CN106485164A - A kind of image processing method and mobile terminal - Google Patents

A kind of image processing method and mobile terminal Download PDF

Info

Publication number
CN106485164A
CN106485164A CN201610857068.0A CN201610857068A CN106485164A CN 106485164 A CN106485164 A CN 106485164A CN 201610857068 A CN201610857068 A CN 201610857068A CN 106485164 A CN106485164 A CN 106485164A
Authority
CN
China
Prior art keywords
picture
privacy
privacy area
pixel
original image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610857068.0A
Other languages
Chinese (zh)
Inventor
周悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610857068.0A priority Critical patent/CN106485164A/en
Publication of CN106485164A publication Critical patent/CN106485164A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/04Context-preserving transformations, e.g. by using an importance map
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of image processing method and mobile terminal, belong to mobile communication technology field, the method includes:Privacy area in identification original image;Pixel value to the pixel in the privacy area is modified, and obtains encrypting picture.Method disclosed by the invention, solves the problems, such as to be unfavorable for protecting the individual privacy in user's picture in prior art.By privacy places in automatic identification picture and it is encrypted, the individual privacy being effectively protected in picture.It is encrypted by the view data of the privacy area in the picture to recognizing, has both can ensure that user can be protected the individual privacy in picture, improved Consumer's Experience further with the image in preview picture again.

Description

A kind of image processing method and mobile terminal
Technical field
The present invention relates to mobile communication technology field, more particularly to a kind of image processing method and mobile terminal.
Background technology
With the development of digital storage technique, people have got used to for the files such as picture being stored in digital storage equipment On, such as hard disk, USB flash disk, and cloud disk etc..With the continuous development of Internet technology, increasing people are selected local number According to being stored in cloud server, or by some sharing files to the other users on internet.For example:Picture is uploaded by user Stored to cloud disk or server.For the picture comprising individual privacy, no matter it is stored on local hard drive, or storage Server, in the event of hacker attacks or server failure, causes picture stolen beyond the clouds, and the picture comprising individual privacy will Serious harmful effect can be caused to user.
Content of the invention
The present invention provides a kind of image processing method and mobile terminal, solves to be unfavorable for protecting user's picture in prior art In individual privacy problem.
In a first aspect, a kind of image processing method is embodiments provided, including:
Privacy area in identification original image;
Pixel value to the pixel in the privacy area is modified, and obtains encrypting picture.
Second aspect, the embodiment of the present invention additionally provide a kind of mobile terminal, including
First privacy identification module, for recognizing the privacy area in original image;
Encryption processing module, for recognizing the pixel in the privacy area for obtaining to the first privacy identification module Pixel value is modified, and obtains encrypting picture.
Image processing method disclosed in the embodiment of the present invention, by recognizing the privacy area in original image, then to institute The pixel value for stating the pixel in privacy area is modified, and obtains encrypting picture, solves in prior art and be unfavorable for protection The problem of the individual privacy in user's picture.By privacy area in automatic detection picture and it is encrypted, effectively protects The individual privacy that has protected in picture.It is encrypted by the view data of the privacy area in the picture to detecting, both Can ensure that user can be protected the individual privacy in picture, improved user's body further with the image in preview picture again Test.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to wanting needed for embodiments of the invention The accompanying drawing for using is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, right For those of ordinary skill in the art, without having to pay creative labor, can also be obtained according to these accompanying drawings Other accompanying drawings.
Fig. 1 is the image processing method flow chart of the embodiment of the present invention one;
Fig. 2 is the image processing method flow chart of the embodiment of the present invention two;
Fig. 3 is one of structure chart of mobile terminal of the embodiment of the present invention three;
Fig. 4 is the two of the structure chart of the mobile terminal of the embodiment of the present invention three;
Fig. 5 is the mobile terminal structure figure of the embodiment of the present invention four;
Fig. 6 is the mobile terminal structure figure of the embodiment of the present invention five.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
Embodiment one:
A kind of image processing method is present embodiments provided, as shown in figure 1, the method includes:Step 100 is to step 110.
Step 100, recognizes the privacy area in original image.
When recognizing the privacy area in original image, can be hidden using privacy places recognition methods identification of the prior art Then privacy places region is defined as privacy area by private position.For example:Based on the image library of default privacy places, Using Viola-Jones framework, extension Ha Er (Haar) feature is first extracted, is then used by self-adaptive enhancement algorithm (AdaBoost) Features training strong classifier is carried out, and trains cascade of strong classifiers further, to constitute privacy places detector, then using instruction Whether comprising privacy places in the privacy places detector detection picture for getting.Generally, different privacy places need difference Different graders, for example:Chest and buttocks are needed to be respectively adopted different sample images and is trained, to generate chest Detector and buttocks detector.When being embodied as, during training grader device, color characteristic, textural characteristics, shape can be comprehensively utilized The physical trait that the mankind such as shape feature and spatial relation characteristics commonly use.When the present invention is embodied as, existing skill can also be adopted The additive method privacy places in picture detected in art, the present invention are not limited to the concrete grammar for detecting privacy places Fixed, here is omitted.
When detecting the privacy places in picture using default privacy places detection method, not only can determine in picture is No containing privacy places, moreover it is possible to determine the area information of the privacy places included in picture.Generally, the privacy places for detecting Region is identified with rectangle, and when being embodied as, default privacy places detection method will return the privacy places included in picture The picture pixels coordinate in the upper left corner in region and the lower right corner, or picture pixels coordinate and the square in the upper left corner in the region of privacy places The pixel wide in shape privacy places region and height.The region of the privacy places for detecting can also be with circular or other rule schemas Shape is identified.If the region of the privacy places for detecting is with circular indicia, default privacy places detection method will return picture In the picture pixels coordinate of central point in the region of privacy places that includes and the radius in region.
Step 110, the pixel value to the pixel in the privacy area are modified, and obtain encrypting picture.
When recognize in picture comprising privacy area after, the view data to the privacy area in picture is encrypted place Reason, so that naked eyes cannot recognize privacy places, so as to reach the effect of individual privacy in protection original image.It is embodied as When, can be by way of the pixel value of the image of the privacy area in the picture to recognizing enters line translation so that pass through picture The image that privacy area after plain value conversion is presented is transformed to other images, so as to protect the individual privacy in picture.Or, lead to Cross picture and a transparency protected figure layer is covered, the corresponding location of pixels of privacy area in the figure layer is set to show other figures As content, such as show a flower so as to the privacy area in the picture is covered, so as to protect the individual privacy in picture.Tool When body is implemented, view data that can also be using additive method of the prior art to privacy area in the picture that recognizes It is encrypted, the present embodiment will not enumerate.
Image processing method disclosed in the embodiment of the present invention, by recognizing the privacy area in original image;To described hidden The pixel value of the pixel in private region is modified, and obtains encrypting picture, solves in prior art and is unfavorable for protecting user The problem of the individual privacy in picture.By privacy area in automatic identification picture and it is encrypted, is effectively protected picture In individual privacy.It is encrypted by the view data of the privacy area in the picture to recognizing, both can ensure that User can be protected the individual privacy in picture, improved Consumer's Experience further with the image in preview picture again.
Embodiment two:
Referring to Fig. 2, a kind of image processing method is present embodiments provided, the method includes:Step 200 is to step 260.
Step 200, obtains original image to be identified.
The original image to be identified be able to will be uploaded onto the server for user the picture of storage, or for protecting The picture to be encrypted selected to the picture of local storage medium or user is deposited by encryption software.When being embodied as, by connecing The receipts operation of user orientation server uploading pictures, or the operation of user's storage picture etc., obtain original image to be identified.
Step 210, judges whether the spot for photography of the original image is to preset place, and if so, execution step 220, no Then execution step 240.
Whether the spot for photography for judging the original image is to preset place, when the spot for photography of the original image is pre- If during place, need to recognize the privacy area in the original image;Otherwise, it is not necessary to recognize the privacy in the original image Region, directly stores the original image.
Under normal circumstances, if active user is in positions such as hotel, families, wear that random possibility is very big, the figure of shooting The possibility for exposing privacy places in piece is larger, now needs to some specific positions, and the privacy places such as such as chest are carried out Detection encryption.And normal in the dress of the public places such as office, park, market, street, captured picture will not go out Now include the situation of privacy places.Preferably, before the privacy area in identification original image, the bat of the picture is first determined whether Take the photograph whether place is that place is preset, if so, then privacy area identification is carried out to the picture, determine in the picture whether include Privacy area, if comprising needing to be encrypted privacy area.Otherwise, the picture is directly stored.The default field Carried out by family, hotel.
When being embodied as, can by read picture file spot for photography attribute combine user setup public field make and Home location judges whether the spot for photography of the picture is to preset place.Can also be by the position in acquisition picture shooting place Coordinate information, determines the spot for photography of picture in conjunction with GPS system or map software, then in conjunction with user setup public field make and Home location judges whether the spot for photography of the picture is to preset place.If user is not provided with home address, office ground The information such as location are, can be home address by counting the most permanent place of the user of GPS system statistics.
By judging to the spot for photography of picture, it is also possible to avoid using Skin Color Information and human organ structural information Carry out privacy area recognize when, due to clothes color relatively colour of skin etc. be considered as exposed privacy area phenomenon.Enter One step improves the accuracy of privacy area identification.
Step 220, recognizes the privacy area in original image.
Privacy area in the identification original image, including:To possess the region of default feature in the original image Used as privacy area, the default feature includes at least one in herein below:Pre-set color feature, preset textural characteristics, Preset shape feature and pre-set space relationship characteristic.When being embodied as, institute can be recognized by the method for introduction in embodiment one The region for possessing default feature in original image is stated, here is omitted.
Step 230, the pixel value to the pixel in the privacy area are modified, and obtain encrypting picture.
When recognize in picture comprising privacy area after, the view data to the privacy area in picture is encrypted place Reason, so that naked eyes cannot recognize privacy places, so as to reach the effect of individual privacy in protection picture.To the privacy area In the pixel value of pixel modify, obtain encrypting picture, including:Corresponding encryption parameter is obtained according to ID; Based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the first conversion, obtains encrypting picture.
When recognizing the privacy places in picture using default privacy places detection method, not only can determine in picture is No containing privacy places, moreover it is possible to determine the privacy area information of the privacy places included in picture.The privacy area for recognizing can To be identified with any regular figure.In the present embodiment, so that the privacy area for recognizing is identified using rectangle as an example, specifically The concrete scheme that the bright view data to privacy area in the picture that recognizes is encrypted.
When being embodied as, default privacy places recognition methods provides the upper left corner of the privacy area for recognizing with respect to institute In pixel coordinate p (x, y) in the upper left corner of picture, and length in pixels H and pixel wide W of mark privacy area.Described pre- If the privacy area for recognizing that is given of privacy places detection method be usually the Minimum Area comprising the privacy places.Tool When body is implemented, in order to ensure privacy places can be fully protected, for be given according to default privacy places detection method Privacy area extends certain pixel wide to surrounding respectively along upper and lower, left and right four direction, after AES is to extension Image in privacy area is encrypted, and is effectively guaranteed privacy places and is done protection.
When being encrypted to the view data in the privacy area, for the picture of the multi-layer image form such as PSD, can By covering a transparency protected figure layer to picture, the corresponding location of pixels of privacy area in the figure layer to be set to show Other picture materials, such as show a flower so as to cover the privacy area in picture to be uploaded, so as to protect the individual in picture Privacy.
When being encrypted to the view data in the privacy area, the picture to be uploaded to detecting can be passed through In the pixel value of image of privacy places region enter the mode of line translation so that the privacy portion after pixel value conversion The image that position region is presented is transformed to other images, so as to protect the individual privacy in picture.Described to the secret protection area View data in domain is encrypted, including:The encryption ginseng of the predetermined encryption engine is obtained according to the ID Number;Based on the encryption parameter, by the crypto engine to the image slices vegetarian refreshments in secret protection region in the picture Pixel value carries out inverible transform;The positional information in the secret protection region is write the picture file.
In order to improve the security of secret protection, it is preferable that during each user encryption picture, privacy area in picture is adopted With different AESs.In order to reduce the mobile terminal of AES occupancy or the storage resource of server, the present invention is in tool When body is implemented, the encryption parameters different for different user distribution are employed, using same predetermined encryption strategy, based on different The scheme that encryption parameter is encrypted to the privacy area in picture.When being encrypted to privacy area, can adopt The mode of user input encryption parameter.In order to improve the security of secret protection further, when being embodied as, when recognizing picture In after the privacy area that includes, need to obtain ID, to get and the corresponding encryption parameter of the ID, really The encryption parameter for protecting different user acquisition is different, improves the security of protection privacy places.ID can be user Name or the information of other unique marks user.Can for start image ciphering, the user name of account of deciphering function or other Account identification.The ID is different from logging in the ID of picture storage device.For example, when picture is stored in cloud space When, the ID for obtaining AES is different from logging in the ID in cloud space.As such, it is possible to be effectively prevented from when cloud sky Between by hacker attacks or account stolen when, the picture of encrypting storing is utilized same account deciphering, causes privacy leakage.
When being embodied as, can be according to ID, or one a pair of ID and pictorial information to be encrypted etc. and user The information that answers, generates encryption parameter.In the present embodiment, encryption parameter is the cryptographic Hash for presetting the first bit wide, the Hash of such as 40 Value.Corresponding encryption parameter is obtained according to ID, can be that the cryptographic Hash for presetting bit wide is generated according to ID.According to ID generates the method for the cryptographic Hash for presetting bit wide referring to prior art, and here is omitted.
Described based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the first conversion, obtains Encryption picture is arrived, including:Predetermined encryption engine takes cryptographic Hash described at least part of bit wide according to preset rules, in the picture The pixel value of the image slices vegetarian refreshments in privacy area carries out the first conversion.Using cryptographic Hash the adding as predetermined encryption engine for obtaining Close parameter, is encrypted to the image in privacy area described in the picture to be encrypted by the crypto engine.Tool When body is implemented, the crypto engine takes some or all of numerical value in the encryption parameter according to the rule for setting, using taking The numerical value for obtaining carries out the first conversion to the pixel value for needing the pixel in privacy area, generates the picture of encryption.
The cryptographic Hash of one 40 is generated according to ID, such as 2c85856c48d2c3e89c3b258755a5fb2e10474cd0, each ID can generate one unique 40 Cryptographic Hash.In the encryption parameter using the cryptographic Hash as predetermined encryption engine, by the crypto engine to described to be encrypted When image described in picture in privacy area is encrypted, the crypto engine is according to default rule from the Kazakhstan of 40 Selected section or whole numerical value in uncommon value, and the first change is carried out to the pixel value of pixel to be encrypted using the numerical value of selection Change.For example, crypto engine from high to low successively circulation take 8 cryptographic Hash, with the pixel value of pixel to be encrypted is carried out by Position XOR.For example, when carrying out step-by-step XOR to first pixel in privacy area, most-significant byte numerical value 2c85856c is taken, When step-by-step XOR is carried out to second pixel point, take second highest 8 bit value 48d2c3e8, the rest may be inferred, when to the 6th pixel click-through During row step-by-step XOR, then take most-significant byte numerical value 2c85856c.
Or, crypto engine takes wherein 8 cryptographic Hash, carries out step-by-step XOR fortune with to the pixel value of pixel to be encrypted Calculate.
After the pixel of the image in privacy area is all converted, the positional information of the privacy area is write Enter the picture file.Such as:The title of the picture of modification encryption, by the positional information write filename of privacy area; Or, the positional information of the privacy area is write the reserved field in the picture file content.For example:By picture file The name modifications of XXX.jpg are the form of XXX_ upper left corner abscissa _ upper left corner ordinate _ region length _ region width .jpg, such as picture_125_212_200_80.jpg.
If being encrypted to secret protection region by way of covering figure layer, secret protection area need not be preserved The positional information in domain.
Step 240, stores picture.
The picture of this step storage includes not identify the original image of privacy area and to identifying privacy area The encryption picture that original image is obtained after being encrypted.For the picture of storage, if encryption picture, during preview picture, In picture, privacy area will be shown as other images, such as mosaic, or irregular image etc..If the original image is use The family picture to server to be uploaded, then the pixel value to the pixel in the privacy area modify, obtain encryption figure After piece, this step is specially:The encryption picture is uploaded onto the server.
Step 250, recognizes the privacy area in the encryption picture.
When user downloads from a server encryption picture, or when user will browse locally stored encryption picture, need first When determining the picture, first have to determine the privacy area in encryption picture.
When being embodied as, can be by judging whether the filename of picture has encryption identification, or the reservation of picture file Whether there is the positional information of the privacy area of encryption in field, or judge whether picture file has the method for encrypting figure layer To determine the privacy area for whether including encryption in picture, and obtain the picture of the privacy area for having encryption further In, the positional information of privacy area.
Step 260, the pixel value to the pixel in the privacy area are reduced, and obtain the original image.
After determining the privacy area in encryption picture, the encryption ginseng of the default decryption engine is obtained according to ID Number;Based on the encryption parameter, by the decryption engine to the image slices vegetarian refreshments in privacy area in the encryption picture Pixel value enters line translation.The pixel value of the pixel in the privacy area is reduced, and obtains the original image, Including:Corresponding encryption parameter is obtained according to ID;Based on the encryption parameter, to the pixel in the privacy area Pixel value carry out the second conversion, obtain the original image, described second is transformed to the inverse transformation of the described first conversion.According to ID obtains the specific embodiment of corresponding encryption parameter and obtains encryption parameter when being encrypted to original image Method is identical, and here is omitted.When being embodied as, the decryption engine executes second conversion.When being embodied as, if using Files passe will be encrypted to server storage in family, then, between step 240 and step 250, also include:Download from the server The encryption picture.
Whether image processing method disclosed in the embodiment of the present invention, be pre- by the spot for photography for judging the original image If place, the privacy area in original image is if so, recognized, then, the pixel value to the pixel in the privacy area enters Row modification, obtains encrypting picture, solves the problems, such as to be unfavorable for protecting the individual privacy in user's picture in prior art.Pass through Privacy places it is encrypted, the individual privacy being effectively protected in picture in automatic identification picture.By judging picture Spot for photography, for the picture that non-default place shoots, it is believed that not there is a possibility that to expose individual privacy position, does not carry out hidden Private region recognition, directly uploads onto the server or stores, and improves the efficiency of picture processing.By in the picture to recognizing The view data of privacy area is encrypted, and both can ensure that user can protect figure again with the image in preview picture Individual privacy in piece, improves Consumer's Experience further.
Embodiment three:
Correspondingly, the embodiment of the invention also discloses a kind of mobile terminal 30, as shown in figure 3, including:
First privacy identification module 300, for recognizing the privacy area in original image;
Encryption processing module 310, for recognizing the picture in the privacy area for obtaining to the first privacy identification module 300 The pixel value of vegetarian refreshments is modified, and obtains encrypting picture.
Mobile terminal disclosed in the embodiment of the present invention, by recognizing the privacy area in original image, then to the knowledge The pixel value of the pixel in the privacy area not obtained is modified, and obtains encrypting picture, and it is unfavorable in prior art to solve Problem in the individual privacy that protects in user's picture.By privacy places in automatic identification picture, and it is encrypted, effectively Protect the individual privacy in picture.It is encrypted by the view data of the privacy area in the picture to recognizing, Both can ensure that user can be protected the individual privacy in picture, improved user further with the image in preview picture again Experience.
Optionally, the first privacy identification module 300, for the region that will possess default feature in the original image Used as privacy area, the default feature includes at least one in herein below:Pre-set color feature, preset textural characteristics, Preset shape feature and pre-set space relationship characteristic.
Alternatively, referring to Fig. 4, the mobile terminal 30 also includes:
Spot for photography judge module 320, whether the spot for photography for judging the original image is to preset place;
The first privacy identification module 300 is further used for, when the spot for photography of the original image is for presetting place When, using the region for possessing default feature in the original image as privacy area.
Alternatively, referring to Fig. 4, the mobile terminal 30 also includes:
Second privacy identification module 330, for recognizing the privacy area in the encryption picture;
Decryption processing module 340, for recognizing the picture in the privacy area for obtaining to the second privacy identification module 330 The pixel value of vegetarian refreshments is reduced, and obtains the original image.
Alternatively, referring to Fig. 4, the encryption processing module 310 includes:
First encryption parameter acquiring unit 3101, for obtaining corresponding encryption parameter according to ID;
Ciphering unit 3102, for being based on the encryption parameter, the pixel value to the pixel in the privacy area enters Row first is converted, and obtains encrypting picture;
The decryption processing module 340 includes:
Second encryption parameter acquiring unit 3401, for obtaining corresponding encryption parameter according to ID;
Decryption unit 3402, for being based on the encryption parameter, the pixel value to the pixel in the privacy area enters Row second is converted, and obtains the original image, and described second is transformed to the inverse transformation of the described first conversion.
Alternatively, referring to Fig. 4, the mobile terminal 30 also includes:
Upper transmission module (not shown), for uploading onto the server the encryption picture;And,
Download module (not shown), for downloading the encryption picture from the server.
Mobile terminal disclosed in the embodiment of the present invention passes through to judge the spot for photography of picture, shoots for non-default place Picture, it is believed that not there is a possibility that to expose individual privacy position, do not carry out privacy area identification, directly upload onto the server and deposit Storage is locally stored, improves the efficiency of picture processing.
By obtaining the encryption parameter of the predetermined encryption engine according to the ID, and based on the encryption ginseng Number, carries out inverible transform by the crypto engine to the pixel value of the image slices vegetarian refreshments in privacy area in the picture, per Individual user corresponds to a unique encryption parameter, improves the security of individual privacy protection in picture further.
Example IV:
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 500 shown in Fig. 5 includes:At least One processor 501, memory 502, at least one network interface 504 and other users interface 503.In mobile terminal 500 Each component is coupled by bus system 505.It is understood that bus system 505 is used for realizing the company between these components Connect letter.Bus system 505 also includes power bus, controlling bus and status signal bus in addition in addition to data/address bus is included.But It is for the sake of clear explanation, in Figure 5 various buses is all designated as bus system 505.
Wherein, user interface 503 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate, touch-screen or Trackpad etc..The present embodiment detects user to desktop folder by touch-screen Trigger action, such as click on, pressing etc..User interface 503 also includes loudspeaker, for play cuing information.
It is appreciated that the memory 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- OnlyMemory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and which is used as outside height Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 502 of system and method described herein be intended to including but not limited to these and arbitrarily its It is suitable for the memory of type.
In some embodiments, memory 502 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 5021 and application program 5022.
Wherein, operating system 5021, comprising various system programs, for example ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 5022, comprising various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method is may be embodied in application program 5022.In embodiments of the present invention, the program by calling memory 502 to store Or instruction, specifically, can be the program or instruction stored in application program 5022.By the touch-screen in user interface 503 Picture is uploaded onto the server or the operation from server download pictures by detection user, and is detected user input account name, added Close parameter etc. is operated.Processor 501 is used for recognizing the privacy area in original image;To the pixel in the privacy area Pixel value is modified, and obtains encrypting picture.
The method part that the embodiments of the present invention are disclosed is can apply in processor 501, or real by processor 501 Existing.Processor 501 is probably a kind of IC chip, the disposal ability with signal.During realization, said method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 501 or software form.Above-mentioned place Reason device 501 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and logic diagram.General Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with embodiment of the present invention institute The step of disclosed method, can be embodied directly in hardware decoding processor and execute and complete, or with the hardware in decoding processor And software module combination execution is completed.Software module may be located at random access memory, flash memory, read-only storage, may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 502, access times of the user in the reading memory 502 of processor 501 to application program, complete in conjunction with its hardware The step of stating method.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.Hardware is realized, processing unit can be implemented in one or more special IC (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, Controller, microcontroller, microprocessor, for executing in other electronic units of herein described function or its combination.
Software is realized, can be realized herein by the module (such as process, function etc.) of execution function described herein Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realize outside processor.
Alternatively, processor 501 is used for using the region for possessing default feature in the original image as privacy area, institute State at least one that default feature includes in herein below:Pre-set color feature, preset textural characteristics, preset shape feature and pre- If spatial relation characteristics.
Alternatively, processor 501 is used for:Whether the spot for photography for judging the original image is to preset place;When described When the spot for photography of original image is for presetting place, using the region for possessing default feature in the original image as privacy zone Domain.
Alternatively, processor 501 is used for:Privacy area in the identification encryption picture;To in the privacy area The pixel value of pixel is reduced, and obtains the original image.
Alternatively, processor 501 is used for:Corresponding encryption parameter is obtained according to ID;Based on the encryption parameter, Pixel value to the pixel in the privacy area carries out the first conversion, obtains encrypting picture;Processor 501 is additionally operable to basis ID obtains corresponding encryption parameter;Based on the encryption parameter, the pixel value to the pixel in the privacy area The second conversion is carried out, the original image is obtained, described second is transformed to the inverse transformation of the described first conversion.
Alternatively, processor 501 is used for:The encryption picture is uploaded onto the server;And, download from the server The encryption picture.
Mobile terminal 500 can realize each process that mobile terminal is realized in previous embodiment, for avoiding repeating, here Repeat no more.By embodiments of the invention, solve and be unfavorable for protecting in prior art individual privacy in user's picture Problem.By privacy places in automatic identification picture, and it is encrypted, the individual privacy being effectively protected in picture.Pass through Judge the spot for photography of picture, for the picture that non-default place shoots, it is believed that there is no the possibility for exposing individual privacy position Property, privacy area identification is not carried out, is directly uploaded onto the server or stores, improve the efficiency of picture processing.By to identification To picture in the view data of privacy area be encrypted, both can ensure that user can be with the figure in preview picture Picture, protects the individual privacy in picture again, improves Consumer's Experience further.
Embodiment five:
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 6 Can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer Deng.
Mobile terminal in Fig. 6 includes radio frequency (Radio Frequency, RF) circuit 610, memory 620, input block 630th, display unit 640, processor 660, voicefrequency circuit 670, communication module 680 and power supply 690.Voicefrequency circuit 670 is additionally operable to Play information of voice prompt.
Wherein, input block 630 can be used for the trigger action of receiving user's input, and produce the user with mobile terminal The relevant signal input of setting and function control.Specifically, in the embodiment of the present invention, the input block 630 can include to touch Control panel 631.Contact panel 631, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user Using any suitable object such as finger, stylus or operation of the annex on contact panel 631), and according to journey set in advance Formula drives corresponding attachment means.Optionally, contact panel 631 may include two portions of touch detecting apparatus and touch controller Point.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation brings is detected, transmit a signal to Touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives The processor 660, and the order sent of receiving processor 660 can be executed.Furthermore, it is possible to using resistance-type, condenser type, The polytype such as infrared ray and surface acoustic wave realizes contact panel 631.Except contact panel 631, input block 630 is acceptable Including other input equipments 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control Button processed, switch key etc.), trace ball, mouse, one or more in action bars etc..Input block 630 can also include to take the photograph As head, for shooting photo.
Wherein, display unit 640 can be used for display by the information of user input or be supplied to information and the movement of user The various menu interfaces of terminal 600.Display unit 640 may include display floater 641, optionally, can adopt LCD or organic The forms such as optical diode (OrganicLight-Emitting Diode, OLED) are configuring display floater 641.
It should be noted that contact panel 631 can cover display floater 641, touch display screen is formed, when the touch display screen inspection Measure thereon or after neighbouring touch operation, processor 660 is sent to determine the type of touch event, with preprocessor 660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible The interface element such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 660 is the control centre of mobile terminal 600, using various interfaces and connection whole mobile phone Various pieces, by running or executing software program and/or the module being stored in first memory 621, and call storage Data in second memory 622, execute various functions and the processing data of mobile terminal 600, so as to mobile terminal 600 Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/ Or the data in the second memory 622, processor 660 is for recognizing the privacy area in original image;To the privacy zone The pixel value of the pixel in domain is modified, and obtains encrypting picture.
Alternatively, processor 660 is used for using the region for possessing default feature in the original image as privacy area, institute State at least one that default feature includes in herein below:Pre-set color feature, preset textural characteristics, preset shape feature and pre- If spatial relation characteristics.
Alternatively, processor 660 is used for:Whether the spot for photography for judging the original image is to preset place;When described When the spot for photography of original image is for presetting place, using the region for possessing default feature in the original image as privacy zone Domain.
Alternatively, processor 660 is used for:Privacy area in the identification encryption picture;To in the privacy area The pixel value of pixel is reduced, and obtains the original image.
Alternatively, processor 660 is used for:Corresponding encryption parameter is obtained according to ID;Based on the encryption parameter, Pixel value to the pixel in the privacy area carries out the first conversion, obtains encrypting picture;Processor 660 is additionally operable to basis ID obtains corresponding encryption parameter;Based on the encryption parameter, the pixel value to the pixel in the privacy area The second conversion is carried out, the original image is obtained, described second is transformed to the inverse transformation of the described first conversion.
Alternatively, processor 660 is used for:The encryption picture is uploaded onto the server;And, download from the server The encryption picture.
It can be seen that, by the mobile terminal of the present embodiment, solve be unfavorable for protecting in prior art in user's picture The problem of people's privacy.By privacy places in automatic identification picture, and it is encrypted, the individual being effectively protected in picture is hidden Private.By judging the spot for photography of picture, for the picture that non-default place shoots, it is believed that there is no exposure individual privacy position Possibility, do not carry out privacy area identification, directly upload onto the server or store, improve the efficiency of picture processing.Pass through View data to the privacy area in the picture that recognizes is encrypted, and both can ensure that user can be with preview picture Image, protect the individual privacy in picture again, improve Consumer's Experience further.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually Executed with hardware or software mode, the application-specific depending on technical scheme and design constraint.Professional and technical personnel Each specific application can be used different methods to described function is realized, but this realization is it is not considered that exceed The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the movement of foregoing description The specific work process of terminal, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only schematically, for example division of the unit, is only A kind of division of logic function, can have when actually realizing other dividing mode, for example multiple units or component can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or discussed is mutual Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some interfaces Connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execute each embodiment methods described of the present invention all or part of step. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Each embodiment in this specification is all described by the way of going forward one by one, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.For mobile terminal reality For applying example, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part is referring to embodiment of the method Part explanation.

Claims (12)

1. a kind of image processing method, it is characterised in that include:
Privacy area in identification original image;
Pixel value to the pixel in the privacy area is modified, and obtains encrypting picture.
2. method according to claim 1, it is characterised in that the privacy area in the identification original image, including:
Using the region for possessing default feature in the original image as privacy area, the default feature is included in herein below At least one:Pre-set color feature, default textural characteristics, preset shape feature and pre-set space relationship characteristic.
3. method according to claim 2, it is characterised in that the area that will possess default feature in the original image Before domain is as privacy area, also include:
Whether the spot for photography for judging the original image is to preset place;
Described using the region for possessing default feature in the original image as privacy area, including:
When the spot for photography of the original image is for presetting place, the region for possessing default feature in the original image is made For privacy area.
4. method according to claim 1, it is characterised in that the pixel value of the pixel in the privacy area Modify, after obtaining encrypting picture, also include:
Privacy area in the identification encryption picture;
Pixel value to the pixel in the privacy area is reduced, and obtains the original image.
5. method according to claim 4, it is characterised in that the pixel value of the pixel in the privacy area Modify, obtain picture is encrypted, including:
Corresponding encryption parameter is obtained according to ID;
Based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the first conversion, obtains encryption figure Piece;
The pixel value of the pixel in the privacy area is reduced, and obtains the original image, including:
Corresponding encryption parameter is obtained according to ID;
Based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the second conversion, obtains the original Beginning picture, described second is transformed to the inverse transformation of the described first conversion.
6. method according to claim 4, it is characterised in that the pixel value of the pixel in the privacy area Modify, after obtaining the step of encrypting picture, also include:
The encryption picture is uploaded onto the server;
Described identification described encryption picture in privacy area the step of before, also include:
The encryption picture is downloaded from the server.
7. a kind of mobile terminal, it is characterised in that include:
First privacy identification module, for recognizing the privacy area in original image;
Encryption processing module, for recognizing the pixel of the pixel in the privacy area for obtaining to the first privacy identification module Value is modified, and obtains encrypting picture.
8. mobile terminal according to claim 7, it is characterised in that the first privacy identification module, for will be described Possesses the region of default feature in original image as privacy area, the default feature includes in herein below at least one ?:Pre-set color feature, default textural characteristics, preset shape feature and pre-set space relationship characteristic.
9. mobile terminal according to claim 8, it is characterised in that also include:
Spot for photography judge module, whether the spot for photography for judging the original image is to preset place;
The first privacy identification module is further used for, when the spot for photography of the original image is for presetting place, by institute The region for possessing default feature in original image is stated as privacy area.
10. mobile terminal according to claim 7, it is characterised in that also include:
Second privacy identification module, for recognizing the privacy area in the encryption picture;
Decryption processing module, for recognizing the pixel of the pixel in the privacy area for obtaining to the second privacy identification module Value is reduced, and obtains the original image.
11. mobile terminals according to claim 10, it is characterised in that the encryption processing module includes:
First encryption parameter acquiring unit, for obtaining corresponding encryption parameter according to ID;
Ciphering unit, for being based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the first change Change, obtain encrypting picture;
The decryption processing module includes:
Second encryption parameter acquiring unit, for obtaining corresponding encryption parameter according to ID;
Decryption unit, for being based on the encryption parameter, the pixel value to the pixel in the privacy area carries out the second change Change, the original image is obtained, described second is transformed to the inverse transformation of the described first conversion.
12. mobile terminals according to claim 10, it is characterised in that also include:
Upper transmission module, for uploading onto the server the encryption picture;And,
Download module, for downloading the encryption picture from the server.
CN201610857068.0A 2016-09-27 2016-09-27 A kind of image processing method and mobile terminal Pending CN106485164A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610857068.0A CN106485164A (en) 2016-09-27 2016-09-27 A kind of image processing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610857068.0A CN106485164A (en) 2016-09-27 2016-09-27 A kind of image processing method and mobile terminal

Publications (1)

Publication Number Publication Date
CN106485164A true CN106485164A (en) 2017-03-08

Family

ID=58268040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610857068.0A Pending CN106485164A (en) 2016-09-27 2016-09-27 A kind of image processing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106485164A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953863A (en) * 2017-03-24 2017-07-14 联想(北京)有限公司 A kind of synchronous method and device
CN107122679A (en) * 2017-05-16 2017-09-01 北京小米移动软件有限公司 Image processing method and device
CN107545165A (en) * 2017-08-16 2018-01-05 惠州Tcl移动通信有限公司 A kind of mobile terminal and its fingerprint image processing method and storage medium
CN107770443A (en) * 2017-10-26 2018-03-06 努比亚技术有限公司 A kind of image processing method, mobile terminal and computer-readable recording medium
CN108040297A (en) * 2017-12-06 2018-05-15 宁波亿拍客网络科技有限公司 A kind of video image, audio-frequency information mandate access method and system
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能***有限公司 A kind of monitoring method and device for protecting privacy
CN108733690A (en) * 2017-04-18 2018-11-02 阿里巴巴集团控股有限公司 Image data recording method, device and electronic equipment
CN109934265A (en) * 2019-02-15 2019-06-25 同盾控股有限公司 A kind of determination method and apparatus of resident address
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device
CN110582010A (en) * 2019-09-30 2019-12-17 上海依图网络科技有限公司 Video/picture encryption transmission method and device, electronic equipment and storage medium
CN110686353A (en) * 2019-09-26 2020-01-14 珠海格力电器股份有限公司 Image control method and device, storage medium and air conditioner
CN111294574A (en) * 2018-12-10 2020-06-16 苹果公司 Pixel-by-pixel filter
WO2020135038A1 (en) * 2018-12-29 2020-07-02 上海掌门科技有限公司 Image processing method, electronic apparatus, and computer readable medium
CN112449102A (en) * 2019-09-03 2021-03-05 联发科技股份有限公司 Private image encryption method and device
CN113344790A (en) * 2021-06-30 2021-09-03 北京奇艺世纪科技有限公司 Picture processing method and device, electronic equipment and storage medium
CN113393471A (en) * 2021-05-26 2021-09-14 中国联合网络通信集团有限公司 Image processing method and device
CN114363474A (en) * 2022-03-17 2022-04-15 深圳市利诺威科技有限公司 Image transmission method and system
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images
CN103942469A (en) * 2014-04-14 2014-07-23 小米科技有限责任公司 Picture processing method, device and terminal
CN105354509A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Picture processing method and processing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images
CN103942469A (en) * 2014-04-14 2014-07-23 小米科技有限责任公司 Picture processing method, device and terminal
CN105354509A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Picture processing method and processing system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953863B (en) * 2017-03-24 2020-08-25 联想(北京)有限公司 Synchronization method and device
CN106953863A (en) * 2017-03-24 2017-07-14 联想(北京)有限公司 A kind of synchronous method and device
CN108733690A (en) * 2017-04-18 2018-11-02 阿里巴巴集团控股有限公司 Image data recording method, device and electronic equipment
CN107122679A (en) * 2017-05-16 2017-09-01 北京小米移动软件有限公司 Image processing method and device
CN107545165A (en) * 2017-08-16 2018-01-05 惠州Tcl移动通信有限公司 A kind of mobile terminal and its fingerprint image processing method and storage medium
CN107770443A (en) * 2017-10-26 2018-03-06 努比亚技术有限公司 A kind of image processing method, mobile terminal and computer-readable recording medium
CN108040297A (en) * 2017-12-06 2018-05-15 宁波亿拍客网络科技有限公司 A kind of video image, audio-frequency information mandate access method and system
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能***有限公司 A kind of monitoring method and device for protecting privacy
CN108040230B (en) * 2017-12-19 2020-02-07 司马大大(北京)智能***有限公司 Monitoring method and device for protecting privacy
US11301966B2 (en) 2018-12-10 2022-04-12 Apple Inc. Per-pixel filter
CN111294574A (en) * 2018-12-10 2020-06-16 苹果公司 Pixel-by-pixel filter
WO2020135038A1 (en) * 2018-12-29 2020-07-02 上海掌门科技有限公司 Image processing method, electronic apparatus, and computer readable medium
CN109934265A (en) * 2019-02-15 2019-06-25 同盾控股有限公司 A kind of determination method and apparatus of resident address
CN110427761A (en) * 2019-07-08 2019-11-08 维沃移动通信有限公司 A kind of reminding method and terminal device
CN112449102A (en) * 2019-09-03 2021-03-05 联发科技股份有限公司 Private image encryption method and device
CN112449102B (en) * 2019-09-03 2022-05-31 联发科技股份有限公司 Private image encryption method and device
CN110686353A (en) * 2019-09-26 2020-01-14 珠海格力电器股份有限公司 Image control method and device, storage medium and air conditioner
CN110582010A (en) * 2019-09-30 2019-12-17 上海依图网络科技有限公司 Video/picture encryption transmission method and device, electronic equipment and storage medium
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album
CN114817938B (en) * 2021-01-28 2024-05-17 海信集团控股股份有限公司 Method and equipment for accessing shared album and protecting private pictures of shared album
CN113393471A (en) * 2021-05-26 2021-09-14 中国联合网络通信集团有限公司 Image processing method and device
CN113344790A (en) * 2021-06-30 2021-09-03 北京奇艺世纪科技有限公司 Picture processing method and device, electronic equipment and storage medium
CN114363474A (en) * 2022-03-17 2022-04-15 深圳市利诺威科技有限公司 Image transmission method and system

Similar Documents

Publication Publication Date Title
CN106485164A (en) A kind of image processing method and mobile terminal
CN105354466B (en) A kind of fingerprint identification method and mobile terminal
CN106358069A (en) Video data processing method and mobile terminal
CN106055996A (en) Method and mobile terminal for multimedia information sharing
CN106022196A (en) Information sharing method and intelligent terminal
CN107169329A (en) A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN107145795A (en) Screenshot method, device and computer equipment
CN106937055A (en) A kind of image processing method and mobile terminal
CN105959564B (en) A kind of photographic method and mobile terminal
CN107256555A (en) A kind of image processing method, device and storage medium
CN107527040A (en) A kind of method and apparatus of recognition of face
CN107678644A (en) A kind of image processing method and mobile terminal
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN107741820A (en) A kind of entering method keyboard display methods and mobile terminal
CN106657793A (en) Image processing method and mobile terminal
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN106648382A (en) Picture browsing method and mobile terminal
CN107643912A (en) A kind of information sharing method and mobile terminal
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN106408628B (en) A kind of image processing method and device
CN107644170A (en) A kind of image processing method and mobile terminal
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN106598623A (en) Picture combination template generation method and mobile terminal
CN107229396A (en) A kind of hiding method of mobile terminal application icon and mobile terminal
CN107590465A (en) A kind of image processing method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308