Encryption method, encryption system, decryption method and decryption system of picture

An encryption method and encryption system technology, applied in the field of encryption system, photo encryption method, decryption method and decryption system, can solve problems such as poor security performance, inability to encrypt in real time, and untargeted encryption targets, etc., to achieve high security Effect

Active Publication Date: 2016-02-17
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the purpose of the present invention is to provide an encryption method, encryption system, decryption method and decryption system for photos, which can solve the technical problems in the prior art that cannot be encrypted in real time, have no specificity to the encryption target, and have poor security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, encryption system, decryption method and decryption system of picture
  • Encryption method, encryption system, decryption method and decryption system of picture
  • Encryption method, encryption system, decryption method and decryption system of picture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] see figure 1 , which is a schematic flow chart of the photo encryption method provided by the embodiment of the present invention.

[0042] Specifically, the encryption method of the photos includes:

[0043] In step S101, when taking a photo of a portrait, an iris image of the portrait is acquired.

[0044] It can be understood that the acquisition of the iris image specifically includes:

[0045] (1) Obtain an iris image through the camera when taking a portrait photo; or

[0046] (2) After the portrait photo is taken, the iris image is intercepted from the portrait photo.

[0047] In step S102, iris features are extracted from the iris image, and encoded to form an iris code.

[0048] It can be understood that this step specifically includes:

[0049] (1) Position the iris by determining the positions of the inner circle (the boundary between the iris and the pupil), the outer circle (the boundary between the iris and the sclera) and the quadratic curve (the bou...

Embodiment 2

[0057] see figure 2 , which is a schematic flow chart of the photo encryption method provided by the embodiment of the present invention. figure 2 neutralize figure 1 The same steps still start with S1, with figure 1 Different steps start with S2 to show their differences.

[0058] Specifically, the encryption method of the photos includes:

[0059] In step S201, after the camera mode is turned on, count the number of people in the camera.

[0060] The step of counting the number of people in the mirror specifically includes:

[0061] (1) Mark the portrait in the mirror through the display frame;

[0062] (2) receiving a trigger instruction for each display frame; and

[0063] (3) Counting the number of triggering instructions as the number of people entering the camera.

[0064] It can be understood that, by triggering the image of the person entering the mirror through the display frame, it is possible to effectively avoid collecting iris information of irrelevant p...

Embodiment 3

[0086] see image 3 , is a block diagram of the photo encryption system provided by the embodiment of the present invention.

[0087] Specifically, the photo encryption system 300 includes:

[0088] The statistics module 31 is used for counting the number of people in the mirror, and judging whether the number of people in the mirror is greater than 1.

[0089] Specifically, the statistics module 31 includes: a marking submodule 311 , a triggering submodule 312 , and a statistics submodule 313 . Wherein, the marking sub-module 311 is used to mark the portrait of the person in the mirror through the display frame. The trigger sub-module 312 is configured to receive a trigger instruction for each display frame. The counting sub-module 313 is used to count the number of triggering instructions as the number of people entering the camera.

[0090] It can be understood that, by triggering the image of the person entering the mirror through the display frame, it is possible to e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method, an encryption system, a decryption method and a decryption system of a picture. The encryption method comprises the steps that when a figure picture is photographed, acquiring an iris image of a figure; extracting iris characteristics from the iris image, and coding to form an iris code; encrypting the figure picture in real time by virtue of the iris code; and storing the figure picture which is encrypted in real time. According to the method, the figure picture is coded by acquiring the iris image, an encryption object is selected on purpose, the real-time encryption of the picture is realized, and the safety is high.

Description

technical field [0001] The invention belongs to the field of Internet network security, and in particular relates to an encryption method, an encryption system, a decryption method and a decryption system for photos. Background technique [0002] The popularity of smart terminal devices has brought great joy to users' lives, for example, they can take pictures anytime and anywhere to save or share beautiful moments. [0003] However, in today's increasingly concerned about personal privacy, improper handling of files such as photos may cause trouble for users. The current photo encryption method is usually to encrypt the folder where the photos are stored through mobile phone housekeeper software, so that other people cannot see the user's photos even if they get the mobile phone. [0004] There are following problems in the above-mentioned method for folder encryption: [0005] First, non-real-time encryption requires users to set up the photos they have taken or stored; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 张海平周意保
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products