CN108830141A - Image processing method, device, computer readable storage medium and electronic equipment - Google Patents
Image processing method, device, computer readable storage medium and electronic equipment Download PDFInfo
- Publication number
- CN108830141A CN108830141A CN201810403000.4A CN201810403000A CN108830141A CN 108830141 A CN108830141 A CN 108830141A CN 201810403000 A CN201810403000 A CN 201810403000A CN 108830141 A CN108830141 A CN 108830141A
- Authority
- CN
- China
- Prior art keywords
- image
- depth
- speckle
- depth image
- acquisition instructions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 29
- 230000000977 initiatory effect Effects 0.000 claims abstract description 28
- 238000000034 method Methods 0.000 claims abstract description 12
- 238000012545 processing Methods 0.000 claims description 83
- 238000012937 correction Methods 0.000 claims description 22
- 230000006399 behavior Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000004422 calculation algorithm Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000003384 imaging method Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 230000003190 augmentative effect Effects 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 description 2
- 230000033228 biological regulation Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 235000008434 ginseng Nutrition 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003796 beauty Effects 0.000 description 1
- 239000000571 coke Substances 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/80—Geometric correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/50—Depth or shape recovery
- G06T7/521—Depth or shape recovery from laser ranging, e.g. using interferometry; from the projection of structured light
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/10—Image acquisition
- G06V10/12—Details of acquisition arrangements; Constructional details thereof
- G06V10/14—Optical characteristics of the device performing the acquisition or on the illumination arrangements
- G06V10/145—Illumination specially adapted for pattern recognition, e.g. using gratings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10028—Range image; Depth image; 3D point clouds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10048—Infrared image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
- G06T2207/30196—Human being; Person
- G06T2207/30201—Face
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Bioethics (AREA)
- Artificial Intelligence (AREA)
- Optics & Photonics (AREA)
- Image Processing (AREA)
Abstract
This application involves a kind of image processing method, device, computer readable storage medium and electronic equipments.The method includes:If detecting image capture instruction, judge whether the corresponding application operating of described image acquisition instructions is non-secure operations;If the corresponding application operating of described image acquisition instructions is non-secure operations, camera module is controlled according to described image acquisition instructions and acquires speckle image;Depth image is calculated according to the speckle image;The depth image is sent to the destination application for initiating described image acquisition instructions, the depth image is used to indicate the destination application and executes the application operating.The efficiency of image procossing can be improved in above-mentioned image processing method, device, computer readable storage medium and electronic equipment.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of image processing method, device, computer-readable deposit
Storage media and electronic equipment.
Background technique
Due to face have uniqueness characteristic, face recognition technology in an intelligent terminal using more and more extensive.
Many application programs of intelligent terminal can all be authenticated by face, such as carried out the unlock of intelligent terminal by face, led to
It crosses face and carries out payment authentication.Meanwhile intelligent terminal can also be handled the image comprising face.For example, to face spy
Sign is identified, makes expression packet according to human face expression, or carry out U.S. face processing etc. by face characteristic.
Summary of the invention
The embodiment of the present application provides a kind of image processing method, device, computer readable storage medium and electronic equipment, can
To improve the efficiency of image procossing.
A kind of image processing method, including:
If detecting image capture instruction, judge whether the corresponding application operating of described image acquisition instructions is non-security
Operation;
If the corresponding application operating of described image acquisition instructions is non-secure operations, camera module is controlled according to
Image capture instruction acquires speckle image;
Depth image is calculated according to the speckle image;
The depth image is sent to the destination application for initiating described image acquisition instructions, the depth image is used
The application operating is executed in the instruction destination application.
A kind of image processing apparatus, including:
Instruction detection module, if judging that described image acquisition instructions are corresponding for detecting image capture instruction and answering
It whether is non-secure operations with operation;
Speckle image obtains module, if being non-secure operations for the corresponding application operating of described image acquisition instructions,
It controls camera module and acquires speckle image according to described image acquisition instructions;
Depth image obtains module, for depth image to be calculated according to the speckle image;
Image sending module, for the depth image to be sent to the target application journey for initiating described image acquisition instructions
Sequence, the depth image are used to indicate the destination application and execute the application operating.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Following steps are realized when row:
If detecting image capture instruction, judge whether the corresponding application operating of described image acquisition instructions is non-security
Operation;
If the corresponding application operating of described image acquisition instructions is non-secure operations, camera module is controlled according to
Image capture instruction acquires speckle image;
Depth image is calculated according to the speckle image;
The depth image is sent to the destination application for initiating described image acquisition instructions, the depth image is used
The application operating is executed in the instruction destination application.
A kind of electronic equipment, including memory and processor store computer-readable instruction in the memory, described
When instruction is executed by the processor, so that the processor executes following steps:
If detecting image capture instruction, judge whether the corresponding application operating of described image acquisition instructions is non-security
Operation;
If the corresponding application operating of described image acquisition instructions is non-secure operations, camera module is controlled according to
Image capture instruction acquires speckle image;
Depth image is calculated according to the speckle image;
The depth image is sent to the destination application for initiating described image acquisition instructions, the depth image is used
The application operating is executed in the instruction destination application.
Above-mentioned image processing method, device, computer readable storage medium and electronic equipment, electronic equipment are detecting figure
When the corresponding application operating of picture acquisition instructions is non-secure operations, camera module can be controlled and dissipated according to image capture instruction acquisition
Then depth image is calculated according to speckle image in spot image, and depth image is sent to destination application and is carried out pair
The application operating answered.The application operating of image capture instruction can be classified in this way, and be referred to according to different Image Acquisition
It enables and carries out different operations.When the image of acquisition is used for non-secure operations, then directly the image of acquisition can be handled,
Improve the efficiency of image procossing.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the application scenario diagram of image processing method in one embodiment;
Fig. 2 is the flow chart of image processing method in one embodiment;
Fig. 3 is the flow chart of image processing method in another embodiment;
Fig. 4 is the schematic diagram that depth information is calculated in one embodiment;
Fig. 5 is the flow chart of image processing method in another embodiment;
Fig. 6 is the flow chart of image processing method in another embodiment;
Fig. 7 is the hardware structure diagram that image processing method is realized in one embodiment;
Fig. 8 is the hardware structure diagram that image processing method is realized in another embodiment;
Fig. 9 is the structural schematic diagram of image processing apparatus in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
It is appreciated that term " first " used in this application, " second " etc. can be used to describe various elements herein,
But these elements should not be limited by these terms.These terms are only used to distinguish the first element from the other element.Citing comes
It says, in the case where not departing from scope of the present application, the first client can be known as the second client, and similarly, can incite somebody to action
Second client is known as the first client.The first client and the second client both client, but it is not same visitor
Family end.
Fig. 1 is the application scenario diagram of image processing method in one embodiment.As shown in Figure 1, including in the application scenarios
Electronic equipment 104.Mountable camera module in electronic equipment 104, can also install several application programs.Electronic equipment
104 when detecting image capture instruction, judges whether the corresponding application operating of image capture instruction is non-secure operations.If figure
The corresponding application operating of picture acquisition instructions is non-secure operations, then can control camera module and acquired according to image capture instruction
Speckle image 102.Then depth image is calculated according to speckle image 102, and depth image is sent to initiation image and is adopted
Collect the destination application of instruction, destination application can go to execute application operating according to depth image.Wherein, electronic equipment
104 can be smart phone, tablet computer, personal digital assistant, wearable device etc..
Fig. 2 is the flow chart of image processing method in one embodiment.As shown in Fig. 2, the image processing method includes step
Rapid 202 to step 208.Wherein:
Step 202, if detecting image capture instruction, judge whether the corresponding application operating of image capture instruction is non-
Safety operation.
In one embodiment, camera can be installed on electronic equipment, and image is obtained by the camera of installation.It takes the photograph
As head can be divided into the first-class type of Laser video camera head, visible image capturing according to the difference of the image of acquisition, Laser video camera head can be with
It obtains and is formed by image in laser irradiation to object, it is seen that be formed by the available radiation of visible light to object of light image
Image.Several cameras can be installed, and the position installed is without limitation on electronic equipment.For example, can be in electronic equipment
Front panel on a camera is installed, two cameras are overleaf installed, camera can also be with embedded side on panel
Formula is installed on the inside of electronic equipment, and camera is then opened by way of rotating or sliding.It specifically, can on electronic equipment
Front camera and rear camera be installed, front camera and rear camera can obtain image from different visual angles, and one
As front camera can obtain image from the positive visual angle of electronic equipment, rear camera can regard from the back side of electronic equipment
Angle obtains image.
Image capture instruction refers to the instruction for triggering Image Acquisition operation.For example, when user carries out smart phone
When unlock, verifying unlock can be carried out by obtaining facial image;When user is paid by smart phone,
It can be authenticated with facial image.It, can after application operating refers to that application program is opened in the operation that application program needs to complete, user
To complete different application operatings by application program.For example, application operating can be delivery operation, shooting operation, unlock behaviour
Work, game operation etc..The relatively high application operating of security requirement is considered as safety operation, the lower application of security requirement
Operation is considered as non-secure operations.
Step 204, if the corresponding application operating of image capture instruction be non-secure operations, control camera module according to
Image capture instruction acquires speckle image.
The processing unit of electronic equipment can receive the instruction from upper level applications, when processing unit receives image
When acquisition instructions, so that it may control camera module and work, acquire speckle image by camera.Processing unit is connected to
Camera, camera obtain image can be transferred to processing unit, and cut through the processing unit, brightness regulation,
The processing such as Face datection, recognition of face.Specifically, it can be, but not limited to include Laser video camera head and radium-shine in camera module
Lamp.When processing unit receives image capture instruction, processing unit can control color-changing lamp unlatching, when color-changing lamp is opened, lead to
Too drastic light video camera head acquires speckle image.It can also include Laser video camera head, color-changing lamp and floodlight in camera module.Work as place
When reason unit receives image capture instruction, processing unit can control color-changing lamp and floodlight carries out time-sharing work, work as color-changing lamp
When unlatching, speckle image is acquired by Laser video camera head;When floodlight is opened, infrared image is acquired by Laser video camera head.
It is understood that when laser irradiation is on the optically roughness surface that mean fluctuation is greater than number of wavelengths magnitude, this
The wavelet of the bin scattering of random distribution, which is overlapped mutually, on a little surfaces makes reflection light field that there is random spatial light intensity to be distributed, and presents
Granular structure out, here it is laser speckles.The laser speckle of formation has height random, therefore different Laser emissions
The laser that device emits laser speckle generated is different.When the laser speckle of formation is irradiated to the object of different depth and shape
When on body, the speckle image of generation is different.There is uniqueness by the laser speckle that different laser emitters is formed,
The speckle image obtained from also has uniqueness.The laser speckle that color-changing lamp is formed can be irradiated on object, then be passed through
Laser video camera head is irradiated on object the laser speckle that acquires and is formed by speckle image.
It specifically, may include first processing units and the second processing unit in electronic equipment, first processing units operate in
In secure operating environment.The second processing unit can be run under secure operating environment, can also be transported under non-security running environment
Row.First processing units and the second processing unit are distribution processing unit on the different processors, and are in different safety
Under environment.First processing units operate under the first security context, and the second processing unit may operate under the second security context.Example
Such as, first processing units can be external MCU (Microcontroller Unit, micro-control unit) module or DSP
Secure processing module in (Digital Signal Processing, digital signal processor), the second processing unit can be with
CPU (Central Processing Unit, central processing unit) kernel, CPU core can be at TEE (Trust Execution
Environment, credible performing environment) under, can also be in REE, (Rich Execution Environment executes ring naturally
Border) under.
Specifically, when electronic equipment needs to obtain the higher data of security level, such as electronic equipment needs to obtain people
When face data carry out identification verifying, CPU can be switched to TEE by REE and be run.It, can be straight when CPU is monokaryon in electronic equipment
It connects and above-mentioned monokaryon is switched to TEE by REE;When CPU is multicore in electronic equipment, electronic equipment is cut a kernel by REE
TEE is changed to, other kernels still operate in REE.The second processing unit can receive the image capture instruction of application program transmission,
And image capture instruction is sent to first processing units, then speckle pattern is acquired by first processing units control camera module
Picture.
Step 206, depth image is calculated according to speckle image.
It is understood that color-changing lamp can launch several laser speckle points, laser speckle point be irradiated to it is different away from
From object on when, the speckle displacement that is presented on the image is different.Electronic equipment can acquire the reference of a standard in advance
Image, reference picture are that laser speckle is irradiated in plane and is formed by image.So the speckle point on reference picture is usually
It is equally distributed, then establish the corresponding relationship of each speckle point and reference depth in the reference picture.It is dissipated when needing to acquire
When spot image, control color-changing lamp issues laser speckle, after laser speckle is irradiated on object, is acquired by Laser video camera head
To speckle image.Then each of speckle image speckle point is compared with the speckle point in reference picture, obtains and dissipates
Position offset of the speckle point relative to speckle point corresponding in reference picture in spot image, and the position offset of speckle point
The corresponding real depth information of speckle point is obtained with reference depth.
Specifically, it during calculating depth information according to speckle image, first has to opposite with reference according to speckle image
The position offset of the speckle point of image calculates relative depth, and relative depth can indicate that actual photographed object arrives reference planes
Depth information.Then the real depth information of object is calculated further according to the relative depth of acquisition and reference depth.Depth image is used
In the depth information for indicating shooting object, it can be the object of expression to the relative depth of reference planes, be also possible to object and arrive
The absolute depth of camera.
Step 208, depth image is sent to the destination application for initiating image capture instruction, depth image is for referring to
Show that destination application executes application operating.
The depth image that will acquire is sent to destination application, and destination application can be obtained according to depth image and be clapped
The depth information of object is taken the photograph, corresponding application operating is then carried out according to depth image.For example, electronic equipment can acquire simultaneously
One RGB (Red Green Blue, RGB) image and a speckle image, RGB image and speckle image collected are
It is corresponding, then the depth image being calculated according to speckle image is also corresponding with above-mentioned RGB image.Destination application
After getting RGB image and depth image, so that it may it is corresponding to obtain each pixel in RGB image according to depth image
Then depth value carries out three-dimensional modeling to RGB image according to obtained depth value, (Augmented Reality, enhancing are existing by AR
Real technology), the processing such as U.S. face.
Image processing method provided by the above embodiment, electronic equipment are detecting the corresponding application behaviour of image capture instruction
When as non-secure operations, camera module can be controlled according to image capture instruction and acquire speckle image, then according to speckle pattern
As depth image is calculated, and depth image is sent to destination application and carries out corresponding application operating.It in this way can be with
The application operating of image capture instruction is classified, and carries out different operations according to different image capture instructions.When adopting
When the image of collection is used for non-secure operations, then directly the image of acquisition can be handled, improve the efficiency of image procossing.
Fig. 3 is the flow chart of image processing method in another embodiment.As shown in figure 3, being wrapped in the image processing method
Step 302 is included to step 314.Wherein:
Step 302, if detecting image capture instruction, judge whether the corresponding application operating of image capture instruction is non-
Safety operation.
Step 304, it if the corresponding application operating of image capture instruction is non-secure operations, obtains in image capture instruction
The timestamp for including, at the time of timestamp is for indicating to initiate image capture instruction.
Specifically, a time can be written when sending image capture instruction in application program in image capture instruction
Stamp, at the time of which initiates the image capture instruction for records application program.When first processing units receive image
When acquisition instructions, first processing units acquisition time can be stabbed from image capture instruction, be judged to generate the figure according to the timestamp
At the time of as acquisition instructions.For example, when application program initiate image capture instruction when, application program can be read electronic equipment when
At the time of clock is recorded, as a timestamp, and the timestamp that will acquire is written in image capture instruction.Such as
In android system system time can be obtained by System.currentTimeMillis () function.
Step 306, if timestamp is less than duration threshold value to the interval duration between object time, camera module is controlled
Speckle image is acquired according to image capture instruction, at the time of object time is for indicating to detect image capture instruction.
At the time of object time refers to that electronic equipment detects image capture instruction, specifically first processing units are detected
At the time of image capture instruction.Timestamp between object time interval duration, in particular to from initiate image capture instruction
At the time of the duration that is spaced at the time of detect image capture instruction to electronic equipment.If the interval duration is more than duration threshold
Value, then it is assumed that the response abnormality of instruction, so that it may stop obtaining image, and return to unexpected message to application program.If when interval
It is long to be less than duration threshold value, then control camera acquisition speckle image.
In one embodiment, camera module is made of the first camera module and second camera mould group, the
One camera module is for acquiring RGB image, and second camera mould group is for acquiring speckle image.According to RGB image and dissipate
It when spot image carries out application operating, needs to guarantee RGB image and speckle image is corresponding, then just needing to control to take the photograph
As head mould group acquires RGB image and speckle image simultaneously.Specifically, the first camera module is controlled according to image capture instruction to adopt
Collect RGB image, and controls second camera mould group acquisition speckle image;Wherein, the first moment and acquisition for acquiring RGB image dissipate
Time interval between second moment of spot image is less than first threshold.
It is understood that acquisition RGB image and speckle image be it is corresponding, also it is necessary that RGB image and dissipate
The consistency of spot image.Assuming that if the first camera module and second camera mould group are time-sharing work, it is necessary that adopting
The time interval for collecting RGB image and speckle image is very short.Acquire the first moment and the second of acquisition speckle image of RGB image
Time interval between moment is less than first threshold.First threshold is usually a smaller value, when time interval is less than
When one threshold value, it is believed that for subject there is no variation, the RGB image and speckle image of acquisition are corresponding.It is understood that
It is that can also be adjusted according to the changing rule of subject.The variation of subject is faster, corresponding first obtained
Threshold value is smaller.Assuming that subject for a long time remain static if, the first threshold can be set as one it is larger
Value.Specifically, obtaining the pace of change of subject, corresponding first threshold is obtained according to the pace of change.
For example, when mobile phone needs to carry out U.S. face self-timer, user can click button of taking pictures and initiate photographing instruction, and
Front camera alignment face is shot.Mobile phone can send photographing instruction to first processing units, first processing units
Camera is controlled again to work.RGB image is acquired by the first camera module first, after being spaced 1 millisecond of time, then is controlled
Second camera mould group acquires speckle image.Then according to speckle image calculate depth image, and by acquisition RGB image and
Depth image carries out U.S. face processing.
Further, RGB image is acquired in the first moment control camera module, and controls camera at the second moment
Mould group acquires speckle image;Time interval between first moment and object time is less than second threshold;Second moment and target
Time interval between moment is less than third threshold value.If the time interval between the first moment and object time is less than the second threshold
Value then controls camera module acquisition RGB image;If the time interval between the first moment and object time is greater than the second threshold
Value, then can be to the prompt information of application program returning response time-out, and application program is waited to re-initiate image capture instruction.
After camera module acquires RGB image, first processing units can control camera module to acquire speckle image, adopt
Collect the time interval between the second moment and the first moment of speckle image and be less than first threshold, when the second moment of colleague is with target
Time interval between quarter is less than third threshold value.If the time interval between the second moment and the first moment is greater than first threshold,
Or the second time interval between moment and object time is greater than third threshold value, then it can mentioning to application program returning response time-out
Show information, and application program is waited to re-initiate image capture instruction.It is understood that the second moment of acquisition speckle image
The first moment of acquisition RGB image can be greater than, might be less that the first moment of acquisition RGB image, it is not limited here.
Step 308, reference picture is obtained, reference picture is the image obtained by calibrating with reference depth information.
Electronic equipment can in advance demarcate laser speckle to obtain a reference picture, and by reference pictures store in electricity
In sub- equipment.Generally, reference picture is that laser speckle is irradiated to a reference planes and is formed, and reference picture is also one
The image with several speckle points is opened, each speckle point has corresponding reference depth information.When needing to obtain subject
When the depth information of body, so that it may be compared the speckle image of actual acquisition with reference picture, and according to actual acquisition
The offset of speckle point calculates actual depth information in speckle image.
Fig. 4 is the schematic diagram that depth information is calculated in one embodiment.As shown in figure 4, laser can be generated in color-changing lamp 402
Speckle, laser speckle obtain the image formed after object is reflected, through Laser video camera head 404.In the mark of camera
During fixed, the laser speckle that color-changing lamp 402 emits can be reflected by reference planes 408, then pass through Laser video camera head
404 acquisition reflection lights obtain reference picture by the imaging of imaging plane 410.Reference planes 408 arrive the reference of color-changing lamp 402
Depth is L, which is known.During actually calculating depth information, the laser speckle of the transmitting of color-changing lamp 402
It can be reflected by object 406, then reflection light is acquired by Laser video camera head 404, reality is obtained by the imaging of imaging plane 410
The speckle image on border.Then the calculation formula of available actual depth information is:
Wherein, L is that color-changing lamp 402 arrives the distance between reference planes 408, and f is the coke of lens in Laser video camera head 404
Be color-changing lamp 402 the distance between to Laser video camera head 404 away from, CD, AB be object 406 imaging and reference planes 408 at
Offset distance as between.AB can be the product of pixel-shift amount n and the actual range p of pixel.When object 404 arrives color-changing lamp
When the reference planes 406 that the distance between 402 Dis are greater than arrive the distance between color-changing lamp 402 L, AB is negative value;When object 404 arrives
When the reference planes 406 that the distance between color-changing lamp 402 Dis are less than arrive the distance between color-changing lamp 402 L, AB is positive value.
Step 310, reference picture is compared to obtain offset information with speckle image, offset information is for indicating speckle
Speckle point is relative to the horizontal offset for corresponding to speckle point in reference picture in image.
Specifically, each pixel (x, y) in speckle image is traversed, centered on the pixel, selects one to preset
Size block of pixels.For example, it may be choosing the block of pixels of 31pixel*31pixel size.Then phase is searched on a reference
Matched block of pixels calculates the horizontal offset of the coordinate of matched pixel and pixel (x, y) coordinate on a reference,
Offset is positive to the right, and offset is denoted as negative to the left.Calculated horizontal offset is brought into formula (1) available pixel again
The depth information of (x, y).The depth information of each pixel in speckle image is successively calculated in this way, so that it may be obtained with speckle
Depth information corresponding to each pixel in image.
Step 312, depth image is calculated according to offset information and reference depth information.
Depth image can be used to indicate that the corresponding depth information of infrared image, each pixel for including in depth image
Point indicates a depth information.Specifically, each of reference picture speckle point all corresponds to a reference depth information, when obtaining
Getting speckle point in reference picture can calculate with after the horizontal offset of speckle point in speckle image according to the horizontal offset
Obtain the object in speckle image to reference planes relative depth information, then further according to relative depth information and reference depth
Information, so that it may object be calculated to the real depth information of camera to get depth image to the end.
Step 314, depth image is sent to the destination application for initiating image capture instruction, depth image is for referring to
Show that destination application executes application operating.
In one embodiment, after getting depth image, depth parallax figure can be calculated according to depth image
Picture.It can be corrected according to depth parallax image, obtain correction depth image, carried out further according to correction depth image using behaviour
Make.Above-mentioned depth image is corrected respectively, refers to inside and outside parameter in the above-mentioned depth image of correction.For example, Laser video camera head
Deflection is generated, then the depth image obtained just needs the error generated to the deflection parallax to be corrected, to obtain standard
Depth image.Being corrected to above-mentioned depth image can be obtained correction depth image.Specifically, depth image is corrected
Correction depth image is obtained, and correction depth image is sent to the destination application for initiating image capture instruction.It can root
Depth parallax image is calculated according to depth image, carries out inside and outside parameter correction further according to depth parallax image, it is deep to obtain correction
Spend image.
In one embodiment, before sending depth image, depth image can also be encrypted:
Step 502, the network safety grade for the network environment that electronic equipment is presently in is obtained.
Application program is when acquisition image is operated, it may be necessary to carry out networking operation.For example, being carried out to image
When three-dimensional modeling, RGB image and depth image can be sent to the server of application program, and carry out on the server
Three-dimensional modeling processing.Then application program needs to connect network when sending RGB image and depth image, then passes through network for RGB
Image and depth image are sent to corresponding server.Rogue program obtains depth image and carries out malicious operation in order to prevent,
The depth image of transmission can be encrypted before sending image.
Step 504, if network safety grade is less than grade threshold, depth image is encrypted.
When network safety grade is less than grade threshold, then it is assumed that the safety of the network currently connected is relatively low.In net
In the lower situation of the safety of network environment, depth image is encrypted.Specifically, it is obtained according to network safety grade
Secret grade, and depth image is encrypted according to secret grade.Electronic equipment pre-establish network safety grade with
The corresponding relationship of secret grade, according to the available corresponding secret grade of network safety grade, and according to secret grade to people
Face recognition result is encrypted.Depth image can be encrypted according to the reference picture of acquisition.By depth map
As being encrypted, specific Encryption Algorithm is without limitation.For example, it may be according to DES (Data Encryption
Standard, data encryption standards), MD5 (Message-Digest Algorithm 5, Message-Digest Algorithm 5), HAVAL
(Diffie-Hellman, Diffie-Hellman).
Reference picture is electronic equipment in the speckle image for carrying out mark timing acquiring to camera module, due to reference picture
With height uniqueness, the reference picture of different electronic equipment acquisitions is different.So reference picture can inherently be made
The key encrypted for one, for data are encrypted.Reference picture can be stored in security context by electronic equipment
In, leaking data can be prevented in this way.Specifically, the reference picture of acquisition is made of a two-dimensional picture element matrix, often
One pixel has corresponding pixel value.Depth image can be added according to all or part of pixel of reference picture
Close processing.For example, reference picture can be directly overlapped with depth image, an encrypted image is obtained.It can also be with depth
The corresponding picture element matrix of image picture element matrix corresponding with reference picture carries out product calculation, obtains encrypted image.It can also take
Some in reference picture or the corresponding pixel value of multiple pixels are encrypted depth image as encryption key,
Specific Encryption Algorithm is the present embodiment does not limit.
Reference picture is generated in electronic equipment calibration, then reference picture can be stored in advance in peace by electronic equipment
In full ambient engine, when needing to encrypt depth image, reference picture can be read in a secure environment, and according to ginseng
Image is examined depth image is encrypted.Meanwhile meeting storage one on the corresponding server of good application program is identical
Reference picture, face recognition result after electronic equipment is by encryption is sent to the corresponding server of destination application
Later, the server of destination application obtains reference picture, and according to the reference picture of acquisition to encrypted recognition of face
As a result it is decrypted.
It is understood that the ginseng of multiple distinct electronic apparatuses acquisition may be stored in the server of destination application
Examine image, the corresponding reference picture of each electronic equipment is different.Therefore, one can be defined to each reference picture in server
A reference picture mark, and the device identification of electronic equipment is stored, it then establishes between reference picture mark and device identification
Corresponding relationship.When server receives depth image, the depth image received can carry the equipment mark of electronic equipment simultaneously
Know.Server can search corresponding reference picture according to device identification and identify, and find correspondence according to reference picture mark
Reference picture, then depth image is decrypted according to the reference picture that finds.
In other embodiments provided by the present application, specifically it can wrap according to the method that reference picture is encrypted
It includes:The corresponding picture element matrix of reference picture is obtained, encryption key is obtained according to the picture element matrix;According to encryption key to depth map
As being encrypted.
Specifically, reference picture is made of a two-dimensional pixel matrix, due to the reference picture of acquisition be it is unique,
Therefore the corresponding picture element matrix of reference picture is also unique.The picture element matrix itself can be used as an encryption key to depth
Image is encrypted, and certain encryption key that is converted to, then the encryption by being converted to can also be carried out to picture element matrix
Key pair depth image is encrypted.For example, picture element matrix is the two-dimensional matrix being made of multiple pixel values,
Position of each pixel value in picture element matrix can be indicated by a two-dimensional coordinate, then can pass through one or more
A position coordinates obtain corresponding pixel value, and the one or more pixel value that will acquire is combined into an encryption key.It obtains
After getting encryption key, face recognition result can be encrypted according to encryption key, specifically Encryption Algorithm exists
In the present embodiment without limitation.For example, can directly be overlapped encryption key and data or product, or can will encrypt
Key in, obtains final encryption data as a numerical value insert number.
Electronic equipment can also use different Encryption Algorithm to different application programs.Specifically, electronic equipment can be with
The application identities of application program and the corresponding relationship of Encryption Algorithm are pre-established, may include target application journey in image capture instruction
The target application of sequence identifies.After receiving image capture instruction, the target application that includes in available image capture instruction
Mark, and corresponding Encryption Algorithm is obtained according to target application mark, according to the Encryption Algorithm of acquisition to face recognition result into
Row encryption.
Before depth image is sent to destination application, the precision of depth image can also be adjusted.Tool
Body, above-mentioned image processing method may also include:Obtain the application level for initiating the destination application of image capture instruction, root
Corresponding accuracy class is obtained according to application level;According to the precision of precision grade percentage regulation image, by depth map adjusted
As being sent to application program.Application level can indicate the corresponding important level of destination application.General objectives application program
Application level it is higher, the precision of the image of transmission is higher.Electronic equipment can preset the application level of application program, and
The corresponding relationship for establishing application level and accuracy class, according to the available corresponding accuracy class of application level.For example, can be with
Application program is divided into the non-security class application program of system security classes application program, system, third party's security classes application program,
Four application levels, the corresponding accuracy classes such as the non-security class application program of tripartite gradually decrease.
The precision of depth image can show as the speckle point for including in the resolution ratio or speckle image of depth image
Number, the precision of the depth image obtained in this way according to speckle image also can be different.Specifically, the adjustment precision of images can wrap
It includes:The resolution ratio of image to be sent is adjusted according to precision grade;Or, including according in the speckle image of precision grade adjustment acquisition
Speckle point number.Wherein, the number for the speckle point for including in speckle image can be adjusted by way of software,
It can be adjusted by way of hardware.When software mode adjusts, the speckle point in the speckle pattern of acquisition can be directly detected, and
Speckle point in part is merged or Processing for removing, the quantity for the speckle point for including in speckle pattern adjusted so is just reduced
?.When hardware mode adjusts, the number for the laser speckle point that adjustable color-changing lamp diffraction generates.For example, being generated when precision is high
Laser speckle point number be 30000;When precision is lower, the number of the laser speckle point of generation is 20000.It is right in this way
The precision for the depth image that should be calculated will accordingly decrease.
Specifically, can in color-changing lamp preset different diffraction optical element (Diffractive Optical
Elements, DOE), wherein the number for the speckle point that difference DOE diffraction is formed is different.Switch different DOE according to precision grade
It carries out diffraction and generates speckle image, and the depth map of different accuracy is obtained according to obtained speckle image.When answering for application program
With it is higher ranked when, corresponding precision grade is also relatively high, and color-changing lamp can control the more DOE of speckle point number to emit laser
Speckle, to obtain the more speckle image of speckle point number;When the application level of application program is lower, corresponding levels of precision
Also not relatively low, color-changing lamp can control the less DOE of speckle point number to emit laser speckle, thus obtain speckle point number compared with
Few speckle image.
Step 506, the depth image after encryption is sent to the destination application for initiating image capture instruction.
In above-mentioned image processing method, the process for sending depth image can also include:
Step 602, the running environment that electronic equipment is presently in is obtained.
Step 604, if electronic equipment is currently under non-security running environment, by depth under non-security running environment
Image is sent to the destination application for initiating image capture instruction.
The running environment of electronic equipment includes secure operating environment and non-security running environment.For example, the running environment of CPU
TEE and REE can be divided into, TEE is exactly a kind of secure operating environment, and REE is exactly a kind of non-security running environment, for some safety
Property requires relatively high application operating, it is necessary to complete in secure operating environment.It is relatively low for some security requirements
Application operating can carry out in non-security running environment.Then the corresponding application operating of image capture instruction is non-secure operations
When, so that it may the depth image of acquisition is sent to destination application by non-security running environment.
Step 606, if electronic equipment is currently under secure operating environment, electronic equipment is cut from secure operating environment
Non-security running environment is changed to, answers the target that depth image is sent to initiation image capture instruction under non-security running environment
Use program.
It in one embodiment, may include first processing units in electronic equipment, first processing units can be can be with
MCU processor.Since MCU processor is placed outside CPU processor, MCU itself is under secure operating environment.
Specifically, first processing units can connect secure transmission tunnel and non-secure transfer channel, and first processing units are detecting
When image command, if judging, the corresponding application operating of image capture instruction for non-secure operations, may be coupled to non-security biography
Defeated channel sends depth image by non-secure transfer channel.Secure transmission tunnel is under secure operating environment, at image
The safety of reason is higher;Non-secure transfer channel is under non-security running environment, lower to the safety of image procossing.
Image processing method provided by the above embodiment, electronic equipment are detecting the corresponding application behaviour of image capture instruction
When as non-secure operations, then whether can be surpassed according to the response time for the timestamp decision instruction for including in image capture instruction
When.If the response time of instruction is not timed-out, camera module is controlled according to image capture instruction and acquires speckle image, so
Depth image is calculated according to speckle image afterwards, and depth image is sent to destination application and carries out corresponding application behaviour
Make.The application operating of image capture instruction can be classified in this way, and difference is carried out according to different image capture instructions
Operation.When the image of acquisition is used for non-secure operations, then directly the image of acquisition can be handled, improve image
The efficiency of processing.
Fig. 7 is the hardware structure diagram that image processing method is realized in one embodiment.As shown in fig. 7, in the electronic equipment
It may include camera module 710, central processing unit (CPU) 720 and first processing units 730, wrapped in above-mentioned camera module 710
Include Laser video camera head 712, floodlight 714, RGB (Red/Green/Blue, red green blue color mode) camera 716 and radium-shine
Lamp 718.First processing units 730 include PWM (Pulse Width Modulation, pulse width modulation) module 732, SPI/
I2C (Serial Peripheral Interface/Inter-Integrated Circuit, Serial Peripheral Interface (SPI)/two-way two
Line synchronous serial interface) module 734, RAM (Random Access Memory, random access memory) module 736,
Depth Engine module 738.Wherein, the second processing unit 722 can be in TEE (Trusted execution
Environment, credible running environment) under CPU core, first processing units 730 be MCU (Microcontroller
Unit, micro-control unit) processor.It is understood that central processing unit 720 can be multicore operational mode, central processing
CPU core in device 720 can be transported at TEE or REE (Rich Execution Environment, natural running environment)
Row.TEE and REE is the operation mould of ARM module (Advanced RISC Machines, Advanced Reduced Instruction Set processor)
Formula.Under normal conditions, the higher operation behavior needs of safety are executed at TEE in electronic equipment, other operation behaviors then may be used
It is executed at REE.In the embodiment of the present application, when the Image Acquisition that central processing unit 720 receives destination application initiation refers to
Enable, the CPU core i.e. the second processing unit 722 run under TEE, can by SECURE SPI/I2C into MCU730 SPI/I2C
Module 734 sends image capture instruction to first processing units 730.First processing units 730 are receiving image capture instruction
Afterwards, if judging the corresponding application operating of image capture instruction for non-secure operations, impulse wave control is emitted by PWM module 732
Color-changing lamp 718 is opened to acquire speckle pattern in camera module 710 processed.Camera module 710 can be by collected speckle image
Send Depth Engine module 738 in first processing units 730 to, Depth Engine module 738 can be according to speckle image
Depth image is calculated, and depth parallax image is obtained according to depth image.Then it is regarded under non-security running environment according to depth
Difference image is corrected, and obtains correction depth image, and correction depth image is sent to destination application.
Fig. 8 is the software architecture schematic diagram that image processing method is realized in one embodiment.As shown in figure 8, the software frame
Structure includes application layer 810, operating system 820 and secure operating environment 830.Wherein, the module in secure operating environment 830
Including first processing units 831, camera module 832, the second processing unit 833 and encrypting module 834 etc.;Operating system 830
In include safety management module 821, face management module 822, webcam driver 823 and camera frame 824;Application layer 810
In include application program 811.Application program 811 can initiate image capture instruction, and image capture instruction is sent to first
Processing unit 831 is handled.For example, being paid, being unlocked, U.S. face, augmented reality by acquiring face
When (Augmented Reality, AR) etc. is operated, application program can initiate the image capture instruction of acquisition facial image.It can be with
Understand, the image command that application program 811 is initiated can be sent initially to the second processing unit 833, then by second processing
Unit 833 is sent to first processing units 831.
After first processing units 831 receive image capture instruction, if judging the corresponding application behaviour of image capture instruction
As safety operation (such as payment, unlock operation), then camera module 832 can be controlled according to image capture instruction and acquire infrared figure
Picture and speckle image, the infrared image and speckle image that camera module 832 acquires are transferred to first processing units 831.First
Depth image including depth information is calculated according to speckle image in processing unit 831, and is calculated according to depth image
Infrared anaglyph is calculated according to infrared image in depth parallax image.Then pass through secure transmission tunnel for depth parallax
Image and infrared anaglyph are sent to the second processing unit 833.The second processing unit 833 can be carried out according to infrared anaglyph
Correction obtains correction infrared image, is corrected to obtain correction depth image according to depth parallax image.Then red according to correcting
Outer image carries out face authentication, detects in above-mentioned correction infrared image with the presence or absence of face, and the face detected and storage
Face whether match;If face authentication passes through, living body is carried out further according to above-mentioned correction infrared image and correction depth image
Detection, judges whether above-mentioned face is living body faces.The face recognition result that the second processing unit 833 obtains, which can be sent to, to be added
Encrypted face recognition result after being encrypted by encrypting module 834, is sent to safety management module by close module 834
821.Generally, different application programs 811 has corresponding safety management module 821, and safety management module 821 can will encrypt
Face recognition result afterwards is decrypted, and the face recognition result obtained after decryption processing is sent to corresponding face
Management module 822.Face recognition result can be sent to the application program 811 on upper layer, application program by face management module 822
811 carry out corresponding operation further according to face recognition result.
If the corresponding application operating of the image capture instruction that first processing units 831 receive is non-secure operations (such as beauty
Face, AR operation), then first processing units 831 can control camera module 832 and acquire speckle image, and according to speckle image
Depth image is calculated, depth parallax image is then obtained according to depth image.First processing units 831 can pass through non-secure transfer
Depth parallax image is sent to webcam driver 823 by channel, and webcam driver 823 is corrected further according to depth parallax image
Processing obtains correction depth image, correction depth image is then sent to camera frame 824, then by camera frame 824
It is sent to face management module 822 or application program 811.
Fig. 9 is the structural schematic diagram of image processing apparatus in one embodiment.As shown in figure 9, the image processing apparatus 900
Module 904 is obtained including instruction detection module 902, speckle image, depth image obtains module 906 and image sending module 908.
Wherein:
Instruction detection module 902, if judging that described image acquisition instructions are corresponding for detecting image capture instruction
Whether application operating is non-secure operations.
Speckle image obtains module 904, if being non-secure operations for the corresponding application operating of described image acquisition instructions,
It then controls camera module and acquires speckle image according to described image acquisition instructions.
Depth image obtains module 906, for depth image to be calculated according to the speckle image.
Image sending module 908, the target for the depth image to be sent to initiation described image acquisition instructions are answered
With program, the depth image is used to indicate the destination application and executes the application operating.
Image processing apparatus provided by the above embodiment, electronic equipment are detecting the corresponding application behaviour of image capture instruction
When as non-secure operations, camera module can be controlled according to image capture instruction and acquire speckle image, then according to speckle pattern
As depth image is calculated, and depth image is sent to destination application and carries out corresponding application operating.It in this way can be with
The application operating of image capture instruction is classified, and carries out different operations according to different image capture instructions.When adopting
When the image of collection is used for non-secure operations, then directly the image of acquisition can be handled, improve the efficiency of image procossing.
In one embodiment, speckle image, which obtains module 904 and is also used to obtain in described image acquisition instructions, includes
Timestamp, at the time of the timestamp is for indicating to initiate image capture instruction;If timestamp is to the interval between object time
Duration is less than duration threshold value, then controls camera module according to image capture instruction and acquire speckle image, the object time is used
At the time of indicating to detect image capture instruction.
In one embodiment, depth image obtains module 906 and is also used to obtain reference picture, and the reference picture is mark
Surely the image with reference depth information obtained;It is compared the reference picture to obtain offset information with speckle image,
The offset information is for indicating that speckle point is relative to the level for corresponding to speckle point in the reference picture in the speckle image
Offset;Depth image is calculated according to the offset information and reference depth information.
In one embodiment, it is deep to be also used to be corrected the depth image to obtain correction for image sending module 908
Image is spent, and the correction depth image is sent to the destination application for initiating described image acquisition instructions.
In one embodiment, image sending module 908 is also used to obtain the running environment that electronic equipment is presently in;If
Electronic equipment is currently under non-security running environment, then is sent to the depth image under the non-security running environment
Initiate the destination application of described image acquisition instructions;If electronic equipment is currently under secure operating environment, by electronics
Equipment is switched to non-security running environment from secure operating environment, sends out the depth image under the non-security running environment
Give the destination application for initiating described image acquisition instructions.
In one embodiment, image sending module 908 is also used to obtain the network environment that electronic equipment is presently in
Network safety grade;If the network safety grade is less than grade threshold, the depth image is encrypted;It will add
It is close that treated that depth image is sent to initiates the destination applications of described image acquisition instructions.
In one embodiment, image sending module 908 is also used to obtain secret grade according to the network safety grade,
And the depth image is encrypted according to the secret grade.
The division of modules is only used for for example, in other embodiments, can will scheme in above-mentioned image processing apparatus
As processing unit is divided into different modules as required, to complete all or part of function of above-mentioned image processing apparatus.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When, so that the processor executes image processing method provided by the above embodiment.
A kind of computer program product comprising instruction, when run on a computer, so that computer execution is above-mentioned
The image processing method that embodiment provides.
Any reference to memory, storage, database or other media used in this application may include non-volatile
And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application
Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of image processing method, which is characterized in that including:
If detecting image capture instruction, judge whether the corresponding application operating of described image acquisition instructions is non-security behaviour
Make;
If the corresponding application operating of described image acquisition instructions is non-secure operations, camera module is controlled according to described image
Acquisition instructions acquire speckle image;
Depth image is calculated according to the speckle image;
The depth image is sent to the destination application for initiating described image acquisition instructions, the depth image is for referring to
Show that the destination application executes the application operating.
2. the method according to claim 1, wherein the control camera module refers to according to described image acquisition
Acquisition speckle image is enabled, including:
Obtain described image acquisition instructions in include timestamp, the timestamp be used for indicates initiation image capture instruction when
It carves;
If timestamp is less than duration threshold value to the interval duration between object time, camera module is controlled according to Image Acquisition
Instruction acquisition speckle image, at the time of the object time is for indicating to detect image capture instruction.
3. the method according to claim 1, wherein described be calculated depth map according to the speckle image
Picture, including:
Reference picture is obtained, the reference picture is the image obtained by calibrating with reference depth information;
The reference picture is compared to obtain offset information with speckle image, the offset information is for indicating the speckle
Speckle point is relative to the horizontal offset for corresponding to speckle point in the reference picture in image;
Depth image is calculated according to the offset information and reference depth information.
4. the method according to claim 1, wherein described be sent to initiation described image for the depth image
The destination application of acquisition instructions, including:
The depth image is corrected to obtain correction depth image, and the correction depth image is sent to described in initiation
The destination application of image capture instruction.
5. the method according to claim 1, wherein described be sent to initiation described image for the depth image
The destination application of acquisition instructions, including:
Obtain the running environment that electronic equipment is presently in;
If electronic equipment is currently under non-security running environment, by the depth image under the non-security running environment
It is sent to the destination application for initiating described image acquisition instructions;
If electronic equipment is currently under secure operating environment, electronic equipment is switched to non-security fortune from secure operating environment
Row environment answers the target that the depth image is sent to initiation described image acquisition instructions under the non-security running environment
Use program.
6. the method according to any one of claims 1 to 5, which is characterized in that described to be sent to the depth image
Before the destination application for initiating described image acquisition instructions, further include:
Obtain the network safety grade for the network environment that electronic equipment is presently in;
If the network safety grade is less than grade threshold, the depth image is encrypted;
The destination application that the depth image is sent to initiation described image acquisition instructions, including:
Depth image after encryption is sent to the destination application for initiating described image acquisition instructions.
7. according to the method described in claim 6, it is characterized in that, described the depth image is encrypted, including:
Secret grade is obtained according to the network safety grade, and the depth image is encrypted according to the secret grade
Processing.
8. a kind of image processing apparatus, which is characterized in that including:
Instruction detection module, if judging the corresponding application behaviour of described image acquisition instructions for detecting image capture instruction
It whether is non-secure operations;
Speckle image obtains module, if being non-secure operations for the corresponding application operating of described image acquisition instructions, controls
Camera module acquires speckle image according to described image acquisition instructions;
Depth image obtains module, for depth image to be calculated according to the speckle image;
Image sending module, for the depth image to be sent to the destination application for initiating described image acquisition instructions,
The depth image is used to indicate the destination application and executes the application operating.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The method as described in any one of claims 1 to 7 is realized when processor executes.
10. a kind of electronic equipment, including memory and processor, computer-readable instruction is stored in the memory, it is described
When instruction is executed by the processor, so that the processor executes the method as described in any one of claims 1 to 7.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810403000.4A CN108830141A (en) | 2018-04-28 | 2018-04-28 | Image processing method, device, computer readable storage medium and electronic equipment |
PCT/CN2019/083260 WO2019206020A1 (en) | 2018-04-28 | 2019-04-18 | Image processing method, apparatus, computer-readable storage medium, and electronic device |
EP19791784.2A EP3624006A4 (en) | 2018-04-28 | 2019-04-18 | Image processing method, apparatus, computer-readable storage medium, and electronic device |
US16/671,856 US11275927B2 (en) | 2018-04-28 | 2019-11-01 | Method and device for processing image, computer readable storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810403000.4A CN108830141A (en) | 2018-04-28 | 2018-04-28 | Image processing method, device, computer readable storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108830141A true CN108830141A (en) | 2018-11-16 |
Family
ID=64147576
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810403000.4A Pending CN108830141A (en) | 2018-04-28 | 2018-04-28 | Image processing method, device, computer readable storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108830141A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110322498A (en) * | 2019-06-27 | 2019-10-11 | Oppo广东移动通信有限公司 | A kind of image generating method and terminal, storage medium |
WO2019206020A1 (en) * | 2018-04-28 | 2019-10-31 | Oppo广东移动通信有限公司 | Image processing method, apparatus, computer-readable storage medium, and electronic device |
CN110610469A (en) * | 2019-08-01 | 2019-12-24 | 长沙理工大学 | Face image privacy protection method, device, equipment and storage medium |
CN112584054A (en) * | 2019-09-29 | 2021-03-30 | 深圳市光鉴科技有限公司 | Brightness self-adaptive adjusting method, system, equipment and medium based on image coding |
CN113011238A (en) * | 2020-11-24 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Data processing method, device, server, terminal and storage medium |
CN113379817A (en) * | 2021-01-12 | 2021-09-10 | 四川深瑞视科技有限公司 | Depth information acquisition method, device and system based on speckles |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140112574A1 (en) * | 2012-10-23 | 2014-04-24 | Electronics And Telecommunications Research Institute | Apparatus and method for calibrating depth image based on relationship between depth sensor and color camera |
CN104239816A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Electronic equipment capable of switching work status and switching method thereof |
CN106331462A (en) * | 2015-06-25 | 2017-01-11 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for shooting track pictures, as well as mobile terminal |
CN107077607A (en) * | 2014-11-13 | 2017-08-18 | 英特尔公司 | The enhanced image rectifications of 3D |
CN107292283A (en) * | 2017-07-12 | 2017-10-24 | 深圳奥比中光科技有限公司 | Mix face identification method |
-
2018
- 2018-04-28 CN CN201810403000.4A patent/CN108830141A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140112574A1 (en) * | 2012-10-23 | 2014-04-24 | Electronics And Telecommunications Research Institute | Apparatus and method for calibrating depth image based on relationship between depth sensor and color camera |
CN104239816A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Electronic equipment capable of switching work status and switching method thereof |
CN107077607A (en) * | 2014-11-13 | 2017-08-18 | 英特尔公司 | The enhanced image rectifications of 3D |
CN106331462A (en) * | 2015-06-25 | 2017-01-11 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for shooting track pictures, as well as mobile terminal |
CN107292283A (en) * | 2017-07-12 | 2017-10-24 | 深圳奥比中光科技有限公司 | Mix face identification method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019206020A1 (en) * | 2018-04-28 | 2019-10-31 | Oppo广东移动通信有限公司 | Image processing method, apparatus, computer-readable storage medium, and electronic device |
US11275927B2 (en) | 2018-04-28 | 2022-03-15 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for processing image, computer readable storage medium and electronic device |
CN110322498A (en) * | 2019-06-27 | 2019-10-11 | Oppo广东移动通信有限公司 | A kind of image generating method and terminal, storage medium |
CN110610469A (en) * | 2019-08-01 | 2019-12-24 | 长沙理工大学 | Face image privacy protection method, device, equipment and storage medium |
CN110610469B (en) * | 2019-08-01 | 2022-05-06 | 长沙理工大学 | Face image privacy protection method, device, equipment and storage medium |
CN112584054A (en) * | 2019-09-29 | 2021-03-30 | 深圳市光鉴科技有限公司 | Brightness self-adaptive adjusting method, system, equipment and medium based on image coding |
CN113011238A (en) * | 2020-11-24 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Data processing method, device, server, terminal and storage medium |
CN113379817A (en) * | 2021-01-12 | 2021-09-10 | 四川深瑞视科技有限公司 | Depth information acquisition method, device and system based on speckles |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108668078B (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
TWI736883B (en) | Method for image processing and electronic device | |
CN108805024B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
CN108804895B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
CN108549867A (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
CN108830141A (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
CN108419017B (en) | Control method, apparatus, electronic equipment and the computer readable storage medium of shooting | |
WO2019206020A1 (en) | Image processing method, apparatus, computer-readable storage medium, and electronic device | |
US11256903B2 (en) | Image processing method, image processing device, computer readable storage medium and electronic device | |
CN108711054B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
WO2019205890A1 (en) | Image processing method, apparatus, computer-readable storage medium, and electronic device | |
CN108573170A (en) | Information processing method and device, electronic equipment, computer readable storage medium | |
CN108764053A (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
CN108564032A (en) | Image processing method, device, electronic equipment and computer readable storage medium | |
WO2019196684A1 (en) | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal | |
CN108921903A (en) | Camera calibration method, device, computer readable storage medium and electronic equipment | |
CN108650472B (en) | Method and device for controlling shooting, electronic equipment and computer-readable storage medium | |
CN109213610A (en) | Data processing method, device, computer readable storage medium and electronic equipment | |
CN108769665A (en) | Data transmission method, device, electronic equipment and computer readable storage medium | |
CN108712400B (en) | Data transmission method and device, computer readable storage medium and electronic equipment | |
CN108924421A (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
CN108881712B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
WO2019205889A1 (en) | Image processing method, apparatus, computer-readable storage medium, and electronic device | |
CN108833885A (en) | Image processing method, device, computer readable storage medium and electronic equipment | |
CN109145772A (en) | Data processing method, device, computer readable storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |
|
RJ01 | Rejection of invention patent application after publication |