CN114640813A - Peep-proof method, device, equipment and storage medium - Google Patents

Peep-proof method, device, equipment and storage medium Download PDF

Info

Publication number
CN114640813A
CN114640813A CN202210352671.9A CN202210352671A CN114640813A CN 114640813 A CN114640813 A CN 114640813A CN 202210352671 A CN202210352671 A CN 202210352671A CN 114640813 A CN114640813 A CN 114640813A
Authority
CN
China
Prior art keywords
image set
peeking
determining
target
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210352671.9A
Other languages
Chinese (zh)
Inventor
潘慧宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210352671.9A priority Critical patent/CN114640813A/en
Publication of CN114640813A publication Critical patent/CN114640813A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The embodiment of the application discloses a peep-proof method, a peep-proof device, peep-proof equipment and a peep-proof storage medium, and belongs to the technical field of image processing. The method is applied to the electronic equipment and comprises the following steps: under the condition that the electronic equipment displays a target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment; determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises the target object; and recording peeking information.

Description

Peep-proof method, device, equipment and storage medium
Technical Field
The application belongs to the technical field of image processing, and particularly relates to a peep-proof method, a peep-proof device, an electronic device and a readable storage medium.
Background
With the development of science and technology, people have become one of the common entertainment methods to watch videos by using electronic devices such as mobile phones and tablet computers.
However, in the process of watching the video, a stranger may steal the video. Which results in the privacy of the individual being compromised. In order to avoid this, electronic devices having a peep prevention function have been developed.
At present, electronic devices usually utilize additional accessories to realize a peep-proof function, such as attaching a peep-proof film, or matching a peep-proof invisible eye, etc. And this results in that the electronic equipment realizes that the peep-proof function is with high costs, and the convenience is low.
Disclosure of Invention
An object of the embodiments of the present application is to provide a peeping prevention method, device, apparatus, and storage medium, which can solve the problems of high cost and low convenience when an electronic device implements a peeping prevention function.
In a first aspect, an embodiment of the present application provides a peeping prevention method, which is applied to an electronic device, and includes:
under the condition that the electronic equipment displays a target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment;
determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises a target object;
and recording the peeking information.
In a second aspect, an embodiment of the present application provides a device for preventing peeping, where the device is applied to an electronic device, and the device includes:
the acquisition module is used for acquiring an image set under the condition that the electronic equipment displays a target interface, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment;
the first determining module is used for determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises a target object;
and the recording module is used for recording the peeking information.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the peeping prevention method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the peeping prevention method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the anti-peeping method according to the first aspect.
In a sixth aspect, the present application provides a computer program product, which is stored in a storage medium and executed by at least one processor to implement the peeping prevention method according to the first aspect.
In an embodiment of the present application, there is provided a peeking method applied to an electronic device, including: under the condition that the electronic equipment displays a target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment; determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises the target object; and recording peeking information. In this embodiment, in one aspect, it may be determined whether the image set includes a target object, which provides a software basis for the privacy function. On the basis, the peep-proof function can be realized without using additional accessories. This has reduced the cost that electronic equipment realized the peep-proof function to and improved the convenience that electronic equipment realized the peep-proof function. On the other hand, by recording the peeking information, a legal viewer can conveniently view the peeking information peeked by the target object.
Drawings
Fig. 1 is a schematic flowchart of a peep prevention method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an acquisition principle of an image set for implementing an embodiment of the present application;
fig. 3 is a schematic diagram of an eye movement hotspot graph for implementing embodiments of the present application;
FIG. 4 is a schematic view of a viewing area for implementing embodiments of the present application;
fig. 5 is a schematic diagram illustrating a display of a blocking picture and a peeping position prompt message according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a peep-proof device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device implementing an embodiment of the present application;
fig. 8 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application are capable of operation in sequences other than those illustrated or described herein, and that the terms "first," "second," etc. are generally used in a generic sense and do not limit the number of terms, e.g., a first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/", and generally means that the former and latter related objects are in an "or" relationship.
The peeking method, the apparatus, the device and the storage medium provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The embodiment of the application provides a peep-proof method, which is applied to an electronic device, and as shown in fig. 1, the method includes the following steps S1100-S1300:
and S1100, acquiring an image set under the condition that the electronic equipment displays a target interface.
The image set comprises at least two continuous images acquired by a front camera of the electronic equipment.
In an embodiment of the present application, the principle of image set acquisition may be as shown in fig. 2. Note that the front camera is denoted by 201 in fig. 2.
In the embodiment of the present application, the target interface is an interface that needs to prevent an illegal viewer other than a legal viewer passing through the electronic device from peeping. Wherein the legitimate viewer is typically the owner of the electronic device.
In an embodiment of the application, the target interface may be an interface for playing a video for a video playing application of the electronic device, or a password input interface for a payment application, or the like.
In embodiments of the present application, the target interface may be pre-specified by the legitimate viewer. For example, by providing a set input interface through which a legitimate viewer enters the identity of the target interface. Based on this, the electronic device may identify whether the displayed interface to the electronic device is a target interface.
S1200, under the condition that the image set comprises the target object, peeping information is determined according to the image set and the acquisition time of the image set.
In the embodiment of the application, the target object is an eye image or a face image of an illegal viewer who peeks at a target interface displayed by the electronic device. In actual applications, there are a plurality of target objects. The following steps may be performed separately for each target object.
In the embodiment of the present application, the fact that the image set includes the target object means that the target object is included in at least a first preset number of images in the image set.
Before S1200, the peep prevention method provided in the embodiment of the present application further includes a step of determining whether the image set includes the target object. In one embodiment, this step includes the following S1210 and S1220:
s1210, determining an eye movement heat point diagram and a target distance according to the image set.
The target distance is the distance between the eyeball of the human eye and the electronic equipment.
In this embodiment of the present application, the specific implementation of S1210 may be: and inputting the image set into an eye movement tracking algorithm to obtain an eye movement heat point diagram and a target distance.
It is understood that, in the case that the image set does not include the human eye image or the human face image, the eye movement hot spot map and the target distance obtained based on the above S1210 are an incorrect output value, for example, an indication value indicating that the format of the input image set is incorrect.
In the case where the image set includes the eye image or the face image, the eye movement hot spot map and the target distance obtained based on the above S1210 are both correct output values.
Under the condition that the eye movement hotspot graph is a correct output value, the eye movement hotspot graph can reflect the watching condition of human eyes, and an area of which the watching degree is greater than the preset watching degree is marked as a target area. Correspondingly, the area with the fixation degree smaller than or equal to the preset fixation degree is marked as a non-target area. Wherein the preset fixation degree represents a critical value of fixation concentration and fixation non-concentration. Based on this, the target area is an area with concentrated fixation in the eye movement hot spot diagram, and the non-target area is an area with non-concentrated fixation in the eye movement hot spot diagram.
In one example, where the eye movement hotspot pattern is the correct output value, the eye movement hotspot pattern 301 may be as shown in fig. 3.
And S1220, under the condition that the eye movement hotspot image contains the target area and the target distance is greater than the preset distance, determining that the image set comprises the target object.
In the embodiment of the application, the preset distance is a conventional viewing distance between a legal viewer and a display screen of the electronic device.
In this embodiment, when the eye movement hot spot diagram includes the target area, it is described that the eye movement hot spot diagram corresponds to a situation where a viewer views a display screen of the electronic device. On the contrary, it is stated that the eye movement hotspot image corresponds to the situation that the viewer only faces the display screen of the electronic device and does not look at the display screen of the electronic device, that is, does not look at the display screen of the electronic device.
And when the eye movement distance is greater than or equal to the preset distance, the observation distance of the viewer corresponding to the eye movement heat point diagram exceeds the preset distance, namely the viewer behind the legal viewer. Otherwise, it is indicated that the viewing distance of the viewer corresponding to the eye movement hotspot graph does not exceed the preset distance, that is, the eye movement hotspot graph is located in front of the legal viewer.
In combination with the above, when the eye movement hotspot image includes the target area and the target distance is greater than the preset distance, it is determined that the image set includes the target object.
Correspondingly, under the condition that the eye movement hotspot image does not comprise the target area and/or the target distance is smaller than the preset threshold value and under the condition that an error output value is obtained based on the eye movement tracking algorithm and the image set, the target object is determined not to be comprised in the image set.
In another embodiment of the present application, the specific implementation of determining whether the target object is included in the image set may further be: and determining whether a second preset number of images in the image set contain face images or eye images. And under the condition that the preset number of images all contain face images or eye images, determining that the image set comprises the target object. Otherwise, it is determined that the target object is not included in the image set.
In an embodiment of the present application, in the case that the target object is included in the image set, a subset of images in the image set that include the target object may be determined. Further, according to the acquisition time of the image set, the acquisition time corresponding to the image subset containing the target object can be determined. On the basis, a time period formed by the acquisition time corresponding to the image subset of the target object can be used, or a corresponding video segment in the time period can be used as peeking information.
And S1300, recording peeking information.
In this embodiment of the present application, the peeking information may be stored in a set path to implement the foregoing S1400. Or, in the case that the peeking information is a video segment, S1400 may be implemented by recording the video segment.
It should be noted that, in this embodiment, a specific implementation manner of S1400 is not limited.
In an embodiment of the present application, there is provided a peeking method applied to an electronic device, including: under the condition that the electronic equipment displays a target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment; determining peeking information according to the acquisition time of the image set and the image set under the condition that the image set comprises the target object; and recording peeking information. In this embodiment, in one aspect, it may be determined whether the image set includes a target object, which provides a software basis for the privacy function. On the basis, the peep-proof function can be realized without using additional accessories. This has reduced the cost that electronic equipment realized the peep-proof function to and improved the convenience that electronic equipment realized the peep-proof function. On the other hand, by recording the peeking information, a legal viewer can conveniently view the peeking information peeked by the target object.
In an embodiment, after S1300, the peeking method provided in the embodiment of the present application further includes the following steps S1400 and S1500:
and S1400, determining a peeking area corresponding to the target object according to the image set.
In this embodiment, an eye movement hotspot graph may be determined from the image set by an eye movement tracking algorithm. And taking the area of the eye movement hot spot diagram corresponding to the display screen as a peeping area corresponding to the target object.
In one example, the peeking area 401 may be as shown in fig. 4, based on the illustration of fig. 3 described above.
S1500, adjusting the display parameters of the peeking area, or marking the peeking area on each frame of image in the peeking video segment under the condition that the peeking information is the peeking video segment.
In the embodiment of the present application, the above S1500 may be implemented by displaying the pixels of the peeking area as black. Of course, the adjustment of the display parameters of the peeking area in S1500 may also be implemented in other manners. For example, the transparency of the peeping area is reduced. Alternatively, as shown in fig. 5, a mask image 501 is displayed in the peeking area. Based on this, further peeking by an illegal viewer can be prevented.
In this embodiment, when the peeking information is a peeking video segment, a peeking area may be marked on each frame of image in the recorded peeking video segment. The manner of marking may be highlighting, i.e., highlighting, on each frame of image within the peek video segment, a sub-image within the peek region.
Of course, other marking methods can be used, such as enclosing the peering area on each frame image in the peering video segment by a dotted line or a solid line.
In this embodiment, the legal viewer can not only view the peeking video segment of the illegal viewer, but also further view the peeked area of each frame of image in the peeking video segment.
In one embodiment, at S1220, the following two methods may be implemented:
the method I is realized by the following steps:
s1220-1, outputting a prompt message for authorization or not under the condition that the eye movement hotspot graph contains a target area and the target distance is greater than a preset distance.
In this embodiment, when the eye movement hotspot graph includes a target area, and the target distance is greater than a preset distance, it is described that the suspicion that the eye movement hotspot graph corresponds to an illegal watching of a viewer exists. At this time, prompt information of whether to authorize viewing is output. For example, a pop-up box is displayed for a legitimate viewer to choose whether to authorize viewing.
And S1220-2, receiving authorization indication information aiming at the prompt message.
In the embodiment of the application, the authorization indication information is indication information indicating authorization and indication non-authorization.
In this embodiment of the application, if the eye movement hotspot pattern corresponds to a viewer who is invited to watch by a legal viewer, the legal viewer may select an authorization indication that the authorized eye movement hotspot pattern corresponds to the viewer. If the viewer corresponding to the eye movement hot spot diagram is an illegal viewer, the legal viewer knows that the illegal viewer peeps according to the prompt information of whether the illegal viewer is authorized to watch. At this point, the legitimate viewer selects an unauthorized indication that viewing is not authorized.
And S1220-3, determining that the target object is included in the image set when the authorization indication information indicates unauthorized.
Corresponding to S1220-3 above, in a case where the authorization indication information indicates authorization, it is determined that the eye movement hotspot map corresponds to another legitimate viewer who the viewer authorizes to view the target interface together for the legitimate viewer.
In this embodiment, by outputting the prompt message indicating whether the viewer is authorized, it is possible to prevent a legitimate viewer from being regarded as an illegal viewer who invites another legitimate viewer to view the target interface together.
The second mode can be specifically realized by the following steps:
s1220-4, under the condition that the eye movement hotspot image contains the target area and the target distance is greater than the preset distance, determining that the image set comprises the object to be confirmed.
In this embodiment, the face images of the legitimate viewers may be recorded (e.g., stored) in advance. For example, face images of persons who are to be invited to watch a video together are recorded in advance.
In this embodiment, when the eye movement hotspot graph includes the target area and the target distance is greater than the preset distance, it is described that the suspect that the eye movement hotspot graph corresponds to the illegal viewer exists. At this time, whether the face image is a recorded face image or not is determined from the image set. Specifically, whether the face image contained in the image set is matched with the face image of a pre-recorded legal viewer is determined. And in the case of matching, determining that the object to be confirmed is recorded, otherwise determining that the object to be confirmed is not recorded.
S1220-5, under the condition that the object to be confirmed is not recorded, determining that the target object is included in the image set.
Corresponding to S1220-5 described above, in the case where the object to be confirmed is recorded, it is determined that the target object is not included in the image set.
In the present embodiment, it is possible to avoid the occurrence of a situation in which a legitimate viewer invites another legitimate viewer to view the target interface together as an illegitimate viewer.
In an embodiment, the peeking method provided in this embodiment further includes, before the step S1200, the following steps S1230 and S1231:
s1230, determining whether the image set includes a biological image according to the image set.
In this embodiment, a vital sign signal is obtained according to the image set, and the vital sign signal is subjected to biological recognition to determine whether an obvious pulse rule exists. Specifically, when the pulse law is significant, the explanatory image set includes a biological image. On the other hand, when the pulse rate is not clear, the living body image is not included in the image set, as in the case of a noise signal.
S1231, under the condition that the image set is a biological image, under the condition that the image set comprises a target object, determining peeking information according to the image set and the acquisition time of the image set.
Corresponding to S1231, the process ends when the image is an image of an inanimate object.
In the present embodiment, it is understood that there is a possibility of peeking only in a living body, and for example, there is no possibility of peeking in a person portrait which is a non-living body image. Therefore, if only the image set includes images of a living body, S1200 is triggered. In this way, unnecessary computational overhead is avoided.
In an embodiment of the present application, the peeking method provided in this embodiment further includes the following steps S1240 and S1241 after S1200:
s1240, under the condition that the image set comprises the target object, determining the peeking position according to the image set.
In the present embodiment, the peeking position includes a peeking angle and a peeking distance.
S1241, outputting the peeping position prompt information according to the peeping position.
In this embodiment, by outputting the peeping position prompt information, the legal viewer can know the position of the target object corresponding to the illegal viewer, so that the legal viewer can quickly locate the illegal viewer.
Illustratively, a peep-position prompt message such as "find illegal viewer, 45 ° at the rear left, 2 m" may be displayed directly above the target interface or at another position.
On the basis of the foregoing embodiments, the present embodiment provides a peeping prevention method including the following steps S2001-S2012:
s2001, under the condition that the electronic device displays the target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic device.
S2002, it is determined whether the image set includes the biological image, based on the image set.
S2003, when the biological image is included, an eye movement hotspot graph and a target distance are determined from the image set, the target distance being a distance between the eyeball of the human eye and the electronic device.
And S2004, outputting whether the eye movement hot spot map is authorized or not under the condition that the eye movement hot spot map comprises a target area and the target distance is greater than the preset distance.
And S2005, receiving authorization indication information aiming at the prompt information.
And S2006, determining that the image set comprises the target object when the authorization indication information indicates unauthorized.
S2007, under the condition that the image set comprises the target object, peeping information is determined according to the image set and the acquisition time of the image set.
And S2008, recording peeking information.
And S2009, determining a peeking area corresponding to the target object according to the image set.
And S2010, adjusting the display parameters of the peeking area, or marking the peeking area on each frame of image in the peeking video segment under the condition that the peeking information is the peeking video segment.
S1211, in the case where the image set includes the target object, determines the peeking position based on the image set.
And S1212, outputting the peeping position prompt information according to the peeping position.
According to the peeping prevention method provided by the embodiment of the application, the execution main body can be a peeping prevention device. The embodiment of the present application takes an example of a peep-proof device executing a peep-proof method, and the peep-proof device provided in the embodiment of the present application is described.
As shown in fig. 6, an embodiment of the present application provides a peep-proof device 600, including: an obtaining module 610, a first determining module 620, and a recording module 630, wherein:
an obtaining module 610, configured to obtain an image set when the electronic device displays a target interface, where the image set includes at least two consecutive images obtained by a front camera of the electronic device;
a first determining module 620, configured to determine peeking information according to the image set and the acquisition time of the image set when the image set includes a target object;
the recording module 630 is configured to record the peeking information.
In one embodiment, the peep prevention device 600 provided in the embodiment of the present application further includes:
the second determining module is used for determining a peeking area corresponding to the target object according to the image set;
and further comprising any of an adjustment module and a marking module, wherein:
the adjusting module is used for adjusting the display parameters of the peeping area;
the marking module is used for marking the peeking area on each frame image in the peeking video segment under the condition that the peeking information is the peeking video segment.
In one embodiment, the peep prevention device 600 provided by the embodiment of the present application further includes:
the third determining module is used for determining an eye movement hotspot graph and a target distance according to the image set, wherein the target distance is the distance between the eyeballs of the human eyes and the electronic equipment;
and determining that the image set comprises a target object under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance, wherein the target area is an area with the watching degree greater than a preset watching degree.
In one embodiment, the third determining module comprises:
the output unit is used for outputting whether the eye movement hot spot diagram contains a target area and outputting authorized prompt information under the condition that the target distance is greater than a preset distance;
a receiving unit, configured to receive authorization indication information for the prompt information;
a first determination unit, configured to determine that a target object is included in the image set when the authorization indication information indicates unauthorized;
alternatively, the third determining module includes:
the second determining unit is used for determining that the image set comprises an object to be confirmed under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance;
a third determination unit configured to determine whether the object to be confirmed is recorded;
a fourth determining unit, configured to determine that the target object is included in the image set when the object to be confirmed is not recorded.
In one embodiment, the peep prevention device 600 provided in the embodiment of the present application further includes:
a fourth determining module, configured to determine whether the image set includes an image of a living body according to the image set;
a triggering module, configured to trigger, when the image set includes the biological object image, the step of determining peeking information according to the image set and the acquisition time of the image set when the image set includes a target object.
In an embodiment of the present application, there is provided a peeping device applied to an electronic device, including: the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring an image set under the condition that the electronic equipment displays a target interface, and the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment; the first determining module is used for determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises the target object; and the recording module is used for recording peeking information. In this embodiment, in one aspect, it may be determined whether the image set includes a target object, which provides a software basis for the privacy function. On this basis, can need not to utilize extra accessory to realize the peep-proof function. This has reduced the cost that electronic equipment realized the peep-proof function to and improved the convenience that electronic equipment realized the peep-proof function. On the other hand, by recording the peeking information, a legal viewer can conveniently view the peeking information peeked by the target object.
The peep-proof device in the embodiment of the present application may be an electronic device, or may be a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television (television, TV), an assistant, or a self-service machine, and the embodiments of the present application are not limited in particular.
The peep-proof device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The peep-proof device provided by the embodiment of the application can realize each process realized by the method embodiment of fig. 1, and is not described herein again in order to avoid repetition.
Optionally, as shown in fig. 7, an electronic device 700 is further provided in the embodiment of the present application, and includes a processor 701 and a memory 702, where the memory 702 stores a program or an instruction that can be executed on the processor 701, and when the program or the instruction is executed by the processor 701, the steps of the foregoing peep prevention method embodiment are implemented, and the same technical effects can be achieved, and are not described again here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 8 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 8 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The processor 110 is configured to acquire an image set in a case that the electronic device displays a target interface, where the image set includes at least two consecutive frames of images acquired by a front camera of the electronic device;
determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises a target object;
and recording the peeking information.
In an embodiment of the application, the processor is configured to acquire an image set in a case that the electronic device displays a target interface, where the image set includes at least two consecutive images acquired by a front camera of the electronic device; determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises the target object; and recording peeking information. In this embodiment, in one aspect, it may be determined whether the image set includes a target object, which provides a software basis for a privacy function. On this basis, can need not to utilize extra accessory to realize the peep-proof function. This has reduced the cost that electronic equipment realized the peep-proof function to and improved the convenience that electronic equipment realized the peep-proof function. On the other hand, by recording the peeking information, a legal viewer can conveniently view the peeking information peeked by the target object.
Optionally, after the recording the peek content information, the processor 110 is further configured to:
determining a peeking area corresponding to the target object according to the image set;
adjusting the display parameter of the peeking area, or marking the peeking area on each frame image in the peeking video segment under the condition that the peeking information is a peeking video segment.
Optionally, before determining peeking information according to the image set and the acquisition time of the image set in the case that the image set includes the target object, the processor 110 is further configured to:
determining an eye movement hotspot graph and a target distance according to the image set, wherein the target distance is the distance between the eyeballs of the human eyes and the electronic equipment;
and under the condition that the eye movement hotspot graph contains a target area and the target distance is greater than a preset distance, determining that the image set comprises a target object, wherein the target area is an area with the fixation degree greater than a preset fixation degree.
Optionally, when the eye movement hotspot image contains a target region and the target distance is greater than a preset distance, determining that the image set includes a target object includes:
outputting a prompt message of whether the eye movement hot spot diagram is authorized or not under the condition that the eye movement hot spot diagram contains a target area and the target distance is greater than a preset distance;
receiving authorization indication information aiming at the prompt message;
determining that a target object is included in the image set when the authorization indication information indicates unauthorized;
or determining that the image set comprises an object to be confirmed under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance;
determining whether the object to be confirmed is recorded;
and under the condition that the object to be confirmed is not recorded, determining that the target object is included in the image set.
Optionally, before determining peeking information according to the image set and the acquisition time of the image set in the case that the image set includes the target object, the processor 110 is further configured to:
determining whether the image set comprises a biological body image according to the image set;
if the biological body image is included, the step of determining peeking information based on the image set and the acquisition time of the image set when the image set includes the target object is triggered.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes at least one of a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, memory 109 may comprise volatile memory or non-volatile memory, or memory x09 may comprise both volatile and non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). Memory 109 in the embodiments of the subject application includes, but is not limited to, these and any other suitable types of memory.
Processor 110 may include one or more processing units; optionally, the processor 110 integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the foregoing peep-prevention method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the foregoing peeping prevention method embodiment, and can achieve the same technical effect, and for avoiding repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
The embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing embodiments of the privacy protecting method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. A peep-proof method, applied to an electronic device, includes:
under the condition that the electronic equipment displays a target interface, acquiring an image set, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment;
determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises a target object;
and recording the peeking information.
2. The method according to claim 1, further comprising, after said recording said peek information:
determining a peeking area corresponding to the target object according to the image set;
adjusting the display parameter of the peeking area, or marking the peeking area on each frame image in the peeking video segment under the condition that the peeking information is a peeking video segment.
3. The method of claim 1, wherein the method comprises, prior to determining peeking information based on the image set and the image set's acquisition time, if the image set includes a target object, determining peeking information based on the image set and the image set's acquisition time:
determining an eye movement hotspot graph and a target distance according to the image set, wherein the target distance is the distance between the eyeballs of the human eyes and the electronic equipment;
and under the condition that the eye movement hotspot graph contains a target area and the target distance is greater than a preset distance, determining that the image set comprises a target object, wherein the target area is an area with the fixation degree greater than a preset fixation degree.
4. The method according to claim 3, wherein the determining that the image set includes a target object if the eye movement heat map includes a target region and the target distance is greater than a preset distance comprises:
outputting a prompt message of whether the eye movement hot spot diagram is authorized or not under the condition that the eye movement hot spot diagram contains a target area and the target distance is greater than a preset distance;
receiving authorization indication information aiming at the prompt message;
determining that a target object is included in the image set when the authorization indication information indicates unauthorized;
or determining that the image set comprises an object to be confirmed under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance;
determining whether the object to be confirmed is recorded;
and under the condition that the object to be confirmed is not recorded, determining that the target object is included in the image set.
5. The method of claim 1, wherein the method comprises, prior to determining peeking information based on the image set and the image set's acquisition time, if the image set includes a target object, determining peeking information based on the image set and the image set's acquisition time:
determining whether the image set comprises a biological body image according to the image set;
if the biological body image is included, the step of determining peeking information based on the image set and the acquisition time of the image set when the image set includes the target object is triggered.
6. A peep-proof device, applied to an electronic device, comprising:
the acquisition module is used for acquiring an image set under the condition that the electronic equipment displays a target interface, wherein the image set comprises at least two continuous frames of images acquired by a front camera of the electronic equipment;
the first determining module is used for determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises a target object;
and the recording module is used for recording the peeking information.
7. The apparatus of claim 6, further comprising:
the second determining module is used for determining a peeking area corresponding to the target object according to the image set;
and further comprising any of an adjustment module and a marking module, wherein:
the adjusting module is used for adjusting the display parameters of the peeping area;
the marking module is used for marking the peeking area on each frame image in the peeking video segment under the condition that the peeking information is the peeking video segment.
8. The apparatus of claim 6, further comprising:
the third determining module is used for determining an eye movement hotspot graph and a target distance according to the image set, wherein the target distance is the distance between the eyeballs of the human eyes and the electronic equipment;
and determining that the image set comprises a target object under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance, wherein the target area is an area with the watching degree greater than a preset watching degree.
9. The apparatus of claim 8, wherein the third determining module comprises:
the output unit is used for outputting whether the eye movement hot spot diagram contains a target area and outputting authorized prompt information under the condition that the target distance is greater than a preset distance;
a receiving unit, configured to receive authorization indication information for the prompt information;
a first determination unit, configured to determine that a target object is included in the image set when the authorization indication information indicates unauthorized;
alternatively, the third determining module includes:
the second determining unit is used for determining that the image set comprises an object to be confirmed under the condition that the eye movement hotspot image comprises a target area and the target distance is greater than a preset distance;
a third determination unit configured to determine whether the object to be confirmed is recorded;
a fourth determining unit, configured to determine that the target object is included in the image set when the object to be confirmed is not recorded.
10. The apparatus of claim 6, further comprising:
a fourth determining module, configured to determine whether the image set includes an image of a living body according to the image set;
and the triggering module is used for triggering the step of determining peeking information according to the image set and the acquisition time of the image set under the condition that the image set comprises the target object under the condition that the biological body image is included.
11. An electronic device comprising a processor and a memory, the memory storing a program or instructions executable on the processor, the program or instructions when executed by the processor implementing the steps of the privacy method of any one of claims 1-5.
CN202210352671.9A 2022-03-31 2022-03-31 Peep-proof method, device, equipment and storage medium Pending CN114640813A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210352671.9A CN114640813A (en) 2022-03-31 2022-03-31 Peep-proof method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210352671.9A CN114640813A (en) 2022-03-31 2022-03-31 Peep-proof method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114640813A true CN114640813A (en) 2022-06-17

Family

ID=81950852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210352671.9A Pending CN114640813A (en) 2022-03-31 2022-03-31 Peep-proof method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114640813A (en)

Similar Documents

Publication Publication Date Title
US9025830B2 (en) Liveness detection system based on face behavior
US9886598B2 (en) Automatic adjustment of a display to obscure data
US10810326B2 (en) Screen privacy protection method and system for mobile terminal device
US10282563B2 (en) Video-based privacy supporting system
US7774851B2 (en) Methods, systems, and computer program products for protecting information on a user interface based on a viewability of the information
US9600688B2 (en) Protecting display of potentially sensitive information
US9466266B2 (en) Dynamic display markers
Sun et al. Visible: Video-assisted keystroke inference from tablet backside motion.
John et al. EyeVEIL: degrading iris authentication in eye tracking headsets
CN112804445B (en) Display method and device and electronic equipment
CN110457963B (en) Display control method, display control device, mobile terminal and computer-readable storage medium
CA2955072C (en) Reflection-based control activation
CN109934187B (en) Random challenge response method based on face activity detection-eye sight
CN114640813A (en) Peep-proof method, device, equipment and storage medium
JP2009156948A (en) Display control device, display control method, and display control program
CN115909992A (en) Display screen brightness adjusting method and device and electronic equipment
CN115529405A (en) Image display method and device of front camera
CN116361761A (en) Information shielding method, information shielding device and electronic equipment
CN114063873A (en) Information display method, information display device and electronic equipment
CN111797383A (en) Password verification method and device and electronic equipment
CN116112750A (en) Video decryption and video encryption method and device, electronic equipment and storage medium
CN117148584A (en) Pupil distance adjusting method and device, electronic equipment and readable storage medium
CN115758323A (en) Unlocking processing method and device
CN117094013A (en) Content sharing method and content sharing device
CN115422585A (en) Information protection method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination