Nothing Special   »   [go: up one dir, main page]

CN107516027B - Image processing method and electronic device - Google Patents

Image processing method and electronic device Download PDF

Info

Publication number
CN107516027B
CN107516027B CN201710873852.5A CN201710873852A CN107516027B CN 107516027 B CN107516027 B CN 107516027B CN 201710873852 A CN201710873852 A CN 201710873852A CN 107516027 B CN107516027 B CN 107516027B
Authority
CN
China
Prior art keywords
image
security policy
setting
content
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710873852.5A
Other languages
Chinese (zh)
Other versions
CN107516027A (en
Inventor
陈臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201710873852.5A priority Critical patent/CN107516027B/en
Publication of CN107516027A publication Critical patent/CN107516027A/en
Application granted granted Critical
Publication of CN107516027B publication Critical patent/CN107516027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Automation & Control Theory (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Studio Devices (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The disclosure provides an image processing method, which includes acquiring an image, identifying content of the image, and setting a security policy on the image when the content of the image meets a preset condition, wherein the security policy includes limiting presentation, editing or transmission of the image. The present disclosure also provides an electronic device.

Description

Image processing method and electronic device
Technical Field
The present disclosure relates to an image processing method and an electronic device.
Background
Due to the popularization of the intelligent terminal, when a user wants to record some important information, one of the most convenient methods is to use the intelligent terminal to photograph the important information. In other cases, the user may have some private pictures. Such as these, are stored in the terminal device, with the risk of privacy exposure. Some privacy setting methods that exist at present encrypt one photo or folder separately, if the photo is too many, or some photos in the folder need to set privacy encryption, some do not need to set privacy encryption, and the user sets up one piece, which is tedious in work and not intelligent enough.
Disclosure of Invention
One aspect of the present disclosure provides an image processing method, including acquiring an image, identifying content of the image, and setting a security policy on the image if the content of the image satisfies a preset condition, where the security policy includes restricting presentation, editing, or transmission of the image. The present disclosure also provides an electronic device.
Optionally, the setting of the security policy on the image in the case that the content of the image satisfies the preset condition includes at least one of setting the security policy on the image in the case that the content of the image includes a specific object or a specific person, or setting the security policy on the image in the case that the content of the image represents a specific event.
Optionally, the setting of the security policy on the image when the content of the image includes a specific object or a specific person includes, when human skin is detected to be present in the image, determining whether a condition is satisfied based on the human skin, and when a preset condition is satisfied, setting the security policy on the image, or when a human face is detected to be present in the image, determining whether a preset condition is satisfied based on an identity of a person determined by face recognition, and when a preset condition is satisfied, setting the security policy on the image.
Optionally, the setting of the security policy on the image includes at least one of: disabling preview and/or viewing functionality of the image; forbidding the operations of copying, changing a storage path or uploading the image to the cloud; changing the storage path of the image to a specific path; or to hide the image file.
Optionally, when a plurality of images are processed, the method further includes, in a case where the content of the image satisfies a preset condition, identifying a person in the image, and setting a security policy for another image including the person or associated with the person in the plurality of images.
Another aspect of the disclosure provides an electronic device comprising a processor, and a memory having stored thereon computer-readable instructions that, when executed by the processor, cause the processor to acquire an image, identify content of the image, and set a security policy on the image if the content of the image satisfies a preset condition, wherein the security policy includes restricting presentation, editing, or transmission of the image.
Optionally, the processor, in a case that the content of the image satisfies a preset condition, performing security policy setting on the image includes at least one of performing security policy setting on the image in a case that the content of the image includes a specific object or a specific person, or performing security policy setting on the image in a case that the content of the image represents a specific event.
Optionally, the processor, when the content of the image includes a specific object or a specific person, performs setting of a security policy on the image, where the determining includes determining, based on a human skin, whether a condition is satisfied when detecting that the human skin exists in the image, and performing setting of the security policy on the image when the preset condition is satisfied, or determining, based on an identity of a person determined by face recognition, whether the preset condition is satisfied when detecting that a face exists in the image, and performing setting of the security policy on the image when the preset condition is satisfied.
Optionally, the setting of the security policy on the image by the processor includes at least one of disabling a preview and/or viewing function of the image, prohibiting an operation of copying, changing a storage path or uploading the image to a cloud, changing the storage path of the image to a specific path, or hiding the image file.
Optionally, when processing a plurality of images, the processor identifies a person in an image when the content of the image satisfies a preset condition, and sets a security policy for another image including the person or associated with the person in the plurality of images.
Another aspect of the present disclosure provides an image processing system including: the device comprises an acquisition module, a first identification module and a first setting module. And the acquisition module is used for acquiring the image. A first identification module for identifying the content of the image. The image processing device comprises a first setting module and a second setting module, wherein the first setting module is used for setting a security policy for the image under the condition that the content of the image meets a preset condition, and the security policy comprises limitation on presentation, editing or transmission of the image.
Optionally, the setting of the security policy on the image in the case that the content of the image satisfies the preset condition includes at least one of setting the security policy on the image in the case that the content of the image includes a specific object or a specific person, or setting the security policy on the image in the case that the content of the image represents a specific event.
Optionally, the setting of the security policy on the image when the content of the image includes a specific object or a specific person includes, when human skin is detected to be present in the image, determining whether a condition is satisfied based on the human skin, and when a preset condition is satisfied, setting the security policy on the image, or when a human face is detected to be present in the image, determining whether a preset condition is satisfied based on an identity of a person determined by face recognition, and when a preset condition is satisfied, setting the security policy on the image.
Optionally, the setting of the security policy on the image includes at least one of disabling a preview and/or viewing function of the image, prohibiting an operation of copying, changing a storage path or uploading the image to a cloud, changing the storage path of the image to a specific path, or hiding the image file.
Optionally, the system further comprises a second identification module and a second setting module. And the second identification module is used for identifying the person in the image under the condition that the content of the image meets the preset condition. And the second setting module is used for setting the security policy of other images which contain the person or are related to the person in the plurality of images.
Another aspect of the disclosure provides a non-volatile storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows an application scenario of an image processing method and an electronic device according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of an image processing method according to an embodiment of the present disclosure;
FIG. 3 schematically shows a flow chart of an image processing method according to another embodiment of the present disclosure;
FIG. 4 schematically shows a block diagram of an image processing system according to an embodiment of the present disclosure;
FIG. 5 schematically shows a block diagram of an image processing system according to another embodiment of the present disclosure; and
fig. 6 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase "a or B" should be understood to include the possibility of "a" or "B", or "a and B".
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable medium having instructions stored thereon for use by or in connection with an instruction execution system. In the context of this disclosure, a computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the instructions. For example, the computer readable medium can include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the computer readable medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links.
The embodiment of the disclosure provides an image processing method and an electronic device. According to the method, the image content is identified, whether the preset condition is met or not is judged, the security policy is set for the image meeting the preset condition, so that the security of the privacy of the user is improved, the user does not need to manually set, and the operation cost of the user is reduced.
Fig. 1 schematically illustrates an application scenario of an image processing method and an electronic device according to an embodiment of the present disclosure.
As shown in fig. 1, the electronic device 100 includes at least one display area 110, and the display area 110 can be used for displaying image files. Image files, such as file 111, can be presented in a preview manner in display area 110. However, a part of the image file, for example, the image file 112, contains the user's private information and is thus not desired to be seen by others. The method provided by the embodiment of the disclosure can limit the presentation, editing or transmission of the image containing privacy, for example, the preview of the image file 112 can be limited, and the content of the image is prohibited from being previewed.
It should be understood that the above application scenarios are only exemplary, and the application scenarios of the image processing method and the electronic device of the embodiments of the present disclosure are not limited to the above.
Fig. 2 schematically shows a flow chart of an image processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S230.
In operation S210, an image is acquired.
In operation S220, the contents of the image are identified.
In operation S230, in a case that the content of the image satisfies a preset condition, setting a security policy on the image, wherein the security policy includes restricting presentation, editing, or transmission of the image.
The method can identify the content in the image, set the security policy for the image according to the image content, protect the privacy of the user, avoid the operation of the user to set the security policy for a large number of images independently, and improve the user experience.
According to the embodiment of the present disclosure, in operation S210, the image is acquired, for example, the electronic device scans all locally stored images to acquire all locally stored images, or acquires an image under a specified path, or acquires a new image when the image is locally stored, which is not limited by the present disclosure.
According to an embodiment of the present disclosure, in operation S220, the content of the image is identified. The operation can use various existing image recognition methods, including feature matching based algorithm or machine learning based algorithm, etc., and the recognition can be performed through a convolutional neural network, for example.
According to the embodiment of the present disclosure, in operation S230, in the case that the content of the image satisfies a preset condition, the setting of a security policy is performed on the image. For example, when security information such as a password of a user appears in the image, it is determined that the content of the image meets a preset condition, and a security policy is set for the image. It should be noted that the preset conditions can be set as required by those skilled in the art, and the present disclosure is not limited thereto, and the following examples are only provided herein.
According to an embodiment of the present disclosure, in the case that the content of the image satisfies a preset condition, the setting of the security policy on the image may include the following situations:
first, in the case where the content of the image includes a specific object or a specific person, the image is subjected to setting of a security policy.
According to the embodiments of the present disclosure, a specific object may include an object related to the user's property or to the user's personal information, such as a bank card, an identification card, a valuable luxury, or the like, which the user does not want an image containing the above object to be obtained by others, and thus, the setting of a security policy may be performed on the image in the case where the content of the image contains the specific object.
According to the embodiment of the disclosure, when human skin is detected to exist in an image, whether the condition is met is judged based on the human skin, and under the condition that the preset condition is met, the safety strategy is set for the image. For example, whether the image has too much skin exposed is judged by the exposure proportion of the skin, or whether the image includes a privacy portion is judged by texture information on the skin, thereby determining whether the image needs to be set with a security policy.
According to the embodiment of the disclosure, the setting of the security policy on the image when the content of the image includes the specific person includes judging whether a preset condition is met or not based on the identity of the person determined by face recognition when the face is detected to exist in the image, and setting the security policy on the image when the preset condition is met. For example, a user presets a person, and in image recognition, if a face is recognized, it is determined whether the person is the same as the preset person through face recognition. And if the images are the same, judging the images to be privacy images, and setting the security policy for the images.
Another embodiment of the present disclosure is described below with reference to fig. 3.
Fig. 3 schematically shows a flow chart of an image processing method according to another embodiment of the present disclosure.
As shown in fig. 3, the method further includes operations S310 and S320 when processing a plurality of images on the basis of the embodiment illustrated in fig. 2.
In operation S310, in the case where the contents of the image satisfy a preset condition, a person in the image is identified.
In operation S320, a security policy is set for the image including the person or another image associated with the person among the plurality of images.
According to the embodiment of the disclosure, when a plurality of images need to be processed, if one of the images meets the preset condition, the person in the image is identified, and it is determined that the contents related to the person all belong to the privacy of the user, so that it is also necessary to identify whether the contents related to the person are included in other images, and if the contents are included, the images are also subjected to security policy setting, so as to protect the privacy of the user, reduce the risk of being leaked, and further improve the security.
Referring back to fig. 2, second, in the case where the content of the image represents a specific event, the setting of the security policy is performed on the image.
For example, when the specific behavior of the person identified based on the image meets a preset condition, setting a security policy for the image. For example, when the user sleeps, or makes a strange expression, and does not want others to see the image, the preset condition may include corresponding content to set the security policy for the pictures.
According to the embodiment of the disclosure, besides the identification of the image content, information such as a file name or a file source of the image file can be detected, whether the information of the image meets the preset condition or not is judged, and if the information meets the preset condition, the security policy is set for the image.
According to an embodiment of the present disclosure, the setting of the security policy on the image may include one or more of the following situations:
first, the preview and/or viewing functionality of the image is disabled. According to the embodiment of the disclosure, when it is detected that a certain image meets a preset condition, the preview and/or viewing function of the image can be disabled. For example, as shown in fig. 1, the image 111 or the like may be previewed normally, and may be opened for presentation after receiving a user operation. While the image 112 has preview and/or viewing functionality disabled. Under this interface, the thumbnail of image 112 is not displayed directly, but is replaced with a lock shape. The user can not open the device directly when operating 112, for example, an interactive interface for identity verification or a prompt interface for prohibiting viewing can be popped up.
And secondly, the operations of copying, changing a storage path or uploading the image to the cloud are prohibited. According to the embodiment of the disclosure, when it is detected that a certain image satisfies a preset condition, operations of copying, moving, or transmitting the image file may be prohibited to avoid private image leakage.
Thirdly, changing the storage path of the image to a specific path. According to the embodiment of the disclosure, when it is detected that a certain image meets a preset condition, the image can be moved to a specific path, for example, a private folder dedicated to storing privacy files, and the folder can apply a set security policy. The method facilitates centralized management of the privacy files and is not easy to be discovered by others.
Fourth, the image file is hidden. According to the embodiment of the disclosure, when it is detected that a certain image meets the preset condition, the attribute of the image file can be set to be hidden. Under the hidden state, the image file is invisible to the user, and the safety of the privacy file is improved.
According to the embodiment of the disclosure, the security policy may include a process of authenticating a user, and when the identity of the user passes authentication, a part or all of the rights may be opened to a specific user.
The following describes an image processing method according to an embodiment of the present disclosure with a specific embodiment. The embodiment identifies through a deep neural network based on the exposure condition of the skin, and is used for processing the privacy image in a certain photo album of the mobile phone.
Before the method of the present embodiment is performed, the deep neural network model needs to be trained using a training set. The training set includes a number of images with or without a label for the privacy image for training parameters of the deep neural network model. Wherein, the images in the training set can be adjusted to 256 × 256 pixels to speed up the training process. Optionally, the images in the training set may be subjected to data enhancement by rotation, flipping, or random cropping to enhance the training effect.
After the training is completed, the method of the present embodiment can be executed.
First, in operation S210, an image in a mobile phone album is acquired.
In operation S220, images in the album are identified, including the following processing procedures.
And carrying out first recognition on the images in the album, detecting the face in the album, and classifying the images in the album according to the face recognition result.
And carrying out second recognition on each image, and detecting the images by using a global skin color model for recognizing the exposure proportion of the human skin.
And thirdly identifying each image, and using the deep neural network model to take the image as input and output a probability according to the visual characteristics of the image, including color, shape, texture characteristics and the like, so as to further judge whether the image is a private image.
In operation S230, it is determined whether each image satisfies a preset condition according to the results of the first recognition, the second recognition, and the third recognition. For example, according to the result of the second recognition, whether the exposure proportion of the skin exceeds a preset threshold value is judged, and if the exposure proportion of the skin exceeds the preset threshold value, the preset condition is considered to be met; judging whether the image is a privacy image or not according to the result of the third recognition, and if so, considering that a preset condition is met; and after a certain image meets the preset condition, judging whether other images contain the same person according to the first recognition result, and if so, considering that the images also meet the preset condition.
And then, setting security policies such as forbidding preview and viewing, forbidding copying and transmission and the like for all images meeting preset conditions, wherein the operation needs identity verification, and the operation authority is opened only when the password, the fingerprint and the voiceprint information set by the owner are identified. The method can effectively protect the privacy of the user, improve the security of the private image, avoid the operation of independently setting the security policy for a large number of images by the user, and improve the user experience.
Fig. 4 schematically shows a block diagram of an image processing system 400 according to an embodiment of the present disclosure.
As shown in fig. 4, the image processing system 400 includes an acquisition module 410, a first recognition module 420, and a first setting module 430. The image processing system 400 may perform the methods described above with reference to fig. 2 or 3 to implement the setting of the security policy.
In particular, the acquiring module 410 is configured to perform the operation S210 described above with reference to fig. 2 for acquiring an image.
A first identifying module 420 for performing operation S220 described above with reference to fig. 2 for identifying the content of the image.
A first setting module 430, configured to perform operation S230 described above with reference to fig. 2, and configured to set a security policy for the image if content of the image meets a preset condition, where the security policy includes that presentation, editing, or transmission of the image is limited.
According to the embodiment of the disclosure, the setting of the security policy on the image in the case that the content of the image satisfies the preset condition includes at least one of setting the security policy on the image in the case that the content of the image contains a specific object or a specific person, or setting the security policy on the image in the case that the content of the image represents a specific event.
According to the embodiment of the disclosure, the setting of the security policy on the image when the content of the image includes a specific object or a specific person includes, when human skin is detected to be present in the image, determining whether a condition is satisfied based on the human skin, and when a preset condition is satisfied, setting the security policy on the image, or when a face is detected to be present in the image, determining whether a preset condition is satisfied based on the identity of the person determined by face recognition, and when the preset condition is satisfied, setting the security policy on the image.
According to the embodiment of the disclosure, the setting of the security policy on the image includes at least one of disabling a preview and/or viewing function of the image, prohibiting an operation of copying, changing a storage path or uploading the image to a cloud, changing the storage path of the image to a specific path, or hiding the image file.
Fig. 5 schematically shows a block diagram of an image processing system 500 according to another embodiment of the present disclosure.
As shown in fig. 5, the image processing system 500 further includes a second recognition module 510 and a second setting module 520 on the basis of the image processing system 400 as illustrated in fig. 4.
A second identification module 510, configured to perform operation S310 described above with reference to fig. 3, and configured to identify a person in the image if the content of the image meets a preset condition.
A second setting module 520, configured to perform operation S320 described above with reference to fig. 3, to perform setting of a security policy on the image including the person or another image associated with the person.
It is understood that the obtaining module 410, the first identifying module 420, the first setting module 430, the second identifying module 510, and the second setting module 520 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present invention, at least one of the obtaining module 410, the first identifying module 420, the first setting module 430, the second identifying module 510, and the second setting module 520 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable manner of integrating or packaging a circuit, as hardware or firmware, or as a suitable combination of three implementations of software, hardware, and firmware. Alternatively, at least one of the acquisition module 410, the first identification module 420, the first setting module 430, the second identification module 510, and the second setting module 520 may be at least partially implemented as a computer program module that, when executed by a computer, may perform the functions of the respective modules.
Fig. 6 schematically shows a block diagram of an electronic device 600 according to an embodiment of the disclosure.
As shown in fig. 6, the electronic device 600 includes a processor 610 and a memory 620. The electronic device 600 may perform the method described above with reference to fig. 2 or 3 to implement the setting of the security policy.
In particular, the processor 610 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 610 may also include onboard memory for caching purposes. The processor 610 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure described with reference to fig. 2 or 3.
The memory 620, for example, can be any medium that can contain, store, communicate, propagate, or transport the instructions. For example, a readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the readable storage medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); semiconductor memory such as Random Access Memory (RAM) or flash memory; and/or wired/wireless communication links.
The memory 620 may include a computer program 621, which computer program 621 may include code/computer-executable instructions that, when executed by the processor 610, cause the processor 610 to perform a method flow such as that described above in connection with fig. 2 or fig. 3, and any variations thereof.
The computer program 621 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 621 may include one or more program modules, including 621A, 621B, … …, for example. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, which when executed by the processor 610, enable the processor 610 to perform the method flows described above in connection with fig. 2 or 3, for example, and any variations thereof.
According to an embodiment of the present invention, at least one of the obtaining module 410, the first identifying module 420, the first setting module 430, the second identifying module 510, and the second setting module 520 may be implemented as a computer program module described with reference to fig. 6, which, when executed by the processor 610, may implement the corresponding operations described above.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (6)

1. An image processing method comprising:
acquiring an image;
identifying the content of the image; and
setting a security policy for the image in case the content of the image satisfies a preset condition,
wherein the security policy comprises:
restricting presentation, editing, or transmission of the image;
wherein, when the content of the image meets a preset condition, the setting of the security policy on the image comprises at least one of the following:
setting a security policy on the image in the case that the content of the image contains a specific object, wherein the specific object comprises an object related to property of the user or personal information of the user;
setting a security policy for the image in a case where the content of the image represents a specific event, wherein the specific event includes a specific behavior of a person identified based on the image, file name information of an image file, or file source information.
2. The method of claim 1, wherein the setting of the security policy on the image comprises at least one of:
disabling preview and/or viewing functionality of the image;
forbidding the operations of copying, changing a storage path or uploading the image to the cloud;
changing the storage path of the image to a specific path; or
Hiding the image file.
3. The method of claim 1, wherein, when processing a plurality of images, the method further comprises:
under the condition that the content of the image meets a preset condition, identifying a person in the image; and
and setting a security policy for the image containing the person or other images related to the person.
4. An electronic device, comprising:
a processor; and
a memory having computer-readable instructions stored thereon that, when executed by the processor, cause the processor to:
acquiring an image;
identifying the content of the image; and
setting a security policy for the image in case the content of the image satisfies a preset condition,
wherein the security policy comprises:
restricting presentation, editing, or transmission of the image;
wherein, when the content of the image meets a preset condition, the processor sets the security policy for the image, and the setting includes at least one of:
setting a security policy on the image in the case that the content of the image contains a specific object, wherein the specific object comprises an object related to property of the user or personal information of the user;
setting a security policy for the image in a case where the content of the image represents a specific event, wherein the specific event includes a specific behavior of a person identified based on the image, file name information of an image file, or file source information.
5. The electronic device of claim 4, wherein the processor setting the security policy for the image comprises at least one of:
disabling preview and/or viewing functionality of the image;
forbidding the operations of copying, changing a storage path or uploading the image to the cloud;
changing the storage path of the image to a specific path; or
Hiding the image file.
6. The electronic device of claim 4, wherein in processing the plurality of images, the processor further performs:
under the condition that the content of the image meets a preset condition, identifying a person in the image; and
and setting a security policy for the image containing the person or other images related to the person.
CN201710873852.5A 2017-09-25 2017-09-25 Image processing method and electronic device Active CN107516027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710873852.5A CN107516027B (en) 2017-09-25 2017-09-25 Image processing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710873852.5A CN107516027B (en) 2017-09-25 2017-09-25 Image processing method and electronic device

Publications (2)

Publication Number Publication Date
CN107516027A CN107516027A (en) 2017-12-26
CN107516027B true CN107516027B (en) 2021-07-16

Family

ID=60725972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710873852.5A Active CN107516027B (en) 2017-09-25 2017-09-25 Image processing method and electronic device

Country Status (1)

Country Link
CN (1) CN107516027B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114020377A (en) * 2021-10-15 2022-02-08 青岛海信移动通信技术股份有限公司 Terminal device, picture information protection method and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7406334B2 (en) * 2004-01-26 2008-07-29 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
CN103824030A (en) * 2014-02-27 2014-05-28 宇龙计算机通信科技(深圳)有限公司 Data protection device and data protection method
CN104463017B (en) * 2014-12-22 2018-02-27 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN105354509B (en) * 2015-10-28 2018-03-27 广东欧珀移动通信有限公司 The processing method and processing system of picture
CN105389516B (en) * 2015-11-09 2018-09-18 小米科技有限责任公司 Sensitization picture based reminding method and device
CN117454421A (en) * 2015-12-24 2024-01-26 北京三星通信技术研究有限公司 Privacy protection method and device
CN106210528B (en) * 2016-07-29 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of method, device and mobile terminal encrypting photo
CN106982388B (en) * 2017-04-06 2020-01-24 深圳创维-Rgb电子有限公司 Picture display method and device

Also Published As

Publication number Publication date
CN107516027A (en) 2017-12-26

Similar Documents

Publication Publication Date Title
US11444774B2 (en) Method and system for biometric verification
US10062406B2 (en) Video masking processing method and apparatus
US20240121322A1 (en) Methods and systems for providing a visual content gallery within a controlled environment
JP6209962B2 (en) Information processing apparatus and information processing program
US20230034040A1 (en) Face liveness detection method, system, and apparatus, computer device, and storage medium
US9454675B2 (en) Apparatus and method for protecting personal information of recorded image, and computer-readable recording medium having computer program recorded therein
US20160148068A1 (en) Image processing apparatus and method, and electronic device
EP3008704B1 (en) Method of control of persons and application to the inspection of persons
US10484596B2 (en) Capturing and viewing access-protected photos and videos
KR102697908B1 (en) Electronic device and operating methods for the same
CN107341418A (en) Display control method, device, computer installation and computer-readable recording medium
CN106296559A (en) Image processing method and device
CN112084832B (en) Method for highlighting an object of interest in an image or video
US10395069B2 (en) Restricting access to a device
US11301710B2 (en) Managing camera actions
CN105354509A (en) Picture processing method and processing system
US10701261B2 (en) Method, system and computer program product for selective image capture
KR20180116866A (en) System and method for preventing information leakage through screen
CN111428570A (en) Detection method and device for non-living human face, computer equipment and storage medium
KR20220029212A (en) Electronic apparatus and controlling method thereof
CN107516027B (en) Image processing method and electronic device
CN108733690B (en) Image data storage method and device and electronic equipment
US12026284B2 (en) System and method for facilitating a secure access to a photograph over a social networking platform
CN110457877B (en) User authentication method and device, electronic equipment and computer readable storage medium
CN108304563A (en) Image processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant