CN112035877A - Information hiding method and device, electronic equipment and readable storage medium - Google Patents

Information hiding method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112035877A
CN112035877A CN202010896401.5A CN202010896401A CN112035877A CN 112035877 A CN112035877 A CN 112035877A CN 202010896401 A CN202010896401 A CN 202010896401A CN 112035877 A CN112035877 A CN 112035877A
Authority
CN
China
Prior art keywords
information
hiding
target
size
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010896401.5A
Other languages
Chinese (zh)
Inventor
冯军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010896401.5A priority Critical patent/CN112035877A/en
Publication of CN112035877A publication Critical patent/CN112035877A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an information hiding method and device, electronic equipment and a readable storage medium, and belongs to the technical field of information hiding. The information hiding method comprises the following steps: acquiring a target image of a user interface; hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance. The information hiding method, the information hiding device, the electronic equipment and the readable storage medium can hide user-defined information.

Description

Information hiding method and device, electronic equipment and readable storage medium
Technical Field
The application belongs to the technical field of information hiding, and particularly relates to an information hiding method and device, electronic equipment and a readable storage medium.
Background
With the increasing awareness of information protection, it is necessary to hide the information displayed by the device.
At present, the information hiding method in the related art can only hide the designated control area inside the application program. For example, a manual click hide is made to a balance area within a cell phone banking application. In the process of implementing the present application, the inventors found that at least the following problems exist in the related art:
because only the designated control area in the application program can be hidden, the user-defined information cannot be hidden according to the user requirements, and therefore, the method has certain limitation in application scenes.
Disclosure of Invention
The embodiment of the application aims to provide an information hiding method, an information hiding device, electronic equipment and a readable storage medium, which can hide user-defined information.
In a first aspect, an embodiment of the present application provides an information hiding method, including:
acquiring a target image of a user interface;
hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance.
In a second aspect, an embodiment of the present application provides an information hiding apparatus, including:
the acquisition module is used for acquiring a target image of the user interface;
the hiding module is used for hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, where the program or instructions, when executed by the processor, implement the steps of the information hiding method according to the first aspect.
In a fourth aspect, the present application provides a readable storage medium, on which a program or instructions are stored, and when executed by a processor, the program or instructions implement the steps of the information hiding method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, and the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the information hiding method according to the first aspect.
In the embodiment of the application, after a target image of a user interface is acquired, target information is recognized from the target image, and then the target information is hidden based on a preset hiding mode. Because the target information is the information which is pre-defined by the user, the information hiding method can hide the information which is pre-defined by the user.
Drawings
Fig. 1 is a schematic flowchart of an information hiding method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another information hiding method provided in an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating identification of private content in a still frame image according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram illustrating a privacy content hiding effect provided by an embodiment of the present application;
fig. 5 is a schematic structural diagram of an information hiding apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
Based on partial contents of the background art, the information hiding method in the related art can only hide the designated control area inside the application program, and cannot hide the user-defined information according to the user requirements, so that the method has certain limitations in application scenes.
The applicant finds that after a target image of a user interface is obtained, target information can be identified from the target image, and then the target information is hidden based on a preset hiding mode. Since the target information is the information which is pre-defined by the user, the information which is pre-defined by the user can be hidden.
The information hiding method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
As shown in fig. 1, the information hiding method may include:
s101, acquiring a target image of a user interface.
S102, hiding the target information based on a preset hiding mode under the condition that the target information is recognized from the target image; the target information is information which is customized by a user in advance.
According to the information hiding method, after a target image of a user interface is obtained, target information is recognized from the target image, and then the target information is hidden based on a preset hiding mode. Because the target information is the information which is pre-defined by the user, the information hiding method can hide the information which is pre-defined by the user.
To more simply and directly acquire the still frame image, in one embodiment, when the target image is the still frame image, acquiring the target image of the user interface may include:
and acquiring the static frame image by adopting a screen capturing and/or screen recording mode.
The static frame image can be acquired more simply and directly by adopting a screen capturing and/or screen recording mode.
In order to more efficiently acquire the target information, in an embodiment, in a case where the target information is recognized from the target image, before hiding the target information based on a preset hiding manner, the method may further include:
and identifying the target image by adopting a preset information identification mode to obtain target information. In one embodiment, the preset information recognition mode is an Artificial Intelligence (AI) recognition mode.
By adopting an AI identification mode, the target information can be acquired more efficiently.
In order to hide the target information more comprehensively, in an embodiment, hiding the target information based on a preset hiding manner may include:
acquiring a first position and a first size of an area where target information is located;
determining a second size of the target object corresponding to a preset hiding mode according to the first size; wherein the second size is not less than the first size;
displaying the target object having the second size at the first position. In one embodiment, the preset hiding manner may include at least one of mosaic blocking, text replacement display, and image replacement display.
Since the second size of the target object is not smaller than the first size of the target information, the target information can be hidden more comprehensively.
In one embodiment, before hiding the target information based on a preset hiding manner, the method may further include:
and setting a mapping relation between a preset hiding mode and the target information.
In one embodiment, the target information may include at least one of text information and image information.
The target information may be user-defined private content, and the information hiding method is described below by taking the private content as an example. As shown in fig. 2, another information hiding method provided in the embodiment of the present application includes:
s201, selecting an application needing privacy protection by a user.
The user may select one or more applications that require privacy protection that will enable the relevant interfaces, both within the application and notifications sent by the application.
And S202, customizing privacy contents.
The user can customize the private content, and the private content can be in the form of characters or images as a basis for identifying and matching in the application.
S203, setting a privacy processing mode.
The processing mode of the content of the privacy zone set by the user can be a default smearing mode such as mosaic, and can also be a mode of replacing the content by user-defined characters or pictures.
And S204, acquiring a static frame image in the interface.
The Android system screen display process is based on a 'producer-consumer' mode, and in short, graphics streams, i.e., graphics information for drawing to a screen, are generated by a producer first, and then the graphics streams are consumed by a consumer and rendered to the screen, so that the displayed key information is in the graphics streams. The update of a dynamic interface (such as an animation video or an interface slide) is actually realized by continuously updating and displaying a large number of static frame images, so that the update of the dynamic image is a process of circularly executing a process of generating a static graphic stream and sequentially rendering.
There are many ways to capture the still frame image, and screen capture or screen recording is the simplest and most straightforward way. Wherein a Bitmap (Bitmap) containing original image information can be acquired by screen capture. Because the dynamic interface can be understood as that the static frame images are continuously switched and refreshed, in order to realize the real-time identification processing of the dynamic interface, the frequency of refreshing the static frame of the screen is required to be followed for real-time screen capture so as to continuously obtain the static frame images.
And S205, identifying the privacy content in the static frame image.
The identification of the dynamic interface is to identify the static frame image obtained in each step S204, and after the characters and the pictures in the static frame image are obtained, the obtained characters and pictures are compared with the privacy content set in step S202 and matched with the obtained privacy content.
Fig. 3 shows an example of identification of the private content in the still-frame image at a certain time, and the customized private content is shown on the right side of fig. 3. For the still frame image on the left side of fig. 3, matching is performed by AI identification, and the X coordinate and the Y coordinate of the area containing the privacy content in the still frame image, and the width and the height of the privacy content itself are identified. When matching is performed through AI recognition, the matching may be of the same type (for example, matching text with text, matching picture with picture), or may be of different types (for example, matching text with picture). For example, the corresponding text information contained in the picture can be matched and identified as the private content.
S206, hiding the privacy content.
And adding a floating window which does not accept the touch event to the screen according to the size and the position of the identified privacy content, wherein the content displayed in the floating window is determined according to the privacy processing mode set in the step S203. In step S204, the static frame image is captured in real time according to the change of the dynamic interface, so that the position and size of the floating window are dynamically updated according to the real-time recognition condition, so as to hide the privacy content during sliding. Briefly elaborating a real-time mobile updating mode of a floating window for blocking privacy content:
as shown in step S204, the identified object is each static frame image, and in the process of interface sliding or continuous update, the static frame images are continuously switched, so that the privacy content shown in fig. 3 may also have position movement or size change (enlargement or reduction), the corresponding specific parameters are the X coordinate, the Y coordinate, the width and the height in fig. 3, and the change of the position width and the height is reflected in the currently rendered static frame image, so as to capture the current static frame image in real time, identify the position size of the privacy content, and update the position and the size of the floating window in real time according to the parameter of the privacy content in the current static frame image, so as to implement real-time coverage of the floating window on the privacy content.
As shown in fig. 4, the avatar (i.e., a1) and the "grayish wolf" (i.e., a2) in the left static frame image in fig. 4 are both private contents, the display effect obtained by hiding a1 is B1, and the display effect obtained by hiding a2 is B2.
The application implementation example can realize user-defined privacy content, and the privacy content is hidden, replaced and displayed in the application according to a preset hiding mode, so that the privacy protection effect is achieved, and the user experience is further improved. Moreover, the core technical scheme does not depend on a frame and controls in the application, the system application of a mobile phone manufacturer can be realized, the third-party application can also be realized after obtaining certain authority, and the application range is wider.
It should be noted that, in the information hiding method provided in the embodiment of the present application, the execution main body may be an information hiding device, or a control module in the information hiding device for executing the information hiding method. In the embodiment of the present application, an information hiding method executed by an information hiding device is taken as an example to describe the information hiding device provided in the embodiment of the present application.
As shown in fig. 5, an information hiding apparatus 500 according to an embodiment of the present application may include:
an obtaining module 501, configured to obtain a target image of a user interface;
a hiding module 502, configured to hide the target information based on a preset hiding manner when the target information is identified from the target image; the target information is information which is customized by a user in advance.
In one embodiment, when the target image is a still frame image, the obtaining module 501 may include:
and the acquisition unit is used for acquiring the static frame image by adopting a screen capturing and/or screen recording mode.
The static frame image can be acquired more simply and directly by adopting a screen capturing and/or screen recording mode.
In one embodiment, the information hiding apparatus 500 may further include:
and the identification module is used for identifying the target image by adopting a preset information identification mode to obtain target information.
In one embodiment, the preset information identification mode is an artificial intelligent identification mode.
By adopting an AI identification mode, the target information can be acquired more efficiently.
In one embodiment, the concealment module 502 may include:
the acquisition unit is used for acquiring a first position and a first size of an area where the target information is located;
the determining unit is used for determining a second size of the target object corresponding to the preset hiding mode according to the first size; wherein the second size is not less than the first size;
a display unit for displaying the target object having the second size at the first position.
In one embodiment, the preset hiding manner may include at least one of mosaic blocking, text replacement display, and image replacement display.
Since the second size of the target object is not smaller than the first size of the target information, the target information can be hidden more comprehensively.
In one embodiment, the target information may include at least one of text information and image information.
In one embodiment, the information hiding apparatus 500 may further include:
and the setting module is used for setting a mapping relation between a preset hiding mode and the target information.
The information hiding device 500 in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The information hiding device 500 in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The information hiding device 500 provided in this embodiment of the application can implement each process of the information hiding method embodiments shown in fig. 1 and fig. 2, and is not described here again to avoid repetition.
Optionally, as shown in fig. 6, an electronic device 600 is further provided in this embodiment of the present application, and includes a processor 601, a memory 602, and a program or an instruction stored in the memory 602 and capable of being executed on the processor 601, where the program or the instruction is executed by the processor 601 to implement each process of the above-mentioned information hiding method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and a processor 710.
Those skilled in the art will appreciate that the electronic device 700 may also include a power supply (e.g., a battery) for powering the various components, and the power supply may be logically coupled to the processor 710 via a power management system, such that the functions of managing charging, discharging, and power consumption may be performed via the power management system. The electronic device structure shown in fig. 7 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The processor 110 is configured to obtain a target image of the user interface; hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance.
After a target image of a user interface is obtained, target information is recognized from the target image, and then the target information is hidden based on a preset hiding mode. Because the target information is the information which is pre-defined by the user, the information hiding method can hide the information which is pre-defined by the user.
In one embodiment, the processor 110 is configured to capture a still frame image by screen capture and/or screen recording.
The static frame image can be acquired more simply and directly by adopting a screen capturing and/or screen recording mode.
In an embodiment, the processor 110 is configured to, in a case that the target information is identified from the target image, identify the target image by using a preset information identification method before hiding the target information based on a preset hiding method, so as to obtain the target information. In one embodiment, the preset information identification mode is an artificial intelligent identification mode.
By adopting an AI identification mode, the target information can be acquired more efficiently.
In one embodiment, the processor 110 is configured to obtain a first position and a first size of an area in which the target information is located; determining a second size of the target object corresponding to a preset hiding mode according to the first size; wherein the second size is not less than the first size; displaying the target object having the second size at the first position.
In one embodiment, the preset hiding mode includes at least one of mosaic blocking, text replacement display and image replacement display.
Since the second size of the target object is not smaller than the first size of the target information, the target information can be hidden more comprehensively.
In one embodiment, the target information includes at least one of text information and image information.
In an embodiment, the processor 110 is configured to set a mapping relationship between a preset hiding manner and target information before hiding the target information based on the preset hiding manner.
It should be understood that in the embodiment of the present application, the input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics Processing Unit 7041 processes image data of still pictures or videos obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 707 includes a touch panel 7071 and other input devices 7072. The touch panel 7071 is also referred to as a touch screen. The touch panel 7071 may include two parts of a touch detection device and a touch controller. Other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 709 may be used to store software programs as well as various data, including but not limited to applications and operating systems. Processor 710 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information hiding method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above information hiding method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. An information hiding method, comprising:
acquiring a target image of a user interface;
hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance.
2. The information hiding method according to claim 1, wherein when the target image is a still frame image, the obtaining a target image of a user interface comprises:
and acquiring the static frame image by adopting a screen capturing and/or screen recording mode.
3. The information hiding method according to claim 1, wherein before hiding the target information based on a preset hiding manner in a case where the target information is recognized from the target image, the method further comprises:
and identifying the target image by adopting a preset information identification mode to obtain the target information.
4. The information hiding method according to claim 1, wherein hiding the target information based on a preset hiding manner comprises:
acquiring a first position and a first size of an area where the target information is located;
determining a second size of the target object corresponding to the preset hiding mode according to the first size; wherein the second size is not less than the first size;
displaying the target object having the second size at the first location.
5. The information hiding method according to claim 1, wherein before hiding the target information based on a preset hiding manner, the method further comprises:
and setting a mapping relation between the preset hiding mode and the target information.
6. An information hiding apparatus, comprising:
the acquisition module is used for acquiring a target image of the user interface;
the hiding module is used for hiding the target information based on a preset hiding mode under the condition that the target information is identified from the target image; the target information is information which is customized by a user in advance.
7. The information hiding device according to claim 6, wherein when the target image is a still frame image, the obtaining module includes:
and the acquisition unit is used for acquiring the static frame image by adopting a screen capturing and/or screen recording mode.
8. The information hiding apparatus as claimed in claim 6, wherein said apparatus further comprises:
and the identification module is used for identifying the target image by adopting a preset information identification mode to obtain the target information.
9. The information hiding device according to claim 6, wherein said hiding module comprises:
the acquisition unit is used for acquiring a first position and a first size of an area where the target information is located;
the determining unit is used for determining a second size of the target object corresponding to the preset hiding mode according to the first size; wherein the second size is not less than the first size;
a display unit for displaying the target object having the second size at the first position.
10. The information hiding apparatus as claimed in claim 6, wherein said apparatus further comprises:
and the setting module is used for setting the mapping relation between the preset hiding mode and the target information.
CN202010896401.5A 2020-08-31 2020-08-31 Information hiding method and device, electronic equipment and readable storage medium Pending CN112035877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010896401.5A CN112035877A (en) 2020-08-31 2020-08-31 Information hiding method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010896401.5A CN112035877A (en) 2020-08-31 2020-08-31 Information hiding method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112035877A true CN112035877A (en) 2020-12-04

Family

ID=73586514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010896401.5A Pending CN112035877A (en) 2020-08-31 2020-08-31 Information hiding method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112035877A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906047A (en) * 2021-02-04 2021-06-04 陕西师范大学 Image privacy information protection system and method based on deep learning
CN113034356A (en) * 2021-04-22 2021-06-25 平安国际智慧城市科技股份有限公司 Photographing method and device, terminal equipment and storage medium
CN113722735A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Privacy protection method and device, electronic equipment and readable storage medium
CN114140558A (en) * 2021-11-29 2022-03-04 北京达佳互联信息技术有限公司 Image data processing method, image data processing device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679419A (en) * 2017-10-17 2018-02-09 田进 A kind of screenshotss method and device
CN110211029A (en) * 2019-05-14 2019-09-06 努比亚技术有限公司 A kind of record screen protection maintaining method, mobile terminal and computer readable storage medium based on anticipation mode
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
CN111310250A (en) * 2020-01-20 2020-06-19 维沃移动通信有限公司 Application sharing method and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679419A (en) * 2017-10-17 2018-02-09 田进 A kind of screenshotss method and device
CN110211029A (en) * 2019-05-14 2019-09-06 努比亚技术有限公司 A kind of record screen protection maintaining method, mobile terminal and computer readable storage medium based on anticipation mode
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
CN111310250A (en) * 2020-01-20 2020-06-19 维沃移动通信有限公司 Application sharing method and electronic equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906047A (en) * 2021-02-04 2021-06-04 陕西师范大学 Image privacy information protection system and method based on deep learning
CN112906047B (en) * 2021-02-04 2023-02-07 陕西师范大学 Image privacy information protection system and method based on deep learning
CN113034356A (en) * 2021-04-22 2021-06-25 平安国际智慧城市科技股份有限公司 Photographing method and device, terminal equipment and storage medium
CN113722735A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Privacy protection method and device, electronic equipment and readable storage medium
CN114140558A (en) * 2021-11-29 2022-03-04 北京达佳互联信息技术有限公司 Image data processing method, image data processing device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112035877A (en) Information hiding method and device, electronic equipment and readable storage medium
CN111813308B (en) Interface processing method and device, electronic equipment and storage medium
CN112286612B (en) Information display method and device and electronic equipment
CN113794795B (en) Information sharing method and device, electronic equipment and readable storage medium
CN112783594A (en) Message display method and device and electronic equipment
CN113282213A (en) Interface display method and device
CN113311973A (en) Recommendation method and device
CN112422817A (en) Image processing method and device
CN113703634A (en) Interface display method and device
CN113794943B (en) Video cover setting method and device, electronic equipment and storage medium
CN115562539A (en) Control display method and device, electronic equipment and readable storage medium
CN115729544A (en) Desktop component generation method and device, electronic equipment and readable storage medium
CN115718581A (en) Information display method and device, electronic equipment and storage medium
CN114518859A (en) Display control method, display control device, electronic equipment and storage medium
CN114416264A (en) Message display method and device
CN111796736B (en) Application sharing method and device and electronic equipment
CN114895815A (en) Data processing method and electronic equipment
CN113868269A (en) Screenshot method and device, electronic equipment and readable storage medium
CN114095611A (en) Incoming call display interface processing method and device and electronic equipment
CN113282204A (en) Icon control method and icon control device
CN112148406A (en) Page switching method and device, electronic equipment and readable storage medium
CN115866314B (en) Video playing method and device
CN114327715B (en) Interface display method, interface display device, electronic apparatus, and readable storage medium
CN114928761B (en) Video sharing method and device and electronic equipment
CN114237801B (en) Desktop display method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201204