CN105025203A - Image encryption and decryption method combined with physiological features and image capturing device thereof - Google Patents
Image encryption and decryption method combined with physiological features and image capturing device thereof Download PDFInfo
- Publication number
- CN105025203A CN105025203A CN201410175857.7A CN201410175857A CN105025203A CN 105025203 A CN105025203 A CN 105025203A CN 201410175857 A CN201410175857 A CN 201410175857A CN 105025203 A CN105025203 A CN 105025203A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- decryption
- module
- photo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
本发明系提供一种结合生理特征之影像加解密方法及其影像捕获设备,此影像加解密方法执行一加密程序及一解密程序。加密程序包含﹕利用影像撷取模块分别撷取复数个第一虹膜影像。利用加解密模块根据复数个第一虹膜影像产生第一密钥。当影像撷取模块产生照片时,控制加解密模块利用第一密钥对照片进行加密以产生加密照片。解密程序包含﹕控制加解密模块利用第一密钥对加密照片进行解密以还原照片。
The present invention provides an image encryption and decryption method and an image capture device combining physiological characteristics. The image encryption and decryption method executes an encryption procedure and a decryption procedure. The encryption procedure includes: using an image capture module to capture a plurality of first iris images respectively. Using the encryption and decryption module to generate a first key according to the plurality of first iris images. When the image capture module generates a photo, the encryption and decryption module is controlled to encrypt the photo using the first key to generate an encrypted photo. The decryption procedure includes: controlling the encryption and decryption module to decrypt the encrypted photo using the first key to restore the photo.
Description
技术领域technical field
本发明是有涉及一种影像加解密方法,特别是涉及一种能结合生理特征作为影像加解密之方法,以及使用此方法的影像捕获设备。The present invention relates to an image encryption and decryption method, in particular to an image encryption and decryption method capable of combining physiological features, and an image capture device using the method.
背景技术Background technique
目前,消费型相机的摄像镜头之像素大多都在1000万以上,很多高阶手机甚至具备甚至2000万像素以上的摄像镜头,加上消费型相机与手机的便携性,使人们开始习惯用相机或手机记录生活和工作的各种信息,同时,相机或手机内储存高度隐私数据的可能性也越来越高。At present, most of the camera lenses of consumer cameras have more than 10 million pixels, and many high-end mobile phones even have camera lenses with more than 20 million pixels. Coupled with the portability of consumer cameras and mobile phones, people are getting used to using cameras or Mobile phones record all kinds of information in life and work. At the same time, the possibility of storing highly private data in cameras or mobile phones is also increasing.
因此,因为相机或手机外泄照片而导致用户隐私泄露的问题愈发严重。当相机或手机丢失时,其拥有者常苦恼其内的私密照片有外流的风险,或是被有心人士将相机暂时取走以窃取其中之照片。Therefore, the problem of leakage of user privacy due to leakage of photos from cameras or mobile phones has become more and more serious. When a camera or mobile phone is lost, its owner is often worried about the risk of leaking the private photos in it, or the camera is temporarily taken away by someone who wants to steal the photos.
虽然目前有用设定密码的方式来对相机或手机上的照片进行存取的设定,此种方式无法避免有心人士以窃得密码的方式来存取相机或手机内之照片,另一种方式则是可利用应用程序来对照片进行加密之设定,然而一但此手机或相机落入熟悉用户操作此应用程序方式的有心人士手上时,则仍会有隐私资料外泄之可能性。Although it is currently useful to set a password to access the photos on the camera or mobile phone, this method cannot prevent those who want to access the photos in the camera or mobile phone by stealing the password. Another way It is a setting that can use the application program to encrypt photos. However, once the mobile phone or camera falls into the hands of someone who is familiar with the way the user operates the application program, there is still the possibility of leakage of private data.
因此,目前迫切需要的是一种能安全地对相机内的照片进行加密的方法。Therefore, what is urgently needed is a method that can safely encrypt photos in the camera.
发明内容Contents of the invention
有鉴于上述现有技艺的问题,本发明的目的就是在提供一种结合生理特征之影像加解密方法以及使用此方法的影像捕获设备,能够利用复数个使用者的虹膜作为密钥,并以此密钥作为相机内照片的加密或解密依据,进而提升照片的隐私安全。In view of the above-mentioned problems in the prior art, the object of the present invention is to provide an image encryption and decryption method combined with physiological characteristics and an image capture device using this method, which can use the irises of a plurality of users as keys, and thereby The key is used as the basis for encryption or decryption of photos in the camera, thereby improving the privacy and security of photos.
有鉴于上述现有技艺的问题,本发明的目的就是在提供一种结合生理特征之影像加解密方法及使用此方法的影像捕获设备,能够利用密钥的有效时间范围以控制相机的影像撷取功能及照片加解密功能,以避免相机及其内照片被人盗取而使用。In view of the above-mentioned problems in the prior art, the purpose of the present invention is to provide an image encryption and decryption method combined with physiological characteristics and an image capture device using this method, which can use the effective time range of the key to control the image capture of the camera function and photo encryption and decryption functions to prevent the camera and its photos from being stolen and used.
根据本发明的目的,提出一种结合生理特征之影像加解密方法,其适用于一影像捕获设备,影像捕获设备包含一影像撷取模块、一加解密模块以及一处理模块,影像加解密方法可包含执行一加密程序及一解密程序。加密程序包含﹕利用影像撷取模块分别撷取复数个第一虹膜影像。利用加解密模块根据复数个第一虹膜影像产生第一密钥。以及当影像撷取模块产生照片时,控制加解密模块利用第一密钥对照片进行加密以产生加密照片。解密程序包含﹕控制加解密模块利用第一密钥对加密照片进行解密以还原照片。According to the purpose of the present invention, an image encryption and decryption method combined with physiological characteristics is proposed, which is suitable for an image capture device. The image capture device includes an image capture module, an encryption and decryption module, and a processing module. The image encryption and decryption method can be Including executing an encryption program and a decryption program. The encryption program includes: using the image capture module to capture a plurality of first iris images respectively. The encryption and decryption module is used to generate the first key according to the plurality of first iris images. And when the image capture module generates a photo, the encryption and decryption module is controlled to use the first key to encrypt the photo to generate an encrypted photo. The decryption program includes: controlling the encryption and decryption module to use the first key to decrypt the encrypted photo to restore the photo.
优选地,第一密钥具有第一有效时间,当第一密钥被产生后在第一有效时间内时,由处理模块允许影像撷取模块产生照片。Preferably, the first key has a first valid time, and when the first key is generated within the first valid time, the processing module allows the image capture module to generate photos.
优选地,加解密模块根据复数个第二虹膜影像产生第二密钥,当第二密钥等于第一密钥时,由处理模块控制加解密模块利用第二密钥对加密照片进行解密以还原照片。Preferably, the encryption and decryption module generates a second key according to a plurality of second iris images, and when the second key is equal to the first key, the processing module controls the encryption and decryption module to use the second key to decrypt the encrypted photo to restore photo.
优选地,第二密钥具有第二有效时间,第二密钥被产生后在第二有效时间内时,由处理模块允许加解密模块利用第二密钥对加密照片进行解密以还原照片。Preferably, the second key has a second valid time, and when the second key is generated within the second valid time, the processing module allows the encryption and decryption module to use the second key to decrypt the encrypted photo to restore the photo.
优选地,影像捕获设备更包含显示模块,影像加解密方法更包含:使用显示模块以显示撷取复数个第一虹膜影像时之顺序提示讯息。Preferably, the image capture device further includes a display module, and the image encryption and decryption method further includes: using the display module to display a sequence prompt message when capturing a plurality of first iris images.
根据本发明的目的,再提供一种利用生理特征作影像加解密之影像捕获设备,其包含一影像撷取模块、一加解密模块以及一处理模块。影像撷取模块用以撷取复数个第一虹膜影像或用以产生照片。加解密模块可根据复数个第一虹膜影像产生第一密钥并利用第一密钥对照片进行加密以产生加密照片,或利用第一密钥对加密照片进行解密。处理模系控制加解密模块利用第一密钥产生加密照片,或控制加解密模块利用第一密钥解密加密照片以还原照片。According to the purpose of the present invention, an image capture device using physiological characteristics for image encryption and decryption is provided, which includes an image capture module, an encryption and decryption module, and a processing module. The image capturing module is used for capturing a plurality of first iris images or for generating photos. The encryption and decryption module can generate a first key according to the plurality of first iris images and use the first key to encrypt the photo to generate an encrypted photo, or use the first key to decrypt the encrypted photo. The processing model controls the encryption and decryption module to use the first key to generate an encrypted photo, or controls the encryption and decryption module to use the first key to decrypt the encrypted photo to restore the photo.
优选地,第一密钥具有第一有效时间,当第一密钥被产生后在第一有效时间内时,由处理模块允许影像撷取模块产生照片。Preferably, the first key has a first valid time, and when the first key is generated within the first valid time, the processing module allows the image capture module to generate photos.
优选地,加解密模块根据复数个第二虹膜影像产生第二密钥,当第二密钥等于第一密钥时,由处理模块控制加解密模块利用第二密钥对加密照片进行解密以还原照片。Preferably, the encryption and decryption module generates a second key according to a plurality of second iris images, and when the second key is equal to the first key, the processing module controls the encryption and decryption module to use the second key to decrypt the encrypted photo to restore photo.
优选地,第二密钥具有第二有效时间,第二密钥被产生后在第二有效时间内时,由处理模块允许加解密模块利用第二密钥对加密照片进行解密以还原照片。Preferably, the second key has a second valid time, and when the second key is generated within the second valid time, the processing module allows the encryption and decryption module to use the second key to decrypt the encrypted photo to restore the photo.
优选地,本创作之影像捕获设备更包含显示模块以显示撷取复数个第一虹膜影像时之顺序提示讯息。Preferably, the image capturing device of the present invention further includes a display module for displaying a sequence prompt message when capturing a plurality of first iris images.
附图说明Description of drawings
图1是为本发明实施例之利用生理特征作影像加解密之影像捕获设备之方块图。FIG. 1 is a block diagram of an image capture device using physiological characteristics for image encryption and decryption according to an embodiment of the present invention.
图2是为本发明实施例之利用生理特征作影像加解密之影像捕获设备之示意图。FIG. 2 is a schematic diagram of an image capture device using physiological characteristics for image encryption and decryption according to an embodiment of the present invention.
图3是为本发明第二实施例之结合生理特征之影像加解密方法之加密程序之步骤流程图。FIG. 3 is a flow chart of the steps of the encryption procedure of the image encryption and decryption method combined with physiological characteristics according to the second embodiment of the present invention.
图4是为本发明第三实施例之结合生理特征之影像加解密方法之解密程序之步骤流程图。FIG. 4 is a flowchart showing the steps of the decryption procedure of the image encryption and decryption method combined with physiological characteristics according to the third embodiment of the present invention.
具体实施方式Detailed ways
请参考图1,是为本发明实施例之利用生理特征作影像加解密之影像捕获设备之方块图。此利用生理特征作影像加解密之影像捕获设备10包含影像撷取模块25、加解密模块26以及处理模块27。影像撷取模块25可为一镜头,其可用以撷取复数个第一用户(未显示于图中)之复数个第一虹膜影像22、撷取复数个第二用户(未显示于图中)之复数个第二虹膜影像24或撷取周遭环境之影像以产生一照片32,其中此利用生理特征作影像加解密之影像捕获设备10可为一相机或一智能型手机。Please refer to FIG. 1 , which is a block diagram of an image capture device using physiological characteristics for image encryption and decryption according to an embodiment of the present invention. The image capture device 10 using physiological features for image encryption and decryption includes an image capture module 25 , an encryption and decryption module 26 and a processing module 27 . The image capture module 25 can be a lens, which can be used to capture a plurality of first iris images 22 of a plurality of first users (not shown in the figure), capture a plurality of second users (not shown in the figure) A plurality of second iris images 24 or capture images of the surrounding environment to generate a photo 32, wherein the image capture device 10 using physiological characteristics for image encryption and decryption can be a camera or a smart phone.
加解密模块26可为一应用软件,其可根据复数个第一虹膜影像22产生第一密钥29,并可利用此第一密钥29对照片32进行加密以产生一加密照片31,或在不同的时间点,根据复数个第二虹膜影像24产生第二密钥30以对加密照片31进行解密,其中第一密钥29与第二密钥30分别具有第一有效时间33及第二有效时间34,且加解密模块26可先利用变异数法(variance)或累积分配函数法(cumulative histogram)对复数个第一虹膜影像22或复数个第二虹膜影像24进行正规化,进而产生第一密钥29或第二密钥30。The encryption and decryption module 26 can be an application software, which can generate a first key 29 according to a plurality of first iris images 22, and can use the first key 29 to encrypt the photo 32 to generate an encrypted photo 31, or At different time points, the second key 30 is generated according to the plurality of second iris images 24 to decrypt the encrypted photo 31, wherein the first key 29 and the second key 30 have a first valid time 33 and a second valid time respectively. Time 34, and the encryption and decryption module 26 can first use the variance method (variance) or the cumulative distribution function method (cumulative histogram) to normalize the plurality of first iris images 22 or the plurality of second iris images 24, and then generate the first key 29 or a second key 30.
处理模块27可包含一处理器,处理模块27允许影像撷取模块25产生照片32、控制加解密模块26以第一密钥29对照片32进加密以产生加密照片31,以及控制加解密模块26以第二密钥30对加密照片31进解密。当第一密钥29之产生时间长度未超过第一有效时间33时,处理模块27可允许影像撷取模块25产生照片32并利用加解密模块26产生加密照片31。当加密照片31需要解密时,若第一密钥29之产生时间未超过第一有效时间33时,处理模块27可以设定第一密钥29为第二密钥30,并控制加解密模块26对加密照片31进解密。或者,若第一密钥29之产生时间超过第一有效时间33时,处理模块27可以控制加解密模块26根据第二密钥30对加密照片31进解密。其中,可以进行解密的条件是当第二密钥30等于第一密钥29且第二密钥30之产生时间长度未超过第二有效时间34时,处理模块27可以控制加解密模块26解密加密照片31以还原照片32。The processing module 27 may include a processor, the processing module 27 allows the image capture module 25 to generate the photo 32, controls the encryption and decryption module 26 to encrypt the photo 32 with the first key 29 to generate an encrypted photo 31, and controls the encryption and decryption module 26 The encrypted photo 31 is decrypted with the second key 30 . When the generation time of the first key 29 does not exceed the first valid time 33 , the processing module 27 can allow the image capture module 25 to generate the photo 32 and use the encryption and decryption module 26 to generate the encrypted photo 31 . When the encrypted photo 31 needs to be decrypted, if the generation time of the first key 29 does not exceed the first valid time 33, the processing module 27 can set the first key 29 as the second key 30, and control the encryption and decryption module 26 The encrypted photo 31 is decrypted. Alternatively, if the generation time of the first key 29 exceeds the first validity time 33 , the processing module 27 may control the encryption and decryption module 26 to decrypt the encrypted photo 31 according to the second key 30 . Wherein, the condition that decryption can be performed is that when the second key 30 is equal to the first key 29 and the generation time length of the second key 30 does not exceed the second valid time 34, the processing module 27 can control the encryption and decryption module 26 to decrypt the encrypted Photo 31 to restore photo 32.
举例来说,使用者可以设定第一密钥29的第一有效时间33设为3小时,在此3小时之内,使用者可以使用此利用生理特征作影像加解密之影像捕获设备10进行拍照以及将照片32加密的功能,一但超过3小时后,便无法再进行拍照。另一方面,在此3小时之内,使用者可以利用加解密模块26及此第一密钥29解密加密照片31,以检视所拍摄的照片32。如此一来,万一此影像捕获设备10遗失时,一但超过第一密钥29的第一有效时间33后,此利用生理特征作影像加解密之影像捕获设备10便无法进行影像撷取的功能,用户也无须担心其内的照片32有外泄的问题。当第一密钥29之产生时间超过第一有效时间33后,使用者可以再次拍摄用户的虹膜影像取得第二密钥30,以解密加密照片31,以浏览照片32。For example, the user can set the first valid time 33 of the first key 29 to 3 hours. Within 3 hours, the user can use the image capture device 10 that uses physiological characteristics for image encryption and decryption to perform The function of taking pictures and encrypting 32 photos, once more than 3 hours, you can no longer take pictures. On the other hand, within the 3 hours, the user can use the encryption and decryption module 26 and the first key 29 to decrypt the encrypted photo 31 to view the captured photo 32 . In this way, in case the image capture device 10 is lost, once the first valid time 33 of the first key 29 is exceeded, the image capture device 10 that utilizes physiological characteristics for image encryption and decryption cannot perform image capture. function, the user does not need to worry about the leaking of the photos 32 therein. When the generation time of the first key 29 exceeds the first valid time 33 , the user can take another photo of the user's iris image to obtain the second key 30 to decrypt the encrypted photo 31 and browse the photo 32 .
进一步地说明,此发明之此利用生理特征作影像加解密之相机100可更包含一显示模块28,此显示模块28可为一屏幕,其上可包含一接口以显示撷取复数个第一虹膜影像22或复数个第二虹膜影像24时之顺序提示讯息,以提示用户如何进行收集虹膜影像之顺序。To further illustrate, the camera 100 of this invention using physiological characteristics for image encryption and decryption may further include a display module 28, which may be a screen, and may include an interface on it to display and capture a plurality of first irises The sequence of the image 22 or the plurality of second iris images 24 prompts messages to remind the user how to collect the iris images.
请参考图2,是为本发明实施例之利用生理特征作影像加解密之影像捕获设备之示意图。本实施例中系以相机100作为进行加解密之影像捕获设备来举例实施,但不以此为限。当使用此利用相机100进行拍照时,首先须对复数个第一使用者21之第一虹膜影像22进行影像撷取的动作,再由相机100内之加解密模块26根据此复数个第一虹膜影像22产生一第一密钥29,而透过此相机100进行拍照所产生的照片则均为一加密照片31,其加密方式则是透过第一密钥29以进行加密。Please refer to FIG. 2 , which is a schematic diagram of an image capture device using physiological characteristics for image encryption and decryption according to an embodiment of the present invention. In this embodiment, the camera 100 is used as an example to capture an image for encryption and decryption, but it is not limited thereto. When using the camera 100 to take pictures, firstly, the first iris image 22 of the plurality of first users 21 must be image-captured, and then the encryption and decryption module 26 in the camera 100 according to the plurality of first irises The image 22 generates a first key 29 , and the photos generated by the camera 100 are all encrypted photos 31 , and the encryption method is encrypted by the first key 29 .
当使用者欲观看此相机100所产生的加密照片31内容时,此时若是加解密模块26有一第二密钥30且此第二密钥30等于第一密钥29,使用者便可透过加解密模块26以使用第二密钥30对加密照片31进行解密,以还原当初所拍摄之照片32。但若是无第二密钥30或是第二密钥30的时效性已过期,此时便须对复数个第二使用者23之第二虹膜影像24进行影像撷取的动作,其中复数个第二使用者23须等于复数个第一使用者21,由于每个人的虹膜均有唯一性,故透过复数个第二虹膜影像24产生的第二密钥30亦会等于第一密钥29,加解密模块26便可以利用此第二密钥30对加密照片31进行还原。When the user wants to watch the content of the encrypted photo 31 produced by the camera 100, if the encryption and decryption module 26 has a second key 30 and this second key 30 is equal to the first key 29, the user can pass The encryption and decryption module 26 uses the second key 30 to decrypt the encrypted photo 31 to restore the original photo 32 . But if there is no second key 30 or the timeliness of the second key 30 has expired, then the action of image capture must be performed on the second iris images 24 of a plurality of second users 23, wherein the plurality of second iris images 24 The second user 23 must be equal to the plurality of first users 21. Since each person's iris is unique, the second key 30 generated through the plurality of second iris images 24 will also be equal to the first key 29. The encryption and decryption module 26 can use the second key 30 to restore the encrypted photo 31 .
进一步的说明,此加解密模块26可为一软件应用程序或一手机应用程序,故其亦可执行于一计算机36或一智能型手机上,当使用者将加密照片31放置于计算机36上时,只要此计算机36亦有第二密钥30存在,使用者便可以使用加解密模块26对此加密照片31进行解密以还原当初所拍摄的照片32。Further explanation, this encryption and decryption module 26 can be a software application program or a mobile phone application program, so it can also be executed on a computer 36 or a smart mobile phone, when the user places the encrypted photo 31 on the computer 36 , as long as the computer 36 also has the second key 30, the user can use the encryption and decryption module 26 to decrypt the encrypted photo 31 to restore the original photo 32.
请参考图3,是为本发明第二实施例之结合生理特征之影像加解密方法之加密程序之步骤流程图。此结合生理特征之影像加解密方法,适用于一相机,其包含三个步骤如下。Please refer to FIG. 3 , which is a flow chart of the encryption procedure of the image encryption and decryption method combined with physiological characteristics according to the second embodiment of the present invention. This image encryption and decryption method combined with physiological features is suitable for a camera, and it includes three steps as follows.
步骤S1利用影像撷取模块撷取复数个第一使用者之复数个第一虹膜影像。步骤S2利用加解密模块根据复数个第一虹膜影像产生一第一密钥,其中此第一密钥具有一第一有效时间。步骤S3系指当第一密钥被产生后且在第一有效时间内时,由处理模块允许影像撷取模块撷取周遭环境之影像以产生一照片,并控制加解密模块利用第一密钥对照片进行加密以产生一加密照片。其执行方式如图2中利用相机100撷取第一用户21之虹膜影像,进而产生一第一密钥29并利用此第一密钥29以产生加密照片31。Step S1 utilizes an image capture module to capture a plurality of first iris images of a plurality of first users. Step S2 utilizes the encryption and decryption module to generate a first key according to the plurality of first iris images, wherein the first key has a first valid time. Step S3 means that when the first key is generated and within the first valid time, the processing module allows the image capture module to capture the image of the surrounding environment to generate a photo, and controls the encryption and decryption module to use the first key The photo is encrypted to generate an encrypted photo. Its execution method is as shown in FIG. 2 , using the camera 100 to capture the iris image of the first user 21 , and then generating a first key 29 and using the first key 29 to generate an encrypted photo 31 .
请参考图3,是为本发明第三实施例之结合生理特征之影像加解密方法之解密程序之步骤流程图。其包含五个步骤如下,步骤S4首先判断第一密钥是否存在,若是,则执行步骤S5;若否,则执行步骤S6~步骤S8。步骤S5系控制加解密模块利用第一密钥对加密照片进行解密以还原照片,步骤S6系利用影像撷取模块撷取复数个第二使用者之复数个第二虹膜影像,步骤S7利用加解密模块根据复数个第二虹膜影像产生一第二密钥,第二密钥具有一第二有效时间,步骤S8系指当第二密钥等于第一密钥且第二密钥被产生后在第二有效时间内时,由处理模块控制加解密模块利用第二密钥对加密照片进行解密以还原照片。步骤S6~步骤S8之执行方式如第2图中利用相机100撷取复数个第二虹膜影像24,进而产生一第二密钥30并利用此第二密钥30以解密加密照片31。Please refer to FIG. 3 , which is a flow chart of the decryption procedure of the image encryption and decryption method combined with physiological characteristics according to the third embodiment of the present invention. It includes five steps as follows. Step S4 first judges whether the first key exists, if yes, execute step S5; if not, execute step S6-step S8. Step S5 is to control the encryption and decryption module to use the first key to decrypt the encrypted photo to restore the photo. Step S6 is to use the image capture module to capture a plurality of second iris images of a plurality of second users. Step S7 is to use the encryption and decryption The module generates a second key according to a plurality of second iris images, and the second key has a second valid time. Step S8 means that when the second key is equal to the first key and the second key is generated, Within two valid times, the processing module controls the encryption and decryption module to use the second key to decrypt the encrypted photo to restore the photo. Steps S6-S8 are executed in the same way as shown in FIG. 2 by using the camera 100 to capture a plurality of second iris images 24 to generate a second key 30 and use the second key 30 to decrypt the encrypted photo 31 .
综合上述可知,透过本发明之结合生理特征之影像加解密方法与利用生理特征作影像加解密之相机,能够将复数个使用者的虹膜作为一密钥,并以此密钥作为相机内照片的加密或解密依据,进而提升照片的隐私安全。此外,本发明亦对此密钥设定一有效时间,利用此有效时间可控制相机的影像撷取功能及照片加解密功能,以避免相机及其内照片被人盗取而使用。Based on the above, it can be seen that through the image encryption and decryption method combined with physiological characteristics and the camera using physiological characteristics for image encryption and decryption of the present invention, multiple users' irises can be used as a key, and the key can be used as a photo in the camera. The basis for encryption or decryption, thereby improving the privacy and security of photos. In addition, the present invention also sets an effective time for the key, which can be used to control the camera's image capture function and photo encryption and decryption functions, so as to prevent the camera and the photos in it from being stolen and used.
虽然本发明已参照其例示性实施例而特别地显示及描述,将为所属技术领域具通常知识者所理解的是,于不脱离以下申请专利范围及其等效物所定义之本发明之精神与范畴下可对其进行形式与细节上之各种变更。While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that the spirit of the present invention as defined by the following claims and their equivalents will be understood. Various changes in form and details may be made therein.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410175857.7A CN105025203B (en) | 2014-04-29 | 2014-04-29 | Image encryption and decryption method combined with physiological features and image capturing device thereof |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410175857.7A CN105025203B (en) | 2014-04-29 | 2014-04-29 | Image encryption and decryption method combined with physiological features and image capturing device thereof |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105025203A true CN105025203A (en) | 2015-11-04 |
| CN105025203B CN105025203B (en) | 2018-05-04 |
Family
ID=54414878
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410175857.7A Expired - Fee Related CN105025203B (en) | 2014-04-29 | 2014-04-29 | Image encryption and decryption method combined with physiological features and image capturing device thereof |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105025203B (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106372522A (en) * | 2016-09-29 | 2017-02-01 | 宇龙计算机通信科技(深圳)有限公司 | Photo shooting method, corresponding device, photo viewing method and corresponding device |
| WO2017128218A1 (en) * | 2016-01-28 | 2017-08-03 | 常平 | Image encryption method and mobile terminal |
| WO2017128217A1 (en) * | 2016-01-28 | 2017-08-03 | 常平 | Information push method in image encryption and mobile terminal |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1778065A (en) * | 2003-04-23 | 2006-05-24 | 惠普开发有限公司 | Encryption method and device based on biometric identity |
| CN1885309A (en) * | 2005-06-24 | 2006-12-27 | 英华达(上海)电子有限公司 | Mobile with iris recognition function and iris recognition method thereof |
| CN1947372A (en) * | 2004-04-23 | 2007-04-11 | 松下电器产业株式会社 | Personal information management device, distributed key storage device, and personal information management system |
| US20080016352A1 (en) * | 2006-01-03 | 2008-01-17 | Perlman Radia J | Method and apparatus for maintaining ephemeral keys in limited space |
| CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
| CN102902935A (en) * | 2012-09-26 | 2013-01-30 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and device |
| US20140032924A1 (en) * | 2012-07-30 | 2014-01-30 | David M. Durham | Media encryption based on biometric data |
-
2014
- 2014-04-29 CN CN201410175857.7A patent/CN105025203B/en not_active Expired - Fee Related
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1778065A (en) * | 2003-04-23 | 2006-05-24 | 惠普开发有限公司 | Encryption method and device based on biometric identity |
| CN1947372A (en) * | 2004-04-23 | 2007-04-11 | 松下电器产业株式会社 | Personal information management device, distributed key storage device, and personal information management system |
| CN1885309A (en) * | 2005-06-24 | 2006-12-27 | 英华达(上海)电子有限公司 | Mobile with iris recognition function and iris recognition method thereof |
| US20080016352A1 (en) * | 2006-01-03 | 2008-01-17 | Perlman Radia J | Method and apparatus for maintaining ephemeral keys in limited space |
| CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
| US20140032924A1 (en) * | 2012-07-30 | 2014-01-30 | David M. Durham | Media encryption based on biometric data |
| CN102902935A (en) * | 2012-09-26 | 2013-01-30 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and device |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017128218A1 (en) * | 2016-01-28 | 2017-08-03 | 常平 | Image encryption method and mobile terminal |
| WO2017128217A1 (en) * | 2016-01-28 | 2017-08-03 | 常平 | Information push method in image encryption and mobile terminal |
| CN106372522A (en) * | 2016-09-29 | 2017-02-01 | 宇龙计算机通信科技(深圳)有限公司 | Photo shooting method, corresponding device, photo viewing method and corresponding device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105025203B (en) | 2018-05-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10193875B2 (en) | Method and apparatus for controlling access to surveillance video | |
| JP4931924B2 (en) | Media data processing apparatus and media data processing method | |
| CN112597469B (en) | Mobile terminal privacy protection method, protection device and mobile terminal | |
| US10073985B2 (en) | Apparatus and method for trusted execution environment file protection | |
| CN104253933A (en) | Shooting method and device | |
| CN105354509B (en) | The processing method and processing system of picture | |
| US20190065790A1 (en) | Method Of Displaying Content On A Screen Of An Electronic Processing Device | |
| US9853955B2 (en) | Techniques for securing delivery of an audio message | |
| CN105281907B (en) | Encrypted data processing method and device | |
| TWI519994B (en) | Image encryption and decryption method combining physiological characteristics and image capturing device thereof | |
| JPWO2017026356A1 (en) | Image processing apparatus, image processing method, and program | |
| CN106295284A (en) | A kind of information protecting method and mobile terminal | |
| CN105095787A (en) | Information processing method and device | |
| WO2018113537A1 (en) | Method and system for encrypting photograph on the basis fingerprint identification | |
| CN105025203B (en) | Image encryption and decryption method combined with physiological features and image capturing device thereof | |
| CN103377343A (en) | System and method for information confidentiality | |
| CN101437116A (en) | System and method for hiding and displaying image and sound file of image-shooting apparatus | |
| JP6938579B2 (en) | Mobile device privacy protection methods and devices, as well as mobile devices | |
| CN109800583B (en) | Electronic device including display and method for encrypting information | |
| CN108696355B (en) | A method and system for preventing the theft of user avatars | |
| CN105205415B (en) | The processing method and processing system of file | |
| CN108664216A (en) | Date storage method and device | |
| Templeman et al. | Reactive security: Responding to visual stimuli from wearable cameras | |
| CN105303085A (en) | File sharing method and sharing system | |
| KR101559915B1 (en) | A system of managing shared data in the smart phone by using couple finger-prints |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180504 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |