CN109118551A - A kind of image processing method, terminal and storage medium - Google Patents
A kind of image processing method, terminal and storage medium Download PDFInfo
- Publication number
- CN109118551A CN109118551A CN201710479543.XA CN201710479543A CN109118551A CN 109118551 A CN109118551 A CN 109118551A CN 201710479543 A CN201710479543 A CN 201710479543A CN 109118551 A CN109118551 A CN 109118551A
- Authority
- CN
- China
- Prior art keywords
- image
- processed
- encryption
- information
- encryption section
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 31
- 238000003860 storage Methods 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 84
- 239000000284 extract Substances 0.000 claims abstract description 30
- 230000015654 memory Effects 0.000 claims description 29
- 238000004891 communication Methods 0.000 claims description 8
- 239000000203 mixture Substances 0.000 claims description 6
- 108010001267 Protein Subunits Proteins 0.000 claims description 4
- 238000000151 deposition Methods 0.000 claims 1
- 238000000605 extraction Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 43
- 230000006870 function Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000012015 optical character recognition Methods 0.000 description 3
- 206010048669 Terminal state Diseases 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241001270131 Agaricus moelleri Species 0.000 description 1
- 241001269238 Data Species 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001373 regressive effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/30—Determination of transform parameters for the alignment of images, i.e. image registration
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Image Processing (AREA)
Abstract
The embodiment of the invention discloses a kind of image processing method, terminal and storage mediums, this method comprises: obtaining image to be processed, and extract the information to be processed in image to be processed;Information to be processed is compared with target information is prestored, obtain in image to be processed and prestores the matched first information of target information;First information region locating in image to be processed is determined as target area;The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein, the first image is parts of images corresponding with target area in image to be processed.
Description
Technical field
The present invention relates to terminal technology more particularly to a kind of image processing methods, terminal and storage medium.
Background technique
Screenshotss are the picture or text on a kind of terminal interception display interface, and form the means of a screenshot capture,
It is a kind of terminal application technology.User can be intercepted in need by this technological means of screenshotss from the webpage browsed
Text or image information form screenshot capture to facilitate viewing to learn, while can also be by screenshotss by the text on display interface
Or pictorial information is sent to other terminals in the form of screenshot picture and carrys out shared information.Since the technological means of screenshotss is simply easy
It learns, is easy-to-use, therefore more and more terminals all have the function of screenshotss, to facilitate user to carry out screenshotss processing.
Currently, when the screenshotss function of user's using terminal is to information interception on display interface, the screenshot capture meeting of acquisition
Including all information in terminal current display interface, therefore the privacy letter of some users may be related in screenshot capture
Breath, such as the various sensitive informations such as password, account No., telephone number.If including the screenshot capture of user privacy information
It is maliciously stolen, then user privacy information will be leaked, so that certain privacy or property etc. can be caused
Security threat.
Summary of the invention
The embodiment of the present invention provides a kind of image processing method, terminal and storage medium, is able to solve prior art screenshotss
When screenshot capture is not handled, and sensitive information leakage caused by all information is shown on screenshot capture is asked
Topic, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of image processing methods, comprising:
Image to be processed is obtained, and extracts the information to be processed in the image to be processed;
The information to be processed is compared with target information is prestored, obtains and is prestored in the image to be processed with described
The matched first information of target information;
First information region locating in the image to be processed is determined as target area;
The first image in the target area is encrypted, encrypted image to be processed is obtained;Wherein, institute
Stating the first image is parts of images corresponding with the target area in the image to be processed.
In the above scheme, when the information to be processed is character information, it is described extract in the image to be processed to
Handle information, comprising:
Whole pixels corresponding to the image to be processed carry out gray processing processing, and it is corresponding to obtain whole pixels
Whole gray values;
Extract at least one pixel that the gray value in whole pixels is greater than default gray threshold;
Identify the information to be processed in the character picture of at least one pixel composition.
In the above scheme, first image in the target area is encrypted, and obtains encrypted
Image to be processed, comprising:
The first encryption section is determined from the target area, and judges whether first encryption section meets default add
Close condition;
When first encryption section meets the predetermined encryption condition, added according to predetermined encryption rule to described first
The second image in close region is encrypted, and by first encryption section labeled as encryption section;Wherein, described
Second image is parts of images corresponding with first encryption section in the first image;
When the encryption section meets the decision condition for completing processing, stop processing the first image, and generate
The encrypted image to be processed.
In the above scheme, described that the second image in first encryption section is added according to predetermined encryption rule
After close processing, the method also includes;
The corresponding first decryption code key in first encryption section, and setting institute are generated according to the predetermined encryption rule
The corresponding first area identifier in the first encryption section is stated, and determines corresponding first coordinate in first encryption section;
It sets the first decryption code key, the first area identifier and first coordinate to described first and adds
The corresponding encryption identification in close region;
The encryption identification is added to and is prestored in mark array.
In the above scheme, described that the second image in first encryption section is added according to predetermined encryption rule
Close processing, and by first encryption section labeled as after encryption section, the method also includes:
When the encryption section is unsatisfactory for the decision condition for completing processing, under being determined in the target area
One encryption section;
Next encryption section is continued with, until the encryption section, satisfaction completes the decision condition of processing,
Stop processing the first image, and generates the encrypted image to be processed.
It is in the above scheme, described that next encryption section is determined from the target area, comprising:
By an adjacent area in the corresponding whole adjacent areas in first encryption section of the target area, really
It is set to next encryption section.
It is in the above scheme, described that next encryption section is determined from the target area, further includes:
After having handled the corresponding whole adjacent areas in first encryption section, from the target area
, in other regions except the corresponding whole adjacent areas in first encryption section, determine next encryption section.
In the above scheme, after the encrypted image to be processed of acquisition, the method also includes:
Touch control operation is received in the display interface of the encrypted image to be processed, determines institute according to the touch control operation
State the region to be decrypted in encrypted image to be processed;
Receive the corresponding decryption instructions in the region to be decrypted;
According to the decryption instructions, the third image in the region to be decrypted is decrypted.
In the above scheme, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second solution
Close realm identifier and the second decryption coordinate, it is described according to the decryption instructions, to the third figure in the region to be decrypted
As being decrypted, comprising:
The corresponding encryption identification in the region to be decrypted is extracted from prestoring in mark array;
By the second decryption code key in the decryption instructions, the second decryption realm identifier and described second
It decrypts coordinate and decrypts coordinate with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively
It is matched;
If successful match, the third image in the region to be decrypted is decrypted.
The embodiment of the invention provides a kind of terminal, the terminal includes: acquiring unit, processing unit, determination unit with
And encryption unit,
The acquiring unit for obtaining image to be processed, and extracts the information to be processed in the image to be processed;
The processing unit, for comparing the information to be processed with target information is prestored;
The acquiring unit is also used to obtain in the image to be processed and prestores matched first letter of target information with described
Breath;
The determination unit, for first information region locating in the image to be processed to be determined as target
Region;
The encryption unit, for the first image in the target area to be encrypted;Wherein, described first
Image is parts of images corresponding with the target area in the image to be processed;
The acquiring unit is also used to obtain encrypted image to be processed.
In the above scheme, the information to be processed be character information when, the acquiring unit include: obtain subelement and
Identify subelement,
The processing unit is also used to whole pixels corresponding to the image to be processed and carries out gray processing processing;
The acquisition subelement, for obtaining the corresponding whole gray values of whole pixels;And it extracts described complete
Gray value in portion's pixel is greater than at least one pixel of default gray threshold;
The identification subelement, it is described to be processed in the character picture of at least one pixel composition for identification
Information.
In the above scheme, the encryption unit, comprising: judgment sub-unit, encryption sub-unit operable and generation subelement,
The determination unit is also used to determine the first encryption section from the target area;
The judgment sub-unit, for judging whether first encryption section meets predetermined encryption condition;
The encryption sub-unit operable, for when first encryption section meets the predetermined encryption condition, according to default
The second image in first encryption section is encrypted in encryption rule;By first encryption section labeled as
Encryption section;Wherein, second image is parts of images corresponding with first encryption section in the first image;
The generation subelement, for when the encryption section meets the decision condition for completing processing, stopping to be handled
The first image, and generate the encrypted image to be processed;
The encryption sub-unit operable, specifically for according to predetermined encryption rule to the second image in first encryption section
After being encrypted, the corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule,
And the corresponding first area identifier in setting first encryption section, and determine first encryption section corresponding the
One coordinate;And described the is set by the first decryption code key, the first area identifier and first coordinate
The corresponding encryption identification in one encryption section;The encryption identification is added to and is prestored in mark array.
In the above scheme, the determination unit, be also used to it is described according to predetermined encryption rule to first encrypted area
The second image in domain is encrypted, and by first encryption section labeled as after encryption section, when it is described
When encryption section is unsatisfactory for the decision condition for completing processing, next encryption section is determined from the target area;
The processing unit is also used to continue with next encryption section, until the encryption section meets
The decision condition of processing is completed, stops processing the first image, and generate the encrypted image to be processed;
The determination unit, specifically for by the corresponding whole adjacent regions in first encryption section of the target area
An adjacent area in domain, is determined as next encryption section;
The determination unit is specifically also used to have handled the corresponding whole adjacent areas in first encryption section
Later, from the target area, in other regions except the corresponding whole adjacent areas in first encryption section, really
Fixed next encryption section.
In the above scheme, the acquiring unit is also used to after the encrypted image to be processed of acquisition, described
The display interface of encrypted image to be processed receives touch control operation;
The determination unit, be also used to determine according to the touch control operation in the encrypted image to be processed wait solve
Close region;
The acquiring unit is also used to receive the corresponding decryption instructions in the region to be decrypted;
The encryption unit is also used to carry out the third image in the region to be decrypted according to the decryption instructions
Decryption processing;
Wherein, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second decryption region mark
Know symbol and the second decryption coordinate,
The decryption unit, specifically for extracting the corresponding encryption in the region to be decrypted mark in mark array from prestoring
Know;And described second in the decryption instructions is decrypted into code key, the second decryption realm identifier and described second
It decrypts coordinate and decrypts coordinate with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively
It is matched;And if successful match, the third image in the region to be decrypted is decrypted.
The embodiment of the invention provides a kind of terminal, the terminal includes processor, to be stored with the processor executable
The memory of instruction, communication interface, and the bus for connecting the processor, the memory and the communication interface,
When executed, the processor performs the following operations:
The processor for obtaining image to be processed, and extracts the information to be processed in the image to be processed;By institute
It states information to be processed to compare with target information is prestored, obtains and matched in the image to be processed with the target information that prestores
The first information;First information region locating in the image to be processed is determined as target area;To the mesh
The first image in mark region is encrypted, and obtains encrypted image to be processed;Wherein, the first image is described
Parts of images corresponding with the target area in image to be processed.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with program, are applied in terminal,
Such as claim 1-9 described in any item methods are realized when described program is executed by processor.
It can be seen that being obtained to be processed the embodiment of the invention provides a kind of image processing method, terminal and storage medium
Image, and extract the information to be processed in image to be processed;Information to be processed is compared with target information is prestored, obtain to
In processing image and prestore the matched first information of target information;First information region locating in image to be processed is determined
For target area;The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein,
One image is parts of images corresponding with target area in image to be processed.That is, one kind that the embodiment of the present invention proposes
Image processing method, terminal and storage medium can determine target area in image according to target information is prestored, then basis
The first image in target area is encrypted in predetermined encryption rule, thus not to screen when solving prior art screenshotss
Curtain screenshot is handled and all information is shown in the problem of sensitive information caused on screenshot capture leaks, and then right
Privacy information in terminal is protected, and the safety of terminal is effectively increased.
Detailed description of the invention
Fig. 1 is a kind of implementation process schematic diagram one for image processing method that the embodiment of the present invention proposes;
Fig. 2 is a kind of implementation process schematic diagram two for image processing method that the embodiment of the present invention proposes;
Fig. 3 is a kind of implementation process schematic diagram three for image processing method that the embodiment of the present invention proposes;
Fig. 4 is the schematic diagram that the first encryption section pixel quadrangle mode that the embodiment of the present invention proposes arranges;
Fig. 5 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram one;
Fig. 6 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram two;
Fig. 7 is a kind of implementation process schematic diagram four for image processing method that the embodiment of the present invention proposes;
Fig. 8 is a kind of implementation process schematic diagram five for image processing method that the embodiment of the present invention proposes;
Fig. 9 is a kind of implementation process schematic diagram six for image processing method that the embodiment of the present invention proposes;
Figure 10 is the schematic diagram of the adjacent area for the first encryption section that the embodiment of the present invention proposes;
Figure 11 is a kind of implementation process schematic diagram seven for image processing method that the embodiment of the present invention proposes;
Figure 12 is a kind of implementation process schematic diagram eight for image processing method that the embodiment of the present invention proposes;
Figure 13 is the composed structure schematic diagram one for the terminal that the embodiment of the present invention proposes;
Figure 14 is the composed structure schematic diagram two for the terminal that the embodiment of the present invention proposes;
Figure 15 is the composed structure schematic diagram three for the terminal that the embodiment of the present invention proposes;
Figure 16 is the composed structure schematic diagram four for the terminal that the embodiment of the present invention proposes.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description.
Embodiment one
Fig. 1 is a kind of implementation process schematic diagram one for image processing method that the embodiment of the present invention proposes, as shown in Figure 1,
In an embodiment of the present invention, the method that terminal carries out image procossing may comprise steps of:
Step 101 obtains image to be processed, and extracts the information to be processed in image to be processed.
In an embodiment of the present invention, terminal can first obtain image to be processed, then extract in image to be processed to
Handle information.Wherein, above-mentioned image to be processed can be the screenshot capture of terminal, or any one stored in terminal
Image, further, terminal can obtain above-mentioned image to be processed by a variety of methods, for example, terminal can be by display
Screen carries out screenshot, then obtains the corresponding screenshot capture of display screen, i.e., above-mentioned image to be processed;Terminal can also be from storage
Any one image is extracted in all images in terminal as image to be processed.
Further, in an embodiment of the present invention, terminal can first obtain screenshotss instruction, then can be referred to according to screenshotss
It enables and screenshotss is carried out to content shown by terminal display interface, finally obtain screen corresponding with the display content of terminal display interface
Curtain screenshot.Wherein, above-mentioned terminal can be mobile phone, tablet computer, smart camera etc. with screenshotss function.
Further, in an embodiment of the present invention, terminal can obtain screenshotss instruction in several ways, for example, eventually
End can obtain screenshotss instruction by the pressing operation of the pre-set combination button of detection;Terminal can also be pre- by detecting
The touch gestures for the display interface being first arranged obtain screenshotss instruction.
Further, in an embodiment of the present invention, terminal can star screenshotss function after obtaining above-mentioned screenshotss instruction
Can, and content shown by the current display interface to terminal carry out screenshotss, and then obtain a corresponding screenshot capture, i.e., to
Handle image.Wherein, above-mentioned display content can all show for text information, the image information etc. shown in current display interface
Show information, includes the text information shown on above-mentioned display interface, figure by the above-mentioned screenshot capture that screenshotss obtain correspondingly
As information etc. all shows information.
It should be noted that in an embodiment of the present invention, after terminal obtains above-mentioned image to be processed, terminal needs elder generation
Extract the above-mentioned information to be processed in above-mentioned image to be processed.Specifically, terminal is needed the background in above-mentioned image to be processed
Information or marginal information filter out, and then extract the information to be processed in above-mentioned image to be processed again.
Step 102 compares information to be processed with target information is prestored, and obtains in image to be processed and prestores target
The first information of information matches.
In an embodiment of the present invention, terminal is obtaining image to be processed, and extracts the letter to be processed in image to be processed
After breath, information to be processed and pre-stored target information can be compared, it is hereby achieved that in image to be processed
, the matched first information of target information is prestored with above-mentioned.
Further, in an embodiment of the present invention, terminal extract the information to be processed in above-mentioned image to be processed it
Afterwards, above-mentioned information to be processed and pre-stored target information can be compared, by above-mentioned information to be processed with it is above-mentioned
It prestores the information that target information matches and is determined as the first information, that is to say, that the above-mentioned first information is above-mentioned information to be processed
In with the above-mentioned target information that prestores to matched all information.
It should be noted that in an embodiment of the present invention, terminal can pre-establish a target information database, on
Stating target information database can store above-mentioned target information, and further, above-mentioned target information can be image information, can also
Think character information.
It should be noted that in an embodiment of the present invention, for character information, common target information, such as password,
Bank account, telephone number etc. all have more significant feature, and therefore, terminal can in advance store common target information
Extremely in above-mentioned target information database, and then can be by the above-mentioned target information database that prestores to above-mentioned information progress to be processed
Identification detects in above-mentioned image to be processed and prestores the matched first information of target information.
It should be noted that in an embodiment of the present invention, terminal is prestoring target information to above-mentioned wait locate by above-mentioned
After reason information is compared, if not in need in information to be processed in above-mentioned image to be processed be encrypted
When target information, terminal can not be encrypted above-mentioned image to be processed.That is, in the embodiment of the present invention
In, all images to be processed can't be encrypted in terminal, but only to including to prestore target information phase with above-mentioned
The image to be processed of the matched first information is encrypted.
First information region locating in image to be processed is determined as target area by step 103.
In an embodiment of the present invention, terminal is comparing information to be processed with target information is prestored, and obtains wait locate
It, can be by the above-mentioned first information in above-mentioned image to be processed in reason image and after prestoring the matched first information of target information
Locating region is determined as target area.
Further, in an embodiment of the present invention, terminal can be by the corresponding image of the above-mentioned first information and above-mentioned section
Screen image compares, and may thereby determine that the corresponding image of above-mentioned first information location in above-mentioned screenshotss image,
Specifically, terminal can first determine the first pixel corresponding with the above-mentioned first information in above-mentioned screenshotss image, then further according to
Above-mentioned first pixel determines above-mentioned target area.
Specifically, in a specific embodiment of the present invention, terminal is determining the corresponding image of the above-mentioned first information above-mentioned
In screenshotss image after corresponding first pixel, terminal can be according to the first pixel, pre-stored pixel and position
The corresponding relationship of coordinate determines the corresponding coordinate of the first pixel.
It should be noted that in an embodiment of the present invention, terminal can predefine each pixel in display screen
The position coordinates of point, so as to which the corresponding relationship of each of image to be processed pixel and position coordinates is stored in advance.
For example, the corresponding position coordinates of pixel A are (xA, yA), the corresponding position coordinates of pixel B are (xB, yB).
Further, in an embodiment of the present invention, corresponding first pixel of the above-mentioned first information is multiple and different
What pixel was constituted, that is to say, that the corresponding image of the above-mentioned first information is made of multiple and different pixels, therefore, eventually
End determines the corresponding seat of the first pixel according to the first pixel, the corresponding relationship of pre-stored pixel and position coordinates
Mark is also multiple and different coordinate.
Further, in an embodiment of the present invention, terminal according to the first pixel, prestore pixel and position coordinates
Corresponding relationship, after determining the corresponding coordinate of the first pixel, it is corresponding multiple and different to can recorde above-mentioned first pixel
Coordinate, then by selecting the minimum value and maximum value of x in above-mentioned multiple and different coordinate, the minimum value and maximum value of y, from
And can determine four boundary points in the region that the statement first information is constituted, further, terminal can will be aforementioned four
Boundary point is attached, so that above-mentioned target area is constituted, to carry out at encryption to the first information in above-mentioned target area
Reason.
The first image in target area is encrypted in step 104, obtains encrypted image to be processed,
In, the first image is parts of images corresponding with target area in image to be processed.
In an embodiment of the present invention, first information region locating in image to be processed is being determined as target by terminal
After region, the first image in the target area in above-mentioned image to be processed can be encrypted, it is final to obtain
Encrypted image to be processed, wherein the first image is parts of images corresponding with target area in image to be processed.
Further, in an embodiment of the present invention, terminal can preset a variety of encryption rules, so as to it is above-mentioned to
The first image in target area in processing image is encrypted.For example, terminal can be incited somebody to action by two-dimentional reversible process
The pixel of the first image in above-mentioned target area is rearranged, to realize to the first figure in above-mentioned target area
The encryption of picture.
It should be noted that in an embodiment of the present invention, terminal is in the target area in above-mentioned image to be processed
The first image be encrypted after, the corresponding encrypted figure to be processed of above-mentioned image to be processed can be obtained
Picture, specifically, in above-mentioned encrypted image to be processed, with the above-mentioned target information for prestoring target information database and matching
It can not appeared in by above-mentioned encryption in above-mentioned encrypted image.
The embodiment of the invention provides a kind of image processing method, terminal and storage mediums, that is to say, that the present invention is implemented
A kind of image processing method, terminal and the storage medium that example proposes can determine target in image according to target information is prestored
Then region is encrypted the first image in target area according to predetermined encryption rule, to solve existing skill
Screenshot capture is not handled when art screenshotss and all information is shown in sensitive information caused on screenshot capture and is let out
The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment two
In an embodiment of the present invention, further, when above-mentioned information to be processed is character information, terminal can pass through
Optical character identification (Optical Character Recognition, OCR) is to be processed in above-mentioned image to be processed to identify
Information.Preferably, in an embodiment of the present invention, terminal can filter out the background information in image to be processed by a variety of methods
Or marginal information determines the information to be processed in above-mentioned image to be processed, for example, terminal can be by above-mentioned figure to be processed
As carrying out gray processing and binary conversion treatment, so that it is determined that the information to be processed in above-mentioned image to be processed.
Fig. 2 is a kind of implementation process schematic diagram two for image processing method that the embodiment of the present invention proposes, as shown in Fig. 2,
Based on embodiment one, in an embodiment of the present invention, further, when above-mentioned information to be processed is character information, terminal is mentioned
The method for taking the information to be processed in image to be processed may comprise steps of:
Step 102a, whole pixels corresponding to image to be processed carry out gray processing processing, obtain whole pixels pair
The whole gray values answered.
In an embodiment of the present invention, terminal is after obtaining image to be processed, if terminal need to extract it is above-mentioned wait locate
The character information in image is managed, then terminal first can carry out gray processing processing to above-mentioned image to be processed, to obtain above-mentioned
The corresponding whole gray values of whole pixels in image to be processed.Wherein, any one pixel of above-mentioned whole pixels
Gray value value range be [0,255].
Further, in an embodiment of the present invention, if above-mentioned image to be processed is color image, terminal can be with
Gray processing processing is carried out to above-mentioned image to be processed by a variety of methods, for example, terminal can by component method, maximum value process,
Mean value method adds or a variety of methods such as weight average method carry out gray processing processing to above-mentioned image to be processed, thus obtain it is above-mentioned to
Handle the corresponding whole gray values of whole pixels in image.
Step 102b, at least one pixel that the gray value in whole pixels is greater than default gray threshold is extracted.
In an embodiment of the present invention, terminal is carrying out gray processing processing to the corresponding whole pixels of image to be processed,
After obtaining the corresponding whole gray values of whole pixels, can by the corresponding whole gray values of above-mentioned whole pixels respectively and
Pre-set gray threshold is compared, and is preset if be greater than in above-mentioned whole gray value there are at least one gray value
Gray threshold when, terminal can determine at least one corresponding pixel of at least one above-mentioned gray value, to extract wait locate
Manage information.
It should be noted that in an embodiment of the present invention, terminal is by the corresponding whole gray scales of above-mentioned whole pixels
After value is compared with pre-set gray threshold respectively, it is less than or equal in advance if existed in above-mentioned whole gray value
When the gray value for the gray threshold being first arranged, then terminal can be by above-mentioned less than or equal to pre-set gray threshold
Gray value is updated to pre-set Luminance edge value, and then can update above-mentioned less than or equal to pre-set gray scale threshold
The corresponding pixel of the gray value of value, so as to filter out the background information or marginal information in image to be processed, so as to right
Information to be processed extracts.
Further, in an embodiment of the present invention, above-mentioned default gray threshold be terminal it is pre-set, for
The threshold value that the corresponding whole gray values of whole pixels are split is stated, above-mentioned default Luminance edge value is that terminal is set in advance
A gray value setting, for updating the corresponding whole gray values of above-mentioned whole pixels.Specifically, in implementation of the invention
In example, the value of above-mentioned default gray threshold and above-mentioned default Luminance edge value can be preset according to user's operation,
For example, terminal can set 100 for above-mentioned default gray threshold according to user's operation, meanwhile, terminal can be grasped according to user
Make by above-mentioned default gray threshold to set 0, that is to say, that image to be processed for one, terminal can will be in the figures
The gray value of pixel of the gray value less than 100 is updated to 0, thus formed a background information filtered out in image to be processed or
The image of person's marginal information.
It should be noted that in an embodiment of the present invention, terminal is to less than or equal to above-mentioned default gray threshold
The process that pixel is updated according to above-mentioned default Luminance edge value simultaneously can carry out above-mentioned whole pixels for terminal
Parallel processing.
Step 102c, the information to be processed in the character picture of at least one pixel composition is identified.
In an embodiment of the present invention, terminal is extracting the gray value in whole pixels extremely greater than default gray threshold
After a few pixel, terminal can identify the letter to be processed in the character picture that at least one above-mentioned pixel is constituted
Breath.
It should be noted that terminal is corresponding in the above-mentioned gray value less than or equal to pre-set gray threshold of update
Pixel after, can filter out the background information or marginal information in image to be processed, obtain in above-mentioned image to be processed
Gray value meets the character picture that the pixel of above-mentioned default gray threshold is constituted, at least one as above-mentioned pixel is constituted
Character picture.
Further, in an embodiment of the present invention, terminal is in the character figure for obtaining above-mentioned at least one pixel composition
As after, can identify the character information in character picture that above-mentioned at least one pixel is constituted by a variety of methods, i.e., to
Handle information.Such as terminal can identify the character information in the character picture of above-mentioned at least one pixel composition by OCR,
To extract above-mentioned information to be processed.
According to the description above it is found that 102a~102c, terminal can be corresponding to image to be processed through the above steps
Whole pixels carry out gray processing processing, obtain the corresponding whole gray values of whole pixels;It extracts in whole pixels
Gray value is greater than at least one pixel of default gray threshold;Identify at least one pixel constitute character picture in
Handle information;So as to effectively identify the information to be processed in image to be processed, when to solve prior art screenshotss
Screenshot capture is not handled and all information is shown in the problem of target information caused on screenshot capture leaks,
And then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment three
Fig. 3 is a kind of implementation process schematic diagram three for image processing method that the embodiment of the present invention proposes, as shown in figure 3,
Based on embodiment one, in an embodiment of the present invention, the first image in target area is encrypted in terminal, is added
The method of image to be processed after close may comprise steps of:
Step 103a, the first encryption section is determined from target area, and it is default to judge whether the first encryption section meets
Encryption condition.
In an embodiment of the present invention, terminal can first determine initial encryption point in above-mentioned target area, i.e., first adds
Close region, and judge whether above-mentioned first encryption section meets preset encryption condition.
Further, in an embodiment of the present invention, if the boundary of above-mentioned first encryption section and above-mentioned target area
Coincidence or above-mentioned first encryption section and above-mentioned encryption section are overlapped, then terminal can consider above-mentioned first encrypted area
Domain is unsatisfactory for encryption condition, and terminal then needs to reselect next region in above-mentioned target area as the first encrypted area
Domain.
It should be noted that in an embodiment of the present invention, during terminal states the first encryption section in the choice, on
Stating the first encryption section can generate to be random, and the corresponding pixel size in above-mentioned first encryption section can choose and be with M
Unit, wherein M is the natural number more than or equal to 1.Further, in an embodiment of the present invention, in above-mentioned first encryption section
The arrangement mode of M pixel be also random, for example, above-mentioned first encryption section can be arranged according to quadrangle mode
Pixel, Fig. 4 is the schematic diagram that the first encryption section pixel quadrangle mode that the embodiment of the present invention proposes arranges, such as Fig. 4 institute
Show, when the value of the corresponding pixel size M in the first encryption section is respectively M=1, M=2, M=3, M=4, M=5 and M=
When 6, there are many case where above-mentioned first encryption section is arranged according to quadrangle mode.
Step 103b, it when the first encryption section meets predetermined encryption condition, is slightly encrypted to first according to default plus rule
Corresponding second image in region is encrypted, and by the first encryption section labeled as encryption section, wherein the second image
For parts of images corresponding with the first encryption section in the first image.
In an embodiment of the present invention, if above-mentioned first encryption section meets predetermined encryption condition, terminal can root
Corresponding second image in above-mentioned first encryption section is encrypted according to predetermined encryption rule, and to above-mentioned first encryption
After the encryption of corresponding second image in region terminates, by above-mentioned first encryption section labeled as encryption section.
It further, in an embodiment of the present invention, may include the interpolation side of pixel in above-mentioned predetermined encryption rule
Method and method for folding.Specifically, in an embodiment of the present invention, above-mentioned predetermined encryption rule can be a variety of two-dimentional reversible encryptions
Any one in method.For example, terminal can be encrypted above-mentioned first encryption section using regressive interpolation method, it is false
It, first can be by mapping by the first encryption if the pixel size of corresponding second image in above-mentioned first encryption section is DxQ
Region is stretched as the straight line of long DxQ, then image of the refolding at a new DxQ, i.e., encrypted first encryption section pair
The second image answered.
Fig. 5 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram one, as shown in figure 5, if first adds
There are 4 pixels, respectively pixel 1, pixel 2, pixel 3 and pixel 4 in corresponding second image in close region, such as
Scheme shown in (a), then to can obtain such as figure (b) after corresponding second image in above-mentioned first encryption section progress backward interpolation
Interpolation result, such as scheme (c) shown in, terminal can to figure (b) again use whirlpool folding mode, i.e., by folded interpolation with vortex
Form arrangement obtains result such as figure (c), figure (c) and then carries out at encryption for terminal the second image corresponding to the first encryption section
Result after reason.
Fig. 6 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram two, as shown in fig. 6, if i-th is adjacent
There are 4 pixels, respectively pixel 1, pixel 2, pixel 3 and pixel 4 in corresponding second image in region, such as schemes
(a) shown in, then to can obtain such as figure (b) after above-mentioned i-th adjacent area corresponding second image progress backward interpolation
Interpolation result is such as schemed shown in (c), and terminal can use whirlpool folding mode to figure (b) again, i.e., by folded interpolation with helicoid
Formula arrangement obtains result such as figure (c), after figure (c) is then encrypted for terminal the second image corresponding to the i-th adjacent area
Result.
Step 103c, when encryption section meets the decision condition for completing processing, stop the first image of processing, and generate
Encrypted image to be processed.
In an embodiment of the present invention, terminal is according to default plus rule the second image slightly corresponding to the first encryption section
It is encrypted, and the first encryption section can first be judged that above-mentioned encryption section is labeled as after encryption section
It is no to meet the decision condition for completing processing, if above-mentioned encryption section meets the decision condition for completing processing, terminal
Stop handling above-mentioned first image, then generates encrypted image to be processed.
Further, in an embodiment of the present invention, terminal can judge that above-mentioned encryption section is by a variety of methods
Then the no decision condition for completing to handle that meets calculates above-mentioned target area for example, terminal can preset a proportion threshold value
First area in domain, while the second area of above-mentioned encryption section is calculated, and determine above-mentioned first area and above-mentioned second face
Long-pending ratio, when the ratio of above-mentioned first area and above-mentioned second area is more than or equal to aforementioned proportion threshold value, then eventually
End can determine that above-mentioned encryption section meets the decision condition for completing processing.
Fig. 7 is a kind of implementation process schematic diagram four for image processing method that the embodiment of the present invention proposes, as shown in fig. 7,
In an embodiment of the present invention, the method for the terminal judgement decision condition that whether encryption section has met completion processing may include
Following steps:
Step 201 determines corresponding first area in target area, and according to the first area and predetermined encryption ratio, determines
The corresponding encryption section lower limit value in target area.
In an embodiment of the present invention, terminal can determine the corresponding area in target area after obtaining target area,
That is the first area, then terminal can determine that above-mentioned target area is corresponding according to above-mentioned first area and predetermined encryption ratio
Encryption section lower limit value.
It should be noted that in an embodiment of the present invention, above-mentioned predetermined encryption can be arranged by a variety of methods in terminal
Ratio can also be arranged for example, terminal can be operated according to the input of user determines above-mentioned encryption ratio according to initialization information
Above-mentioned encryption ratio.
It should be noted that in an embodiment of the present invention, above-mentioned encryption ratio determines a need for continuing for terminal
Above-mentioned target area is encrypted, for example, when above-mentioned encryption ratio is 80%, if terminal is to above-mentioned target area
When the area being encrypted alreadys exceed the 80% of the first area, then, terminal can terminate to above-mentioned target area
Encryption.
Step 202 determines the corresponding second area in encryption section, when second area is more than or equal under encryption section
When limit value, determine that encryption section meets the decision condition for completing processing.
In an embodiment of the present invention, terminal is after completing to the encryption of above-mentioned first encryption section, Ke Yixian
The corresponding area in above-mentioned encryption section, i.e. second area are determined, if above-mentioned second area is more than or equal to above-mentioned encryption
When the lower limit value of region, then it is considered that terminal has completed the encryption to target area.
It should be noted that in an embodiment of the present invention, when above-mentioned encryption ratio is 80%, if terminal is to above-mentioned
When the second area that target area is encrypted alreadys exceed the 80% of the first area, then, terminal can terminate pair
The encryption of above-mentioned target area.
According to the description above it is found that 103a~103c, terminal can be determined from target area through the above steps
First encryption section, and judge whether the first encryption section meets predetermined encryption condition;When the first encryption section meets default add
When close condition, it is encrypted according to default plus rule the second image slightly corresponding to the first encryption section, and first is added
Close zone marker is encryption section, wherein the second image is parts of images corresponding with the first encryption section in the first image;
When encryption section meets the decision condition for completing processing, stop the first image of processing, and generate encrypted figure to be processed
Picture;Screenshot capture is not handled when to solve prior art screenshotss and all information is shown on screenshot capture
The problem of caused target information leaks, and then the privacy information in terminal is protected, effectively increase terminal
Safety.
Example IV
Fig. 8 is a kind of implementation process schematic diagram five for image processing method that the embodiment of the present invention proposes, as shown in figure 8,
Based on embodiment three, in an embodiment of the present invention, terminal judges whether the first encryption section meets the side of predetermined encryption condition
Method may comprise steps of:
Step 301 obtains corresponding first boundary coordinate in target area.
In an embodiment of the present invention, terminal can first obtain above-mentioned target area after determining above-mentioned target area
The corresponding coordinate in boundary, i.e. the first boundary coordinate, so that it is determined that the boundary of above-mentioned target area.
Step 302 obtains the corresponding the second boundary coordinate in encryption section.
In an embodiment of the present invention, terminal is after obtaining corresponding above-mentioned first boundary coordinate in above-mentioned target area,
The corresponding coordinate in boundary of available encryption section, i.e. the second boundary coordinate, so that it is determined that the side of above-mentioned encryption section
Boundary.
Step 303 determines the corresponding first area coordinate in the first encryption section.
In an embodiment of the present invention, after terminal states the first encryption section in the choice, it can determine that above-mentioned first adds
The corresponding area coordinate in close region, i.e., above-mentioned first area coordinate, so that it is determined that the regional scope of above-mentioned first encryption section.
Step 304, when first area coordinate is within the first boundary coordinate, and first area coordinate is in the second boundary coordinate
Except when, determine the first encryption section meet predetermined encryption condition.
In an embodiment of the present invention, terminal is determining corresponding first boundary coordinate in above-mentioned target area, above-mentioned respectively
After the corresponding first area coordinate of the corresponding the second boundary coordinate in encryption section and above-mentioned first encryption section, if on
First area coordinate is stated within above-mentioned first boundary coordinate, and above-mentioned first area coordinate is except above-mentioned the second boundary coordinate
When, then terminal is it is determined that above-mentioned first encryption section meets predetermined encryption condition.
Further, in an embodiment of the present invention, if above-mentioned first encryption section above-mentioned target area range it
It is interior, and above-mentioned first encryption section is not belonging within the scope of above-mentioned encryption section, then terminal can consider that above-mentioned first adds
Close region meets above-mentioned predetermined encryption condition.
A kind of image processing method that the embodiment of the present invention proposes can determine mesh in image according to target information is prestored
Region is marked, then the first image in target area is encrypted according to predetermined encryption rule, to solve existing
Screenshot capture is not handled when technology screenshotss and all information is shown in sensitive information caused on screenshot capture
The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment five
Fig. 9 is a kind of implementation process schematic diagram six for image processing method that the embodiment of the present invention proposes, as shown in figure 9,
Based on embodiment three, in an embodiment of the present invention, terminal is according to predetermined encryption rule corresponding to the first encryption section
Two images are encrypted, and by the first encryption section labeled as after encryption section, i.e. after step 103b, terminal into
The method of row image procossing can with the following steps are included:
Step 103d, when encryption section is unsatisfactory for completing the decision condition of processing, determination is next from target area
A encryption section.
In an embodiment of the present invention, terminal is according to predetermined encryption rule the second image corresponding to the first encryption section
It is encrypted, and by the first encryption section labeled as after encryption section, if encryption section is unsatisfactory at completion
When the decision condition of reason, then terminal can determine next encryption section from target area.
Step 103e, next encryption section is continued with, until, encryption section meets the decision condition for completing to handle,
Stop the first image of processing, and generates encrypted image to be processed.
In an embodiment of the present invention, terminal can continue after determining next encryption section in target area
Above-mentioned next encryption section is encrypted, until, encryption section meets the decision condition of above-mentioned completion processing, that
Terminal stops handling above-mentioned first image, and generates encrypted image to be processed.
In an embodiment of the present invention, further, terminal can determination be next from target area by a variety of methods
A encryption section, for example, terminal can first determine above-mentioned next encrypted area in the adjacent region in above-mentioned first encryption section
Then domain determines above-mentioned next encryption section from other regions except the adjacent region in above-mentioned first encryption section again.
Specifically, in an embodiment of the present invention, terminal can be by above-mentioned first encryption section pair of above-mentioned target area
An adjacent area in the whole adjacent areas answered, is determined as next encryption section, then successively adjacent to above-mentioned whole
The corresponding image of each adjacent area in region is encrypted.
It should be noted that in an embodiment of the present invention, terminal is to any one in above-mentioned whole adjacent areas
After adjacent area is encrypted, if it is decided that encryption section meets the decision condition for completing processing, then terminal is just
It can stop handling above-mentioned first image, and generate encrypted image to be processed.
Further, in an embodiment of the present invention, when having handled the corresponding whole adjacent regions in above-mentioned first encryption section
After domain, if encryption section does not meet the decision condition for completing processing, terminal can be from above-mentioned target area
, in other regions except the corresponding whole adjacent areas in above-mentioned first encryption section, determine above-mentioned next encryption section.
Further, in an embodiment of the present invention, terminal can be according to the multiple and different of above-mentioned first encryption section
Related direction selects the corresponding adjacent area in above-mentioned first encryption section.For example, Figure 10 is what the embodiment of the present invention proposed
The schematic diagram of the adjacent area of first encryption section, as shown in Figure 10, if 9 in above-mentioned first encryption section of terminal selection
A pixel is arranged according to quadrangle mode, then above-mentioned first encryption section can have 8 different related directions,
Terminal can select above-mentioned first encryption section one corresponding according to 8 different related directions of above-mentioned first encryption section
Adjacent area, so as to which said one adjacent area is encrypted.
According to the description above it is found that 103d~103e, terminal can ought be discontented with encryption section through the above steps
When foot completes the decision condition of processing, next encryption section is determined from target area;Next encryption section is continued with,
Until, encryption section meets the decision condition for completing to handle, and stops the first image of processing, and generate encrypted figure to be processed
Picture;Screenshot capture is not handled when to solve prior art screenshotss and all information is shown on screenshot capture
The problem of caused target information leaks, and then the privacy information in terminal is protected, effectively increase terminal
Safety.
Embodiment six
Figure 11 is a kind of implementation process schematic diagram seven for image processing method that the embodiment of the present invention proposes, such as Figure 11 institute
Show, is based on embodiment three, in an embodiment of the present invention, terminal is corresponding to the first encryption section according to predetermined encryption rule
Second image is encrypted, and by the first encryption section labeled as after encryption section, i.e. after step 103b, terminal
Carry out image procossing method can with the following steps are included:
Step 103f, the corresponding first decryption code key in the first encryption section, and setting are generated according to predetermined encryption rule
The corresponding first area identifier in first encryption section, and determine corresponding first coordinate in the first encryption section.
In an embodiment of the present invention, terminal is according to predetermined encryption rule the second image corresponding to the first encryption section
It is encrypted, and by the first encryption section labeled as the after encryption section, can be generated according to predetermined encryption rule
The corresponding first decryption code key in one encryption section, and the corresponding first area identifier in the first encryption section of setting, and really
Fixed corresponding first coordinate in first encryption section.
Further, in an embodiment of the present invention, it should be noted that in an embodiment of the present invention, terminal according to
The second image in above-mentioned first encryption section is encrypted in above-mentioned predetermined encryption rule, then, terminal can root
The corresponding code key in above-mentioned first encryption section, i.e., the first decryption code key are generated according to above-mentioned predetermined encryption rule.For example, terminal is to upper
State the interpolation method in the predetermined encryption rule that the first image in the first encryption section is encrypted including pixel and folding
Method, then, terminal according to above-mentioned predetermined encryption rule generate first decryption code key in also include corresponding interpolation method and
Method for folding.
Step 103g, code key, first area identifier and the first coordinate are decrypted by first and is set as the first encryption section
Corresponding encryption identification.
In an embodiment of the present invention, terminal is generating corresponding first solution in the first encryption section according to predetermined encryption rule
Close code key, and the corresponding first area identifier in the first encryption section of setting, and determine the first encryption section corresponding the
After one coordinate, above-mentioned first decryption code key, above-mentioned first area identifier and above-mentioned first coordinate can be set to the
The corresponding encryption identification in one encryption section.
It should be noted that in an embodiment of the present invention, the corresponding encryption identification in above-mentioned first encryption section can be made
It is identified for the certification of above-mentioned first encryption section, for determining whether to solve the second image in above-mentioned first encryption section
Close processing.
Step 103h, encryption identification is added to and is prestored in mark array.
In an embodiment of the present invention, terminal is set by the first decryption code key, first area identifier and the first coordinate
It is set to after the corresponding encryption identification in the first encryption section, above-mentioned encryption identification can be added to and be prestored in mark array.
It should be noted that in an embodiment of the present invention, it is above-mentioned prestore mark array may include prestore code key array,
It prestores identifier array and prestores coordinate array.Further, in an embodiment of the present invention, terminal can respectively will be above-mentioned
First decryption code key be added to it is above-mentioned prestore in code key array, above-mentioned first area identifier is added to and above-mentioned prestores identifier
In array, and above-mentioned first area coordinate is added to above-mentioned prestore in coordinate array.
Further, in an embodiment of the present invention, terminal can mark above-mentioned first decryption code key, above-mentioned first area
Know symbol and above-mentioned first area coordinate be stored respectively in three array corresponding positions of safety zone, it should be noted that
In an embodiment of the present invention, the first decryption code key, first area identifier and first corresponding to identical encryption section
Label of the area coordinate in above three array is identical.
According to the description above it is found that 103f~103h, terminal can be according to predetermined encryption rules through the above steps
The corresponding first decryption code key in the first encryption section, and the corresponding first area identifier in the first encryption section of setting are generated,
And determine corresponding first coordinate in the first encryption section;Code key, first area identifier and the first coordinate are decrypted by first
It is set as the corresponding encryption identification in the first encryption section;Encryption identification is added to and is prestored in mark array;It is existing to solve
Have and screenshot capture is not handled when technology screenshotss and all information is shown in target caused on screenshot capture and is believed
The problem of breath leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment seven
Figure 12 is a kind of implementation process schematic diagram eight for image processing method that the embodiment of the present invention proposes, such as Figure 12 institute
Show, be based on embodiment one, in an embodiment of the present invention, terminal according to predetermined encryption rule to the first figure in target area
As being encrypted, after obtaining encrypted image to be processed, image to be processed is decrypted in terminal method
It may comprise steps of:
Step 401, image to be processed after encryption display interface receive touch control operation, determined according to touch control operation plus
The region to be decrypted in image to be processed after close.
In an embodiment of the present invention, in the display interface of above-mentioned encrypted image to be processed, terminal be can receive
The corresponding touch control operation of above-mentioned encrypted image to be processed, then terminal can determine above-mentioned encryption according to above-mentioned touch control operation
The region to be decrypted in image to be processed afterwards.
It should be noted that in an embodiment of the present invention, above-mentioned region to be decrypted can be above-mentioned encrypted wait locate
The corresponding region of a part of image in image being already encrypted in reason image.
Step 402 receives the corresponding decryption instructions in region to be decrypted.
In an embodiment of the present invention, terminal determines to be decrypted in encrypted image to be processed in foundation touch control operation
After region, it can receive the corresponding decryption instructions in above-mentioned region to be decrypted.
It should be noted that in an embodiment of the present invention, above-mentioned decryption instructions may include above-mentioned region pair to be decrypted
The second decryption code key, the second decryption realm identifier and the second decryption coordinate answered.
Step 403, according to decryption instructions, the third image in region to be decrypted is decrypted.
In an embodiment of the present invention, terminal, can after receiving the corresponding above-mentioned decryption instructions in above-mentioned region to be decrypted
According to above-mentioned decryption instructions, the third image in above-mentioned region to be decrypted to be decrypted.
Further, in an embodiment of the present invention, terminal can first from prestore mark array in extract it is above-mentioned to be decrypted
The corresponding encryption identification in region, then by above-mentioned decryption instructions second decryption code key, second decryption realm identifier and
Second decryption coordinate is decrypted with third decryption code key, third decryption realm identifier and the third in above-mentioned encryption identification respectively
Coordinate is matched.
Further, in an embodiment of the present invention, second in above-mentioned decryption instructions is being decrypted code key, second by terminal
It decrypts realm identifier and the second decryption coordinate and decrypts region with third decryption code key, the third in above-mentioned encryption identification respectively
After identifier and third decryption coordinate are matched, if successful match, terminal can be to above-mentioned region to be decrypted
In third image be decrypted.
Specifically, in an embodiment of the present invention, terminal can respectively from prestore decryption code key array in obtain it is above-mentioned to
It decrypts the corresponding third in region and decrypts code key, obtain the corresponding third in above-mentioned region to be decrypted in identifier array from above-mentioned prestore
Realm identifier, and the corresponding third area coordinate in above-mentioned region to be decrypted is obtained in coordinate array from above-mentioned prestore.
It should be noted that in an embodiment of the present invention, above-mentioned third decryption code key, third realm identifier and the
Three area coordinates are that the above-mentioned band obtained after the image in above-mentioned region to be decrypted is encrypted in terminal decrypts area
The corresponding decryption code key in domain, realm identifier and area coordinate.
Further, in an embodiment of the present invention, terminal can respectively by third area coordinate and second area coordinate,
Third decryption code key and the second decryption code key, third realm identifier and second area identifier are compared, if third area
Domain coordinate is identical with second area coordinate, third decryption code key is identical with the second decryption code key, and third realm identifier and the
When two realm identifiers are identical, then terminal can be decrypted the third image in above-mentioned region to be decrypted.
Further, in an embodiment of the present invention, the third image in above-mentioned region to be decrypted is decrypted in terminal
Processing on condition that meet third area coordinate identical with second area coordinate, third decryption code key and the second decryption code key phase simultaneously
Together, and third realm identifier and identical three conditions of second area identifier, if any one in above three condition
A condition is not able to satisfy, then terminal will not be decrypted the third image in above-mentioned region to be decrypted.
A kind of image processing method that the embodiment of the present invention proposes can determine mesh in image according to target information is prestored
Region is marked, then the first image in target area is encrypted according to predetermined encryption rule, to solve existing
Screenshot capture is not handled when technology screenshotss and all information is shown in sensitive information caused on screenshot capture
The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment eight
Under same inventive concept based on embodiment one to embodiment seven, Figure 13 is the terminal that the embodiment of the present invention proposes
Composed structure schematic diagram one, as shown in figure 13, the terminal 1 that the embodiment of the present invention proposes includes: acquiring unit 11, processing unit
12, determination unit 13 and encryption unit 14.
Acquiring unit 11 for obtaining image to be processed, and extracts the information to be processed in image to be processed.
Processing unit 12 for obtaining image to be processed in acquiring unit 11, and extracts to be processed in image to be processed
After information, information to be processed is compared with target information is prestored.
Acquiring unit 11 is obtained for by information to be processed and prestoring after target information compares in processing unit 12
It obtains in image to be processed and prestores the matched first information of target information.
Determination unit 13, for obtaining in image to be processed and prestoring matched first letter of target information in acquiring unit 11
After breath, the first image in target area is encrypted.
Encryption unit 14, for first information region locating in image to be processed to be determined as mesh in determination unit 13
After marking region, the first image in target area is encrypted;Wherein, the first image be image to be processed in mesh
Mark the corresponding parts of images in region.
Acquiring unit 11, for obtaining after the first image in target area is encrypted in encryption unit 14
Obtain encrypted image to be processed.
Based on above-mentioned Figure 13, Figure 14 is the composed structure schematic diagram two for the terminal that the embodiment of the present invention proposes, such as Figure 14 institute
Show, the acquiring unit 11 that the embodiment of the present invention proposes includes: to obtain subelement 111 and identification subelement 112.
Processing unit 12 is also used to whole pixels corresponding to image to be processed and carries out gray processing processing.
Subelement 111 is obtained, is also used to carry out gray scale in the whole pixels corresponding to image to be processed of processing unit 12
After change processing, the corresponding whole gray values of whole pixels are obtained;And the gray value extracted in whole pixels is greater than in advance
If at least one pixel of gray threshold.
Subelement 112 is identified, for obtaining the corresponding whole gray values of whole pixels in acquisition subelement 111;And
It extracts the gray value in whole pixels to be greater than after at least one pixel of default gray threshold, identifies at least one pixel
The information to be processed in character picture that point is constituted.
Based on above-mentioned Figure 13, Figure 15 is the composed structure schematic diagram three for the terminal that the embodiment of the present invention proposes, such as Figure 15 institute
Show, the encryption unit 14 that the embodiment of the present invention proposes includes: judgment sub-unit 141, encryption sub-unit operable 142 and generation subelement
143。
Determination unit 13 is also used to determine the first encryption section from target area.
Judgment sub-unit 141, for after determining the first encryption section in target area, judging the in determination unit 13
Whether one encryption section meets predetermined encryption condition.
Encryption sub-unit operable 142, for judging whether the first encryption section meets predetermined encryption item in judgment sub-unit 141
After part, when the first encryption section meets predetermined encryption condition, according to predetermined encryption rule in the first encryption section
Two images are encrypted;By the first encryption section labeled as encryption section;Wherein, the second image be the first image in
The corresponding parts of images in first encryption section.
Generate subelement 143, in encryption sub-unit operable 142 according to predetermined encryption rule to the in the first encryption section
Two images are encrypted;After first encryption section is labeled as encryption section, when, encryption section meets at completion
When the decision condition of reason, stop the first image of processing, and generate encrypted image to be processed.
In an embodiment of the present invention, further, encryption sub-unit operable 142, it is right according to predetermined encryption rule to be specifically used for
After the second image in first encryption section is encrypted, it is corresponding that the first encryption section is generated according to predetermined encryption rule
The first decryption code key, and the corresponding first area identifier in the first encryption section of setting, and determine the first encryption section
Corresponding first coordinate;And code key, first area identifier and the first coordinate are decrypted by first and is set as the first encrypted area
The corresponding encryption identification in domain;Encryption identification is added to and is prestored in mark array.
In an embodiment of the present invention, further, it is determined that unit 13, is also used to be added according to predetermined encryption rule to first
The second image in close region is encrypted, and by the first encryption section labeled as after encryption section, when having encrypted
When region is unsatisfactory for completing the decision condition of processing, next encryption section is determined from target area.
Processing unit 12 is also used to continue with next encryption section, and until, encryption section meets completion processing
Decision condition stops the first image of processing, and generates encrypted image to be processed.
Determination unit 13, specifically for by one in the corresponding whole adjacent areas in the first encryption section of target area
Adjacent area is determined as next encryption section.
Determination unit 13 is specifically also used to after having handled the corresponding whole adjacent areas in the first encryption section, from mesh
It marks in region, in other regions except the corresponding whole adjacent areas in the first encryption section, determines next encryption section.
In an embodiment of the present invention, further, acquiring unit 11, be also used to obtain encrypted image to be processed it
Afterwards, the display interface of image to be processed after encryption receives touch control operation.
Determination unit 13, the display interface for being also used to the image to be processed in acquiring unit 11 after encryption receive touch-control behaviour
After work, the region to be decrypted in encrypted image to be processed is determined according to touch control operation.
Acquiring unit 11, be also used to determine in determination unit 13 according to touch control operation in encrypted image to be processed to
After decrypting region, the corresponding decryption instructions in region to be decrypted are received.
Encryption unit 14 is also used to that the third image in region to be decrypted is decrypted according to decryption instructions.
In an embodiment of the present invention, further, decryption instructions include region to be decrypted it is corresponding second decryption code key,
Second decryption realm identifier and second decryption coordinate, encryption unit 14, specifically for from prestore mark array in extract to
Decrypt the corresponding encryption identification in region;And by decryption instructions second decryption code key, second decryption realm identifier and
Second decryption coordinate decrypts coordinate with third decryption code key, third decryption realm identifier and the third in encryption identification respectively
It is matched;And if successful match, the third image in region to be decrypted is decrypted.
Figure 16 is the composed structure schematic diagram four for the terminal that the embodiment of the present invention proposes, in practical applications, based on implementation
Under example one to the same inventive concept of embodiment seven, as shown in figure 16, terminal 1 may include processor 15, be stored with processor
The memory 16 of 15 executable instructions, communication interface 17, and for connecting processor 15, memory 16 and communication interface 17
Bus 18.
In an embodiment of the present invention, acquiring unit 11, processing unit 12, determination unit 13 and encryption unit 14
By be located at terminal 1 on processor 15 realize, above-mentioned processor 15 can for application-specific IC (ASIC,
Application Specific Integrated Circuit), digital signal processor (DSP, Digital Signal
Processor), digital signal processing device (DSPD, Digital Signal Processing Device), programmable logic
Device (PLD, ProgRAMmable Logic Device), field programmable gate array (FPGA, Field ProgRAMmable
Gate Array), CPU, controller, at least one of microcontroller, microprocessor.It is to be appreciated that being set for different
It is standby, can also be to be other for realizing the electronic device of above-mentioned processor function, the embodiment of the present invention is not especially limited.The end
End 1 can also include memory 16, which can connect with processor 15, wherein memory 16 is for storing and can hold
Line program code, the program code include computer operation instruction, and memory 13 may include high speed RAM memory, it is also possible to
It further include nonvolatile memory, for example, at least two magnetic disk storages.
In an embodiment of the present invention, bus 18 for connection communication interface 17, processor 15 and memory 16 and this
Being in communication with each other between a little devices.
In an embodiment of the present invention, memory 16, for storing instruction and data.
Processor 15 for obtaining image to be processed, and extracts the information to be processed in image to be processed;By letter to be processed
It ceases and prestores target information and compare, obtain in image to be processed and prestore the matched first information of target information;By first
Information region locating in image to be processed is determined as target area;The first image in target area is carried out at encryption
Reason obtains encrypted image to be processed;Wherein, the first image is part figure corresponding with target area in image to be processed
Picture.
In practical applications, above-mentioned memory 16 can be volatibility first memory (volatile memory), such as
Arbitrary access first memory (RAM, Random-Access Memory);Or non-volatile first memories (non-
Volatile memory), for example, read-only first memory (ROM, Read-Only Memory), quick flashing first memory
(flash memory), hard disk (HDD, Hard Disk Drive) or solid state hard disk (SSD, Solid-State Drive);Or
The combination of the first memory of person's mentioned kind, and instruction and data is provided to processor 15.
The embodiment of the invention provides a kind of terminals, obtain image to be processed, and extract to be processed in image to be processed
Information;Information to be processed is compared with target information is prestored, obtain in image to be processed with to prestore target information matched
The first information;First information region locating in image to be processed is determined as target area;To first in target area
Image is encrypted, and obtains encrypted image to be processed;Wherein, the first image be image to be processed in target area
Corresponding parts of images.That is, a kind of terminal that the embodiment of the present invention proposes, can determine figure according to target information is prestored
Target area as in, is then encrypted the first image in target area according to predetermined encryption rule, to solve
Determined the prior art screenshotss when screenshot capture is not handled and caused by all information is shown on screenshot capture
The problem of sensitive information leaks, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
In addition, each functional module in the present embodiment can integrate in one processing unit, it is also possible to each list
Member physically exists alone, and can also be integrated in one unit with two or more units.Above-mentioned integrated unit both can be with
Using formal implementation of hardware, can also be realized in the form of software function module.
If integrated unit realizes that being not intended as independent product is sold or made in the form of software function module
Used time can store in a computer readable storage medium, based on this understanding, the technical solution sheet of the present embodiment
The all or part of the part that contributes to existing technology or the technical solution can be with software product in other words in matter
Form embodies, which is stored in a storage medium, including some instructions are used so that a meter
It calculates machine equipment (can be personal computer, server or the network equipment etc.) or processor (processor) executes this implementation
The all or part of the steps of example method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read
Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with
Store the medium of program code.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored thereon with program, is applied in terminal, should
The method such as embodiment one to embodiment seven is realized when program is executed by processor.
Specifically, the corresponding program instruction of one of the present embodiment image processing method can be stored in CD,
Hard disk, on the storage mediums such as USB flash disk, when the program instruction corresponding with a kind of image processing method in storage medium is set by an electronics
It is standby to read or be performed, include the following steps:
Image to be processed is obtained, and extracts the information to be processed in image to be processed;
Information to be processed is compared with target information is prestored, obtain in image to be processed with prestore target information and match
The first information;
First information region locating in image to be processed is determined as target area;
The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein, the first figure
As being parts of images corresponding with target area in image to be processed.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the realization of equipment (system) and computer program product
Flow diagram and/or block diagram describe.It should be understood that flow diagram and/or box can be realized by computer program instructions
The combination of each flow and/or block in figure and the process in implementation process schematic diagram and/or block diagram and/or box.
These computer program instructions be can provide to general purpose computer, special purpose computer, Embedded Processor or other programmable datas
The processor of processing equipment is to generate a machine, so that passing through computer or the processor of other programmable data processing devices
The instruction of execution generate for realizing in one box of implementation process schematic diagram one process or multiple processes and/or block diagrams or
The device for the function of being specified in multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
The manufacture of device is enabled, which realizes in implementation process schematic diagram one process or multiple processes and/or block diagrams one
The function of being specified in a box or multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction that is executed on other programmable devices provide for realizing in one process of implementation process schematic diagram or multiple processes and/or
The step of function of being specified in one or more blocks of the block diagram.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (16)
1. a kind of image processing method, which is characterized in that the described method includes:
Image to be processed is obtained, and extracts the information to be processed in the image to be processed;
The information to be processed is compared with target information is prestored, obtains in the image to be processed and prestores target with described
The first information of information matches;
First information region locating in the image to be processed is determined as target area;
The first image in the target area is encrypted, encrypted image to be processed is obtained;Wherein, described
One image is parts of images corresponding with the target area in the image to be processed.
2. the method according to claim 1, wherein the information to be processed be character information when, the extraction
Information to be processed in the image to be processed, comprising:
Whole pixels corresponding to the image to be processed carry out gray processing processing, and it is corresponding complete to obtain whole pixels
Portion's gray value;
Extract at least one pixel that the gray value in whole pixels is greater than default gray threshold;
Identify the information to be processed in the character picture of at least one pixel composition.
3. the method according to claim 1, wherein first image in the target area adds
Close processing obtains encrypted image to be processed, comprising:
The first encryption section is determined from the target area, and judges whether first encryption section meets predetermined encryption item
Part;
When first encryption section meets the predetermined encryption condition, according to predetermined encryption rule to first encrypted area
The second image in domain is encrypted, and by first encryption section labeled as encryption section;Wherein, described second
Image is parts of images corresponding with first encryption section in the first image;
When satisfaction completes the decision condition of processing when the encryption section, stop processing the first image, and described in generation
Encrypted image to be processed.
4. according to the method described in claim 3, it is characterized in that, it is described according to predetermined encryption rule to first encrypted area
After the second image in domain is encrypted, the method also includes;
The corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule, and setting described the
The corresponding first area identifier in one encryption section, and determine corresponding first coordinate in first encryption section;
First encrypted area is set by the first decryption code key, the first area identifier and first coordinate
The corresponding encryption identification in domain;
The encryption identification is added to and is prestored in mark array.
5. according to the method described in claim 3, it is characterized in that, it is described according to predetermined encryption rule to first encrypted area
The second image in domain is encrypted, and by first encryption section labeled as after encryption section, the method
Further include:
When the encryption section is unsatisfactory for the decision condition for completing processing, determination is next from the target area
Encryption section;
Next encryption section is continued with, until the encryption section meets the decision condition for completing to handle, stopping
The first image is handled, and generates the encrypted image to be processed.
6. according to the method described in claim 5, it is characterized in that, described determine next encrypted area from the target area
Domain, comprising:
By an adjacent area in the corresponding whole adjacent areas in first encryption section of the target area, it is determined as
Next encryption section.
7. according to the method described in claim 6, it is characterized in that, described determine next encrypted area from the target area
Domain, further includes:
After having handled the corresponding whole adjacent areas in first encryption section, from the target area, institute
It states in other regions except the corresponding whole adjacent areas in the first encryption section, determines next encryption section.
8. the method according to claim 1, wherein it is described obtain encrypted image to be processed after, it is described
Method further include:
Touch control operation is received in the display interface of the encrypted image to be processed, determines described add according to the touch control operation
The region to be decrypted in image to be processed after close;
Receive the corresponding decryption instructions in the region to be decrypted;
According to the decryption instructions, the third image in the region to be decrypted is decrypted.
9. according to the method described in claim 8, it is characterized in that, the decryption instructions include that the region to be decrypted is corresponding
Second decryption code key, the second decryption realm identifier and the second decryption coordinate, it is described according to the decryption instructions, to it is described to
Third image in decryption region is decrypted, comprising:
The corresponding encryption identification in the region to be decrypted is extracted from prestoring in mark array;
By the second decryption code key, the second decryption realm identifier and second decryption in the decryption instructions
Coordinate is carried out with third decryption code key, third decryption realm identifier and the third decryption coordinate in the encryption identification respectively
Matching;
If successful match, the third image in the region to be decrypted is decrypted.
10. a kind of terminal, which is characterized in that the terminal includes: acquiring unit, and processing unit, determination unit and encryption are single
Member,
The acquiring unit for obtaining image to be processed, and extracts the information to be processed in the image to be processed;
The processing unit, for comparing the information to be processed with target information is prestored;
The acquiring unit is also used to obtain in the image to be processed and prestores the matched first information of target information with described;
The determination unit, for first information region locating in the image to be processed to be determined as target area
Domain;
The encryption unit, for the first image in the target area to be encrypted;Wherein, the first image
For parts of images corresponding with the target area in the image to be processed;
The acquiring unit is also used to obtain encrypted image to be processed.
11. terminal according to claim 10, which is characterized in that described to obtain when the information to be processed is character information
Taking unit includes: to obtain subelement and identification subelement,
The processing unit is also used to whole pixels corresponding to the image to be processed and carries out gray processing processing;
The acquisition subelement, for obtaining the corresponding whole gray values of whole pixels;And extract whole pictures
Gray value in vegetarian refreshments is greater than at least one pixel of default gray threshold;
The identification subelement, the letter to be processed in character picture that at least one described pixel is constituted for identification
Breath.
12. terminal according to claim 10, which is characterized in that the encryption unit, comprising: judgment sub-unit, encryption
Subelement and generation subelement,
The determination unit is also used to determine the first encryption section from the target area;
The judgment sub-unit, for judging whether first encryption section meets predetermined encryption condition;
The encryption sub-unit operable, for when first encryption section meets the predetermined encryption condition, according to predetermined encryption
The second image in first encryption section is encrypted in rule;First encryption section is labeled as having encrypted
Region;Wherein, second image is parts of images corresponding with first encryption section in the first image;
The generation subelement, described in when the encryption section meets the decision condition for completing processing, stopping is handled
First image, and generate the encrypted image to be processed;
The encryption sub-unit operable, specifically for being carried out according to predetermined encryption rule to the second image in first encryption section
After encryption, the corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule, and
The corresponding first area identifier in first encryption section is set, and determines that first encryption section corresponding first is sat
Mark;And it sets the first decryption code key, the first area identifier and first coordinate to described first and adds
The corresponding encryption identification in close region;The encryption identification is added to and is prestored in mark array.
13. terminal according to claim 12, which is characterized in that
The determination unit, be also used to it is described according to predetermined encryption rule in first encryption section the second image carry out
Encryption, and by first encryption section labeled as after encryption section, when the encryption section be unsatisfactory for it is described
When completing the decision condition of processing, next encryption section is determined from the target area;
The processing unit is also used to continue with next encryption section, completes until the encryption section meets
The decision condition of processing stops processing the first image, and generates the encrypted image to be processed;
The determination unit, specifically for will be in the corresponding whole adjacent areas in first encryption section of the target area
An adjacent area, be determined as next encryption section;
The determination unit, be specifically also used to when handle first encryption section it is corresponding it is described whole adjacent areas it
Afterwards, it from the target area, in other regions except the corresponding whole adjacent areas in first encryption section, determines
Next encryption section.
14. terminal according to claim 10, which is characterized in that
The acquiring unit is also used to after the encrypted image to be processed of acquisition, in the encrypted figure to be processed
The display interface of picture receives touch control operation;
The determination unit is also used to determine the area to be decrypted in the encrypted image to be processed according to the touch control operation
Domain;
The acquiring unit is also used to receive the corresponding decryption instructions in the region to be decrypted;
The encryption unit is also used to that the third image in the region to be decrypted is decrypted according to the decryption instructions
Processing;
Wherein, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second decryption realm identifier
And second decryption coordinate,
The decryption unit, specifically for from prestore mark array in extract the corresponding encryption identification in the region to be decrypted;With
And the second decryption code key, the second decryption realm identifier and second decryption in the decryption instructions are sat
Mark decrypts coordinate progress with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively
Match;And if successful match, the third image in the region to be decrypted is decrypted.
15. a kind of terminal, which is characterized in that the terminal includes processor, is stored with depositing for the processor-executable instruction
Reservoir, communication interface, and the bus for connecting the processor, the memory and the communication interface, when the finger
Order is performed, and the processor performs the following operations:
The processor for obtaining image to be processed, and extracts the information to be processed in the image to be processed;Will it is described to
Processing information is compared with target information is prestored, and prestores target information matched the with described in the acquisition image to be processed
One information;First information region locating in the image to be processed is determined as target area;To the target area
The first image in domain is encrypted, and obtains encrypted image to be processed;Wherein, the first image is described wait locate
Manage parts of images corresponding with the target area in image.
16. a kind of computer readable storage medium, is stored thereon with program, it is applied in terminal, which is characterized in that described program
Such as claim 1-9 described in any item methods are realized when being executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710479543.XA CN109118551A (en) | 2017-06-22 | 2017-06-22 | A kind of image processing method, terminal and storage medium |
PCT/CN2018/092463 WO2018233700A1 (en) | 2017-06-22 | 2018-06-22 | Image processing method, and terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710479543.XA CN109118551A (en) | 2017-06-22 | 2017-06-22 | A kind of image processing method, terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109118551A true CN109118551A (en) | 2019-01-01 |
Family
ID=64732741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710479543.XA Pending CN109118551A (en) | 2017-06-22 | 2017-06-22 | A kind of image processing method, terminal and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109118551A (en) |
WO (1) | WO2018233700A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368310A (en) * | 2019-08-26 | 2020-07-03 | 杭州海康威视系统技术有限公司 | Data encryption and decryption method and device, electronic equipment and storage medium |
CN112035847A (en) * | 2019-06-03 | 2020-12-04 | 湖北微模式科技发展有限公司 | Image encryption and decryption method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070133792A1 (en) * | 2005-09-28 | 2007-06-14 | Keiko Utsumi | Image processing apparatus, control method therefor, computer program, and computer-readable storage medium |
US20100074437A1 (en) * | 2007-05-31 | 2010-03-25 | Pfu Limited | Image processing system, program and method |
CN106131360A (en) * | 2016-06-15 | 2016-11-16 | 珠海市魅族科技有限公司 | Image data sending method and device |
CN106354385A (en) * | 2016-08-26 | 2017-01-25 | 广东欧珀移动通信有限公司 | Image processing method, device and terminal equipment |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102567941A (en) * | 2011-12-30 | 2012-07-11 | 无锡智科传感网技术股份有限公司 | Image privacy protection processing technology |
CN106210528B (en) * | 2016-07-29 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method, device and mobile terminal encrypting photo |
CN106775333A (en) * | 2017-02-16 | 2017-05-31 | 深圳市茁壮网络股份有限公司 | A kind of screenshotss method and device |
-
2017
- 2017-06-22 CN CN201710479543.XA patent/CN109118551A/en active Pending
-
2018
- 2018-06-22 WO PCT/CN2018/092463 patent/WO2018233700A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070133792A1 (en) * | 2005-09-28 | 2007-06-14 | Keiko Utsumi | Image processing apparatus, control method therefor, computer program, and computer-readable storage medium |
US20100074437A1 (en) * | 2007-05-31 | 2010-03-25 | Pfu Limited | Image processing system, program and method |
CN106131360A (en) * | 2016-06-15 | 2016-11-16 | 珠海市魅族科技有限公司 | Image data sending method and device |
CN106354385A (en) * | 2016-08-26 | 2017-01-25 | 广东欧珀移动通信有限公司 | Image processing method, device and terminal equipment |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
Non-Patent Citations (1)
Title |
---|
翟亚宇;潘晋孝;刘宾;陈平;: "基于运动目标尺寸检测的实时图像处理与显示", no. 11 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112035847A (en) * | 2019-06-03 | 2020-12-04 | 湖北微模式科技发展有限公司 | Image encryption and decryption method and device, electronic equipment and storage medium |
CN112035847B (en) * | 2019-06-03 | 2023-10-27 | 湖北微模式科技发展有限公司 | Image encryption and decryption methods and devices, electronic equipment and storage medium |
CN111368310A (en) * | 2019-08-26 | 2020-07-03 | 杭州海康威视系统技术有限公司 | Data encryption and decryption method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2018233700A1 (en) | 2018-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI574197B (en) | Systems and methods for gesture lock obfuscation | |
US10176315B2 (en) | Graphical authentication | |
KR101556599B1 (en) | Pattern Inputting Apparatus and Method, and Recording Medium Using the Same | |
US8904482B1 (en) | Techniques for securing a one-time passcode with an alteration code | |
US20180165442A1 (en) | Multiuser login method, device and storage medium | |
JP6687222B2 (en) | Terminal device password unlock method, device and terminal device | |
Ritter et al. | Miba: Multitouch image-based authentication on smartphones | |
CN105814575B (en) | Authenticating device, Verification System, program, storage medium and authentication method | |
US9397992B1 (en) | Authentication using color-shape pairings | |
US20170249450A1 (en) | Device and Method for Authenticating a User | |
CN105303096A (en) | Symbol selection for swipe based authentication | |
CN109118551A (en) | A kind of image processing method, terminal and storage medium | |
CN104217153A (en) | Information processing method and electronic equipment | |
CN106778344B (en) | A kind of data permission control method and terminal | |
KR20150047735A (en) | User Authentication Method base on User Input on the Image and Electronic Device using the same | |
US9613201B1 (en) | Access control by a mobile device using an image | |
CN106022151A (en) | Information transmission method and device | |
US20180124034A1 (en) | Image based method, system and computer program product to authenticate user identity | |
JP2014081729A (en) | Information processing apparatus, information processing system, control method, and program | |
US10229260B1 (en) | Authenticating by labeling | |
US10404694B2 (en) | Mobile device, method of authenticating a user, computer program, article of manufacture, display | |
CN107450834A (en) | A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium | |
CN115134473A (en) | Image encryption method and device | |
CN115080946A (en) | Password input method and input device | |
CN107784220A (en) | A kind of pattern authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |