CN104680078A - Method and system for taking photos and checking images and terminal - Google Patents
Method and system for taking photos and checking images and terminal Download PDFInfo
- Publication number
- CN104680078A CN104680078A CN201510029022.5A CN201510029022A CN104680078A CN 104680078 A CN104680078 A CN 104680078A CN 201510029022 A CN201510029022 A CN 201510029022A CN 104680078 A CN104680078 A CN 104680078A
- Authority
- CN
- China
- Prior art keywords
- encrypted data
- data chunk
- picture file
- photo
- indication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a method for taking photos. The method includes that when a security photo mode is detected to be in the open state, photos taken are subjected to encryption processing and storage. The invention further discloses a method for checking images, the method includes: analyzing image files and determining positions of encrypted data blocks when determining instruction information used for instructing encryption is carried in the image files; acquiring data of original photos and displaying the same after the encrypted data blocks are decrypted successfully, wherein the image files carrying the instruction information are spliced by first image files and the encrypted data blocks, the first image files contain instructed images, and the encrypted data blocks are data blocks acquired after the original photos are encrypted. With the method for taking the photos and checking the images, encrypted photos can be taken and checked. The invention further discloses a terminal corresponding to systems.
Description
Technical field
The present invention relates to field of terminal technology, in particular a kind of method, the method for checking picture, system and terminal of taking pictures.
Background technology
One of function that modern cell phones is the most frequently used is exactly take pictures, so usually store the photo that a large amount of use mobile phones shoots in the mobile phone (comprising mobile phone memory card) of user.
But fall into other staff once mobile phone or storage card, the privacy of user the most easily revealed is exactly the photo be stored on mobile phone.In addition, people also to like oneself with the photo of mobile phone shooting by network sharing to friend, and they use chat software of koinotropic type to carry out sharing (such as micro-letter) usually, and this kind of software all has and sends the function of picture.The use-pattern of this function is normally: directly open after camera is taken pictures when chatting and send immediately, or opens picture library when chatting and select existing photo to send.But the mode of this share photos exists potential safety hazard: photo may be intercepted and captured by hacker in the process of transmission over networks, thus reveal the privacy of user.
In addition, itself also there is potential safety hazard in mobile phone, once mobile phone has suffered trojan horse, then the photo files that user is stored on mobile phone can be got by the person of stealing secret information.Such as, the person of stealing secret information pretends a Games Software and uses to user, the picture file (such as, jpg file) that built-in wooden horse is all on backstage stealthily scanning cell phone, and after the picture scanned is carried out convergent-divergent, the server of the person of stealing secret information oneself is passed in packing.
Therefore, how meeting the protection demand of user's comparison film privacy, is the technical issues that need to address.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of method, the method for checking picture, system and terminal of taking pictures, a kind of safe exposal model can be provided, the photo taken in this mode can encrypting storing, use picture inspection method of the present invention to check described encryption photo and successful decryption, the true content of encryption photo can be seen.
In order to solve the problems of the technologies described above, the invention provides a kind of method of taking pictures, the method comprises:
Detect safe exposal model and whether be in opening;
When safe exposal model is in opening, the photo of shooting is encrypted and is preserved.
Further, the method also comprises following feature:
The photo of shooting is encrypted and is preserved, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
Further, the method also comprises following feature:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, the method also comprises following feature:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, the method also comprises following feature:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, the method also comprises following feature:
The photo of shooting is encrypted, generates encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
In order to solve the problems of the technologies described above, the invention provides a kind of method of checking picture, the method comprises:
Resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information;
Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Further, the method also comprises following feature:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
Further, the method also comprises following feature:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
Further, the method also comprises following feature:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
Further, the method also comprises following feature:
Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
In order to solve the problems of the technologies described above, the invention provides a kind of system of taking pictures, comprising:
Whether detection module, be in opening for detecting safe exposal model;
Safe photo module, for when safe exposal model is in opening, is encrypted the photo of shooting and preserves.
Further, this system also comprises following feature:
Safe photo module, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
Further, this system also comprises following feature:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this system also comprises following feature:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this system also comprises following feature:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this system also comprises following feature:
Safe photo module, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
In order to solve the problems of the technologies described above, the invention provides a kind of system of checking picture, comprising:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determines the position of the encrypted data chunk comprised in described picture file according to described indication information;
Deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Further, this system also comprises following feature:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
Further, this system also comprises following feature:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
Further, this system also comprises following feature:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
Further, this system also comprises following feature:
Deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
In order to solve the problems of the technologies described above, present invention also offers a kind of terminal, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to whether be in opening for detecting safe exposal model, when safe exposal model is in opening, the photo of shooting is encrypted and is preserved.
Further, this terminal also comprises following feature:
Described processor, it is configured to, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
Further, this terminal also comprises following feature:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this terminal also comprises following feature:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this terminal also comprises following feature:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Further, this terminal also comprises following feature:
Described processor, it is configured to, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
In order to solve the problems of the technologies described above, present invention also offers a kind of terminal, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information; Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Further, this terminal also comprises following feature:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
Further, this terminal also comprises following feature:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
Further, this terminal also comprises following feature:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
Further, this terminal also comprises following feature:
Described processor, it is configured to for reading described encrypted data chunk and being decrypted, and after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
Compared with prior art; a kind of method, the method for checking picture, system and terminal of taking pictures provided by the invention; the photo taken under safe exposal model of terminal can encrypting storing; if successful decryption when using picture inspection method of the present invention to check described encryption photo; then can see the true content of encryption photo; otherwise only can see schematic images and can't see the true content of encrypting photo, thus the photo privacy of protection user.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of method of taking pictures of the embodiment of the present invention.
Fig. 2 is the structural representation of described encryption photo files (for JPG form) of the present invention.
Fig. 3 is a kind of process flow diagram checking the method for picture of the embodiment of the present invention.
Fig. 4 is the structural representation of a kind of system of taking pictures of the embodiment of the present invention.
Fig. 5 is a kind of structural representation checking the system of picture of the embodiment of the present invention.
Fig. 6 is the structural representation of a kind of terminal (having safe exposal model) of the embodiment of the present invention.
Fig. 7 is the structural representation of a kind of terminal (can check encryption photo) of the embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
Photo be all by terminal bottom frame according to upper layer application request take and display.The bottom frame of mobile phone of the present invention can provide a kind of safe exposal model; the photo taken in this mode is directly encrypted; the correct decruption key of acquisition is only had to show; otherwise cannot see the true picture (comprising the situation being copied to by photo and PC carries out show) of photo and can only to identify this be a photo, thus reach the object of protection user picture privacy.
The photo storage of taking under safe mode is for after encryption photo files, and the storage format of this encryption photo files remains normal file layout, but it has some distinguishable features.Software (being no matter the software on PC or the software on mobile phone) can demonstrate an instruction picture (instruction picture is for representing that this is an encryption photo) to use normal picture to check, also be, what this encryption photo files showed when being in non-decrypted state is not real pictures, but to human eye, a width can illustrate that this is the instruction picture of an encryption photo, can accomplish that this point is relevant with the structure of encryption photo files of the present invention.In encryption photo files structure of the present invention, instruction picture data be placed on before, the picture data block after encryption is put behind (being actually a pile mess code).
Picture present invention utilizes the fault tolerant mechanism of modern image handle software to conventional picture format: because always likely there will be error of transmission in transmitting procedure, so modern image handle software carries out fault-tolerant processing to picture as far as possible, ensure that user can see picture, an important mechanisms is had to be in these fault tolerant mechanisms: if read the end mark that file layout specifies, just terminate, no longer down read byte.The form of picture file is very various, with conventional JPG form, (meaning of JPG form mentioned here refers to the file memory format of JPG image, such as JFIF (JPEG File Interchange Format, JPEG archives Interchange Format) or EXIF (Exchangeable Image File, exchangeable image file) storage format) be example, JPG file layout always with FFD8 beginning, ends up with FFD9.Till normal picture checks that software generally reads FFD9, the byte of adding after FFD9 can not have influence on the display of picture.
As shown in Figure 1, embodiments provide a kind of method of taking pictures, the method comprises:
S10, detects safe exposal model and whether is in opening;
S20, when safe exposal model is in opening, is encrypted the photo of shooting and preserves;
Described method of taking pictures can also comprise following feature:
Wherein, when safe exposal model is in closed condition, the source document of the photo of shooting is not encrypted, directly preserves described source document;
Wherein, the photo of shooting is encrypted and is preserved, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve;
Wherein, described instruction picture is to human eye, a width can illustrate that this is the picture of an encryption photo;
Wherein, the storage format of described first picture file can be EXIF (Exchangeable Image File, exchangeable image file) form or JFIF (JPEG File Interchange Format, JPEG archives Interchange Format) form;
Wherein, the raw data format of the photo of described shooting can be any image form;
Wherein, generate instruction picture, comprising:
Generation can show the picture of the descriptive information of the photo of described shooting; Wherein, described descriptive information can comprise: system is the file name information that the photo of described shooting generates; Such as, indicate on picture and show below information: IMG_20141205124530.jpg;
Wherein, described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo;
Preferably, the storage format of described first picture file can be EXIF form;
Wherein, described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo;
Wherein, described second indication information is the character string of regular length, and described designator bit is on the fixed position of described character string;
Wherein, described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo;
Wherein, described 3rd indication information is the character string of regular length, and described designator bit is on the fixed position of described character string;
Wherein, the photo of shooting is encrypted, generates encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk;
Utilize Crypted password to be encrypted data, can adopt existing data ciphering method, generally, generate encryption key according to Crypted password, recycling encryption key is encrypted data by cryptographic algorithm.During deciphering, according to clear crytpographic key generating solution decryption key, recycling decruption key is decrypted the data block after encryption by decipherment algorithm.Decrypting process is corresponding with ciphering process.
As shown in Figure 2, the photo that the present invention takes under safe exposal model generates encrypted data chunk (in accompanying drawing 2 102) after encryption, by described encrypted data chunk splicing after the EOF FFD9 of the first picture file (in accompanying drawing 2 101).Original photo before encryption can be any image form or even RAW (without processing) format picture.
Normal picture check software check in this programme encrypt photo files time, the EOF FFD9 that it only can read the first picture file (comprising an instruction picture) just terminates, only instruction picture is shown, and neglect instruction picture data below.
The photo taken under terminal of the present invention (having encryption photo look facility) can identify safe exposal model is encryption photo files, when user inputs correct clear crytpographic key, is decrypted by encryption photo and is shown to user.
The photo taken under going out safe exposal model to allow terminal recognition, needs to add some distinguishable features in encryption photo files, has two kinds of optional schemes:
1) scheme one,
The indication information of instruction encryption can be added in the picture detailed description information of the first picture file and go (generally in File header information), such as, be designed with data segment specially in EXIF storage format, describe information in detail for subsidiary picture.
Such as: we can " author " in the picture detailed description information of instruction picture insert " WindtalkerXXXXXXXX " in this, and just can tell this photo files according to " Windtalker " when terminal reads this is encrypt file; And XXXXXXXX is the sexadecimal number word string being fixed as 8 bit lengths, represent the length of encrypted data chunk.
2) scheme two,
Between the first picture file and encrypted data chunk, or after encrypted data chunk, add the character string of regular length.Described character string is using special character sequence as beginning.
Such as: after encrypted data chunk, add character string " WindtalkerXXXXXXXX ".During this encryption photo files of terminal parses, read encryption photo files last 18 bytes be " Windtalker " at the first bruss, judge this file be encryption photo files.And XXXXXXXX is the sexadecimal number word string being fixed as 8 bit lengths, represent the length of encrypted data chunk.
Safe exposal model provides the suspended window swum on screen, above has two buttons; One of them button is switch, for quick opening/closing " safe exposal model "; There is input cryptographic session frame in another button, is convenient to user and inputs Crypted password fast after clicking, after described Crypted password input, before " safe exposal model " closes, this Crypted password can continuously effective.
As shown in Figure 3, embodiments provide a kind of method of checking picture, the method comprises:
S10, resolves picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determines the position of the encrypted data chunk comprised in described picture file according to described indication information;
S20, reads described encrypted data chunk and is decrypted, and after successful decryption, obtains the data of original photo, shows described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Describedly check that the method for picture can also comprise following feature:
Wherein, resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information;
Wherein, described instruction picture can also show the descriptive information of the photo of described shooting; Wherein, described descriptive information can comprise: system is the file name information that the photo of described shooting generates; Such as, indicate on picture and show below information: IMG_20141205124530.jpg;
Preferably, the storage format of described first picture file can be EXIF form;
Wherein, resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information;
Wherein, described second indication information is the character string of regular length, comprises the length information for the designator and encrypted data chunk representing encryption, and described designator bit is on the fixed position of described character string;
Wherein, resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information;
Wherein, described 3rd indication information is the character string of regular length, comprises the length information for the designator and encrypted data chunk representing encryption, and described designator bit is on the fixed position of described character string;
Wherein, read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo;
After prompting user inputs password, when not receiving clear crytpographic key or clear crytpographic key mistake, also comprise:
As resolved the first picture file and obtaining instruction picture, then show described instruction picture;
As also do not resolved the first picture file, then described first picture file being resolved, after the described instruction picture of acquisition, described instruction picture being shown;
As shown in Figure 4, embodiments provide a kind of system of taking pictures, comprising:
Whether detection module, be in opening for detecting safe exposal model;
Safe photo module, for when safe exposal model is in opening, is encrypted the photo of shooting and preserves.
Described system of taking pictures can also comprise following feature:
Wherein, safe photo module, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
Wherein, safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, safe photo module, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
As shown in Figure 5, embodiments provide a kind of system of checking picture, comprising:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determines the position of the encrypted data chunk comprised in described picture file according to described indication information;
Deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Describedly check that the system of picture can also comprise following feature:
Wherein, parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
Wherein, parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
Wherein, parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
Wherein, deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
As shown in Figure 6, embodiments provide a kind of terminal, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to whether be in opening for detecting safe exposal model, when safe exposal model is in opening, the photo of shooting is encrypted and is preserved.
Described terminal can also comprise following feature:
Wherein, described processor, it is configured to, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
Wherein, described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
Wherein, described processor, it is configured to, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
As shown in Figure 7, the embodiment of the present invention additionally provides a kind of terminal, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information; Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
Described terminal can also comprise following feature:
Wherein, described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
Wherein, described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
Wherein, described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
Wherein, described processor, it is configured to for reading described encrypted data chunk and being decrypted, and after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
A kind of method, the method for checking picture, system and terminal of taking pictures that above-described embodiment provides; the photo taken under safe exposal model of terminal can encrypting storing; if successful decryption when using picture inspection method of the present invention to check described encryption photo; then can see the true content of encryption photo; otherwise only can see schematic images and can't see the true content of encrypting photo, thus the photo privacy of protection user.
The all or part of step that one of ordinary skill in the art will appreciate that in said method is carried out instruction related hardware by program and is completed, and described program can be stored in computer-readable recording medium, as ROM (read-only memory), disk or CD etc.Alternatively, all or part of step of above-described embodiment also can use one or more integrated circuit to realize, and correspondingly, each module/unit in above-described embodiment can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
It should be noted that; the present invention also can have other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art can make various corresponding change and distortion according to the present invention, but these change accordingly and are out of shape the protection domain that all should belong to the claim appended by the present invention.
Claims (33)
1. a method of taking pictures, the method comprises:
Detect safe exposal model and whether be in opening;
When safe exposal model is in opening, the photo of shooting is encrypted and is preserved.
2. the method for claim 1, is characterized in that:
The photo of shooting is encrypted and is preserved, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
3. method as claimed in claim 2, is characterized in that:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
4. method as claimed in claim 2, is characterized in that:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
5. method as claimed in claim 2, is characterized in that:
Described first picture file and described encrypted data chunk are spliced, generate encryption photo files and preserve, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
6. method as claimed in claim 2, is characterized in that:
The photo of shooting is encrypted, generates encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
7. check a method for picture, the method comprises:
Resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information;
Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
8. method as claimed in claim 7, is characterized in that:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
9. method as claimed in claim 7, is characterized in that:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
10. method as claimed in claim 7, is characterized in that:
Resolve picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
11. methods as claimed in claim 7, is characterized in that:
Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
12. 1 kinds of systems of taking pictures, comprising:
Whether detection module, be in opening for detecting safe exposal model;
Safe photo module, for when safe exposal model is in opening, is encrypted the photo of shooting and preserves.
13. systems as claimed in claim 12, is characterized in that:
Safe photo module, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
14. systems as claimed in claim 13, is characterized in that:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
15. systems as claimed in claim 13, is characterized in that:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
16. systems as claimed in claim 13, is characterized in that:
Safe photo module, for described first picture file and described encrypted data chunk being spliced, generating encryption photo files and preserving, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
17. systems as claimed in claim 13, is characterized in that:
Safe photo module, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
18. 1 kinds of systems of checking picture, comprising:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determines the position of the encrypted data chunk comprised in described picture file according to described indication information;
Deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
19. systems as claimed in claim 18, is characterized in that:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
20. systems as claimed in claim 18, is characterized in that:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
21. systems as claimed in claim 18, is characterized in that:
Parsing module, for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file according to described indication information, comprising:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
22. systems as claimed in claim 18, is characterized in that:
Deciphering module, for reading described encrypted data chunk and being decrypted, after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
23. 1 kinds of terminals, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to whether be in opening for detecting safe exposal model, when safe exposal model is in opening, the photo of shooting is encrypted and is preserved.
24. terminals as claimed in claim 23, is characterized in that:
Described processor, it is configured to, for being encrypted the photo of shooting and preserving, comprising:
Generate the first picture file, described first picture file comprises the instruction picture being used to indicate encryption photo;
The photo of shooting is encrypted, generates encrypted data chunk;
Described first picture file and described encrypted data chunk are spliced, generates encryption photo files and preserve.
25. terminals as claimed in claim 24, is characterized in that:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file and encrypted data chunk and preserves, in described encryption photo files, carry the first indication information in the File header information of described first picture file, described encrypted data chunk splicing is after the EOF of described first picture file;
Wherein, described first indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
26. terminals as claimed in claim 24, is characterized in that:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the second indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, after described second indication information is added on described encrypted data chunk;
Wherein, described second indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
27. terminals as claimed in claim 24, is characterized in that:
Described processor, it is configured to for described first picture file and described encrypted data chunk being spliced, and generates encryption photo files and preserves, comprising:
Generation comprises the encryption photo files of the first picture file, encrypted data chunk and the 3rd indication information and preserves, in described encryption photo files, described encrypted data chunk splices after the EOF of described first picture file, between the EOF that described 3rd indication information is added on described first picture file and described encrypted data chunk;
Wherein, described 3rd indication information is used to indicate encryption photo, wherein comprises the length information of described encrypted data chunk and the designator for representing encryption photo.
28. terminals as claimed in claim 24, is characterized in that:
Described processor, it is configured to, for being encrypted the photo of shooting, generating encrypted data chunk, comprising:
When user is provided with the Crypted password under safe exposal model, utilizes the photo of described Crypted password to shooting to be encrypted, generate encrypted data chunk; When user does not arrange the Crypted password under safe exposal model, prompting user arranges Crypted password, after the Crypted password getting user's setting, utilizes the photo of described Crypted password to shooting to be encrypted, generates encrypted data chunk.
29. 1 kinds of terminals, comprising:
Storer, for storing instruction;
Processor, it is coupled with described storer, described processor is configured to perform the instruction stored in which memory, wherein, described processor is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determine the position of the encrypted data chunk comprised in described picture file according to described indication information; Read described encrypted data chunk and be decrypted, after successful decryption, obtaining the data of original photo, show described original photo;
Wherein, the picture file carrying described indication information is spliced by the first picture file and encrypted data chunk, and described first picture file comprises instruction picture, and described encrypted data chunk is data block original photo being encrypted to rear acquisition.
30. terminals as claimed in claim 29, is characterized in that:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
The first picture file is parsed from the front portion of described picture file, carry the first indication information being used to indicate encryption photo in the File header information determining described first picture file after, after determining that described encrypted data chunk is positioned at the EOF of described first picture file, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described first indication information.
31. terminals as claimed in claim 29, is characterized in that:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
Attempt extracting the second indication information being used to indicate encryption photo from the afterbody of described picture file, as extracted, before then determining that described encrypted data chunk is positioned at described second indication information, determine the reference position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described second indication information.
32. terminals as claimed in claim 29, is characterized in that:
Described processor, it is configured to for resolving picture file, when determining to carry in described picture file the indication information being used to indicate encryption photo, determining the position of the encrypted data chunk comprised in described picture file, comprising according to described indication information:
The first picture file is parsed from the front portion of described picture file, attempt extracting the 3rd indication information being used to indicate encryption photo after the EOF of described first picture file, as extracted, after then determining that described encrypted data chunk is positioned at described 3rd indication information, determine the end position of described encrypted data chunk according to the length information of the encrypted data chunk comprised in described 3rd indication information.
33. terminals as claimed in claim 29, is characterized in that:
Described processor, it is configured to for reading described encrypted data chunk and being decrypted, and after successful decryption, obtains the data of original photo, shows described original photo, comprising:
Read described encrypted data chunk, prompting user inputs clear crytpographic key, after the clear crytpographic key receiving user's input, according to described clear crytpographic key, described encrypted data chunk is decrypted, as successful decryption, then obtain the original photo data before encryption, show described original photo.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510029022.5A CN104680078B (en) | 2015-01-20 | 2015-01-20 | Method for shooting picture, method, system and terminal for viewing picture |
PCT/CN2015/087534 WO2016115888A1 (en) | 2015-01-20 | 2015-08-19 | Photograph capturing method, image viewing method, system, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510029022.5A CN104680078B (en) | 2015-01-20 | 2015-01-20 | Method for shooting picture, method, system and terminal for viewing picture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104680078A true CN104680078A (en) | 2015-06-03 |
CN104680078B CN104680078B (en) | 2021-09-03 |
Family
ID=53315105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510029022.5A Active CN104680078B (en) | 2015-01-20 | 2015-01-20 | Method for shooting picture, method, system and terminal for viewing picture |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104680078B (en) |
WO (1) | WO2016115888A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
WO2016115888A1 (en) * | 2015-01-20 | 2016-07-28 | 中兴通讯股份有限公司 | Photograph capturing method, image viewing method, system, and terminal |
WO2016115912A1 (en) * | 2015-01-20 | 2016-07-28 | 中兴通讯股份有限公司 | Image encryption method, image viewing method, system, and terminal |
CN106326762A (en) * | 2016-10-17 | 2017-01-11 | 广东七洲科技股份有限公司 | Data protection method realizing encryption while shooting for mobile terminal |
CN106445324A (en) * | 2016-08-29 | 2017-02-22 | 珠海市魅族科技有限公司 | Photo sending method and device |
CN106650469A (en) * | 2016-10-12 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Photo processing method and terminal device |
CN107145794A (en) * | 2017-04-20 | 2017-09-08 | 北京安云世纪科技有限公司 | A kind of data processing method and device and mobile terminal |
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
CN110061835A (en) * | 2019-03-28 | 2019-07-26 | 东南大学 | A kind of safe capture apparatus and its implementation |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030174893A1 (en) * | 2002-03-18 | 2003-09-18 | Eastman Kodak Company | Digital image storage method |
US6839844B1 (en) * | 2000-01-03 | 2005-01-04 | Hirokazu Okano | Image encryption method and device |
CN1922544A (en) * | 2004-02-19 | 2007-02-28 | 创新科技有限公司 | Method and apparatus for providing a combined image |
CN101459807A (en) * | 2007-12-12 | 2009-06-17 | 佛山普立华科技有限公司 | Image ciphering/deciphering system and method |
CN103400064A (en) * | 2013-08-20 | 2013-11-20 | 北京网秦天下科技有限公司 | Method and equipment for encrypting and decrypting file |
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101359989A (en) * | 2008-09-03 | 2009-02-04 | 深圳华为通信技术有限公司 | Method, apparatus and mobile communication terminal generating safe digital photograph |
CN101562681B (en) * | 2009-05-26 | 2011-05-04 | 西南交通大学 | Method for generating digital photo containing watermark based on state parameter |
CN101763397B (en) * | 2009-12-23 | 2013-05-08 | 中兴通讯股份有限公司 | Device and method for processing expanding information in image file |
CN104135605B (en) * | 2013-06-21 | 2015-08-05 | 腾讯科技(深圳)有限公司 | Photographic method and device |
CN104680078B (en) * | 2015-01-20 | 2021-09-03 | 中兴通讯股份有限公司 | Method for shooting picture, method, system and terminal for viewing picture |
-
2015
- 2015-01-20 CN CN201510029022.5A patent/CN104680078B/en active Active
- 2015-08-19 WO PCT/CN2015/087534 patent/WO2016115888A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6839844B1 (en) * | 2000-01-03 | 2005-01-04 | Hirokazu Okano | Image encryption method and device |
US20030174893A1 (en) * | 2002-03-18 | 2003-09-18 | Eastman Kodak Company | Digital image storage method |
CN1922544A (en) * | 2004-02-19 | 2007-02-28 | 创新科技有限公司 | Method and apparatus for providing a combined image |
CN101459807A (en) * | 2007-12-12 | 2009-06-17 | 佛山普立华科技有限公司 | Image ciphering/deciphering system and method |
CN103400064A (en) * | 2013-08-20 | 2013-11-20 | 北京网秦天下科技有限公司 | Method and equipment for encrypting and decrypting file |
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016115888A1 (en) * | 2015-01-20 | 2016-07-28 | 中兴通讯股份有限公司 | Photograph capturing method, image viewing method, system, and terminal |
WO2016115912A1 (en) * | 2015-01-20 | 2016-07-28 | 中兴通讯股份有限公司 | Image encryption method, image viewing method, system, and terminal |
US10922435B2 (en) | 2015-01-20 | 2021-02-16 | Zte Corporation | Image encryption method, image viewing method, system, and terminal |
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
CN105069364B (en) * | 2015-06-30 | 2017-11-17 | 广东欧珀移动通信有限公司 | A kind of picture display method and mobile terminal |
CN106445324A (en) * | 2016-08-29 | 2017-02-22 | 珠海市魅族科技有限公司 | Photo sending method and device |
CN106650469A (en) * | 2016-10-12 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | Photo processing method and terminal device |
CN106650469B (en) * | 2016-10-12 | 2021-05-18 | 宇龙计算机通信科技(深圳)有限公司 | Photo processing method and terminal equipment |
CN106326762A (en) * | 2016-10-17 | 2017-01-11 | 广东七洲科技股份有限公司 | Data protection method realizing encryption while shooting for mobile terminal |
CN107145794A (en) * | 2017-04-20 | 2017-09-08 | 北京安云世纪科技有限公司 | A kind of data processing method and device and mobile terminal |
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
CN110061835A (en) * | 2019-03-28 | 2019-07-26 | 东南大学 | A kind of safe capture apparatus and its implementation |
Also Published As
Publication number | Publication date |
---|---|
WO2016115888A1 (en) | 2016-07-28 |
CN104680078B (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104680078A (en) | Method and system for taking photos and checking images and terminal | |
CN104680077B (en) | Method for encrypting picture, method for viewing picture, system and terminal | |
CN104615917A (en) | Picture camouflaging method, picture viewing method, system and terminal | |
JP4097773B2 (en) | Digital image editing system | |
Raggo et al. | Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols | |
CN107679370B (en) | Equipment identifier generation method and device | |
Harran et al. | A method for verifying integrity & authenticating digital media | |
KR20140042905A (en) | Identity authentication and management device and method thereof | |
Marshall | Digital forensics: digital evidence in criminal investigations | |
JP6277868B2 (en) | Document management system, document reproduction device, document management method, and computer program | |
Tahiri | Mastering mobile forensics | |
CN115344835A (en) | Picture processing method, storage medium and computer terminal | |
CN109255249B (en) | Image generation method, image generation apparatus, image display method, image display apparatus, and storage medium | |
WO2017137481A1 (en) | A removable security device and a method to prevent unauthorized exploitation and control access to files | |
CN106033518B (en) | Information processing method and device | |
Koh et al. | Encrypted cloud photo storage using Google photos | |
CN114357524B (en) | Electronic document processing method and device | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
Por et al. | StegCure: a comprehensive steganographic tool using enhanced LSB scheme | |
CN108563396B (en) | Safe cloud object storage method | |
US20150356282A1 (en) | Apparatus and method for data taint tracking | |
Voisin et al. | The metadata anonymization toolkit | |
JP5328078B2 (en) | Medical image information processing device | |
CN110740112B (en) | Authentication method, apparatus and computer readable storage medium | |
KR102155240B1 (en) | Digital forensic data decoding device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |