CN108733690B - Image data storage method and device and electronic equipment - Google Patents

Image data storage method and device and electronic equipment Download PDF

Info

Publication number
CN108733690B
CN108733690B CN201710252448.6A CN201710252448A CN108733690B CN 108733690 B CN108733690 B CN 108733690B CN 201710252448 A CN201710252448 A CN 201710252448A CN 108733690 B CN108733690 B CN 108733690B
Authority
CN
China
Prior art keywords
image data
storage
preset
content
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710252448.6A
Other languages
Chinese (zh)
Other versions
CN108733690A (en
Inventor
董行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN202210033807.XA priority Critical patent/CN114491128A/en
Priority to CN201710252448.6A priority patent/CN108733690B/en
Publication of CN108733690A publication Critical patent/CN108733690A/en
Application granted granted Critical
Publication of CN108733690B publication Critical patent/CN108733690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Library & Information Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides an image data storage method, an image data storage device and electronic equipment, wherein the method comprises the following steps: identifying content features in the image data; determining a storage mode corresponding to the image data based on the content features; and storing the image data according to the storage mode. According to the technical scheme, the storage mode of the image data can be determined based on the content characteristics of the image data, so that the storage efficiency of the image data can be improved.

Description

Image data storage method and device and electronic equipment
Technical Field
The present application relates to the field of image processing technologies, and in particular, to an image data storage method and apparatus, and an electronic device.
Background
An intelligent terminal, such as a mobile phone, can enable a user to take photos anytime and anywhere through a camera application program by configuring a camera, and the taken photos are usually automatically stored in an album application program. When the cell phone is used by other users, any photos in the camera application will be viewed by the other users. Some photos may not be seen by others, so how to identify and store photos needing to be kept secret is a technical problem to be solved by the prior art.
Disclosure of Invention
In view of this, the present application provides a new technical solution, which can ensure that image data related to personal privacy is accessed by a user with a specific authority.
In order to achieve the above purpose, the present application provides the following technical solutions:
according to a first aspect of the present application, there is provided an image data storage method including:
identifying content features in the image data;
determining a storage mode corresponding to the image data based on the content features;
and storing the image data based on the storage mode.
According to a second aspect of the present application, there is provided an image data reading method including:
detecting a data access request which needs identity authentication and corresponds to a preset storage position;
acquiring a verification mode corresponding to the preset storage position;
detecting authentication information input by a user in the authentication mode;
and judging whether the user has the authority to access the data or not based on the verification result.
According to a third aspect of the present application, there is provided an image data storage apparatus comprising:
a feature recognition unit configured to recognize a content feature in the image data;
a storage mode determining unit, configured to determine a storage mode corresponding to the image data based on the content feature identified by the feature identifying unit, where the storage mode includes secure storage;
and the storage unit is used for storing the image data to a preset storage position needing identity authentication if the storage mode determined by the storage mode determining unit is the secret storage.
According to a fourth aspect of the present application, there is provided an image data reading apparatus comprising:
the first detection unit is used for detecting a data access request which needs identity authentication and corresponds to a preset storage position;
the acquisition unit is used for responding to the data access request detected by the first detection unit and acquiring a verification mode corresponding to the preset storage position;
the second detection unit is used for detecting the verification information input by the user according to the verification mode acquired by the acquisition unit;
and the judging unit is used for judging whether the user has the authority to access the data or not based on the verification result obtained by the second detecting unit.
According to a fifth aspect of the present application, a computer-readable storage medium is proposed, which stores a computer program for executing the image data storage method proposed by the first aspect described above or the image data reading method proposed by the second aspect described above.
According to a sixth aspect of the present application, there is provided an electronic device comprising:
a processor; a memory for storing the processor-executable instructions;
wherein the processor is configured to identify content features in the image data; determining a storage mode corresponding to the image data based on the content features, wherein the storage mode comprises secret storage; if the storage mode is the secret storage, storing the image data to a preset storage position needing identity authentication; or,
the processor is used for detecting a data access request which needs identity authentication and corresponds to a preset storage position; acquiring a verification mode corresponding to the preset storage position; detecting authentication information input by a user in the authentication mode; and judging whether the user has the authority to access the data or not based on the verification result.
According to the technical scheme, when a large amount of image data to be stored is newly added in a short time through a network or a camera photographing mode and the like, the storage mode of the image data can be determined based on the content characteristics of the image data, and when the storage mode is confidential storage, the image data can be stored to the preset storage position needing identity authentication, so that the storage efficiency of the image data needing to be confidential can be improved; since the image data is stored in the preset storage position needing identity authentication, the image data needing to be kept secret can be ensured not to be seen by others.
Drawings
Fig. 1A shows a schematic diagram of a picture used in an image data storage method of an exemplary embodiment of the present application;
FIG. 1B is a flow chart illustrating an image data storage method according to an exemplary embodiment of the present application;
FIG. 2A is a scene diagram illustrating a flow chart of an image data storage method according to another exemplary embodiment of the present application;
FIG. 2B is a schematic flow chart diagram illustrating an image data storage method according to another exemplary embodiment of the present application;
FIG. 3 shows a schematic flow chart of an image data storage method of yet another exemplary embodiment of the present application;
FIG. 4 shows a schematic flow chart of an image data storage method of a further exemplary embodiment of the present application;
FIG. 5 shows a schematic structural diagram of an image data storage device according to an exemplary embodiment of the present application;
fig. 6 is a schematic structural diagram showing an image data reading apparatus according to an exemplary embodiment of the present application;
fig. 7 shows a schematic structural diagram of an electronic device according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The application provides an image data storage method, which comprises the following steps:
identifying content features in the image data;
determining a storage mode corresponding to the image data based on the content characteristics;
and storing the image data according to the storage mode.
According to the embodiment of the application, the storage mode of the image data can be determined based on the content characteristics of the image data, so that the storage efficiency of the image data can be improved.
For further explanation of the present application, the following examples are provided:
fig. 1A shows a schematic diagram of a picture used in an image data storage method according to an exemplary embodiment of the present application. The target object described in the present application may be, for example, a piece of apparel, including but not limited to a head yarn worn on the head of a user, sunglasses worn on the face of a user, bikini worn on the body of a user, and the like, through which a specific part of a human body may be covered. In another embodiment, the content feature may also be a gesture preset by the user, and the content feature of the picture is determined through recognition of the gesture, for example, as shown in fig. 1A, when the user stretches out the picture of the gesture in which the "V" font represents winning, if the "V" font is detected, the "V" font may be regarded as the content feature of the picture. In an embodiment, the content features in the picture may be identified based on prior art methods for image recognition.
FIG. 1B is a flow chart illustrating an image data storage method according to an exemplary embodiment of the present application; the embodiment can be applied to an electronic device, and is implemented by installing an application program or software on the electronic device, as shown in fig. 1B, including the following steps:
in step 101, content features in image data are identified.
In an embodiment, the Image Data (Image Data) is a set of gray-scale values of pixels (pixels) represented by numerical values, and a still picture may be acquired by an Image sensor on an imaging device (e.g., a camera, a smartphone equipped with a camera, or other portable device), or a picture of each frame in a video file may be displayed to a user in a picture mode.
In one embodiment, the content feature may be an image feature of an object having a specific shape or a specific distribution rule to be identified.
And 102, determining a storage mode corresponding to the image data based on the content characteristics, wherein the storage mode comprises secret storage.
In one embodiment, the storage means may include secure storage and normal storage. For image data which is stored secretly, the image data can be checked only through identity authentication; any user that can launch an application or software can view normally stored image data.
In an embodiment, the correspondence may be set manually, for example, different storage manners may be set for respective targets corresponding to a plurality of different content features, for example, the target corresponding to the content feature is a head yarn, if it is determined through image recognition that the head yarn covers a face, the picture may be stored normally, if it is determined through image recognition that the head yarn does not cover the face, the picture needs to be stored in secrecy, and if the target corresponding to the content feature is glasses at a face, the picture needs to be stored in secrecy. It should be noted that, a user may set a corresponding storage manner for pictures with different content characteristics according to specific requirements, which is not limited in this application.
According to another embodiment of the present application, in this step, a security level (i.e., a first security level) corresponding to the image data is determined based on the content feature, and then the storage manner is determined based on the security level. The correspondence between the content characteristics and the security level may be predetermined.
103, if the storage mode is secret storage, storing the image data to a preset storage position needing identity authentication; for example, if the storage mode is secret storage, the image data is stored in a preset folder which needs identity authentication.
In one embodiment, the default folder may be one of the storage spaces associated with the application or software. In an embodiment, the preset folder may be associated with a password lock or a fingerprint authentication module, and the user who needs to access the preset folder is authenticated by unlocking the password lock or the fingerprint authentication module.
In the embodiment, when a large amount of image data to be stored is newly added in a short time through a network or a camera photographing mode and the like, the storage mode of the image data can be determined based on the content characteristics of the image data, and when the storage mode is confidential storage, the image data can be stored in the preset storage position needing identity authentication, so that the storage efficiency of the image data needing to be confidential can be improved, and the image data needing to be confidential can be ensured not to be seen by other people.
In the embodiment shown in fig. 1B, the preset storage path may be a secure storage area of the hard disk, and the storage path is a storage path of the secure storage area, which is exemplarily described below with reference to fig. 2A and fig. 2B by taking an example that the preset storage path corresponds to a preset folder.
Fig. 2A is a scene diagram illustrating a flowchart of an image data storage method according to another exemplary embodiment of the present application, as shown in fig. 2A, the preset folder includes three subfolders, i.e., subfolder 21, subfolder 22 and subfolder 23, which include "head yarn", "sunglasses" and "bikini", and the subfolder 21 stores a picture containing a content feature of "sunglasses" that needs to be kept secret, the sub-folder 22 of "head yarn" stores a picture containing a content feature of "head yarn" that needs to be kept secret, and the sub-folder 23 of "bikini" stores a picture containing a content feature of "bikini" that needs to be kept secret. In addition, in the preset folder, pictures that are not classified into the above-described subfolders but need to be stored securely, for example, the picture 24 and the picture 25, may also be stored. It should be noted that the pictures described in the present application describe the image data from the visual point of view of the user, and the image data and the pictures can be regarded as equivalent concepts in the present application.
FIG. 2B is a schematic flow chart diagram illustrating an image data storage method according to another exemplary embodiment of the present application; in this embodiment, based on the embodiment shown in fig. 1B, an example of how to store image data in a preset folder that needs identity authentication is described, as shown in fig. 2B, the image data storage method includes the following steps:
in step 201, content features in image data are identified.
Step 202, determining a storage mode corresponding to the image data based on the content characteristics.
The description of step 201 and step 202 can be referred to the description of the embodiment shown in fig. 1B, and will not be described in detail here.
Step 203, if the storage mode is secret storage, determining whether the image data has a corresponding subfolder in a preset folder needing identity authentication based on the content characteristics, if so, executing step 204, and if not, executing step 208.
In one embodiment, the subfolders correspond to a storage path similar to a storage path corresponding to a predetermined folder.
In one embodiment, the predetermined folder may include at least one subfolder, each of which corresponds to a content feature
Step 204, storing the image data into the subfolder.
Corresponding to the above step 203, if the content feature in the picture is "head yarn", the picture may be stored in the "head yarn" subfolder, if the content feature in the picture is "sunglasses", the picture may be stored in the "sunglasses" subfolder, and if the content feature in the picture is "bikini", the picture may be stored in the "bikini" subfolder.
Step 205, detecting whether the image data includes a preset target object, if so, executing step 206, and if not, ending the process.
In an embodiment, the preset target object may be identified by using an image recognition algorithm corresponding to the preset target object, for example, when the target object is a human face, whether the image includes the human face may be identified by using a human face recognition algorithm in the prior art, which is not described in detail in this application.
Step 206, determining the security level (i.e. the second security level) corresponding to the preset object from the first preset list, where the first preset list is used to record the security levels corresponding to different preset objects.
In one embodiment, the security level may be to hide the image data in a predetermined folder and not hide the image data in the predetermined folder. Different preset objects can correspond to different security levels, for example, taking the preset objects as human faces and human eyes as examples, the security level corresponding to the human face of zhang three needs to hide pictures in a preset folder, the security level corresponding to the human eye of lie four does not need to hide pictures in the preset folder, and the like. The first preset list is shown in table 1.
TABLE 1
Human face Privacy level
Zhang San Hiding
Li Si Is not hidden
In an embodiment, the first preset list may record characteristics of preset objects of a plurality of different users and a security level corresponding to the characteristic of each preset object. It should be noted that, the user may set the privacy level corresponding to the preset target object included in the first preset list in a customized manner.
Step 207, if the security level indicates that the image data needs to be hidden, the image data is hidden in the subfolder, and the process ends.
In an embodiment, the image data may be hidden based on the prior art methods for hiding image data, so that it may be ensured that the image data is not visible in the subfolder.
And step 208, if the corresponding subfolder in the preset folder is not found based on the content characteristics, storing the image data in the preset folder, and ending the process.
For example, if a subfolder about "sunglasses" is not set in the preset folder, and the content feature in the picture is "sunglasses", when it is determined that the picture including "sunglasses" needs to be stored securely based on the content feature, the picture still needs to be stored in the preset folder. In other embodiments of the present application, the user may also select the mapping relationship between the content features and the folders according to the user configuration, for example, the configuration is that the sunglasses product is placed in the hat folder.
In the embodiment, the image data are stored in the corresponding subfolders in the preset folder based on the content characteristics, so that the image data can be finely classified, and a user can conveniently check the images; when the security level indicates that the image data needs to be hidden, the image data is hidden in the subfolder, and after the preset folder is opened by an illegal user, the image data is hidden, so that the privacy of the user can be protected doubly.
FIG. 3 shows a schematic flow chart of an image data storage method of yet another exemplary embodiment of the present application; based on the embodiment shown in fig. 1B, the present embodiment takes an example of how to store the picture in the preset folder that needs identity authentication, as shown in fig. 3, and includes the following steps:
step 301, determining a reference feature template matched with the image data from more than two reference feature templates, wherein the reference feature templates are used for recording content features of different preset target objects.
In one embodiment, the reference feature template may be obtained by acquiring an image of a piece of clothing closely related to the privacy of the user through an image recognition technology, where the piece of clothing closely related to the privacy of the user is, for example: sunglasses, head yarn, bikini, etc., where clothing may be considered one implementation of the preset target in this application. It should be noted that the reference feature template may be set based on the actual requirement of the user, and the specific content of the reference feature template is not limited in the present application.
Step 302, determining the content feature corresponding to the reference feature template matched with the image data as the content feature of the image data.
For example, if the content feature corresponding to the reference feature template "head yarn" matches the picture, the content feature of the picture may be determined to be "head yarn".
Step 303, searching for a storage mode corresponding to the content feature in a second preset list, where the second preset list is used to record storage modes corresponding to different content features.
The second preset list, for example, as shown in table 2, may include content features of the target object preset by the user and a storage manner corresponding to each content feature.
TABLE 2
Content features Storage mode
First yarn Secure storage
Sunglasses Secure storage
Bikini Normal storage
And 304, if the storage mode is secret storage, storing the image data into a preset folder needing identity authentication.
The description of step 304 can be found in the above description of the embodiment shown in fig. 1B, and will not be described in detail here.
In this embodiment, the reference feature templates may be set according to the requirements of the user on the individual privacy, so that different users may have different reference feature templates, and different content features may be obtained through different reference feature templates, thereby ensuring that the privacy protection for different users is more targeted.
FIG. 4 is a flowchart illustrating an image data reading method according to an exemplary embodiment of the present application; as shown in fig. 4, the method comprises the following steps:
step 401, a data access request corresponding to a preset storage location requiring identity authentication is detected.
Step 402, obtaining a verification mode corresponding to a preset storage position.
In one embodiment, the verification method may include: fingerprint authentication, password authentication, pattern authentication, and the like, and the specific authentication manner may be set by a user. In another embodiment, the verification mode may be to authenticate the identity of the user who needs to access the preset folder for a preset gesture made by the user with respect to the electronic device.
In this authentication manner, authentication information input by the user is detected, step 403.
Corresponding to the step 401, the verification information may include biometric information of the user, for example, the user sets the verification mode to be fingerprint verification, when the processor of the electronic device detects that the preset folder is triggered, the fingerprint authentication module may be started, the fingerprint information of the user is collected by the fingerprint authentication module, and the fingerprint information is the verification information in this embodiment. The user sets the verification mode to be iris verification, when the processor of the electronic equipment detects that the preset folder is triggered, the iris authentication module can be started, the iris authentication module collects the iris information of the user, and the iris information is the verification information in the embodiment. The user sets up the verification mode for face verification, detects when presetting the folder and is triggered when electronic equipment's treater, can start the camera, gathers user's facial feature through the camera, with facial feature promptly as the verification information in this embodiment. For another example, after the application program is started, the number of times that the user shakes the mobile phone in a set direction (for example, a vertical direction) is detected through the acceleration sensor, and if the number of times that the mobile phone is shaken reaches a preset number of times, the identity authentication of the user passes, and the preset folder can be accessed by the user.
And step 404, judging whether the user has the right to access the data or not based on the verification result.
The image data in the preset folder may be located in a subfolder below the preset folder, or may be directly stored in the preset folder. The subfolders included in the preset folder and the image data stored in the subfolders included in the preset folder can be referred to in fig. 2A.
According to the image data reading method provided by the embodiment, the user is allowed to access the preset storage position through the authentication mode, so that the image data of the preset storage position can be ensured not to be seen by other illegal users, and the privacy of the user is protected.
Fig. 5 shows a schematic structural diagram of an image data storage device according to an exemplary embodiment of the present application, and as shown in fig. 5, the image data storage device may include: a feature recognition unit 51, a determination unit 52, and a storage unit 53. Wherein:
a feature recognition unit 51 for recognizing a feature of content in the image data;
a storage mode determining unit 52, configured to determine a storage mode corresponding to the image data based on the content features identified by the feature identifying unit 51, where the storage mode includes secure storage;
and the storage unit 53 is configured to store the picture in a preset storage location requiring identity authentication if the storage mode determining unit 52 determines that the storage mode is secret storage.
In one embodiment, the storage unit 53 includes:
the determining subunit 531 is configured to determine, based on the content feature, a storage path corresponding to the image data at a preset storage location that needs identity authentication;
a storing subunit 532 for storing the image data to the storage path determined by the determining subunit 531.
In an embodiment, the preset storage location is a secure storage area of the hard disk, and the storage path is a storage path of the secure storage area.
In an embodiment, the apparatus may further comprise:
the security level determining unit 54 is configured to determine, if it is detected that the image data includes a preset target object, a security level corresponding to the preset target object from a first preset list, where the first preset list is used to record security levels corresponding to different preset target objects.
In an embodiment, the apparatus may further comprise:
a concealment processing unit 55 for concealing the image data in the sub folder of the determination sub-unit 531 if the security level determined by the security level determining unit 54 indicates that the image data needs to be concealed.
In one embodiment, the storage unit 53 is further configured to:
and if the storage path corresponding to the preset storage position is not found based on the content characteristics, storing the image data to the preset storage position.
In an embodiment, the feature recognition unit 51 is specifically configured to:
determining a reference feature template matched with the image data from more than two reference feature templates;
and determining the content feature corresponding to the reference feature template matched with the image data as the content feature of the image data.
In an embodiment, the storage manner determining unit 52 is specifically configured to:
and searching a storage mode corresponding to the content characteristics in a second preset list, wherein the second preset list is used for recording the storage modes corresponding to different content characteristics.
Fig. 6 shows a schematic structural diagram of an image data reading apparatus according to an exemplary embodiment of the present application, and the image data storage apparatus may include: a first detection unit 61, an acquisition unit 62, a second detection unit 63, and a judgment unit 64; wherein,
the first detection unit 61 is configured to detect a data access request corresponding to a preset storage location that requires identity authentication;
an obtaining unit 62, configured to obtain, in response to the data access request detected by the first detecting unit 61, an authentication manner corresponding to a preset storage location;
a second detecting unit 63, configured to detect, in the authentication manner acquired by the acquiring unit 62, authentication information input by the user;
and a judging unit 64, configured to judge whether the user has permission to access the data based on the verification result obtained by the second detecting unit 63.
An embodiment of the present application further provides a computer-readable storage medium, where the storage medium stores a computer program, and the computer program is configured to execute the method for storing pictures according to any one of the embodiments shown in fig. 1B to fig. 3, or execute the method for reading image data according to the embodiment shown in fig. 4.
The present application also proposes a schematic structure diagram of an electronic device according to an exemplary embodiment of the present application, shown in fig. 7, corresponding to the image data storage method provided in any one of the embodiments shown in fig. 1B-3. Referring to fig. 7, at the hardware level, the electronic device may include a processor, an internal bus, a network interface, a memory, and a non-volatile memory, but may also include hardware required for other services. The processor reads a corresponding computer program from the non-volatile memory into the memory and then runs the computer program, so as to realize the image data storage device of the embodiment shown in fig. 5 on a logic level. Of course, besides the software implementation, the present application does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Further, corresponding to the image data reading method provided by the embodiment shown in fig. 4, the processor in the electronic device provided by the embodiment shown in fig. 7 may further implement the image data reading apparatus shown in fig. 6 on a logic level.
It should be noted that, the systems, devices, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or implemented by an article with a certain function. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (15)

1. An image data storage method, characterized in that the method comprises:
identifying content features in the image data; the content features comprise image features of a target object which needs to be identified and has a specific shape or a specific distribution rule; or, the content features comprise gestures preset by a user; wherein, the target object is used for covering a specific part of a human body;
determining a storage mode corresponding to the image data based on the content features;
and storing the image data according to the storage mode.
2. The method according to claim 1, wherein the storing the image data according to the storage manner includes:
and if the storage mode is secret storage, storing the image data to a preset storage position needing identity authentication.
3. The method according to claim 2, wherein the storing the image data to a preset storage location requiring identity authentication comprises:
determining a storage path corresponding to the image data at a preset storage position needing identity authentication based on the content characteristics;
storing the image data into the storage path.
4. The method according to claim 3, wherein the preset storage location is a secure storage area of a hard disk, and the storage path is a storage path of the secure storage area.
5. The method of claim 4, further comprising:
if the image data is detected to contain the preset target object, determining the security level corresponding to the preset target object from a first preset list, wherein the first preset list is used for recording the security levels corresponding to different preset target objects.
6. The method of claim 5, further comprising:
and if the security level indicates that the image data needs to be hidden, hiding the image data in the storage path.
7. The method of claim 3, further comprising:
and if the storage path corresponding to the preset storage position is not found based on the content characteristics, storing the image data to the preset storage position.
8. The method of claim 1, wherein identifying content features in image data comprises:
determining a reference feature template matched with the image data from more than two reference feature templates, wherein the reference feature templates are used for recording content features of different preset target objects;
and determining content characteristics corresponding to the reference characteristic template matched with the image data as the content characteristics of the image data.
9. The method according to claim 1, wherein the determining a storage manner corresponding to the image data based on the content feature comprises:
and searching a storage mode corresponding to the content characteristics in a second preset list, wherein the second preset list is used for recording the storage modes corresponding to different content characteristics.
10. An image data reading method, characterized in that the method further comprises:
detecting a data access request which needs identity authentication and corresponds to a preset storage position; the storage mode corresponding to the image data stored in the preset storage position is determined based on content features in the image data, and the content features comprise image features of a target object which needs to be identified and has a specific shape or a specific distribution rule; or, the content features comprise gestures preset by a user; wherein, the target object is used for covering a specific part of a human body;
acquiring a verification mode corresponding to the preset storage position;
detecting authentication information input by a user in the authentication mode;
and judging whether the user has the authority to access the data or not based on the verification result.
11. The method of claim 10, wherein the authentication information comprises biometric information of the user.
12. An image data storage apparatus, characterized in that the apparatus comprises:
a feature recognition unit configured to recognize a content feature in the image data; the content features comprise image features of a target object which needs to be identified and has a specific shape or a specific distribution rule; or, the content features comprise gestures preset by a user; wherein, the target object is used for covering a specific part of a human body;
a storage mode determining unit, configured to determine a storage mode corresponding to the image data based on the content feature identified by the feature identifying unit, where the storage mode includes secure storage;
and the storage unit is used for storing the image data to a preset storage position needing identity authentication if the storage mode determining unit determines that the storage mode is the secret storage.
13. An image data reading apparatus, characterized in that the apparatus comprises:
the first detection unit is used for detecting a data access request which needs identity authentication and corresponds to a preset storage position; the storage mode corresponding to the image data stored in the preset storage position is determined based on content features in the image data, and the content features comprise image features of a target object which needs to be identified and has a specific shape or a specific distribution rule; or, the content features comprise gestures preset by a user; wherein, the target object is used for covering a specific part of a human body;
the acquisition unit is used for responding to the data access request detected by the first detection unit and acquiring a verification mode corresponding to the preset storage position;
the second detection unit is used for detecting the verification information input by the user according to the verification mode acquired by the acquisition unit;
and the judging unit is used for judging whether the user has the authority to access the data or not based on the verification result obtained by the second detecting unit.
14. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the image data storage method according to any one of claims 1 to 8 or the image data reading method according to claim 9 or 10.
15. An electronic device, characterized in that the electronic device comprises:
a processor; a memory for storing the processor-executable instructions;
wherein the processor is configured to identify content features in the image data; the content features comprise image features of a target object which needs to be identified and has a specific shape or a specific distribution rule; or, the content features comprise gestures preset by a user; wherein, the target object is used for covering a specific part of a human body; determining a storage mode corresponding to the image data based on the content features, wherein the storage mode comprises secret storage; if the storage mode is the secret storage, storing the image data to a preset storage position needing identity authentication; or,
the processor is used for detecting a data access request which needs identity authentication and corresponds to a preset storage position; acquiring a verification mode corresponding to the preset storage position; detecting authentication information input by a user in the authentication mode; and judging whether the user has the authority to access the data or not based on the verification result.
CN201710252448.6A 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment Active CN108733690B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210033807.XA CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment
CN201710252448.6A CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710252448.6A CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202210033807.XA Division CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN108733690A CN108733690A (en) 2018-11-02
CN108733690B true CN108733690B (en) 2022-02-18

Family

ID=63925118

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710252448.6A Active CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment
CN202210033807.XA Pending CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202210033807.XA Pending CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Country Status (1)

Country Link
CN (2) CN108733690B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659512B (en) * 2019-09-27 2022-02-11 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113742793B (en) * 2021-08-13 2022-05-24 北京海泰方圆科技股份有限公司 PIN code input method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504505A (en) * 2014-12-12 2015-04-08 北京航天新风机械设备有限责任公司 Data acquisition system based on process
CN105678114A (en) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 Image preview method and device
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10469578B2 (en) * 2011-11-28 2019-11-05 Pure Storage, Inc. Prioritization of messages of a dispersed storage network
CN105760817A (en) * 2016-01-28 2016-07-13 深圳泰首智能技术有限公司 Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678114A (en) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 Image preview method and device
CN104504505A (en) * 2014-12-12 2015-04-08 北京航天新风机械设备有限责任公司 Data acquisition system based on process
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device

Also Published As

Publication number Publication date
CN108733690A (en) 2018-11-02
CN114491128A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
ES2768252T3 (en) Image recognition apparatus and procedure
WO2014187134A1 (en) Method and apparatus for protecting browser private information
CN107844748A (en) Auth method, device, storage medium and computer equipment
US20160072819A1 (en) Determination method for identifying user authority based on fingerprints in a mobile terminal and system employing the same
US10579783B1 (en) Identity authentication verification
CN110998573A (en) Computer-implemented method and computer program product for access control of a terminal
CN102902935A (en) Mobile terminal privacy protection method and device
CN105760737A (en) Control method for applications and terminal
CN108733690B (en) Image data storage method and device and electronic equipment
CN103324947B (en) Authentication method and authentication method
CN108959884B (en) Human authentication verification device and method
CA2819767A1 (en) Methods and systems for improving the accuracy performance of authentication systems
CN104778416A (en) Information hiding method and terminal
US11711215B2 (en) Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information
JP7318833B2 (en) Image processing device, image processing method, and program
CN106611114A (en) Equipment using authority determination method and device
JP6311237B2 (en) Collation device and collation method, collation system, and computer program
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
Shende et al. A survey based on fingerprint, face and iris biometric recognition system, image quality assessment and fake biometric
CN109063442B (en) Service implementation method and device and camera implementation method and device
WO2018133584A1 (en) Identity authentication method and device
Roy et al. Detection of bifurcation angles in a retinal fundus image
KR102539533B1 (en) Method and apparatus for preventing other people from photographing identification
WO2016095680A1 (en) Intrusion detection method and device for private data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant