picture of longitudinal Y, M=X*Y;
Wherein, it is described therefrom to choose N number of sub-pictures and specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, determines that image entropy is more than the The number m of the sub-pictures of one preset value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, it is then randomly selected (N-m) in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy A sub-pictures, by described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures As key area;
S4, user identifier is generated to two-dimension code image, the user identifier checks the sensitive information with having permission User correspond, the two-dimension code image size is identical with the sub-pictures size;
The two-dimension code image is used as digital watermarking tracing to the source for subsequent information;
Wherein, the sequence between S2-S4 in no particular order, can also parallel processing;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, per frame Incomplete picture is described comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of several frame incompleteness pictures is first picture;
Specifically, S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively It is cut out coming from first picture;
The part being cut away in S52, first picture respectively with the background colour fill, and with the Quick Response Code figure Piece synthesizes, and forms second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and successively in post synthesis respectively with the two-dimension code image Picture in the black region in the correspondence two-dimension code image and white area are sheared respectively, it is complementary to form 2 frames Picture ultimately generates 2*N frame pictures;
The N number of sub-pictures for having synthesized two-dimension code image are sheared successively, form 2*N frames complementary picture two-by-two {DstFrame1_0,DstFrame1_1,DstFrame2_0,DstFrame2_1,……,DstFrameN_0,DstFrameN_ 1};
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate;
After rendering, have permission and check that the user of the sensitive information can obtain complete information;
Further include step:
S61, selection clarity is more than second and presets from the picture frame sequence comprising sensitive information after the rendering of acquisition One frame picture of value, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
Specifically, identifying the square color lump for being respectively distributed to three angles from the black and white picture, determine described The corresponding position of square color lump, according to the position, is cut out a picture, as two-dimension code image;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image;
By identifying user identifier, you can navigate to the user of leakage sensitive information, complete to trace back to leakage information Source.
Embodiment two
Fig. 2 is please referred to, a kind of display terminal 1 of sensitive information including memory 2, processor 3 and is stored in described deposit On reservoir 2 and the computer program that can be run on the processor 3, the processor 3 perform real during the computer program Step in current embodiment one.
In conclusion the display methods and terminal of a kind of sensitive information provided by the invention, by the figure comprising sensitive information Piece is changed into the Dynamic Display for the incomplete figure that multiframe contains two-dimension code image from the complete figure static display of a frame, due to people The time delay characteristic of eye, such processing will not receive information to human eye and impact, when leakage person using screenshotss or takes pictures It when illegally to obtain information, cannot get complete information, if leakage person captures dynamic picture using video recording, can pass through The digital watermarking retrospect leakage source included in leakage information, is effectively prevented from the leakage of sensitive information, improves sensitive information Safety, effectively contains the illegal interception of information, and can effectively trace to the source after information leakage, frightens from root latent Source of leakage, be effectively guaranteed privacy of user and enterprise's secret, avoid causing damages to information owner.
The foregoing is merely the embodiment of the present invention, are not intended to limit the scope of the invention, every to utilize this hair The equivalents that bright specification and accompanying drawing content are made directly or indirectly are used in relevant technical field, similarly include In the scope of patent protection of the present invention.

Claims (10)

1. a kind of display methods of sensitive information, which is characterized in that including step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square therefrom choose N number of sub-pictures as key area, and 0< N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier is with having permission the use for checking the sensitive information Family corresponds, and the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, it is incomplete per frame Picture is described several comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of frame incompleteness picture is first picture.
2. a kind of display methods of sensitive information according to claim 1, which is characterized in that described in the step S3 from The middle N number of sub-pictures of selection are specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, and it is pre- to determine that image entropy is more than first If the number m of the sub-pictures of value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, then (N-m) height is randomly selected in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy Picture, using described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures as Key area.
3. the display methods of a kind of sensitive information according to claim 1, which is characterized in that the step S5 is specifically wrapped It includes:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from first figure It is cut out coming in piece;
The part being cut away in S52, first picture is filled respectively with the background colour, and is closed with the two-dimension code image Into formation second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and figure in post synthesis successively with the two-dimension code image respectively The black region in the correspondence two-dimension code image and white area are sheared respectively in piece, form the picture of 2 frames complementation, Ultimately generate 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
4. the display methods of a kind of sensitive information according to claim 1, which is characterized in that further include step:
S61, clarity is chosen from the picture frame sequence comprising sensitive information after the rendering of acquisition more than the second preset value One frame picture, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
5. the display methods of a kind of sensitive information according to claim 4, which is characterized in that the step S63 is specifically wrapped It includes:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square color lump pair The position answered according to the position, is cut out a picture, as two-dimension code image.
6. a kind of display terminal of sensitive information, including memory, processor and it is stored on the memory and can be in institute State the computer program run on processor, which is characterized in that the processor is realized following when performing the computer program Step:
S1, sensitive information to be shown is subjected to figure pretreatment, obtains the first picture;
The theme color of S2, extraction first picture, negate color to the theme color, obtain background colour;
S3, the sub-pictures that first picture is divided into M square therefrom choose N number of sub-pictures as key area, and 0< N≤M;
S4, user identifier is generated to two-dimension code image, the user identifier is with having permission the use for checking the sensitive information Family corresponds, and the two-dimension code image size is identical with the sub-pictures size;
S5, first picture, background colour, key area and two-dimension code image are synthesized into several frame incompleteness pictures, it is incomplete per frame Picture is described several comprising the two-dimension code image, and several frame incompleteness pictures are rendered frame by frame with a scheduled rate The union of frame incompleteness picture is first picture.
7. a kind of display terminal of sensitive information according to claim 6, which is characterized in that described in the step S3 from The middle N number of sub-pictures of selection are specifically included as key area:
The image entropy of each sub-pictures in the sub-pictures of the M square is calculated successively, and it is pre- to determine that image entropy is more than first If the number m of the sub-pictures of value;
Judge whether m is more than or equal to N, if so, choosing the top n sub-pictures of image entropy maximum as key area;
If it is not, then (N-m) height is randomly selected in the sub-pictures in addition to m sub-pictures for being more than the first preset value except image entropy Picture, using described image entropy be more than the first preset value m sub-pictures with randomly select described in (N-m) a sub-pictures as Key area.
8. the display terminal of a kind of sensitive information according to claim 6, which is characterized in that the step S5 is specifically wrapped It includes:
S51, the position specified according to the key area, by the corresponding sub-pictures of the key area successively from first figure It is cut out coming in piece;
The part being cut away in S52, first picture is filled respectively with the background colour, and is closed with the two-dimension code image Into formation second picture;
S53, the N number of sub-pictures for being cut out are synthesized, and figure in post synthesis successively with the two-dimension code image respectively The black region in the correspondence two-dimension code image and white area are sheared respectively in piece, form the picture of 2 frames complementation, Ultimately generate 2*N frame pictures;
S54, the second picture and the 2*N frames picture are rendered frame by frame with a scheduled rate.
9. the display terminal of a kind of sensitive information according to claim 6, which is characterized in that further include step:
S61, clarity is chosen from the picture frame sequence comprising sensitive information after the rendering of acquisition more than the second preset value One frame picture, as third picture;
S62, the third picture is subjected to gray proces, generates black and white picture;
S63, two-dimension code image is identified from the black and white picture;
S64, the two-dimension code image is decoded, obtains the corresponding user identifier of the two-dimension code image.
10. the display terminal of a kind of sensitive information according to claim 9, which is characterized in that the step S63 is specifically wrapped It includes:
The square color lump for being respectively distributed to three angles is identified from the black and white picture, determines the square color lump pair The position answered according to the position, is cut out a picture, as two-dimension code image.
CN201711403158.3A 2017-12-22 2017-12-22 Sensitive information display method and terminal Active CN108256360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711403158.3A CN108256360B (en) 2017-12-22 2017-12-22 Sensitive information display method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711403158.3A CN108256360B (en) 2017-12-22 2017-12-22 Sensitive information display method and terminal

Publications (2)

Publication Number Publication Date
CN108256360A true CN108256360A (en) 2018-07-06
CN108256360B CN108256360B (en) 2020-02-07

Family

ID=62722804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711403158.3A Active CN108256360B (en) 2017-12-22 2017-12-22 Sensitive information display method and terminal

Country Status (1)

Country Link
CN (1) CN108256360B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145618A (en) * 2018-08-09 2019-01-04 山东中孚安全技术有限公司 A method of papery black and white printing sensitive data is hidden based on greyscale transformation
CN110531911A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Screenshotss information control method, device, computer equipment and storage medium
CN111178869A (en) * 2019-10-25 2020-05-19 腾讯科技(深圳)有限公司 Identification code display method and device, terminal equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130230241A1 (en) * 2005-11-11 2013-09-05 Colorzip Technology Co., Ltd. Animated Image Code, Apparatus for Generating/Decoding Animated Image Code, and Method Thereof
CN105491443A (en) * 2014-09-19 2016-04-13 中兴通讯股份有限公司 Method and device for processing and accessing images
US20160294781A1 (en) * 2015-01-25 2016-10-06 Jennifer Kate Ninan Partial or complete image obfuscation and recovery for privacy protection
CN106330464A (en) * 2016-10-26 2017-01-11 上海众人网络安全技术有限公司 Identity authentication method, device and system
CN106656908A (en) * 2015-10-28 2017-05-10 阿里巴巴集团控股有限公司 Two-dimensional code processing method and two-dimensional code processing device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130230241A1 (en) * 2005-11-11 2013-09-05 Colorzip Technology Co., Ltd. Animated Image Code, Apparatus for Generating/Decoding Animated Image Code, and Method Thereof
CN105491443A (en) * 2014-09-19 2016-04-13 中兴通讯股份有限公司 Method and device for processing and accessing images
US20160294781A1 (en) * 2015-01-25 2016-10-06 Jennifer Kate Ninan Partial or complete image obfuscation and recovery for privacy protection
CN106656908A (en) * 2015-10-28 2017-05-10 阿里巴巴集团控股有限公司 Two-dimensional code processing method and two-dimensional code processing device
CN106330464A (en) * 2016-10-26 2017-01-11 上海众人网络安全技术有限公司 Identity authentication method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
A.CAVALL ARO: ""ADDING PRIVACY CONSTRAINTS TO VIDEO-BASED APPLICATIONS "", 《PROCEEDINGS OF THE EUROPEAN WORKSHOP FOR THE INTEGRATION OF KNOWLEDGE, SEMANTICS AND DIGITAL MEDIA TECHNOLOGY》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145618A (en) * 2018-08-09 2019-01-04 山东中孚安全技术有限公司 A method of papery black and white printing sensitive data is hidden based on greyscale transformation
CN109145618B (en) * 2018-08-09 2022-02-22 山东中孚安全技术有限公司 Method for hiding paper black and white printing sensitive data based on gray level transformation
CN110531911A (en) * 2019-07-22 2019-12-03 平安科技(深圳)有限公司 Screenshotss information control method, device, computer equipment and storage medium
CN110531911B (en) * 2019-07-22 2022-05-27 平安科技(深圳)有限公司 Screen capture information control method and device, computer equipment and storage medium
CN111178869A (en) * 2019-10-25 2020-05-19 腾讯科技(深圳)有限公司 Identification code display method and device, terminal equipment and storage medium
CN111178869B (en) * 2019-10-25 2023-10-17 腾讯科技(深圳)有限公司 Identification code display method and device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN108256360B (en) 2020-02-07

Similar Documents

Publication Publication Date Title
Kabulov et al. Algorithmic method of security of the Internet of Things based on steganographic coding
US20210264139A1 (en) Creating videos with facial expressions
CN107959895B (en) Video playing tracing method, device, equipment and storage medium
WO2015131713A1 (en) Image processing and access method and apparatus
US10979746B2 (en) Video stream display and protection method and device
CN112529757B (en) Screen information protection method, device, computer equipment and readable storage medium
CN108256360A (en) The display methods and terminal of a kind of sensitive information
CN106156237B (en) Information processing method, information processing unit and user equipment
CN109845271A (en) Streaming Media plagiarism detection method and system
CN110634096B (en) Self-adaptive multi-mode information hiding method and device
WO2018010118A1 (en) Digital video content security authentication method and system thereof
CN107509080B (en) Method and device for displaying coded image and electronic equipment
CN106789856A (en) A kind of information coding method, coding/decoding method and device
English Comparison of high capacity steganography techniques
CN112633230A (en) Face encryption method and device, electronic equipment and storage medium
CN109859090A (en) Reversible water mark method and device based on human visual system
WO2019194900A1 (en) Watermarking digital content
CN111294543A (en) System and method for video monitoring photographing protection
Reddy Novel chaos based Steganography for Images using matrix encoding and cat mapping techniques
CN113613015A (en) Tamper-resistant video generation method and device, electronic equipment and readable medium
CN114004726A (en) Watermark display method, watermark display device, computer equipment and storage medium
CN112434327A (en) Information protection method and device and electronic equipment
Goswami et al. An efficient algorithm of steganography using JPEG colored image
WO2019126389A1 (en) Automatic obfuscation engine for computer-generated digital images
Rughani et al. Steganography on ANDROID based smart phones

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant