CN111259407A - Picture processing method and device, storage medium and terminal - Google Patents
Picture processing method and device, storage medium and terminal Download PDFInfo
- Publication number
- CN111259407A CN111259407A CN201811466781.8A CN201811466781A CN111259407A CN 111259407 A CN111259407 A CN 111259407A CN 201811466781 A CN201811466781 A CN 201811466781A CN 111259407 A CN111259407 A CN 111259407A
- Authority
- CN
- China
- Prior art keywords
- picture
- processed
- information
- encrypting
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 13
- 238000000034 method Methods 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 23
- 238000012795 verification Methods 0.000 claims abstract description 22
- 238000012790 confirmation Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a picture processing method, a picture processing device, a storage medium and a terminal, wherein the method comprises the following steps: identifying whether preset sensitive information exists in the picture to be processed; if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture; when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information; and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted. The scheme provided by the invention can reduce the leakage of personal information of the user and remind the user to protect the privacy safety of the user.
Description
Technical Field
The present invention relates to the field of picture processing, and in particular, to a picture processing method, an apparatus, a storage medium, and a terminal.
Background
In the era of such information explosion, when a user performs some financial business or needs to provide identity information, in order to save trouble and facilitate the drawing, important certificates such as an identity card, a credit investigation form, a marriage certificate, a contract and the like are directly stored in a mobile phone in a photographing mode, so that information leakage is easily caused. In such an information flooding era, personal information is very important, whether large companies or large organizations can intentionally and unintentionally collect personal information of users, and even more terrible hackers and lawless persons can steal the personal information of users for financial crimes, credit cards, balance in cards and the like, so the information protection is very important.
Disclosure of Invention
The main purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a picture processing method, an apparatus, a storage medium and a terminal, so as to solve the problem in the prior art that a user often stores important evidence in a mobile phone in a photographing manner, which is easy to cause information leakage.
One aspect of the present invention provides a method for processing an image, including: identifying whether preset sensitive information exists in the picture to be processed; if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture; when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information; and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted.
Optionally, the method further comprises: if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed; receiving confirmation information for encrypting the picture to be processed; and encrypting the picture to be processed under the condition of receiving the confirmation information for encrypting.
Optionally, the preset sensitive information includes: preset sensitive image information and/or preset sensitive character information; identifying whether preset sensitive information exists in the picture to be processed or not, wherein the identifying comprises the following steps: carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed; and/or performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
Optionally, the encrypting the picture to be processed to obtain a processed encrypted picture includes: encrypting the picture to be processed by using an AES encryption algorithm; and/or encrypting the picture to be processed by adding byte header information of the mixed password.
Optionally, receiving decryption information input by a user includes: displaying a decryption interface for decrypting the encrypted picture; and receiving decryption information input by a user on the decryption interface.
Optionally, the decryption information includes: fingerprint information, face information, iris information, character password, and pattern password.
Another aspect of the present invention provides an image processing apparatus, including: the identification unit is used for identifying whether preset sensitive information exists in the picture to be processed; the encryption unit is used for encrypting the picture to be processed to obtain a processed encrypted picture if the sensitive information exists in the picture to be processed; the first receiving unit is used for receiving an operation instruction of the encrypted picture and receiving decryption information input by a user when the operation instruction of the encrypted picture is received; the verification unit is used for verifying the decryption information when the receiving unit receives the decryption information input by a user; and the execution unit is used for decrypting the encrypted picture and executing the received operation instruction if the verification of the verification unit passes.
Optionally, the method further comprises: the display unit is used for displaying inquiry information about whether to encrypt the picture to be processed if the sensitive information exists in the picture to be processed; the receiving unit is further configured to: receiving confirmation information for encrypting the picture to be processed; and the execution unit encrypts the picture to be processed only when the receiving unit receives the confirmation information for encrypting.
Optionally, the preset sensitive information includes: preset sensitive image information and/or preset sensitive character information; the identification unit identifies whether preset sensitive information exists in the picture to be processed, and the identification unit comprises the following steps: carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed; and/or performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
Optionally, the encrypting the picture to be processed to obtain a processed encrypted picture includes: encrypting the picture to be processed by using an AES encryption algorithm; and/or encrypting the picture to be processed by adding byte header information of the mixed password.
Optionally, receiving decryption information input by a user includes: displaying a decryption interface for decrypting the encrypted picture; and receiving decryption information input by a user on the decryption interface.
Optionally, the decryption information includes: fingerprint information, face information, iris information, character password, and pattern password.
A further aspect of the invention provides a storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of any of the methods described above.
A further aspect of the invention provides a terminal comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the methods described above when executing the program.
The invention further provides a terminal comprising any one of the image processing devices.
According to the technical scheme of the invention, the picture with the sensitive information is encrypted to obtain the processed encrypted picture, and the encrypted picture is decrypted only after the decryption information input by the user is verified, so that the leakage of personal information of the user can be reduced, and the user is reminded to protect the privacy and safety of the user.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a method of processing a picture according to an embodiment of the present invention;
FIG. 2 is a schematic interface diagram showing a decryption interface for decrypting the encrypted picture according to an embodiment of the present invention;
fig. 3 is a schematic interface diagram showing query information for displaying whether to encrypt the to-be-processed picture according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a picture processing method according to another embodiment of the present invention;
FIG. 5 is a schematic structural diagram of an embodiment of a picture processing apparatus according to the present invention;
fig. 6 is a schematic structural diagram of another embodiment of a picture processing apparatus according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a schematic method diagram of an embodiment of a picture processing method according to the present invention. The method can be executed in a terminal, and the terminal can be a mobile terminal, such as a mobile phone, a tablet computer and the like.
As shown in fig. 1, according to an embodiment of the present invention, the picture processing method includes at least step S110, step S140, step S150, and step S160.
Step S110, identifying whether there is preset sensitive information in the picture to be processed.
Specifically, the picture to be processed may be a picture taken by a terminal camera, for example, in a bottom layer processing logic of camera shooting, a thread pool (mainly depending on a library of opencv vision processing) of a picture recognition technology is started, and picture data processed at the bottom layer is transmitted to the thread for sensitive information recognition. The preset sensitive information may specifically include preset sensitive image information and/or preset sensitive text information; the preset sensitive image information, for example, includes a specific mark and a pattern on the document, such as a national logo pattern on an identity card, a bank card logo, and the like, and can collect a mark picture on a common document as comparison information. And identifying whether preset sensitive image information exists in the picture to be processed or not by carrying out picture identification on the picture to be processed.
And the preset sensitive text information is keywords such as an identity card, a social security card, a driving license, an xx bank and the like. And identifying whether preset sensitive character information exists in the picture to be processed or not by carrying out character identification on the picture to be processed. For example, whether keywords such as an identity card, a bank, a driving license and the like exist in the picture to be processed is recognized through an OCR recognition technology.
Step S140, if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture.
Specifically, the to-be-processed picture is encrypted, that is, the to-be-processed picture generation bytecode is written into file header information in the picture bytecode, and a file is regenerated. In a specific embodiment, the AES encryption algorithm is used to encrypt the picture to be processed, the picture is stored by an encryption stream, a blur effect image of the picture is generated after header information is added, and the blur effect image of the picture is displayed when an operation instruction (for example, preview, view, edit, etc.) of the picture to be processed is received; in another specific embodiment, the to-be-processed picture is encrypted by adding the byte header information of the mixed password, that is, the byte header information of the mixed password is added when the picture is stored, so that the file can be ensured not to be previewed, the encryption effect is achieved, and the byte header information is removed according to the same rule during decryption.
And step S150, receiving decryption information input by a user when an operation instruction for the encrypted picture is received, and verifying the decryption information.
Specifically, the operation instruction includes: at least one of view, share, edit. In a specific embodiment, a decryption interface for decrypting the encrypted picture is displayed; and receiving decryption information input by a user at the decryption interface. The decryption information may specifically include at least one of fingerprint information, face information, iris information, a character password, and a pattern password. For example, referring to fig. 2, when the user views the encrypted picture, a decryption interface prompting the user to perform fingerprint verification is displayed (for example, the interface displays prompting information of "verify fingerprint viewing or share picture"), and after receiving the fingerprint information input by the user (for example, the user inputs a fingerprint in a fingerprint input area of the terminal), the received fingerprint information is verified. For another example, a decryption interface for prompting the user to verify the digital password is displayed, and the received digital password is verified when the digital password input by the user is received.
Step S160, if the verification passes, the received operation instruction is executed after the encrypted picture is decrypted.
For example, when the operation instruction is a viewing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and when the operation instruction is a sharing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and at the same time, a sharing interface is displayed, so that the decrypted picture is shared according to a sharing mode and a sharing object selected by a user on the sharing interface.
Fig. 4 is a schematic method diagram of another embodiment of the picture processing method provided by the present invention. As shown in fig. 4, based on the above embodiment, the picture processing method further includes step S120 and step S130.
Step S120, if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed.
Step S130, receiving confirmation information for performing encryption processing on the picture to be processed.
Specifically, if the sensitive information is identified to exist in the picture to be processed, query information for whether to encrypt the picture to be processed is displayed, and the picture to be processed is encrypted only when confirmation information for encrypting the picture to be processed is received. And if the confirmation information for encrypting the picture to be processed is not received, the picture to be processed is not encrypted. Optionally, query information on whether to delete the to-be-processed picture may be displayed, and if confirmation information for deleting the to-be-processed picture is received, the to-be-processed picture is deleted.
For example, referring to fig. 3, if it is recognized that the to-be-processed picture has sensitive information, an "encrypt photo" option and a "delete" option are displayed, and the user is prompted to "the sensitive information, and do not need to remain in the mobile phone.
Fig. 5 is a schematic structural diagram of an embodiment of a picture processing apparatus according to the present invention. As shown in fig. 5, the picture processing apparatus 100 includes: an identification unit 110, an encryption unit 130, a receiving unit 140, an authentication unit 150, and an execution unit 160.
The identifying unit 110 is configured to identify whether preset sensitive information exists in the picture to be processed; the encryption unit 120 is configured to, if the identification unit 110 identifies that the sensitive information exists in the picture to be processed, encrypt the picture to be processed to obtain a processed encrypted picture; the receiving unit 130 is configured to receive an operation instruction on the encrypted picture, and when the operation instruction on the encrypted picture is received, receive decryption information input by a user; the verification unit 140 is configured to verify the decryption information when the decryption information input by the user is received by the receiving unit; the execution unit 150 is configured to decrypt the encrypted picture and execute the received operation instruction if the verification by the verification unit passes.
The identification unit 110 identifies whether preset sensitive information exists in the picture to be processed. Specifically, the picture to be processed may be a picture taken by a terminal camera, for example, in a bottom layer processing logic of camera shooting, a thread pool (mainly depending on a library of opencv vision processing) of a picture recognition technology is started, and picture data processed at the bottom layer is transmitted to the thread for sensitive information recognition. The preset sensitive information may specifically include preset sensitive image information and/or preset sensitive text information; the preset sensitive image information, for example, includes a specific mark and a pattern on the document, such as a national logo pattern on an identity card, a bank card logo, and the like, and can collect a mark picture on a common document as comparison information. The identification unit 110 identifies whether preset sensitive image information exists in the picture to be processed by performing picture identification on the picture to be processed.
And the preset sensitive text information is keywords such as an identity card, a social security card, a driving license, an xx bank and the like. The identification unit 110 identifies whether the to-be-processed picture has preset sensitive text information by performing text identification on the to-be-processed picture. For example, whether keywords such as an identity card, a bank, a driving license and the like exist in the picture to be processed is recognized through an OCR recognition technology.
If the identification unit 110 identifies that the sensitive information exists in the picture to be processed, the encryption unit 120 encrypts the picture to be processed to obtain a processed encrypted picture.
Specifically, the to-be-processed picture is encrypted, that is, the to-be-processed picture generation bytecode is written into file header information in the picture bytecode, and a file is regenerated. In a specific embodiment, the encryption unit 120 encrypts the picture to be processed by using an AES encryption algorithm, stores the picture by using an encryption stream, and generates a blur effect map of the picture after adding header information to obtain an encrypted picture; when an operation instruction (such as preview, viewing, editing and the like) of a picture to be processed is received, a fuzzy effect picture of the picture is displayed; in another specific embodiment, the encryption unit 120 encrypts the to-be-processed picture by adding the byte header information of the mixed password, that is, adding the byte header information of the mixed password when storing the picture, so that the file can be ensured not to be previewed, the encryption effect is achieved, and the byte header information is removed according to the same rule when decrypting.
The receiving unit 130 receives an operation instruction on the encrypted picture, and when receiving the operation instruction on the encrypted picture, receives decryption information input by a user, and when the receiving unit 130 receives the decryption information input by the user, the verifying unit 140 verifies the decryption information. Specifically, the operation instruction includes: at least one of view, share, edit. In a specific embodiment, a decryption interface for decrypting the encrypted picture is displayed; the receiving unit 130 receives the decryption information input by the user at the decryption interface. The decryption information may specifically include at least one of fingerprint information, face information, iris information, a character password, and a pattern password. For example, referring to fig. 2, when the user views the encrypted picture, a decryption interface prompting the user to perform fingerprint verification is displayed (for example, the interface displays prompting information of "verify fingerprint viewing or share picture"), and after receiving the fingerprint information input by the user (for example, the user inputs a fingerprint in a fingerprint input area of the terminal), the verification unit 140 verifies the received fingerprint information. For another example, a decryption interface for prompting the user to verify the digital password is displayed, and the received digital password is verified when the digital password input by the user is received. If the verification of the verification unit 140 passes, the execution unit 150 decrypts the encrypted picture and then executes the received operation instruction.
For example, when the operation instruction is a viewing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and when the operation instruction is a sharing instruction, if the verification is passed, the encrypted picture is decrypted and displayed, and at the same time, a sharing interface is displayed, so that the decrypted picture is shared according to a sharing mode and a sharing object selected by a user on the sharing interface.
Fig. 6 is a schematic structural diagram of another embodiment of a picture processing apparatus according to the present invention. As shown in fig. 6, the picture processing apparatus 100 further includes a display unit 120.
The display unit 120 is configured to display inquiry information about whether to encrypt the to-be-processed picture if the identification unit 110 identifies that the to-be-processed picture contains the sensitive information; the receiving unit 140 is further configured to receive confirmation information for performing encryption processing on the picture to be processed; the executing unit 160 encrypts the to-be-processed picture only when the receiving unit 140 receives the confirmation information for encrypting.
Specifically, if the identification unit 110 identifies that the sensitive information exists in the picture to be processed, the display unit 120 displays inquiry information on whether to encrypt the picture to be processed, the receiving unit 140 receives confirmation information on encrypting the picture to be processed, and the encryption unit 130 encrypts the picture to be processed only when the receiving unit 140 receives the confirmation information on encrypting the picture to be processed. If the receiving unit 140 does not receive the confirmation information for encrypting the to-be-processed picture, the encrypting unit 130 does not encrypt the to-be-processed picture. Optionally, the display unit 120 may further display query information on whether to delete the to-be-processed picture, and if the receiving unit 140 receives confirmation information on deleting the to-be-processed picture, delete the to-be-processed picture.
For example, referring to fig. 3, if it is recognized that the to-be-processed picture has sensitive information, an "encrypt photo" option and a "delete" option are displayed, and the user is prompted to "the sensitive information, and do not need to remain in the mobile phone.
The invention also provides a storage medium corresponding to the picture processing method, on which a computer program is stored, which program, when executed by a processor, implements the steps of any of the methods described above.
The invention also provides a terminal corresponding to the picture processing method, which comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of any one of the methods.
The invention also provides a terminal corresponding to the image processing device, which comprises any one of the image processing devices.
Therefore, according to the scheme provided by the invention, the picture with the sensitive information is encrypted to obtain the processed encrypted picture, and the encrypted picture is decrypted after the decryption information input by the user is verified, so that the leakage of personal information of the user can be reduced, and the user is reminded to protect the privacy safety.
The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the invention and the following claims. For example, due to the nature of software, the functions described above may be implemented using software executed by a processor, hardware, firmware, hardwired, or a combination of any of these. In addition, each functional unit may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and the parts serving as the control device may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above description is only an example of the present invention, and is not intended to limit the present invention, and it is obvious to those skilled in the art that various modifications and variations can be made in the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.
Claims (15)
1. An image processing method, comprising:
identifying whether preset sensitive information exists in the picture to be processed;
if the sensitive information exists in the picture to be processed, encrypting the picture to be processed to obtain a processed encrypted picture;
when an operation instruction for the encrypted picture is received, receiving decryption information input by a user, and verifying the decryption information;
and if the verification is passed, the received operation instruction is executed after the encrypted picture is decrypted.
2. The method of claim 1, further comprising:
if the sensitive information exists in the picture to be processed, inquiring information whether to encrypt the picture to be processed is displayed;
receiving confirmation information for encrypting the picture to be processed;
and encrypting the picture to be processed under the condition of receiving the confirmation information for encrypting.
3. The method according to claim 1 or 2, wherein the preset sensitive information comprises: preset sensitive image information and/or preset sensitive character information; identifying whether preset sensitive information exists in the picture to be processed or not, wherein the identifying comprises the following steps:
carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed;
and/or the presence of a gas in the gas,
and performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
4. The method according to any one of claims 1 to 3, wherein the encrypting the picture to be processed to obtain the processed encrypted picture comprises:
encrypting the picture to be processed by using an AES encryption algorithm; and/or the presence of a gas in the gas,
and encrypting the picture to be processed by adding byte header information of the mixed password.
5. The method of any one of claims 1-4, wherein receiving user-entered decryption information comprises:
displaying a decryption interface for decrypting the encrypted picture;
and receiving decryption information input by a user on the decryption interface.
6. The method according to any of claims 1-5, wherein said decryption information comprises: fingerprint information, face information, iris information, character password, and pattern password.
7. A picture processing apparatus, comprising:
the identification unit is used for identifying whether preset sensitive information exists in the picture to be processed;
the encryption unit is used for encrypting the picture to be processed to obtain a processed encrypted picture if the sensitive information exists in the picture to be processed;
the first receiving unit is used for receiving an operation instruction of the encrypted picture and receiving decryption information input by a user when the operation instruction of the encrypted picture is received;
the verification unit is used for verifying the decryption information when the receiving unit receives the decryption information input by a user;
and the execution unit is used for decrypting the encrypted picture and executing the received operation instruction if the verification of the verification unit passes.
8. The apparatus of claim 7, further comprising:
the display unit is used for displaying inquiry information about whether to encrypt the picture to be processed if the sensitive information exists in the picture to be processed;
the receiving unit is further configured to: receiving confirmation information for encrypting the picture to be processed;
and the execution unit encrypts the picture to be processed only when the receiving unit receives the confirmation information for encrypting.
9. The apparatus according to claim 7 or 8, wherein the preset sensitive information comprises: preset sensitive image information and/or preset sensitive character information; the identification unit identifies whether preset sensitive information exists in the picture to be processed, and the identification unit comprises the following steps:
carrying out picture identification on the picture to be processed so as to identify whether preset sensitive image information exists in the picture to be processed;
and/or the presence of a gas in the gas,
and performing character recognition on the picture to be processed to recognize whether preset sensitive character information exists in the picture to be processed.
10. The apparatus according to any one of claims 7-9, wherein the encrypting the picture to be processed to obtain the processed encrypted picture comprises:
encrypting the picture to be processed by using an AES encryption algorithm; and/or the presence of a gas in the gas,
and encrypting the picture to be processed by adding byte header information of the mixed password.
11. The apparatus according to any one of claims 7-10, wherein receiving decryption information input by a user comprises:
displaying a decryption interface for decrypting the encrypted picture;
and receiving decryption information input by a user on the decryption interface.
12. The apparatus according to any one of claims 7-11, wherein the decryption information comprises: fingerprint information, face information, iris information, character password, and pattern password.
13. A storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
14. A terminal comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any of claims 1-6 when executing the program.
15. A terminal characterized by comprising a picture processing apparatus according to any one of claims 7 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811466781.8A CN111259407A (en) | 2018-12-03 | 2018-12-03 | Picture processing method and device, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811466781.8A CN111259407A (en) | 2018-12-03 | 2018-12-03 | Picture processing method and device, storage medium and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111259407A true CN111259407A (en) | 2020-06-09 |
Family
ID=70944923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811466781.8A Pending CN111259407A (en) | 2018-12-03 | 2018-12-03 | Picture processing method and device, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111259407A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113536374A (en) * | 2021-07-15 | 2021-10-22 | 荣耀终端有限公司 | Image privacy protection method and electronic equipment |
CN113961125A (en) * | 2021-10-21 | 2022-01-21 | 平安普惠企业管理有限公司 | Image sharing method and device, terminal equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
CN108647262A (en) * | 2018-04-27 | 2018-10-12 | 平安科技(深圳)有限公司 | A kind of picture management method, device, computer equipment and storage medium |
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
-
2018
- 2018-12-03 CN CN201811466781.8A patent/CN111259407A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
CN108647262A (en) * | 2018-04-27 | 2018-10-12 | 平安科技(深圳)有限公司 | A kind of picture management method, device, computer equipment and storage medium |
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113536374A (en) * | 2021-07-15 | 2021-10-22 | 荣耀终端有限公司 | Image privacy protection method and electronic equipment |
CN113961125A (en) * | 2021-10-21 | 2022-01-21 | 平安普惠企业管理有限公司 | Image sharing method and device, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11223948B2 (en) | Anonymous authentication and remote wireless token access | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
US8918633B2 (en) | Information processing device, information processing system, and program | |
CN111047313B (en) | Code scanning payment, information sending and key management method, device and equipment | |
CN104573551A (en) | File processing method and mobile terminal | |
WO2017113790A1 (en) | Method for implementing code-scan bluetooth automatic connection, master device, slave device, and system | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN108880791A (en) | Cryptographic key protection method, terminal and computer readable storage medium | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
CN103559451A (en) | Method and device for protecting and displaying privacy information | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN105809042A (en) | Information protection method and device, information display method and device, and terminal | |
CN111242611B (en) | Method and system for recovering digital wallet key | |
CN105335642A (en) | Processing method and processing system of pictures | |
CN114730337A (en) | Cryptographic key management | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
US20170329995A1 (en) | Anti-replay techniques using secure external non-volatile memory | |
CN102867157A (en) | Mobile terminal and data protecting method | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
US11405782B2 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
US11928680B2 (en) | Techniques for processing pin-inclusive transactions in connection with an electronic device | |
CN103973646A (en) | Method, client device and system for storing services by aid of public cloud | |
KR102414910B1 (en) | Apparatus and method for securing document information | |
CN111259407A (en) | Picture processing method and device, storage medium and terminal | |
CN113343254B (en) | Method, device, medium and electronic equipment for encrypting and decrypting warranty based on OFD format |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200609 |
|
RJ01 | Rejection of invention patent application after publication |