CN111259407A - Picture processing method and device, storage medium and terminal - Google Patents

Picture processing method and device, storage medium and terminal Download PDF

Info

Publication number
CN111259407A
CN111259407A CN201811466781.8A CN201811466781A CN111259407A CN 111259407 A CN111259407 A CN 111259407A CN 201811466781 A CN201811466781 A CN 201811466781A CN 111259407 A CN111259407 A CN 111259407A
Authority
CN
China
Prior art keywords
picture
processed
information
encrypting
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811466781.8A
Other languages
Chinese (zh)
Inventor
文为为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201811466781.8A priority Critical patent/CN111259407A/en
Publication of CN111259407A publication Critical patent/CN111259407A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a picture processing method, a picture processing device, a storage medium and a terminal, wherein the method comprises the following steps: identifying whether preset sensitive information exists in the picture to be processed; if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture; when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information; and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted. The scheme provided by the invention can reduce the leakage of personal information of the user and remind the user to protect the privacy safety of the user.

Description

Picture processing method and device, storage medium and terminal
Technical Field
The present invention relates to the field of picture processing, and in particular, to a picture processing method, an apparatus, a storage medium, and a terminal.
Background
In the era of such information explosion, when a user performs some financial business or needs to provide identity information, in order to save trouble and facilitate the drawing, important certificates such as an identity card, a credit investigation form, a marriage certificate, a contract and the like are directly stored in a mobile phone in a photographing mode, so that information leakage is easily caused. In such an information flooding era, personal information is very important, whether large companies or large organizations can intentionally and unintentionally collect personal information of users, and even more terrible hackers and lawless persons can steal the personal information of users for financial crimes, credit cards, balance in cards and the like, so the information protection is very important.
Disclosure of Invention
The main purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a picture processing method, an apparatus, a storage medium and a terminal, so as to solve the problem in the prior art that a user often stores important evidence in a mobile phone in a photographing manner, which is easy to cause information leakage.
One aspect of the present invention provides a method for processing an image, including: identifying whether preset sensitive information exists in the picture to be processed; if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture; when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information; and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted.
Optionally, the method further comprises: if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed; receiving confirmation information for encrypting the picture to be processed; and encrypting the picture to be processed under the condition of receiving the confirmation information for encrypting.
Optionally, the preset sensitive information includes: preset sensitive image information and/or preset sensitive character information; identifying whether preset sensitive information exists in the picture to be processed or not, wherein the identifying comprises the following steps: carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed; and/or performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
Optionally, the encrypting the picture to be processed to obtain a processed encrypted picture includes: encrypting the picture to be processed by using an AES encryption algorithm; and/or encrypting the picture to be processed by adding byte header information of the mixed password.
Optionally, receiving decryption information input by a user includes: displaying a decryption interface for decrypting the encrypted picture; and receiving decryption information input by a user on the decryption interface.
Optionally, the decryption information includes: fingerprint information, face information, iris information, character password, and pattern password.
Another aspect of the present invention provides an image processing apparatus, including: the identification unit is used for identifying whether preset sensitive information exists in the picture to be processed; the encryption unit is used for encrypting the picture to be processed to obtain a processed encrypted picture if the sensitive information exists in the picture to be processed; the first receiving unit is used for receiving an operation instruction of the encrypted picture and receiving decryption information input by a user when the operation instruction of the encrypted picture is received; the verification unit is used for verifying the decryption information when the receiving unit receives the decryption information input by a user; and the execution unit is used for decrypting the encrypted picture and executing the received operation instruction if the verification of the verification unit passes.
Optionally, the method further comprises: the display unit is used for displaying inquiry information about whether to encrypt the picture to be processed if the sensitive information exists in the picture to be processed; the receiving unit is further configured to: receiving confirmation information for encrypting the picture to be processed; and the execution unit encrypts the picture to be processed only when the receiving unit receives the confirmation information for encrypting.
Optionally, the preset sensitive information includes: preset sensitive image information and/or preset sensitive character information; the identification unit identifies whether preset sensitive information exists in the picture to be processed, and the identification unit comprises the following steps: carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed; and/or performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
Optionally, the encrypting the picture to be processed to obtain a processed encrypted picture includes: encrypting the picture to be processed by using an AES encryption algorithm; and/or encrypting the picture to be processed by adding byte header information of the mixed password.
Optionally, receiving decryption information input by a user includes: displaying a decryption interface for decrypting the encrypted picture; and receiving decryption information input by a user on the decryption interface.
Optionally, the decryption information includes: fingerprint information, face information, iris information, character password, and pattern password.
A further aspect of the invention provides a storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of any of the methods described above.
A further aspect of the invention provides a terminal comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the methods described above when executing the program.
The invention further provides a terminal comprising any one of the image processing devices.
According to the technical scheme of the invention, the picture with the sensitive information is encrypted to obtain the processed encrypted picture, and the encrypted picture is decrypted only after the decryption information input by the user is verified, so that the leakage of personal information of the user can be reduced, and the user is reminded to protect the privacy and safety of the user.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a method of processing a picture according to an embodiment of the present invention;
FIG. 2 is a schematic interface diagram showing a decryption interface for decrypting the encrypted picture according to an embodiment of the present invention;
fig. 3 is a schematic interface diagram showing query information for displaying whether to encrypt the to-be-processed picture according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a picture processing method according to another embodiment of the present invention;
FIG. 5 is a schematic structural diagram of an embodiment of a picture processing apparatus according to the present invention;
fig. 6 is a schematic structural diagram of another embodiment of a picture processing apparatus according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a schematic method diagram of an embodiment of a picture processing method according to the present invention. The method can be executed in a terminal, and the terminal can be a mobile terminal, such as a mobile phone, a tablet computer and the like.
As shown in fig. 1, according to an embodiment of the present invention, the picture processing method includes at least step S110, step S140, step S150, and step S160.
Step S110, identifying whether there is preset sensitive information in the picture to be processed.
Specifically, the picture to be processed may be a picture taken by a terminal camera, for example, in a bottom layer processing logic of camera shooting, a thread pool (mainly depending on a library of opencv vision processing) of a picture recognition technology is started, and picture data processed at the bottom layer is transmitted to the thread for sensitive information recognition. The preset sensitive information may specifically include preset sensitive image information and/or preset sensitive text information; the preset sensitive image information, for example, includes a specific mark and a pattern on the document, such as a national logo pattern on an identity card, a bank card logo, and the like, and can collect a mark picture on a common document as comparison information. And identifying whether preset sensitive image information exists in the picture to be processed or not by carrying out picture identification on the picture to be processed.
And the preset sensitive text information is keywords such as an identity card, a social security card, a driving license, an xx bank and the like. And identifying whether preset sensitive character information exists in the picture to be processed or not by carrying out character identification on the picture to be processed. For example, whether keywords such as an identity card, a bank, a driving license and the like exist in the picture to be processed is recognized through an OCR recognition technology.
Step S140, if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture.
Specifically, the to-be-processed picture is encrypted, that is, the to-be-processed picture generation bytecode is written into file header information in the picture bytecode, and a file is regenerated. In a specific embodiment, the AES encryption algorithm is used to encrypt the picture to be processed, the picture is stored by an encryption stream, a blur effect image of the picture is generated after header information is added, and the blur effect image of the picture is displayed when an operation instruction (for example, preview, view, edit, etc.) of the picture to be processed is received; in another specific embodiment, the to-be-processed picture is encrypted by adding the byte header information of the mixed password, that is, the byte header information of the mixed password is added when the picture is stored, so that the file can be ensured not to be previewed, the encryption effect is achieved, and the byte header information is removed according to the same rule during decryption.
And step S150, receiving decryption information input by a user when an operation instruction for the encrypted picture is received, and verifying the decryption information.
Specifically, the operation instruction includes: at least one of view, share, edit. In a specific embodiment, a decryption interface for decrypting the encrypted picture is displayed; and receiving decryption information input by a user at the decryption interface. The decryption information may specifically include at least one of fingerprint information, face information, iris information, a character password, and a pattern password. For example, referring to fig. 2, when the user views the encrypted picture, a decryption interface prompting the user to perform fingerprint verification is displayed (for example, the interface displays prompting information of "verify fingerprint viewing or share picture"), and after receiving the fingerprint information input by the user (for example, the user inputs a fingerprint in a fingerprint input area of the terminal), the received fingerprint information is verified. For another example, a decryption interface for prompting the user to verify the digital password is displayed, and the received digital password is verified when the digital password input by the user is received.
Step S160, if the verification passes, the received operation instruction is executed after the encrypted picture is decrypted.
For example, when the operation instruction is a viewing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and when the operation instruction is a sharing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and at the same time, a sharing interface is displayed, so that the decrypted picture is shared according to a sharing mode and a sharing object selected by a user on the sharing interface.
Fig. 4 is a schematic method diagram of another embodiment of the picture processing method provided by the present invention. As shown in fig. 4, based on the above embodiment, the picture processing method further includes step S120 and step S130.
Step S120, if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed.
Step S130, receiving confirmation information for performing encryption processing on the picture to be processed.
Specifically, if the sensitive information is identified to exist in the picture to be processed, query information for whether to encrypt the picture to be processed is displayed, and the picture to be processed is encrypted only when confirmation information for encrypting the picture to be processed is received. And if the confirmation information for encrypting the picture to be processed is not received, the picture to be processed is not encrypted. Optionally, query information on whether to delete the to-be-processed picture may be displayed, and if confirmation information for deleting the to-be-processed picture is received, the to-be-processed picture is deleted.
For example, referring to fig. 3, if it is recognized that the to-be-processed picture has sensitive information, an "encrypt photo" option and a "delete" option are displayed, and the user is prompted to "the sensitive information, and do not need to remain in the mobile phone.
Fig. 5 is a schematic structural diagram of an embodiment of a picture processing apparatus according to the present invention. As shown in fig. 5, the picture processing apparatus 100 includes: an identification unit 110, an encryption unit 130, a receiving unit 140, an authentication unit 150, and an execution unit 160.
The identifying unit 110 is configured to identify whether preset sensitive information exists in the picture to be processed; the encryption unit 120 is configured to, if the identification unit 110 identifies that the sensitive information exists in the picture to be processed, encrypt the picture to be processed to obtain a processed encrypted picture; the receiving unit 130 is configured to receive an operation instruction on the encrypted picture, and when the operation instruction on the encrypted picture is received, receive decryption information input by a user; the verification unit 140 is configured to verify the decryption information when the decryption information input by the user is received by the receiving unit; the execution unit 150 is configured to decrypt the encrypted picture and execute the received operation instruction if the verification by the verification unit passes.
The identification unit 110 identifies whether preset sensitive information exists in the picture to be processed. Specifically, the picture to be processed may be a picture taken by a terminal camera, for example, in a bottom layer processing logic of camera shooting, a thread pool (mainly depending on a library of opencv vision processing) of a picture recognition technology is started, and picture data processed at the bottom layer is transmitted to the thread for sensitive information recognition. The preset sensitive information may specifically include preset sensitive image information and/or preset sensitive text information; the preset sensitive image information, for example, includes a specific mark and a pattern on the document, such as a national logo pattern on an identity card, a bank card logo, and the like, and can collect a mark picture on a common document as comparison information. The identification unit 110 identifies whether preset sensitive image information exists in the picture to be processed by performing picture identification on the picture to be processed.
And the preset sensitive text information is keywords such as an identity card, a social security card, a driving license, an xx bank and the like. The identification unit 110 identifies whether the to-be-processed picture has preset sensitive text information by performing text identification on the to-be-processed picture. For example, whether keywords such as an identity card, a bank, a driving license and the like exist in the picture to be processed is recognized through an OCR recognition technology.
If the identification unit 110 identifies that the sensitive information exists in the picture to be processed, the encryption unit 120 encrypts the picture to be processed to obtain a processed encrypted picture.
Specifically, the to-be-processed picture is encrypted, that is, the to-be-processed picture generation bytecode is written into file header information in the picture bytecode, and a file is regenerated. In a specific embodiment, the encryption unit 120 encrypts the picture to be processed by using an AES encryption algorithm, stores the picture by using an encryption stream, and generates a blur effect map of the picture after adding header information to obtain an encrypted picture; when an operation instruction (such as preview, viewing, editing and the like) of a picture to be processed is received, a fuzzy effect picture of the picture is displayed; in another specific embodiment, the encryption unit 120 encrypts the to-be-processed picture by adding the byte header information of the mixed password, that is, adding the byte header information of the mixed password when storing the picture, so that the file can be ensured not to be previewed, the encryption effect is achieved, and the byte header information is removed according to the same rule when decrypting.
The receiving unit 130 receives an operation instruction on the encrypted picture, and when receiving the operation instruction on the encrypted picture, receives decryption information input by a user, and when the receiving unit 130 receives the decryption information input by the user, the verifying unit 140 verifies the decryption information. Specifically, the operation instruction includes: at least one of view, share, edit. In a specific embodiment, a decryption interface for decrypting the encrypted picture is displayed; the receiving unit 130 receives the decryption information input by the user at the decryption interface. The decryption information may specifically include at least one of fingerprint information, face information, iris information, a character password, and a pattern password. For example, referring to fig. 2, when the user views the encrypted picture, a decryption interface prompting the user to perform fingerprint verification is displayed (for example, the interface displays prompting information of "verify fingerprint viewing or share picture"), and after receiving the fingerprint information input by the user (for example, the user inputs a fingerprint in a fingerprint input area of the terminal), the verification unit 140 verifies the received fingerprint information. For another example, a decryption interface for prompting the user to verify the digital password is displayed, and the received digital password is verified when the digital password input by the user is received. If the verification of the verification unit 140 passes, the execution unit 150 decrypts the encrypted picture and then executes the received operation instruction.
For example, when the operation instruction is a viewing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and when the operation instruction is a sharing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and at the same time, a sharing interface is displayed, so that the decrypted picture is shared according to a sharing mode and a sharing object selected by a user on the sharing interface.
Fig. 6 is a schematic structural diagram of another embodiment of a picture processing apparatus according to the present invention. As shown in fig. 6, the picture processing apparatus 100 further includes a display unit 120.
The display unit 120 is configured to display inquiry information about whether to encrypt the to-be-processed picture if the identification unit 110 identifies that the to-be-processed picture contains the sensitive information; the receiving unit 140 is further configured to receive confirmation information for performing encryption processing on the picture to be processed; the executing unit 160 encrypts the to-be-processed picture only when the receiving unit 140 receives the confirmation information for encrypting.
Specifically, if the identification unit 110 identifies that the sensitive information exists in the picture to be processed, the display unit 120 displays inquiry information on whether to encrypt the picture to be processed, the receiving unit 140 receives confirmation information on encrypting the picture to be processed, and the encryption unit 130 encrypts the picture to be processed only when the receiving unit 140 receives the confirmation information on encrypting the picture to be processed. If the receiving unit 140 does not receive the confirmation information for encrypting the to-be-processed picture, the encrypting unit 130 does not encrypt the to-be-processed picture. Optionally, the display unit 120 may further display query information on whether to delete the to-be-processed picture, and if the receiving unit 140 receives confirmation information on deleting the to-be-processed picture, delete the to-be-processed picture.
For example, referring to fig. 3, if it is recognized that the to-be-processed picture has sensitive information, an "encrypt photo" option and a "delete" option are displayed, and the user is prompted to "the sensitive information, and do not need to remain in the mobile phone.
The invention also provides a storage medium corresponding to the picture processing method, on which a computer program is stored, which program, when executed by a processor, implements the steps of any of the methods described above.
The invention also provides a terminal corresponding to the picture processing method, which comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of any one of the methods.
The invention also provides a terminal corresponding to the image processing device, which comprises any one of the image processing devices.
Therefore, according to the scheme provided by the invention, the picture with the sensitive information is encrypted to obtain the processed encrypted picture, and the encrypted picture is decrypted after the decryption information input by the user is verified, so that the leakage of personal information of the user can be reduced, and the user is reminded to protect the privacy safety.
The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the invention and the following claims. For example, due to the nature of software, the functions described above may be implemented using software executed by a processor, hardware, firmware, hardwired, or a combination of any of these. In addition, each functional unit may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and the parts serving as the control device may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above description is only an example of the present invention, and is not intended to limit the present invention, and it is obvious to those skilled in the art that various modifications and variations can be made in the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (15)

1. An image processing method, comprising:
identifying whether preset sensitive information exists in the picture to be processed;
if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture;
when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information;
and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted.
2. The method of claim 1, further comprising:
if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed;
receiving confirmation information for encrypting the picture to be processed;
and encrypting the picture to be processed under the condition of receiving the confirmation information for encrypting.
3. The method according to claim 1 or 2, wherein the preset sensitive information comprises: preset sensitive image information and/or preset sensitive character information; identifying whether preset sensitive information exists in the picture to be processed or not, wherein the identifying comprises the following steps:
carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed;
and/or the presence of a gas in the gas,
and performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
4. The method according to any one of claims 1 to 3, wherein the encrypting the picture to be processed to obtain the processed encrypted picture comprises:
encrypting the picture to be processed by using an AES encryption algorithm; and/or the presence of a gas in the gas,
and encrypting the picture to be processed by adding byte header information of the mixed password.
5. The method of any one of claims 1-4, wherein receiving user-entered decryption information comprises:
displaying a decryption interface for decrypting the encrypted picture;
and receiving decryption information input by a user on the decryption interface.
6. The method according to any of claims 1-5, wherein said decryption information comprises: fingerprint information, face information, iris information, character password, and pattern password.
7. A picture processing apparatus, comprising:
the identification unit is used for identifying whether preset sensitive information exists in the picture to be processed;
the encryption unit is used for encrypting the picture to be processed to obtain a processed encrypted picture if the sensitive information exists in the picture to be processed;
the first receiving unit is used for receiving an operation instruction of the encrypted picture and receiving decryption information input by a user when the operation instruction of the encrypted picture is received;
the verification unit is used for verifying the decryption information when the receiving unit receives the decryption information input by a user;
and the execution unit is used for decrypting the encrypted picture and executing the received operation instruction if the verification of the verification unit passes.
8. The apparatus of claim 7, further comprising:
the display unit is used for displaying inquiry information about whether to encrypt the picture to be processed if the sensitive information exists in the picture to be processed;
the receiving unit is further configured to: receiving confirmation information for encrypting the picture to be processed;
and the execution unit encrypts the picture to be processed only when the receiving unit receives the confirmation information for encrypting.
9. The apparatus according to claim 7 or 8, wherein the preset sensitive information comprises: preset sensitive image information and/or preset sensitive character information; the identification unit identifies whether preset sensitive information exists in the picture to be processed, and the identification unit comprises the following steps:
carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed;
and/or the presence of a gas in the gas,
and performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
10. The apparatus according to any one of claims 7-9, wherein the encrypting the picture to be processed to obtain the processed encrypted picture comprises:
encrypting the picture to be processed by using an AES encryption algorithm; and/or the presence of a gas in the gas,
and encrypting the picture to be processed by adding byte header information of the mixed password.
11. The apparatus according to any one of claims 7-10, wherein receiving decryption information input by a user comprises:
displaying a decryption interface for decrypting the encrypted picture;
and receiving decryption information input by a user on the decryption interface.
12. The apparatus according to any one of claims 7-11, wherein the decryption information comprises: fingerprint information, face information, iris information, character password, and pattern password.
13. A storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
14. A terminal comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any of claims 1-6 when executing the program.
15. A terminal characterized by comprising a picture processing apparatus according to any one of claims 7 to 12.
CN201811466781.8A 2018-12-03 2018-12-03 Picture processing method and device, storage medium and terminal Pending CN111259407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811466781.8A CN111259407A (en) 2018-12-03 2018-12-03 Picture processing method and device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811466781.8A CN111259407A (en) 2018-12-03 2018-12-03 Picture processing method and device, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN111259407A true CN111259407A (en) 2020-06-09

Family

ID=70944923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811466781.8A Pending CN111259407A (en) 2018-12-03 2018-12-03 Picture processing method and device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN111259407A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536374A (en) * 2021-07-15 2021-10-22 荣耀终端有限公司 Image privacy protection method and electronic equipment
CN113961125A (en) * 2021-10-21 2022-01-21 平安普惠企业管理有限公司 Image sharing method and device, terminal equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942469A (en) * 2014-04-14 2014-07-23 小米科技有限责任公司 Picture processing method, device and terminal
CN108647262A (en) * 2018-04-27 2018-10-12 平安科技(深圳)有限公司 A kind of picture management method, device, computer equipment and storage medium
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942469A (en) * 2014-04-14 2014-07-23 小米科技有限责任公司 Picture processing method, device and terminal
CN108647262A (en) * 2018-04-27 2018-10-12 平安科技(深圳)有限公司 A kind of picture management method, device, computer equipment and storage medium
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536374A (en) * 2021-07-15 2021-10-22 荣耀终端有限公司 Image privacy protection method and electronic equipment
CN113961125A (en) * 2021-10-21 2022-01-21 平安普惠企业管理有限公司 Image sharing method and device, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
US11223948B2 (en) Anonymous authentication and remote wireless token access
CN110798315B (en) Data processing method and device based on block chain and terminal
US8918633B2 (en) Information processing device, information processing system, and program
CN111047313B (en) Code scanning payment, information sending and key management method, device and equipment
CN104573551A (en) File processing method and mobile terminal
WO2017113790A1 (en) Method for implementing code-scan bluetooth automatic connection, master device, slave device, and system
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN108880791A (en) Cryptographic key protection method, terminal and computer readable storage medium
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN103559451A (en) Method and device for protecting and displaying privacy information
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN111242611B (en) Method and system for recovering digital wallet key
CN105335642A (en) Processing method and processing system of pictures
CN114730337A (en) Cryptographic key management
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
US20170329995A1 (en) Anti-replay techniques using secure external non-volatile memory
CN102867157A (en) Mobile terminal and data protecting method
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
US11928680B2 (en) Techniques for processing pin-inclusive transactions in connection with an electronic device
CN103973646A (en) Method, client device and system for storing services by aid of public cloud
KR102414910B1 (en) Apparatus and method for securing document information
CN111259407A (en) Picture processing method and device, storage medium and terminal
CN113343254B (en) Method, device, medium and electronic equipment for encrypting and decrypting warranty based on OFD format

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609

RJ01 Rejection of invention patent application after publication