CN109118551A - A kind of image processing method, terminal and storage medium - Google Patents

A kind of image processing method, terminal and storage medium Download PDF

Info

Publication number
CN109118551A
CN109118551A CN201710479543.XA CN201710479543A CN109118551A CN 109118551 A CN109118551 A CN 109118551A CN 201710479543 A CN201710479543 A CN 201710479543A CN 109118551 A CN109118551 A CN 109118551A
Authority
CN
China
Prior art keywords
image
processed
encryption
information
encryption section
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710479543.XA
Other languages
Chinese (zh)
Inventor
孙安庆
魏明业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Zhongxing New Software Co Ltd
Original Assignee
Xian Zhongxing New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Zhongxing New Software Co Ltd filed Critical Xian Zhongxing New Software Co Ltd
Priority to CN201710479543.XA priority Critical patent/CN109118551A/en
Priority to PCT/CN2018/092463 priority patent/WO2018233700A1/en
Publication of CN109118551A publication Critical patent/CN109118551A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/30Determination of transform parameters for the alignment of images, i.e. image registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Image Processing (AREA)

Abstract

The embodiment of the invention discloses a kind of image processing method, terminal and storage mediums, this method comprises: obtaining image to be processed, and extract the information to be processed in image to be processed;Information to be processed is compared with target information is prestored, obtain in image to be processed and prestores the matched first information of target information;First information region locating in image to be processed is determined as target area;The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein, the first image is parts of images corresponding with target area in image to be processed.

Description

A kind of image processing method, terminal and storage medium
Technical field
The present invention relates to terminal technology more particularly to a kind of image processing methods, terminal and storage medium.
Background technique
Screenshotss are the picture or text on a kind of terminal interception display interface, and form the means of a screenshot capture, It is a kind of terminal application technology.User can be intercepted in need by this technological means of screenshotss from the webpage browsed Text or image information form screenshot capture to facilitate viewing to learn, while can also be by screenshotss by the text on display interface Or pictorial information is sent to other terminals in the form of screenshot picture and carrys out shared information.Since the technological means of screenshotss is simply easy It learns, is easy-to-use, therefore more and more terminals all have the function of screenshotss, to facilitate user to carry out screenshotss processing.
Currently, when the screenshotss function of user's using terminal is to information interception on display interface, the screenshot capture meeting of acquisition Including all information in terminal current display interface, therefore the privacy letter of some users may be related in screenshot capture Breath, such as the various sensitive informations such as password, account No., telephone number.If including the screenshot capture of user privacy information It is maliciously stolen, then user privacy information will be leaked, so that certain privacy or property etc. can be caused Security threat.
Summary of the invention
The embodiment of the present invention provides a kind of image processing method, terminal and storage medium, is able to solve prior art screenshotss When screenshot capture is not handled, and sensitive information leakage caused by all information is shown on screenshot capture is asked Topic, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of image processing methods, comprising:
Image to be processed is obtained, and extracts the information to be processed in the image to be processed;
The information to be processed is compared with target information is prestored, obtains and is prestored in the image to be processed with described The matched first information of target information;
First information region locating in the image to be processed is determined as target area;
The first image in the target area is encrypted, encrypted image to be processed is obtained;Wherein, institute Stating the first image is parts of images corresponding with the target area in the image to be processed.
In the above scheme, when the information to be processed is character information, it is described extract in the image to be processed to Handle information, comprising:
Whole pixels corresponding to the image to be processed carry out gray processing processing, and it is corresponding to obtain whole pixels Whole gray values;
Extract at least one pixel that the gray value in whole pixels is greater than default gray threshold;
Identify the information to be processed in the character picture of at least one pixel composition.
In the above scheme, first image in the target area is encrypted, and obtains encrypted Image to be processed, comprising:
The first encryption section is determined from the target area, and judges whether first encryption section meets default add Close condition;
When first encryption section meets the predetermined encryption condition, added according to predetermined encryption rule to described first The second image in close region is encrypted, and by first encryption section labeled as encryption section;Wherein, described Second image is parts of images corresponding with first encryption section in the first image;
When the encryption section meets the decision condition for completing processing, stop processing the first image, and generate The encrypted image to be processed.
In the above scheme, described that the second image in first encryption section is added according to predetermined encryption rule After close processing, the method also includes;
The corresponding first decryption code key in first encryption section, and setting institute are generated according to the predetermined encryption rule The corresponding first area identifier in the first encryption section is stated, and determines corresponding first coordinate in first encryption section;
It sets the first decryption code key, the first area identifier and first coordinate to described first and adds The corresponding encryption identification in close region;
The encryption identification is added to and is prestored in mark array.
In the above scheme, described that the second image in first encryption section is added according to predetermined encryption rule Close processing, and by first encryption section labeled as after encryption section, the method also includes:
When the encryption section is unsatisfactory for the decision condition for completing processing, under being determined in the target area One encryption section;
Next encryption section is continued with, until the encryption section, satisfaction completes the decision condition of processing, Stop processing the first image, and generates the encrypted image to be processed.
It is in the above scheme, described that next encryption section is determined from the target area, comprising:
By an adjacent area in the corresponding whole adjacent areas in first encryption section of the target area, really It is set to next encryption section.
It is in the above scheme, described that next encryption section is determined from the target area, further includes:
After having handled the corresponding whole adjacent areas in first encryption section, from the target area , in other regions except the corresponding whole adjacent areas in first encryption section, determine next encryption section.
In the above scheme, after the encrypted image to be processed of acquisition, the method also includes:
Touch control operation is received in the display interface of the encrypted image to be processed, determines institute according to the touch control operation State the region to be decrypted in encrypted image to be processed;
Receive the corresponding decryption instructions in the region to be decrypted;
According to the decryption instructions, the third image in the region to be decrypted is decrypted.
In the above scheme, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second solution Close realm identifier and the second decryption coordinate, it is described according to the decryption instructions, to the third figure in the region to be decrypted As being decrypted, comprising:
The corresponding encryption identification in the region to be decrypted is extracted from prestoring in mark array;
By the second decryption code key in the decryption instructions, the second decryption realm identifier and described second It decrypts coordinate and decrypts coordinate with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively It is matched;
If successful match, the third image in the region to be decrypted is decrypted.
The embodiment of the invention provides a kind of terminal, the terminal includes: acquiring unit, processing unit, determination unit with And encryption unit,
The acquiring unit for obtaining image to be processed, and extracts the information to be processed in the image to be processed;
The processing unit, for comparing the information to be processed with target information is prestored;
The acquiring unit is also used to obtain in the image to be processed and prestores matched first letter of target information with described Breath;
The determination unit, for first information region locating in the image to be processed to be determined as target Region;
The encryption unit, for the first image in the target area to be encrypted;Wherein, described first Image is parts of images corresponding with the target area in the image to be processed;
The acquiring unit is also used to obtain encrypted image to be processed.
In the above scheme, the information to be processed be character information when, the acquiring unit include: obtain subelement and Identify subelement,
The processing unit is also used to whole pixels corresponding to the image to be processed and carries out gray processing processing;
The acquisition subelement, for obtaining the corresponding whole gray values of whole pixels;And it extracts described complete Gray value in portion's pixel is greater than at least one pixel of default gray threshold;
The identification subelement, it is described to be processed in the character picture of at least one pixel composition for identification Information.
In the above scheme, the encryption unit, comprising: judgment sub-unit, encryption sub-unit operable and generation subelement,
The determination unit is also used to determine the first encryption section from the target area;
The judgment sub-unit, for judging whether first encryption section meets predetermined encryption condition;
The encryption sub-unit operable, for when first encryption section meets the predetermined encryption condition, according to default The second image in first encryption section is encrypted in encryption rule;By first encryption section labeled as Encryption section;Wherein, second image is parts of images corresponding with first encryption section in the first image;
The generation subelement, for when the encryption section meets the decision condition for completing processing, stopping to be handled The first image, and generate the encrypted image to be processed;
The encryption sub-unit operable, specifically for according to predetermined encryption rule to the second image in first encryption section After being encrypted, the corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule, And the corresponding first area identifier in setting first encryption section, and determine first encryption section corresponding the One coordinate;And described the is set by the first decryption code key, the first area identifier and first coordinate The corresponding encryption identification in one encryption section;The encryption identification is added to and is prestored in mark array.
In the above scheme, the determination unit, be also used to it is described according to predetermined encryption rule to first encrypted area The second image in domain is encrypted, and by first encryption section labeled as after encryption section, when it is described When encryption section is unsatisfactory for the decision condition for completing processing, next encryption section is determined from the target area;
The processing unit is also used to continue with next encryption section, until the encryption section meets The decision condition of processing is completed, stops processing the first image, and generate the encrypted image to be processed;
The determination unit, specifically for by the corresponding whole adjacent regions in first encryption section of the target area An adjacent area in domain, is determined as next encryption section;
The determination unit is specifically also used to have handled the corresponding whole adjacent areas in first encryption section Later, from the target area, in other regions except the corresponding whole adjacent areas in first encryption section, really Fixed next encryption section.
In the above scheme, the acquiring unit is also used to after the encrypted image to be processed of acquisition, described The display interface of encrypted image to be processed receives touch control operation;
The determination unit, be also used to determine according to the touch control operation in the encrypted image to be processed wait solve Close region;
The acquiring unit is also used to receive the corresponding decryption instructions in the region to be decrypted;
The encryption unit is also used to carry out the third image in the region to be decrypted according to the decryption instructions Decryption processing;
Wherein, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second decryption region mark Know symbol and the second decryption coordinate,
The decryption unit, specifically for extracting the corresponding encryption in the region to be decrypted mark in mark array from prestoring Know;And described second in the decryption instructions is decrypted into code key, the second decryption realm identifier and described second It decrypts coordinate and decrypts coordinate with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively It is matched;And if successful match, the third image in the region to be decrypted is decrypted.
The embodiment of the invention provides a kind of terminal, the terminal includes processor, to be stored with the processor executable The memory of instruction, communication interface, and the bus for connecting the processor, the memory and the communication interface, When executed, the processor performs the following operations:
The processor for obtaining image to be processed, and extracts the information to be processed in the image to be processed;By institute It states information to be processed to compare with target information is prestored, obtains and matched in the image to be processed with the target information that prestores The first information;First information region locating in the image to be processed is determined as target area;To the mesh The first image in mark region is encrypted, and obtains encrypted image to be processed;Wherein, the first image is described Parts of images corresponding with the target area in image to be processed.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with program, are applied in terminal, Such as claim 1-9 described in any item methods are realized when described program is executed by processor.
It can be seen that being obtained to be processed the embodiment of the invention provides a kind of image processing method, terminal and storage medium Image, and extract the information to be processed in image to be processed;Information to be processed is compared with target information is prestored, obtain to In processing image and prestore the matched first information of target information;First information region locating in image to be processed is determined For target area;The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein, One image is parts of images corresponding with target area in image to be processed.That is, one kind that the embodiment of the present invention proposes Image processing method, terminal and storage medium can determine target area in image according to target information is prestored, then basis The first image in target area is encrypted in predetermined encryption rule, thus not to screen when solving prior art screenshotss Curtain screenshot is handled and all information is shown in the problem of sensitive information caused on screenshot capture leaks, and then right Privacy information in terminal is protected, and the safety of terminal is effectively increased.
Detailed description of the invention
Fig. 1 is a kind of implementation process schematic diagram one for image processing method that the embodiment of the present invention proposes;
Fig. 2 is a kind of implementation process schematic diagram two for image processing method that the embodiment of the present invention proposes;
Fig. 3 is a kind of implementation process schematic diagram three for image processing method that the embodiment of the present invention proposes;
Fig. 4 is the schematic diagram that the first encryption section pixel quadrangle mode that the embodiment of the present invention proposes arranges;
Fig. 5 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram one;
Fig. 6 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram two;
Fig. 7 is a kind of implementation process schematic diagram four for image processing method that the embodiment of the present invention proposes;
Fig. 8 is a kind of implementation process schematic diagram five for image processing method that the embodiment of the present invention proposes;
Fig. 9 is a kind of implementation process schematic diagram six for image processing method that the embodiment of the present invention proposes;
Figure 10 is the schematic diagram of the adjacent area for the first encryption section that the embodiment of the present invention proposes;
Figure 11 is a kind of implementation process schematic diagram seven for image processing method that the embodiment of the present invention proposes;
Figure 12 is a kind of implementation process schematic diagram eight for image processing method that the embodiment of the present invention proposes;
Figure 13 is the composed structure schematic diagram one for the terminal that the embodiment of the present invention proposes;
Figure 14 is the composed structure schematic diagram two for the terminal that the embodiment of the present invention proposes;
Figure 15 is the composed structure schematic diagram three for the terminal that the embodiment of the present invention proposes;
Figure 16 is the composed structure schematic diagram four for the terminal that the embodiment of the present invention proposes.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.
Embodiment one
Fig. 1 is a kind of implementation process schematic diagram one for image processing method that the embodiment of the present invention proposes, as shown in Figure 1, In an embodiment of the present invention, the method that terminal carries out image procossing may comprise steps of:
Step 101 obtains image to be processed, and extracts the information to be processed in image to be processed.
In an embodiment of the present invention, terminal can first obtain image to be processed, then extract in image to be processed to Handle information.Wherein, above-mentioned image to be processed can be the screenshot capture of terminal, or any one stored in terminal Image, further, terminal can obtain above-mentioned image to be processed by a variety of methods, for example, terminal can be by display Screen carries out screenshot, then obtains the corresponding screenshot capture of display screen, i.e., above-mentioned image to be processed;Terminal can also be from storage Any one image is extracted in all images in terminal as image to be processed.
Further, in an embodiment of the present invention, terminal can first obtain screenshotss instruction, then can be referred to according to screenshotss It enables and screenshotss is carried out to content shown by terminal display interface, finally obtain screen corresponding with the display content of terminal display interface Curtain screenshot.Wherein, above-mentioned terminal can be mobile phone, tablet computer, smart camera etc. with screenshotss function.
Further, in an embodiment of the present invention, terminal can obtain screenshotss instruction in several ways, for example, eventually End can obtain screenshotss instruction by the pressing operation of the pre-set combination button of detection;Terminal can also be pre- by detecting The touch gestures for the display interface being first arranged obtain screenshotss instruction.
Further, in an embodiment of the present invention, terminal can star screenshotss function after obtaining above-mentioned screenshotss instruction Can, and content shown by the current display interface to terminal carry out screenshotss, and then obtain a corresponding screenshot capture, i.e., to Handle image.Wherein, above-mentioned display content can all show for text information, the image information etc. shown in current display interface Show information, includes the text information shown on above-mentioned display interface, figure by the above-mentioned screenshot capture that screenshotss obtain correspondingly As information etc. all shows information.
It should be noted that in an embodiment of the present invention, after terminal obtains above-mentioned image to be processed, terminal needs elder generation Extract the above-mentioned information to be processed in above-mentioned image to be processed.Specifically, terminal is needed the background in above-mentioned image to be processed Information or marginal information filter out, and then extract the information to be processed in above-mentioned image to be processed again.
Step 102 compares information to be processed with target information is prestored, and obtains in image to be processed and prestores target The first information of information matches.
In an embodiment of the present invention, terminal is obtaining image to be processed, and extracts the letter to be processed in image to be processed After breath, information to be processed and pre-stored target information can be compared, it is hereby achieved that in image to be processed , the matched first information of target information is prestored with above-mentioned.
Further, in an embodiment of the present invention, terminal extract the information to be processed in above-mentioned image to be processed it Afterwards, above-mentioned information to be processed and pre-stored target information can be compared, by above-mentioned information to be processed with it is above-mentioned It prestores the information that target information matches and is determined as the first information, that is to say, that the above-mentioned first information is above-mentioned information to be processed In with the above-mentioned target information that prestores to matched all information.
It should be noted that in an embodiment of the present invention, terminal can pre-establish a target information database, on Stating target information database can store above-mentioned target information, and further, above-mentioned target information can be image information, can also Think character information.
It should be noted that in an embodiment of the present invention, for character information, common target information, such as password, Bank account, telephone number etc. all have more significant feature, and therefore, terminal can in advance store common target information Extremely in above-mentioned target information database, and then can be by the above-mentioned target information database that prestores to above-mentioned information progress to be processed Identification detects in above-mentioned image to be processed and prestores the matched first information of target information.
It should be noted that in an embodiment of the present invention, terminal is prestoring target information to above-mentioned wait locate by above-mentioned After reason information is compared, if not in need in information to be processed in above-mentioned image to be processed be encrypted When target information, terminal can not be encrypted above-mentioned image to be processed.That is, in the embodiment of the present invention In, all images to be processed can't be encrypted in terminal, but only to including to prestore target information phase with above-mentioned The image to be processed of the matched first information is encrypted.
First information region locating in image to be processed is determined as target area by step 103.
In an embodiment of the present invention, terminal is comparing information to be processed with target information is prestored, and obtains wait locate It, can be by the above-mentioned first information in above-mentioned image to be processed in reason image and after prestoring the matched first information of target information Locating region is determined as target area.
Further, in an embodiment of the present invention, terminal can be by the corresponding image of the above-mentioned first information and above-mentioned section Screen image compares, and may thereby determine that the corresponding image of above-mentioned first information location in above-mentioned screenshotss image, Specifically, terminal can first determine the first pixel corresponding with the above-mentioned first information in above-mentioned screenshotss image, then further according to Above-mentioned first pixel determines above-mentioned target area.
Specifically, in a specific embodiment of the present invention, terminal is determining the corresponding image of the above-mentioned first information above-mentioned In screenshotss image after corresponding first pixel, terminal can be according to the first pixel, pre-stored pixel and position The corresponding relationship of coordinate determines the corresponding coordinate of the first pixel.
It should be noted that in an embodiment of the present invention, terminal can predefine each pixel in display screen The position coordinates of point, so as to which the corresponding relationship of each of image to be processed pixel and position coordinates is stored in advance. For example, the corresponding position coordinates of pixel A are (xA, yA), the corresponding position coordinates of pixel B are (xB, yB).
Further, in an embodiment of the present invention, corresponding first pixel of the above-mentioned first information is multiple and different What pixel was constituted, that is to say, that the corresponding image of the above-mentioned first information is made of multiple and different pixels, therefore, eventually End determines the corresponding seat of the first pixel according to the first pixel, the corresponding relationship of pre-stored pixel and position coordinates Mark is also multiple and different coordinate.
Further, in an embodiment of the present invention, terminal according to the first pixel, prestore pixel and position coordinates Corresponding relationship, after determining the corresponding coordinate of the first pixel, it is corresponding multiple and different to can recorde above-mentioned first pixel Coordinate, then by selecting the minimum value and maximum value of x in above-mentioned multiple and different coordinate, the minimum value and maximum value of y, from And can determine four boundary points in the region that the statement first information is constituted, further, terminal can will be aforementioned four Boundary point is attached, so that above-mentioned target area is constituted, to carry out at encryption to the first information in above-mentioned target area Reason.
The first image in target area is encrypted in step 104, obtains encrypted image to be processed, In, the first image is parts of images corresponding with target area in image to be processed.
In an embodiment of the present invention, first information region locating in image to be processed is being determined as target by terminal After region, the first image in the target area in above-mentioned image to be processed can be encrypted, it is final to obtain Encrypted image to be processed, wherein the first image is parts of images corresponding with target area in image to be processed.
Further, in an embodiment of the present invention, terminal can preset a variety of encryption rules, so as to it is above-mentioned to The first image in target area in processing image is encrypted.For example, terminal can be incited somebody to action by two-dimentional reversible process The pixel of the first image in above-mentioned target area is rearranged, to realize to the first figure in above-mentioned target area The encryption of picture.
It should be noted that in an embodiment of the present invention, terminal is in the target area in above-mentioned image to be processed The first image be encrypted after, the corresponding encrypted figure to be processed of above-mentioned image to be processed can be obtained Picture, specifically, in above-mentioned encrypted image to be processed, with the above-mentioned target information for prestoring target information database and matching It can not appeared in by above-mentioned encryption in above-mentioned encrypted image.
The embodiment of the invention provides a kind of image processing method, terminal and storage mediums, that is to say, that the present invention is implemented A kind of image processing method, terminal and the storage medium that example proposes can determine target in image according to target information is prestored Then region is encrypted the first image in target area according to predetermined encryption rule, to solve existing skill Screenshot capture is not handled when art screenshotss and all information is shown in sensitive information caused on screenshot capture and is let out The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment two
In an embodiment of the present invention, further, when above-mentioned information to be processed is character information, terminal can pass through Optical character identification (Optical Character Recognition, OCR) is to be processed in above-mentioned image to be processed to identify Information.Preferably, in an embodiment of the present invention, terminal can filter out the background information in image to be processed by a variety of methods Or marginal information determines the information to be processed in above-mentioned image to be processed, for example, terminal can be by above-mentioned figure to be processed As carrying out gray processing and binary conversion treatment, so that it is determined that the information to be processed in above-mentioned image to be processed.
Fig. 2 is a kind of implementation process schematic diagram two for image processing method that the embodiment of the present invention proposes, as shown in Fig. 2, Based on embodiment one, in an embodiment of the present invention, further, when above-mentioned information to be processed is character information, terminal is mentioned The method for taking the information to be processed in image to be processed may comprise steps of:
Step 102a, whole pixels corresponding to image to be processed carry out gray processing processing, obtain whole pixels pair The whole gray values answered.
In an embodiment of the present invention, terminal is after obtaining image to be processed, if terminal need to extract it is above-mentioned wait locate The character information in image is managed, then terminal first can carry out gray processing processing to above-mentioned image to be processed, to obtain above-mentioned The corresponding whole gray values of whole pixels in image to be processed.Wherein, any one pixel of above-mentioned whole pixels Gray value value range be [0,255].
Further, in an embodiment of the present invention, if above-mentioned image to be processed is color image, terminal can be with Gray processing processing is carried out to above-mentioned image to be processed by a variety of methods, for example, terminal can by component method, maximum value process, Mean value method adds or a variety of methods such as weight average method carry out gray processing processing to above-mentioned image to be processed, thus obtain it is above-mentioned to Handle the corresponding whole gray values of whole pixels in image.
Step 102b, at least one pixel that the gray value in whole pixels is greater than default gray threshold is extracted.
In an embodiment of the present invention, terminal is carrying out gray processing processing to the corresponding whole pixels of image to be processed, After obtaining the corresponding whole gray values of whole pixels, can by the corresponding whole gray values of above-mentioned whole pixels respectively and Pre-set gray threshold is compared, and is preset if be greater than in above-mentioned whole gray value there are at least one gray value Gray threshold when, terminal can determine at least one corresponding pixel of at least one above-mentioned gray value, to extract wait locate Manage information.
It should be noted that in an embodiment of the present invention, terminal is by the corresponding whole gray scales of above-mentioned whole pixels After value is compared with pre-set gray threshold respectively, it is less than or equal in advance if existed in above-mentioned whole gray value When the gray value for the gray threshold being first arranged, then terminal can be by above-mentioned less than or equal to pre-set gray threshold Gray value is updated to pre-set Luminance edge value, and then can update above-mentioned less than or equal to pre-set gray scale threshold The corresponding pixel of the gray value of value, so as to filter out the background information or marginal information in image to be processed, so as to right Information to be processed extracts.
Further, in an embodiment of the present invention, above-mentioned default gray threshold be terminal it is pre-set, for The threshold value that the corresponding whole gray values of whole pixels are split is stated, above-mentioned default Luminance edge value is that terminal is set in advance A gray value setting, for updating the corresponding whole gray values of above-mentioned whole pixels.Specifically, in implementation of the invention In example, the value of above-mentioned default gray threshold and above-mentioned default Luminance edge value can be preset according to user's operation, For example, terminal can set 100 for above-mentioned default gray threshold according to user's operation, meanwhile, terminal can be grasped according to user Make by above-mentioned default gray threshold to set 0, that is to say, that image to be processed for one, terminal can will be in the figures The gray value of pixel of the gray value less than 100 is updated to 0, thus formed a background information filtered out in image to be processed or The image of person's marginal information.
It should be noted that in an embodiment of the present invention, terminal is to less than or equal to above-mentioned default gray threshold The process that pixel is updated according to above-mentioned default Luminance edge value simultaneously can carry out above-mentioned whole pixels for terminal Parallel processing.
Step 102c, the information to be processed in the character picture of at least one pixel composition is identified.
In an embodiment of the present invention, terminal is extracting the gray value in whole pixels extremely greater than default gray threshold After a few pixel, terminal can identify the letter to be processed in the character picture that at least one above-mentioned pixel is constituted Breath.
It should be noted that terminal is corresponding in the above-mentioned gray value less than or equal to pre-set gray threshold of update Pixel after, can filter out the background information or marginal information in image to be processed, obtain in above-mentioned image to be processed Gray value meets the character picture that the pixel of above-mentioned default gray threshold is constituted, at least one as above-mentioned pixel is constituted Character picture.
Further, in an embodiment of the present invention, terminal is in the character figure for obtaining above-mentioned at least one pixel composition As after, can identify the character information in character picture that above-mentioned at least one pixel is constituted by a variety of methods, i.e., to Handle information.Such as terminal can identify the character information in the character picture of above-mentioned at least one pixel composition by OCR, To extract above-mentioned information to be processed.
According to the description above it is found that 102a~102c, terminal can be corresponding to image to be processed through the above steps Whole pixels carry out gray processing processing, obtain the corresponding whole gray values of whole pixels;It extracts in whole pixels Gray value is greater than at least one pixel of default gray threshold;Identify at least one pixel constitute character picture in Handle information;So as to effectively identify the information to be processed in image to be processed, when to solve prior art screenshotss Screenshot capture is not handled and all information is shown in the problem of target information caused on screenshot capture leaks, And then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment three
Fig. 3 is a kind of implementation process schematic diagram three for image processing method that the embodiment of the present invention proposes, as shown in figure 3, Based on embodiment one, in an embodiment of the present invention, the first image in target area is encrypted in terminal, is added The method of image to be processed after close may comprise steps of:
Step 103a, the first encryption section is determined from target area, and it is default to judge whether the first encryption section meets Encryption condition.
In an embodiment of the present invention, terminal can first determine initial encryption point in above-mentioned target area, i.e., first adds Close region, and judge whether above-mentioned first encryption section meets preset encryption condition.
Further, in an embodiment of the present invention, if the boundary of above-mentioned first encryption section and above-mentioned target area Coincidence or above-mentioned first encryption section and above-mentioned encryption section are overlapped, then terminal can consider above-mentioned first encrypted area Domain is unsatisfactory for encryption condition, and terminal then needs to reselect next region in above-mentioned target area as the first encrypted area Domain.
It should be noted that in an embodiment of the present invention, during terminal states the first encryption section in the choice, on Stating the first encryption section can generate to be random, and the corresponding pixel size in above-mentioned first encryption section can choose and be with M Unit, wherein M is the natural number more than or equal to 1.Further, in an embodiment of the present invention, in above-mentioned first encryption section The arrangement mode of M pixel be also random, for example, above-mentioned first encryption section can be arranged according to quadrangle mode Pixel, Fig. 4 is the schematic diagram that the first encryption section pixel quadrangle mode that the embodiment of the present invention proposes arranges, such as Fig. 4 institute Show, when the value of the corresponding pixel size M in the first encryption section is respectively M=1, M=2, M=3, M=4, M=5 and M= When 6, there are many case where above-mentioned first encryption section is arranged according to quadrangle mode.
Step 103b, it when the first encryption section meets predetermined encryption condition, is slightly encrypted to first according to default plus rule Corresponding second image in region is encrypted, and by the first encryption section labeled as encryption section, wherein the second image For parts of images corresponding with the first encryption section in the first image.
In an embodiment of the present invention, if above-mentioned first encryption section meets predetermined encryption condition, terminal can root Corresponding second image in above-mentioned first encryption section is encrypted according to predetermined encryption rule, and to above-mentioned first encryption After the encryption of corresponding second image in region terminates, by above-mentioned first encryption section labeled as encryption section.
It further, in an embodiment of the present invention, may include the interpolation side of pixel in above-mentioned predetermined encryption rule Method and method for folding.Specifically, in an embodiment of the present invention, above-mentioned predetermined encryption rule can be a variety of two-dimentional reversible encryptions Any one in method.For example, terminal can be encrypted above-mentioned first encryption section using regressive interpolation method, it is false It, first can be by mapping by the first encryption if the pixel size of corresponding second image in above-mentioned first encryption section is DxQ Region is stretched as the straight line of long DxQ, then image of the refolding at a new DxQ, i.e., encrypted first encryption section pair The second image answered.
Fig. 5 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram one, as shown in figure 5, if first adds There are 4 pixels, respectively pixel 1, pixel 2, pixel 3 and pixel 4 in corresponding second image in close region, such as Scheme shown in (a), then to can obtain such as figure (b) after corresponding second image in above-mentioned first encryption section progress backward interpolation Interpolation result, such as scheme (c) shown in, terminal can to figure (b) again use whirlpool folding mode, i.e., by folded interpolation with vortex Form arrangement obtains result such as figure (c), figure (c) and then carries out at encryption for terminal the second image corresponding to the first encryption section Result after reason.
Fig. 6 is that a kind of encryption method that the embodiment of the present invention proposes realizes schematic diagram two, as shown in fig. 6, if i-th is adjacent There are 4 pixels, respectively pixel 1, pixel 2, pixel 3 and pixel 4 in corresponding second image in region, such as schemes (a) shown in, then to can obtain such as figure (b) after above-mentioned i-th adjacent area corresponding second image progress backward interpolation Interpolation result is such as schemed shown in (c), and terminal can use whirlpool folding mode to figure (b) again, i.e., by folded interpolation with helicoid Formula arrangement obtains result such as figure (c), after figure (c) is then encrypted for terminal the second image corresponding to the i-th adjacent area Result.
Step 103c, when encryption section meets the decision condition for completing processing, stop the first image of processing, and generate Encrypted image to be processed.
In an embodiment of the present invention, terminal is according to default plus rule the second image slightly corresponding to the first encryption section It is encrypted, and the first encryption section can first be judged that above-mentioned encryption section is labeled as after encryption section It is no to meet the decision condition for completing processing, if above-mentioned encryption section meets the decision condition for completing processing, terminal Stop handling above-mentioned first image, then generates encrypted image to be processed.
Further, in an embodiment of the present invention, terminal can judge that above-mentioned encryption section is by a variety of methods Then the no decision condition for completing to handle that meets calculates above-mentioned target area for example, terminal can preset a proportion threshold value First area in domain, while the second area of above-mentioned encryption section is calculated, and determine above-mentioned first area and above-mentioned second face Long-pending ratio, when the ratio of above-mentioned first area and above-mentioned second area is more than or equal to aforementioned proportion threshold value, then eventually End can determine that above-mentioned encryption section meets the decision condition for completing processing.
Fig. 7 is a kind of implementation process schematic diagram four for image processing method that the embodiment of the present invention proposes, as shown in fig. 7, In an embodiment of the present invention, the method for the terminal judgement decision condition that whether encryption section has met completion processing may include Following steps:
Step 201 determines corresponding first area in target area, and according to the first area and predetermined encryption ratio, determines The corresponding encryption section lower limit value in target area.
In an embodiment of the present invention, terminal can determine the corresponding area in target area after obtaining target area, That is the first area, then terminal can determine that above-mentioned target area is corresponding according to above-mentioned first area and predetermined encryption ratio Encryption section lower limit value.
It should be noted that in an embodiment of the present invention, above-mentioned predetermined encryption can be arranged by a variety of methods in terminal Ratio can also be arranged for example, terminal can be operated according to the input of user determines above-mentioned encryption ratio according to initialization information Above-mentioned encryption ratio.
It should be noted that in an embodiment of the present invention, above-mentioned encryption ratio determines a need for continuing for terminal Above-mentioned target area is encrypted, for example, when above-mentioned encryption ratio is 80%, if terminal is to above-mentioned target area When the area being encrypted alreadys exceed the 80% of the first area, then, terminal can terminate to above-mentioned target area Encryption.
Step 202 determines the corresponding second area in encryption section, when second area is more than or equal under encryption section When limit value, determine that encryption section meets the decision condition for completing processing.
In an embodiment of the present invention, terminal is after completing to the encryption of above-mentioned first encryption section, Ke Yixian The corresponding area in above-mentioned encryption section, i.e. second area are determined, if above-mentioned second area is more than or equal to above-mentioned encryption When the lower limit value of region, then it is considered that terminal has completed the encryption to target area.
It should be noted that in an embodiment of the present invention, when above-mentioned encryption ratio is 80%, if terminal is to above-mentioned When the second area that target area is encrypted alreadys exceed the 80% of the first area, then, terminal can terminate pair The encryption of above-mentioned target area.
According to the description above it is found that 103a~103c, terminal can be determined from target area through the above steps First encryption section, and judge whether the first encryption section meets predetermined encryption condition;When the first encryption section meets default add When close condition, it is encrypted according to default plus rule the second image slightly corresponding to the first encryption section, and first is added Close zone marker is encryption section, wherein the second image is parts of images corresponding with the first encryption section in the first image; When encryption section meets the decision condition for completing processing, stop the first image of processing, and generate encrypted figure to be processed Picture;Screenshot capture is not handled when to solve prior art screenshotss and all information is shown on screenshot capture The problem of caused target information leaks, and then the privacy information in terminal is protected, effectively increase terminal Safety.
Example IV
Fig. 8 is a kind of implementation process schematic diagram five for image processing method that the embodiment of the present invention proposes, as shown in figure 8, Based on embodiment three, in an embodiment of the present invention, terminal judges whether the first encryption section meets the side of predetermined encryption condition Method may comprise steps of:
Step 301 obtains corresponding first boundary coordinate in target area.
In an embodiment of the present invention, terminal can first obtain above-mentioned target area after determining above-mentioned target area The corresponding coordinate in boundary, i.e. the first boundary coordinate, so that it is determined that the boundary of above-mentioned target area.
Step 302 obtains the corresponding the second boundary coordinate in encryption section.
In an embodiment of the present invention, terminal is after obtaining corresponding above-mentioned first boundary coordinate in above-mentioned target area, The corresponding coordinate in boundary of available encryption section, i.e. the second boundary coordinate, so that it is determined that the side of above-mentioned encryption section Boundary.
Step 303 determines the corresponding first area coordinate in the first encryption section.
In an embodiment of the present invention, after terminal states the first encryption section in the choice, it can determine that above-mentioned first adds The corresponding area coordinate in close region, i.e., above-mentioned first area coordinate, so that it is determined that the regional scope of above-mentioned first encryption section.
Step 304, when first area coordinate is within the first boundary coordinate, and first area coordinate is in the second boundary coordinate Except when, determine the first encryption section meet predetermined encryption condition.
In an embodiment of the present invention, terminal is determining corresponding first boundary coordinate in above-mentioned target area, above-mentioned respectively After the corresponding first area coordinate of the corresponding the second boundary coordinate in encryption section and above-mentioned first encryption section, if on First area coordinate is stated within above-mentioned first boundary coordinate, and above-mentioned first area coordinate is except above-mentioned the second boundary coordinate When, then terminal is it is determined that above-mentioned first encryption section meets predetermined encryption condition.
Further, in an embodiment of the present invention, if above-mentioned first encryption section above-mentioned target area range it It is interior, and above-mentioned first encryption section is not belonging within the scope of above-mentioned encryption section, then terminal can consider that above-mentioned first adds Close region meets above-mentioned predetermined encryption condition.
A kind of image processing method that the embodiment of the present invention proposes can determine mesh in image according to target information is prestored Region is marked, then the first image in target area is encrypted according to predetermined encryption rule, to solve existing Screenshot capture is not handled when technology screenshotss and all information is shown in sensitive information caused on screenshot capture The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment five
Fig. 9 is a kind of implementation process schematic diagram six for image processing method that the embodiment of the present invention proposes, as shown in figure 9, Based on embodiment three, in an embodiment of the present invention, terminal is according to predetermined encryption rule corresponding to the first encryption section Two images are encrypted, and by the first encryption section labeled as after encryption section, i.e. after step 103b, terminal into The method of row image procossing can with the following steps are included:
Step 103d, when encryption section is unsatisfactory for completing the decision condition of processing, determination is next from target area A encryption section.
In an embodiment of the present invention, terminal is according to predetermined encryption rule the second image corresponding to the first encryption section It is encrypted, and by the first encryption section labeled as after encryption section, if encryption section is unsatisfactory at completion When the decision condition of reason, then terminal can determine next encryption section from target area.
Step 103e, next encryption section is continued with, until, encryption section meets the decision condition for completing to handle, Stop the first image of processing, and generates encrypted image to be processed.
In an embodiment of the present invention, terminal can continue after determining next encryption section in target area Above-mentioned next encryption section is encrypted, until, encryption section meets the decision condition of above-mentioned completion processing, that Terminal stops handling above-mentioned first image, and generates encrypted image to be processed.
In an embodiment of the present invention, further, terminal can determination be next from target area by a variety of methods A encryption section, for example, terminal can first determine above-mentioned next encrypted area in the adjacent region in above-mentioned first encryption section Then domain determines above-mentioned next encryption section from other regions except the adjacent region in above-mentioned first encryption section again.
Specifically, in an embodiment of the present invention, terminal can be by above-mentioned first encryption section pair of above-mentioned target area An adjacent area in the whole adjacent areas answered, is determined as next encryption section, then successively adjacent to above-mentioned whole The corresponding image of each adjacent area in region is encrypted.
It should be noted that in an embodiment of the present invention, terminal is to any one in above-mentioned whole adjacent areas After adjacent area is encrypted, if it is decided that encryption section meets the decision condition for completing processing, then terminal is just It can stop handling above-mentioned first image, and generate encrypted image to be processed.
Further, in an embodiment of the present invention, when having handled the corresponding whole adjacent regions in above-mentioned first encryption section After domain, if encryption section does not meet the decision condition for completing processing, terminal can be from above-mentioned target area , in other regions except the corresponding whole adjacent areas in above-mentioned first encryption section, determine above-mentioned next encryption section.
Further, in an embodiment of the present invention, terminal can be according to the multiple and different of above-mentioned first encryption section Related direction selects the corresponding adjacent area in above-mentioned first encryption section.For example, Figure 10 is what the embodiment of the present invention proposed The schematic diagram of the adjacent area of first encryption section, as shown in Figure 10, if 9 in above-mentioned first encryption section of terminal selection A pixel is arranged according to quadrangle mode, then above-mentioned first encryption section can have 8 different related directions, Terminal can select above-mentioned first encryption section one corresponding according to 8 different related directions of above-mentioned first encryption section Adjacent area, so as to which said one adjacent area is encrypted.
According to the description above it is found that 103d~103e, terminal can ought be discontented with encryption section through the above steps When foot completes the decision condition of processing, next encryption section is determined from target area;Next encryption section is continued with, Until, encryption section meets the decision condition for completing to handle, and stops the first image of processing, and generate encrypted figure to be processed Picture;Screenshot capture is not handled when to solve prior art screenshotss and all information is shown on screenshot capture The problem of caused target information leaks, and then the privacy information in terminal is protected, effectively increase terminal Safety.
Embodiment six
Figure 11 is a kind of implementation process schematic diagram seven for image processing method that the embodiment of the present invention proposes, such as Figure 11 institute Show, is based on embodiment three, in an embodiment of the present invention, terminal is corresponding to the first encryption section according to predetermined encryption rule Second image is encrypted, and by the first encryption section labeled as after encryption section, i.e. after step 103b, terminal Carry out image procossing method can with the following steps are included:
Step 103f, the corresponding first decryption code key in the first encryption section, and setting are generated according to predetermined encryption rule The corresponding first area identifier in first encryption section, and determine corresponding first coordinate in the first encryption section.
In an embodiment of the present invention, terminal is according to predetermined encryption rule the second image corresponding to the first encryption section It is encrypted, and by the first encryption section labeled as the after encryption section, can be generated according to predetermined encryption rule The corresponding first decryption code key in one encryption section, and the corresponding first area identifier in the first encryption section of setting, and really Fixed corresponding first coordinate in first encryption section.
Further, in an embodiment of the present invention, it should be noted that in an embodiment of the present invention, terminal according to The second image in above-mentioned first encryption section is encrypted in above-mentioned predetermined encryption rule, then, terminal can root The corresponding code key in above-mentioned first encryption section, i.e., the first decryption code key are generated according to above-mentioned predetermined encryption rule.For example, terminal is to upper State the interpolation method in the predetermined encryption rule that the first image in the first encryption section is encrypted including pixel and folding Method, then, terminal according to above-mentioned predetermined encryption rule generate first decryption code key in also include corresponding interpolation method and Method for folding.
Step 103g, code key, first area identifier and the first coordinate are decrypted by first and is set as the first encryption section Corresponding encryption identification.
In an embodiment of the present invention, terminal is generating corresponding first solution in the first encryption section according to predetermined encryption rule Close code key, and the corresponding first area identifier in the first encryption section of setting, and determine the first encryption section corresponding the After one coordinate, above-mentioned first decryption code key, above-mentioned first area identifier and above-mentioned first coordinate can be set to the The corresponding encryption identification in one encryption section.
It should be noted that in an embodiment of the present invention, the corresponding encryption identification in above-mentioned first encryption section can be made It is identified for the certification of above-mentioned first encryption section, for determining whether to solve the second image in above-mentioned first encryption section Close processing.
Step 103h, encryption identification is added to and is prestored in mark array.
In an embodiment of the present invention, terminal is set by the first decryption code key, first area identifier and the first coordinate It is set to after the corresponding encryption identification in the first encryption section, above-mentioned encryption identification can be added to and be prestored in mark array.
It should be noted that in an embodiment of the present invention, it is above-mentioned prestore mark array may include prestore code key array, It prestores identifier array and prestores coordinate array.Further, in an embodiment of the present invention, terminal can respectively will be above-mentioned First decryption code key be added to it is above-mentioned prestore in code key array, above-mentioned first area identifier is added to and above-mentioned prestores identifier In array, and above-mentioned first area coordinate is added to above-mentioned prestore in coordinate array.
Further, in an embodiment of the present invention, terminal can mark above-mentioned first decryption code key, above-mentioned first area Know symbol and above-mentioned first area coordinate be stored respectively in three array corresponding positions of safety zone, it should be noted that In an embodiment of the present invention, the first decryption code key, first area identifier and first corresponding to identical encryption section Label of the area coordinate in above three array is identical.
According to the description above it is found that 103f~103h, terminal can be according to predetermined encryption rules through the above steps The corresponding first decryption code key in the first encryption section, and the corresponding first area identifier in the first encryption section of setting are generated, And determine corresponding first coordinate in the first encryption section;Code key, first area identifier and the first coordinate are decrypted by first It is set as the corresponding encryption identification in the first encryption section;Encryption identification is added to and is prestored in mark array;It is existing to solve Have and screenshot capture is not handled when technology screenshotss and all information is shown in target caused on screenshot capture and is believed The problem of breath leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment seven
Figure 12 is a kind of implementation process schematic diagram eight for image processing method that the embodiment of the present invention proposes, such as Figure 12 institute Show, be based on embodiment one, in an embodiment of the present invention, terminal according to predetermined encryption rule to the first figure in target area As being encrypted, after obtaining encrypted image to be processed, image to be processed is decrypted in terminal method It may comprise steps of:
Step 401, image to be processed after encryption display interface receive touch control operation, determined according to touch control operation plus The region to be decrypted in image to be processed after close.
In an embodiment of the present invention, in the display interface of above-mentioned encrypted image to be processed, terminal be can receive The corresponding touch control operation of above-mentioned encrypted image to be processed, then terminal can determine above-mentioned encryption according to above-mentioned touch control operation The region to be decrypted in image to be processed afterwards.
It should be noted that in an embodiment of the present invention, above-mentioned region to be decrypted can be above-mentioned encrypted wait locate The corresponding region of a part of image in image being already encrypted in reason image.
Step 402 receives the corresponding decryption instructions in region to be decrypted.
In an embodiment of the present invention, terminal determines to be decrypted in encrypted image to be processed in foundation touch control operation After region, it can receive the corresponding decryption instructions in above-mentioned region to be decrypted.
It should be noted that in an embodiment of the present invention, above-mentioned decryption instructions may include above-mentioned region pair to be decrypted The second decryption code key, the second decryption realm identifier and the second decryption coordinate answered.
Step 403, according to decryption instructions, the third image in region to be decrypted is decrypted.
In an embodiment of the present invention, terminal, can after receiving the corresponding above-mentioned decryption instructions in above-mentioned region to be decrypted According to above-mentioned decryption instructions, the third image in above-mentioned region to be decrypted to be decrypted.
Further, in an embodiment of the present invention, terminal can first from prestore mark array in extract it is above-mentioned to be decrypted The corresponding encryption identification in region, then by above-mentioned decryption instructions second decryption code key, second decryption realm identifier and Second decryption coordinate is decrypted with third decryption code key, third decryption realm identifier and the third in above-mentioned encryption identification respectively Coordinate is matched.
Further, in an embodiment of the present invention, second in above-mentioned decryption instructions is being decrypted code key, second by terminal It decrypts realm identifier and the second decryption coordinate and decrypts region with third decryption code key, the third in above-mentioned encryption identification respectively After identifier and third decryption coordinate are matched, if successful match, terminal can be to above-mentioned region to be decrypted In third image be decrypted.
Specifically, in an embodiment of the present invention, terminal can respectively from prestore decryption code key array in obtain it is above-mentioned to It decrypts the corresponding third in region and decrypts code key, obtain the corresponding third in above-mentioned region to be decrypted in identifier array from above-mentioned prestore Realm identifier, and the corresponding third area coordinate in above-mentioned region to be decrypted is obtained in coordinate array from above-mentioned prestore.
It should be noted that in an embodiment of the present invention, above-mentioned third decryption code key, third realm identifier and the Three area coordinates are that the above-mentioned band obtained after the image in above-mentioned region to be decrypted is encrypted in terminal decrypts area The corresponding decryption code key in domain, realm identifier and area coordinate.
Further, in an embodiment of the present invention, terminal can respectively by third area coordinate and second area coordinate, Third decryption code key and the second decryption code key, third realm identifier and second area identifier are compared, if third area Domain coordinate is identical with second area coordinate, third decryption code key is identical with the second decryption code key, and third realm identifier and the When two realm identifiers are identical, then terminal can be decrypted the third image in above-mentioned region to be decrypted.
Further, in an embodiment of the present invention, the third image in above-mentioned region to be decrypted is decrypted in terminal Processing on condition that meet third area coordinate identical with second area coordinate, third decryption code key and the second decryption code key phase simultaneously Together, and third realm identifier and identical three conditions of second area identifier, if any one in above three condition A condition is not able to satisfy, then terminal will not be decrypted the third image in above-mentioned region to be decrypted.
A kind of image processing method that the embodiment of the present invention proposes can determine mesh in image according to target information is prestored Region is marked, then the first image in target area is encrypted according to predetermined encryption rule, to solve existing Screenshot capture is not handled when technology screenshotss and all information is shown in sensitive information caused on screenshot capture The problem of leakage, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
Embodiment eight
Under same inventive concept based on embodiment one to embodiment seven, Figure 13 is the terminal that the embodiment of the present invention proposes Composed structure schematic diagram one, as shown in figure 13, the terminal 1 that the embodiment of the present invention proposes includes: acquiring unit 11, processing unit 12, determination unit 13 and encryption unit 14.
Acquiring unit 11 for obtaining image to be processed, and extracts the information to be processed in image to be processed.
Processing unit 12 for obtaining image to be processed in acquiring unit 11, and extracts to be processed in image to be processed After information, information to be processed is compared with target information is prestored.
Acquiring unit 11 is obtained for by information to be processed and prestoring after target information compares in processing unit 12 It obtains in image to be processed and prestores the matched first information of target information.
Determination unit 13, for obtaining in image to be processed and prestoring matched first letter of target information in acquiring unit 11 After breath, the first image in target area is encrypted.
Encryption unit 14, for first information region locating in image to be processed to be determined as mesh in determination unit 13 After marking region, the first image in target area is encrypted;Wherein, the first image be image to be processed in mesh Mark the corresponding parts of images in region.
Acquiring unit 11, for obtaining after the first image in target area is encrypted in encryption unit 14 Obtain encrypted image to be processed.
Based on above-mentioned Figure 13, Figure 14 is the composed structure schematic diagram two for the terminal that the embodiment of the present invention proposes, such as Figure 14 institute Show, the acquiring unit 11 that the embodiment of the present invention proposes includes: to obtain subelement 111 and identification subelement 112.
Processing unit 12 is also used to whole pixels corresponding to image to be processed and carries out gray processing processing.
Subelement 111 is obtained, is also used to carry out gray scale in the whole pixels corresponding to image to be processed of processing unit 12 After change processing, the corresponding whole gray values of whole pixels are obtained;And the gray value extracted in whole pixels is greater than in advance If at least one pixel of gray threshold.
Subelement 112 is identified, for obtaining the corresponding whole gray values of whole pixels in acquisition subelement 111;And It extracts the gray value in whole pixels to be greater than after at least one pixel of default gray threshold, identifies at least one pixel The information to be processed in character picture that point is constituted.
Based on above-mentioned Figure 13, Figure 15 is the composed structure schematic diagram three for the terminal that the embodiment of the present invention proposes, such as Figure 15 institute Show, the encryption unit 14 that the embodiment of the present invention proposes includes: judgment sub-unit 141, encryption sub-unit operable 142 and generation subelement 143。
Determination unit 13 is also used to determine the first encryption section from target area.
Judgment sub-unit 141, for after determining the first encryption section in target area, judging the in determination unit 13 Whether one encryption section meets predetermined encryption condition.
Encryption sub-unit operable 142, for judging whether the first encryption section meets predetermined encryption item in judgment sub-unit 141 After part, when the first encryption section meets predetermined encryption condition, according to predetermined encryption rule in the first encryption section Two images are encrypted;By the first encryption section labeled as encryption section;Wherein, the second image be the first image in The corresponding parts of images in first encryption section.
Generate subelement 143, in encryption sub-unit operable 142 according to predetermined encryption rule to the in the first encryption section Two images are encrypted;After first encryption section is labeled as encryption section, when, encryption section meets at completion When the decision condition of reason, stop the first image of processing, and generate encrypted image to be processed.
In an embodiment of the present invention, further, encryption sub-unit operable 142, it is right according to predetermined encryption rule to be specifically used for After the second image in first encryption section is encrypted, it is corresponding that the first encryption section is generated according to predetermined encryption rule The first decryption code key, and the corresponding first area identifier in the first encryption section of setting, and determine the first encryption section Corresponding first coordinate;And code key, first area identifier and the first coordinate are decrypted by first and is set as the first encrypted area The corresponding encryption identification in domain;Encryption identification is added to and is prestored in mark array.
In an embodiment of the present invention, further, it is determined that unit 13, is also used to be added according to predetermined encryption rule to first The second image in close region is encrypted, and by the first encryption section labeled as after encryption section, when having encrypted When region is unsatisfactory for completing the decision condition of processing, next encryption section is determined from target area.
Processing unit 12 is also used to continue with next encryption section, and until, encryption section meets completion processing Decision condition stops the first image of processing, and generates encrypted image to be processed.
Determination unit 13, specifically for by one in the corresponding whole adjacent areas in the first encryption section of target area Adjacent area is determined as next encryption section.
Determination unit 13 is specifically also used to after having handled the corresponding whole adjacent areas in the first encryption section, from mesh It marks in region, in other regions except the corresponding whole adjacent areas in the first encryption section, determines next encryption section.
In an embodiment of the present invention, further, acquiring unit 11, be also used to obtain encrypted image to be processed it Afterwards, the display interface of image to be processed after encryption receives touch control operation.
Determination unit 13, the display interface for being also used to the image to be processed in acquiring unit 11 after encryption receive touch-control behaviour After work, the region to be decrypted in encrypted image to be processed is determined according to touch control operation.
Acquiring unit 11, be also used to determine in determination unit 13 according to touch control operation in encrypted image to be processed to After decrypting region, the corresponding decryption instructions in region to be decrypted are received.
Encryption unit 14 is also used to that the third image in region to be decrypted is decrypted according to decryption instructions.
In an embodiment of the present invention, further, decryption instructions include region to be decrypted it is corresponding second decryption code key, Second decryption realm identifier and second decryption coordinate, encryption unit 14, specifically for from prestore mark array in extract to Decrypt the corresponding encryption identification in region;And by decryption instructions second decryption code key, second decryption realm identifier and Second decryption coordinate decrypts coordinate with third decryption code key, third decryption realm identifier and the third in encryption identification respectively It is matched;And if successful match, the third image in region to be decrypted is decrypted.
Figure 16 is the composed structure schematic diagram four for the terminal that the embodiment of the present invention proposes, in practical applications, based on implementation Under example one to the same inventive concept of embodiment seven, as shown in figure 16, terminal 1 may include processor 15, be stored with processor The memory 16 of 15 executable instructions, communication interface 17, and for connecting processor 15, memory 16 and communication interface 17 Bus 18.
In an embodiment of the present invention, acquiring unit 11, processing unit 12, determination unit 13 and encryption unit 14 By be located at terminal 1 on processor 15 realize, above-mentioned processor 15 can for application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processor (DSP, Digital Signal Processor), digital signal processing device (DSPD, Digital Signal Processing Device), programmable logic Device (PLD, ProgRAMmable Logic Device), field programmable gate array (FPGA, Field ProgRAMmable Gate Array), CPU, controller, at least one of microcontroller, microprocessor.It is to be appreciated that being set for different It is standby, can also be to be other for realizing the electronic device of above-mentioned processor function, the embodiment of the present invention is not especially limited.The end End 1 can also include memory 16, which can connect with processor 15, wherein memory 16 is for storing and can hold Line program code, the program code include computer operation instruction, and memory 13 may include high speed RAM memory, it is also possible to It further include nonvolatile memory, for example, at least two magnetic disk storages.
In an embodiment of the present invention, bus 18 for connection communication interface 17, processor 15 and memory 16 and this Being in communication with each other between a little devices.
In an embodiment of the present invention, memory 16, for storing instruction and data.
Processor 15 for obtaining image to be processed, and extracts the information to be processed in image to be processed;By letter to be processed It ceases and prestores target information and compare, obtain in image to be processed and prestore the matched first information of target information;By first Information region locating in image to be processed is determined as target area;The first image in target area is carried out at encryption Reason obtains encrypted image to be processed;Wherein, the first image is part figure corresponding with target area in image to be processed Picture.
In practical applications, above-mentioned memory 16 can be volatibility first memory (volatile memory), such as Arbitrary access first memory (RAM, Random-Access Memory);Or non-volatile first memories (non- Volatile memory), for example, read-only first memory (ROM, Read-Only Memory), quick flashing first memory (flash memory), hard disk (HDD, Hard Disk Drive) or solid state hard disk (SSD, Solid-State Drive);Or The combination of the first memory of person's mentioned kind, and instruction and data is provided to processor 15.
The embodiment of the invention provides a kind of terminals, obtain image to be processed, and extract to be processed in image to be processed Information;Information to be processed is compared with target information is prestored, obtain in image to be processed with to prestore target information matched The first information;First information region locating in image to be processed is determined as target area;To first in target area Image is encrypted, and obtains encrypted image to be processed;Wherein, the first image be image to be processed in target area Corresponding parts of images.That is, a kind of terminal that the embodiment of the present invention proposes, can determine figure according to target information is prestored Target area as in, is then encrypted the first image in target area according to predetermined encryption rule, to solve Determined the prior art screenshotss when screenshot capture is not handled and caused by all information is shown on screenshot capture The problem of sensitive information leaks, and then the privacy information in terminal is protected, effectively increase the safety of terminal.
In addition, each functional module in the present embodiment can integrate in one processing unit, it is also possible to each list Member physically exists alone, and can also be integrated in one unit with two or more units.Above-mentioned integrated unit both can be with Using formal implementation of hardware, can also be realized in the form of software function module.
If integrated unit realizes that being not intended as independent product is sold or made in the form of software function module Used time can store in a computer readable storage medium, based on this understanding, the technical solution sheet of the present embodiment The all or part of the part that contributes to existing technology or the technical solution can be with software product in other words in matter Form embodies, which is stored in a storage medium, including some instructions are used so that a meter It calculates machine equipment (can be personal computer, server or the network equipment etc.) or processor (processor) executes this implementation The all or part of the steps of example method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with Store the medium of program code.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored thereon with program, is applied in terminal, should The method such as embodiment one to embodiment seven is realized when program is executed by processor.
Specifically, the corresponding program instruction of one of the present embodiment image processing method can be stored in CD, Hard disk, on the storage mediums such as USB flash disk, when the program instruction corresponding with a kind of image processing method in storage medium is set by an electronics It is standby to read or be performed, include the following steps:
Image to be processed is obtained, and extracts the information to be processed in image to be processed;
Information to be processed is compared with target information is prestored, obtain in image to be processed with prestore target information and match The first information;
First information region locating in image to be processed is determined as target area;
The first image in target area is encrypted, encrypted image to be processed is obtained;Wherein, the first figure As being parts of images corresponding with target area in image to be processed.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the realization of equipment (system) and computer program product Flow diagram and/or block diagram describe.It should be understood that flow diagram and/or box can be realized by computer program instructions The combination of each flow and/or block in figure and the process in implementation process schematic diagram and/or block diagram and/or box. These computer program instructions be can provide to general purpose computer, special purpose computer, Embedded Processor or other programmable datas The processor of processing equipment is to generate a machine, so that passing through computer or the processor of other programmable data processing devices The instruction of execution generate for realizing in one box of implementation process schematic diagram one process or multiple processes and/or block diagrams or The device for the function of being specified in multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, The manufacture of device is enabled, which realizes in implementation process schematic diagram one process or multiple processes and/or block diagrams one The function of being specified in a box or multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction that is executed on other programmable devices provide for realizing in one process of implementation process schematic diagram or multiple processes and/or The step of function of being specified in one or more blocks of the block diagram.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (16)

1. a kind of image processing method, which is characterized in that the described method includes:
Image to be processed is obtained, and extracts the information to be processed in the image to be processed;
The information to be processed is compared with target information is prestored, obtains in the image to be processed and prestores target with described The first information of information matches;
First information region locating in the image to be processed is determined as target area;
The first image in the target area is encrypted, encrypted image to be processed is obtained;Wherein, described One image is parts of images corresponding with the target area in the image to be processed.
2. the method according to claim 1, wherein the information to be processed be character information when, the extraction Information to be processed in the image to be processed, comprising:
Whole pixels corresponding to the image to be processed carry out gray processing processing, and it is corresponding complete to obtain whole pixels Portion's gray value;
Extract at least one pixel that the gray value in whole pixels is greater than default gray threshold;
Identify the information to be processed in the character picture of at least one pixel composition.
3. the method according to claim 1, wherein first image in the target area adds Close processing obtains encrypted image to be processed, comprising:
The first encryption section is determined from the target area, and judges whether first encryption section meets predetermined encryption item Part;
When first encryption section meets the predetermined encryption condition, according to predetermined encryption rule to first encrypted area The second image in domain is encrypted, and by first encryption section labeled as encryption section;Wherein, described second Image is parts of images corresponding with first encryption section in the first image;
When satisfaction completes the decision condition of processing when the encryption section, stop processing the first image, and described in generation Encrypted image to be processed.
4. according to the method described in claim 3, it is characterized in that, it is described according to predetermined encryption rule to first encrypted area After the second image in domain is encrypted, the method also includes;
The corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule, and setting described the The corresponding first area identifier in one encryption section, and determine corresponding first coordinate in first encryption section;
First encrypted area is set by the first decryption code key, the first area identifier and first coordinate The corresponding encryption identification in domain;
The encryption identification is added to and is prestored in mark array.
5. according to the method described in claim 3, it is characterized in that, it is described according to predetermined encryption rule to first encrypted area The second image in domain is encrypted, and by first encryption section labeled as after encryption section, the method Further include:
When the encryption section is unsatisfactory for the decision condition for completing processing, determination is next from the target area Encryption section;
Next encryption section is continued with, until the encryption section meets the decision condition for completing to handle, stopping The first image is handled, and generates the encrypted image to be processed.
6. according to the method described in claim 5, it is characterized in that, described determine next encrypted area from the target area Domain, comprising:
By an adjacent area in the corresponding whole adjacent areas in first encryption section of the target area, it is determined as Next encryption section.
7. according to the method described in claim 6, it is characterized in that, described determine next encrypted area from the target area Domain, further includes:
After having handled the corresponding whole adjacent areas in first encryption section, from the target area, institute It states in other regions except the corresponding whole adjacent areas in the first encryption section, determines next encryption section.
8. the method according to claim 1, wherein it is described obtain encrypted image to be processed after, it is described Method further include:
Touch control operation is received in the display interface of the encrypted image to be processed, determines described add according to the touch control operation The region to be decrypted in image to be processed after close;
Receive the corresponding decryption instructions in the region to be decrypted;
According to the decryption instructions, the third image in the region to be decrypted is decrypted.
9. according to the method described in claim 8, it is characterized in that, the decryption instructions include that the region to be decrypted is corresponding Second decryption code key, the second decryption realm identifier and the second decryption coordinate, it is described according to the decryption instructions, to it is described to Third image in decryption region is decrypted, comprising:
The corresponding encryption identification in the region to be decrypted is extracted from prestoring in mark array;
By the second decryption code key, the second decryption realm identifier and second decryption in the decryption instructions Coordinate is carried out with third decryption code key, third decryption realm identifier and the third decryption coordinate in the encryption identification respectively Matching;
If successful match, the third image in the region to be decrypted is decrypted.
10. a kind of terminal, which is characterized in that the terminal includes: acquiring unit, and processing unit, determination unit and encryption are single Member,
The acquiring unit for obtaining image to be processed, and extracts the information to be processed in the image to be processed;
The processing unit, for comparing the information to be processed with target information is prestored;
The acquiring unit is also used to obtain in the image to be processed and prestores the matched first information of target information with described;
The determination unit, for first information region locating in the image to be processed to be determined as target area Domain;
The encryption unit, for the first image in the target area to be encrypted;Wherein, the first image For parts of images corresponding with the target area in the image to be processed;
The acquiring unit is also used to obtain encrypted image to be processed.
11. terminal according to claim 10, which is characterized in that described to obtain when the information to be processed is character information Taking unit includes: to obtain subelement and identification subelement,
The processing unit is also used to whole pixels corresponding to the image to be processed and carries out gray processing processing;
The acquisition subelement, for obtaining the corresponding whole gray values of whole pixels;And extract whole pictures Gray value in vegetarian refreshments is greater than at least one pixel of default gray threshold;
The identification subelement, the letter to be processed in character picture that at least one described pixel is constituted for identification Breath.
12. terminal according to claim 10, which is characterized in that the encryption unit, comprising: judgment sub-unit, encryption Subelement and generation subelement,
The determination unit is also used to determine the first encryption section from the target area;
The judgment sub-unit, for judging whether first encryption section meets predetermined encryption condition;
The encryption sub-unit operable, for when first encryption section meets the predetermined encryption condition, according to predetermined encryption The second image in first encryption section is encrypted in rule;First encryption section is labeled as having encrypted Region;Wherein, second image is parts of images corresponding with first encryption section in the first image;
The generation subelement, described in when the encryption section meets the decision condition for completing processing, stopping is handled First image, and generate the encrypted image to be processed;
The encryption sub-unit operable, specifically for being carried out according to predetermined encryption rule to the second image in first encryption section After encryption, the corresponding first decryption code key in first encryption section is generated according to the predetermined encryption rule, and The corresponding first area identifier in first encryption section is set, and determines that first encryption section corresponding first is sat Mark;And it sets the first decryption code key, the first area identifier and first coordinate to described first and adds The corresponding encryption identification in close region;The encryption identification is added to and is prestored in mark array.
13. terminal according to claim 12, which is characterized in that
The determination unit, be also used to it is described according to predetermined encryption rule in first encryption section the second image carry out Encryption, and by first encryption section labeled as after encryption section, when the encryption section be unsatisfactory for it is described When completing the decision condition of processing, next encryption section is determined from the target area;
The processing unit is also used to continue with next encryption section, completes until the encryption section meets The decision condition of processing stops processing the first image, and generates the encrypted image to be processed;
The determination unit, specifically for will be in the corresponding whole adjacent areas in first encryption section of the target area An adjacent area, be determined as next encryption section;
The determination unit, be specifically also used to when handle first encryption section it is corresponding it is described whole adjacent areas it Afterwards, it from the target area, in other regions except the corresponding whole adjacent areas in first encryption section, determines Next encryption section.
14. terminal according to claim 10, which is characterized in that
The acquiring unit is also used to after the encrypted image to be processed of acquisition, in the encrypted figure to be processed The display interface of picture receives touch control operation;
The determination unit is also used to determine the area to be decrypted in the encrypted image to be processed according to the touch control operation Domain;
The acquiring unit is also used to receive the corresponding decryption instructions in the region to be decrypted;
The encryption unit is also used to that the third image in the region to be decrypted is decrypted according to the decryption instructions Processing;
Wherein, the decryption instructions include the corresponding second decryption code key in the region to be decrypted, the second decryption realm identifier And second decryption coordinate,
The decryption unit, specifically for from prestore mark array in extract the corresponding encryption identification in the region to be decrypted;With And the second decryption code key, the second decryption realm identifier and second decryption in the decryption instructions are sat Mark decrypts coordinate progress with third decryption code key, third decryption realm identifier and the third in the encryption identification respectively Match;And if successful match, the third image in the region to be decrypted is decrypted.
15. a kind of terminal, which is characterized in that the terminal includes processor, is stored with depositing for the processor-executable instruction Reservoir, communication interface, and the bus for connecting the processor, the memory and the communication interface, when the finger Order is performed, and the processor performs the following operations:
The processor for obtaining image to be processed, and extracts the information to be processed in the image to be processed;Will it is described to Processing information is compared with target information is prestored, and prestores target information matched the with described in the acquisition image to be processed One information;First information region locating in the image to be processed is determined as target area;To the target area The first image in domain is encrypted, and obtains encrypted image to be processed;Wherein, the first image is described wait locate Manage parts of images corresponding with the target area in image.
16. a kind of computer readable storage medium, is stored thereon with program, it is applied in terminal, which is characterized in that described program Such as claim 1-9 described in any item methods are realized when being executed by processor.
CN201710479543.XA 2017-06-22 2017-06-22 A kind of image processing method, terminal and storage medium Pending CN109118551A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710479543.XA CN109118551A (en) 2017-06-22 2017-06-22 A kind of image processing method, terminal and storage medium
PCT/CN2018/092463 WO2018233700A1 (en) 2017-06-22 2018-06-22 Image processing method, and terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710479543.XA CN109118551A (en) 2017-06-22 2017-06-22 A kind of image processing method, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN109118551A true CN109118551A (en) 2019-01-01

Family

ID=64732741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710479543.XA Pending CN109118551A (en) 2017-06-22 2017-06-22 A kind of image processing method, terminal and storage medium

Country Status (2)

Country Link
CN (1) CN109118551A (en)
WO (1) WO2018233700A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368310A (en) * 2019-08-26 2020-07-03 杭州海康威视系统技术有限公司 Data encryption and decryption method and device, electronic equipment and storage medium
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070133792A1 (en) * 2005-09-28 2007-06-14 Keiko Utsumi Image processing apparatus, control method therefor, computer program, and computer-readable storage medium
US20100074437A1 (en) * 2007-05-31 2010-03-25 Pfu Limited Image processing system, program and method
CN106131360A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Image data sending method and device
CN106354385A (en) * 2016-08-26 2017-01-25 广东欧珀移动通信有限公司 Image processing method, device and terminal equipment
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567941A (en) * 2011-12-30 2012-07-11 无锡智科传感网技术股份有限公司 Image privacy protection processing technology
CN106210528B (en) * 2016-07-29 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of method, device and mobile terminal encrypting photo
CN106775333A (en) * 2017-02-16 2017-05-31 深圳市茁壮网络股份有限公司 A kind of screenshotss method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070133792A1 (en) * 2005-09-28 2007-06-14 Keiko Utsumi Image processing apparatus, control method therefor, computer program, and computer-readable storage medium
US20100074437A1 (en) * 2007-05-31 2010-03-25 Pfu Limited Image processing system, program and method
CN106131360A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Image data sending method and device
CN106354385A (en) * 2016-08-26 2017-01-25 广东欧珀移动通信有限公司 Image processing method, device and terminal equipment
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
翟亚宇;潘晋孝;刘宾;陈平;: "基于运动目标尺寸检测的实时图像处理与显示", no. 11 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN112035847B (en) * 2019-06-03 2023-10-27 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, electronic equipment and storage medium
CN111368310A (en) * 2019-08-26 2020-07-03 杭州海康威视系统技术有限公司 Data encryption and decryption method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2018233700A1 (en) 2018-12-27

Similar Documents

Publication Publication Date Title
TWI574197B (en) Systems and methods for gesture lock obfuscation
US10176315B2 (en) Graphical authentication
KR101556599B1 (en) Pattern Inputting Apparatus and Method, and Recording Medium Using the Same
US8904482B1 (en) Techniques for securing a one-time passcode with an alteration code
US20180165442A1 (en) Multiuser login method, device and storage medium
JP6687222B2 (en) Terminal device password unlock method, device and terminal device
Ritter et al. Miba: Multitouch image-based authentication on smartphones
CN105814575B (en) Authenticating device, Verification System, program, storage medium and authentication method
US9397992B1 (en) Authentication using color-shape pairings
US20170249450A1 (en) Device and Method for Authenticating a User
CN105303096A (en) Symbol selection for swipe based authentication
CN109118551A (en) A kind of image processing method, terminal and storage medium
CN104217153A (en) Information processing method and electronic equipment
CN106778344B (en) A kind of data permission control method and terminal
KR20150047735A (en) User Authentication Method base on User Input on the Image and Electronic Device using the same
US9613201B1 (en) Access control by a mobile device using an image
CN106022151A (en) Information transmission method and device
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
JP2014081729A (en) Information processing apparatus, information processing system, control method, and program
US10229260B1 (en) Authenticating by labeling
US10404694B2 (en) Mobile device, method of authenticating a user, computer program, article of manufacture, display
CN107450834A (en) A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium
CN115134473A (en) Image encryption method and device
CN115080946A (en) Password input method and input device
CN107784220A (en) A kind of pattern authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination