[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104915610A - Privacy picture implementation method and privacy picture implementation system - Google Patents

Privacy picture implementation method and privacy picture implementation system Download PDF

Info

Publication number
CN104915610A
CN104915610A CN201510330866.3A CN201510330866A CN104915610A CN 104915610 A CN104915610 A CN 104915610A CN 201510330866 A CN201510330866 A CN 201510330866A CN 104915610 A CN104915610 A CN 104915610A
Authority
CN
China
Prior art keywords
picture file
picture
noise data
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510330866.3A
Other languages
Chinese (zh)
Inventor
邓裕强
陈方毅
区永强
王倩倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou jiubang century science and Technology Co Ltd
Original Assignee
JIUBANG COMPUTER TECHNOLOGY (GUANGZHOU) Co Ltd
Guangzhou Jiubang Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIUBANG COMPUTER TECHNOLOGY (GUANGZHOU) Co Ltd, Guangzhou Jiubang Digital Technology Co Ltd filed Critical JIUBANG COMPUTER TECHNOLOGY (GUANGZHOU) Co Ltd
Priority to CN201510330866.3A priority Critical patent/CN104915610A/en
Publication of CN104915610A publication Critical patent/CN104915610A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a privacy picture implementation method and a privacy picture implementation system. The privacy picture implementation method includes: encrypting encryption required picture files in a picture database, and inserting preset noise data into the picture files to prevent normal analysis of the picture files so as to realize encryption of the picture files; storing length and position of the noise data inserted into the encrypted picture files into an appointed privacy database, and deleting original picture file data in the picture database; decrypting the encrypted picture files, removing the noise data according to the length and position, stored in the privacy database, of the noise data inserted into the encrypted picture files, and recovering the picture file data to the picture database to realize normal analysis and display so as to realize decryption of the picture files.

Description

A kind of implementation method of secret picture and system thereof
Technical field
The present invention relates to mobile terminal picture encryption technology field, particularly relate to a kind of implementation method and system thereof of secret picture.
Background technology
Under normal circumstances, the figure sector-meeting that Android platform stores is retrieved multimedia database automatically by system, and show in system picture library, other third-party application stating picture library reading authority also can read and show the picture of picture library, but some secret pictures are not encrypted temporarily now, to ensure secret picture not by the method for system retrieval with other analytic applications, the individual demand of user can not be met.
Summary of the invention
For the deficiencies in the prior art, the object of the present invention is to provide a kind of implementation method meeting the secret picture of users ' individualized requirement.
Another object of the present invention is to provide a kind of system realizing secret picture.
For achieving the above object, the technical solution used in the present invention is as follows: a kind of implementation method of secret picture, said method comprising the steps of:
To needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
The position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
Process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, remove noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
Further, described method also comprises:
Picture file decryption verification code is set, after the identifying code of user's input adaptation, automatically process is decrypted to the picture file encrypted.
Preferably, described method also comprises:
Described identifying code saves as MD5 value, and the identifying code that user inputs is converted to MD5 value, and contrasts with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.
For realizing another object of the present invention, the present invention also adopts following technical scheme: a kind of system realizing secret picture, and described system comprises:
Ciphering unit, to needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
Storage unit, the position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
Decryption unit, process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, removes noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
Further, described system also comprises:
Authentication unit, arranges picture file decryption verification code, after the identifying code of user's input adaptation, is automatically decrypted process to the picture file encrypted.
Preferably, identifying code is saved as MD5 value by described authentication unit, and the identifying code that user inputs is converted to MD5 value, and contrasts with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.
Relative to prior art, technical solutions according to the invention, by needing the picture file encrypted to be encrypted in picture library, being inserted default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file; The position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database; Process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, remove noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file, meet the individual demand of user.
In order to understand object of the present invention, characteristic sum effect fully, be described further below with reference to the technique effect of accompanying drawing to design of the present invention, concrete structure and generation.
Accompanying drawing explanation
Fig. 1 is the module diagram that the present invention realizes the system of secret picture;
Fig. 2 is the implementation method process flow diagram of secret picture of the present invention.
Embodiment
Describe the present invention in detail below in conjunction with accompanying drawing and specific implementation method, be used for explaining the present invention in exemplary embodiment and description of the present invention, but not as a limitation of the invention.
Embodiment one
As shown in Figure 1, a kind of system realizing secret picture, described system comprises:
Ciphering unit, to needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
Storage unit, the position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
Authentication unit, arranges picture file decryption verification code, after the identifying code of user's input adaptation, is automatically decrypted process to the picture file encrypted; Identifying code is saved as MD5 value by described authentication unit, and the identifying code that user inputs is converted to MD5 value, and contrasts with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.Allow user that the password of six bit digital is set, the MD5 value that preservation generates with password.During authentication password, whether the MD5 value that contrast password generates is identical, and identical then password is correct.
Decryption unit, process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, removes noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
As shown in Figure 2, a kind of implementation method of secret picture, said method comprising the steps of:
S101: to needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
S102: the position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
S103: arrange picture file decryption verification code, after the identifying code of user's input adaptation, is decrypted process to the picture file encrypted automatically;
Identifying code saves as MD5 value, and the identifying code that user inputs is converted to MD5 value, and contrasts with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.
S104: process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, remove noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
Technical solutions according to the invention, by needing the picture file encrypted to be encrypted in picture library, being inserted default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file; The position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database; Process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, remove noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file, ensure secret picture not by system retrieval and other analytic applications, user, by just browsing and shift out secret picture after password authentification, meets the individual demand of user.
More than describe preferred embodiment of the present invention in detail, should be appreciated that the ordinary skill of this area just design according to the present invention can make many modifications and variations without the need to creative work.Therefore, all technician in the art according to the present invention's design on prior art basis by logic analysis, reasoning or according to the available technical scheme of limited experiment, all should by among the determined protection domain of these claims.

Claims (6)

1. an implementation method for secret picture, is characterized in that, said method comprising the steps of:
To needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
The position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
Process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, remove noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
2. the implementation method of secret picture as claimed in claim 1, it is characterized in that, described method also comprises:
Picture file decryption verification code is set, after the identifying code of user's input adaptation, automatically process is decrypted to the picture file encrypted.
3. the implementation method of secret picture as claimed in claim 2, it is characterized in that, described method also comprises:
Described identifying code saves as MD5 value, and the identifying code that user inputs is converted to MD5 value, and contrasts with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.
4. realize a system for secret picture, it is characterized in that, described system comprises:
Ciphering unit, to needing the picture file encrypted to be encrypted in picture library, inserting default noise data in picture file, picture file cannot being normally resolved, to realize the encryption of picture file;
Storage unit, the position that the picture file noise data of encryption is inserted and length are saved in the private data storehouse of specifying, and delete the former picture file data in figure library database;
Decryption unit, process is decrypted to the picture file of encryption, according to position and the length of the picture file noise data preserved in private data storehouse, removes noise data, and recover picture file data and normally resolve display to figure library database, to realize the deciphering of picture file.
5. realize the system of secret picture as claimed in claim 4, it is characterized in that, described system also comprises:
Authentication unit, arranges picture file decryption verification code, after the identifying code of user's input adaptation, is automatically decrypted process to the picture file encrypted.
6. realize the system of secret picture as claimed in claim 5, it is characterized in that, identifying code is saved as MD5 value by described authentication unit, the identifying code that user inputs is converted to MD5 value, and contrast with the MD5 value of decryption verification code, if identical, successful decryption, if not identical, deciphers unsuccessful.
CN201510330866.3A 2015-06-15 2015-06-15 Privacy picture implementation method and privacy picture implementation system Pending CN104915610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510330866.3A CN104915610A (en) 2015-06-15 2015-06-15 Privacy picture implementation method and privacy picture implementation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510330866.3A CN104915610A (en) 2015-06-15 2015-06-15 Privacy picture implementation method and privacy picture implementation system

Publications (1)

Publication Number Publication Date
CN104915610A true CN104915610A (en) 2015-09-16

Family

ID=54084670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510330866.3A Pending CN104915610A (en) 2015-06-15 2015-06-15 Privacy picture implementation method and privacy picture implementation system

Country Status (1)

Country Link
CN (1) CN104915610A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769807A (en) * 2018-04-19 2018-11-06 上海大学 A kind of video encryption method based on Android platform
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459807A (en) * 2007-12-12 2009-06-17 佛山普立华科技有限公司 Image ciphering/deciphering system and method
CN101639928A (en) * 2009-08-20 2010-02-03 无敌科技(西安)有限公司 Image data encryption and decryption method and system thereof
CN102819716A (en) * 2012-07-20 2012-12-12 腾讯科技(深圳)有限公司 Method, device and system for encrypting and decrypting picture
CN104680077A (en) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 Picture encryption method and picture checking method, system and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459807A (en) * 2007-12-12 2009-06-17 佛山普立华科技有限公司 Image ciphering/deciphering system and method
CN101639928A (en) * 2009-08-20 2010-02-03 无敌科技(西安)有限公司 Image data encryption and decryption method and system thereof
CN102819716A (en) * 2012-07-20 2012-12-12 腾讯科技(深圳)有限公司 Method, device and system for encrypting and decrypting picture
CN104680077A (en) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 Picture encryption method and picture checking method, system and terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769807A (en) * 2018-04-19 2018-11-06 上海大学 A kind of video encryption method based on Android platform
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system
CN114221792B (en) * 2021-11-23 2023-06-16 杭州天宽科技有限公司 Internet data transmission encryption system

Similar Documents

Publication Publication Date Title
CN110798315B (en) Data processing method and device based on block chain and terminal
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN105812332A (en) Data protection method
CN104636444B (en) A kind of encryption and decryption method and device of database
CN105847005B (en) Encryption device and method
CN103338445A (en) File encryption and decryption method and system
US20150071442A1 (en) Data-encrypting method and decrypting method for a mobile phone
CN104217175A (en) Data read-write method and device
US20170111172A1 (en) Method and system for encrypted data synchronization for secure data management
CN104506504A (en) Security mechanism and security device for confidential information of card-free terminal
US8891773B2 (en) System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
CN102868826B (en) Terminal and terminal data protection method
CN102480353A (en) Method for password authentication and key protection
TWI536198B (en) System and method for encrypting document
US8462948B2 (en) System and method for protecting data of mobile phone
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
WO2015196642A1 (en) Data encryption method, decryption method and device
US10380353B2 (en) Document security in enterprise content management systems
CN104915610A (en) Privacy picture implementation method and privacy picture implementation system
WO2015154469A1 (en) Database operation method and device
CN105574429A (en) File data encryption and decryption method and device and terminal
KR20170022023A (en) An apparatus for obfuscating and restoring program execution code and method thereof
US20150200777A1 (en) Data securing method, data securing system and data carrier
CN102426637B (en) A kind of embedded database cryptographic storage method
CN102842002A (en) Digital media copyright protection method of intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20171116

Address after: 510055, tower 17, A tower, Zhonghua International Center, No. three, 33 Zhongshan Road, Yuexiu District, Guangdong, Guangzhou, China

Applicant after: Guangzhou jiubang century science and Technology Co Ltd

Address before: 510055 A, block 16-17, China International Center, No. three, Zhongshan Road, Guangzhou, Guangdong, China

Applicant before: Guangzhou Jiubang Digital Technology Co., Ltd.

Applicant before: Jiubang computer technology (Guangzhou) Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150916