Movatterモバイル変換


[0]ホーム

URL:


CN110909368B - Data encryption method, device and computer readable storage medium - Google Patents

Data encryption method, device and computer readable storage medium
Download PDF

Info

Publication number
CN110909368B
CN110909368BCN201911083935.XACN201911083935ACN110909368BCN 110909368 BCN110909368 BCN 110909368BCN 201911083935 ACN201911083935 ACN 201911083935ACN 110909368 BCN110909368 BCN 110909368B
Authority
CN
China
Prior art keywords
multimedia data
data
encryption
content type
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911083935.XA
Other languages
Chinese (zh)
Other versions
CN110909368A (en
Inventor
青欣
刘育氚
王曦
冯诚
张文峰
王智培
丁茂霞
马宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co LtdfiledCriticalTencent Technology Shenzhen Co Ltd
Priority to CN201911083935.XApriorityCriticalpatent/CN110909368B/en
Publication of CN110909368ApublicationCriticalpatent/CN110909368A/en
Application grantedgrantedCritical
Publication of CN110909368BpublicationCriticalpatent/CN110909368B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The application discloses a data encryption method, a device and a computer readable storage medium, wherein the method comprises the following steps: responding to synchronous encryption operation to obtain a multimedia data set; identifying a data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set; determining the first multimedia data with the data content type being the target content type as the multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation; and encrypting the multimedia data to be encrypted. By adopting the application, the encryption efficiency for the multimedia data can be improved.

Description

Data encryption method, device and computer readable storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data encryption method, device, and computer readable storage medium.
Background
There is usually a private space in the existing terminal device, where the private space is an encrypted folder, and the user may store any file that the user wants to store, such as a video file or a picture file.
However, when a user wants to encrypt a plurality of files, for example, a plurality of pictures, for a private space in a current terminal device, the user is required to sequentially add the plurality of pictures to the encrypted space one by one or to add the entire folder storing the plurality of pictures to the encrypted space, thereby achieving the purpose of encrypting the plurality of pictures. It follows that file encryption is less efficient for the way files are currently encrypted in the private space.
Disclosure of Invention
The application provides a data encryption method, a data encryption device and a computer readable storage medium, which can improve encryption efficiency for multimedia data.
In one aspect, the present application provides a data encryption method, including:
responding to synchronous encryption operation to obtain a multimedia data set;
identifying a data content type of first multimedia data in the multimedia data set according to the data content of the first multimedia data;
determining the first multimedia data with the data content type as a target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation;
And encrypting the multimedia data to be encrypted.
Wherein the first multimedia data is image data; the identifying the data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set comprises the following steps:
traversing each pixel point in the first multimedia data, and acquiring a plurality of target areas in the first multimedia data according to a color tolerance threshold and the color value of each traversed pixel point in the first multimedia data; the colors of all pixel points in a target area are in a color value interval defined by a target color value and the color tolerance threshold, wherein the target color value refers to the color value of the first pixel point traversed in the target area;
determining the number of pixel points in each target area as the first pixel point number;
and determining the data content type of the first multimedia data according to the target color value interval for matching the target content type, the first pixel number and the color value of each pixel in each target area.
Wherein the target color value interval comprises a first type color value interval and a second type color value interval; the determining the data content type of the first multimedia data according to the target color value interval for matching the target content type, the first pixel number and the color value of each pixel in each target area includes:
Acquiring a color value of each pixel point in each target area, selecting a first area from the target areas based on the first type color value interval, and selecting a second area from the target areas based on the second type color value interval; the number of the pixel points, of which the color values are in the first type color value interval, in the first area is larger than the target number; the number of the pixel points, of which the color values are in the second type color value interval, in the second area is larger than the target number; the target number is determined based on the first pixel number and a scaling threshold;
counting the number of the pixel points in each first area to obtain a first quantity value, and counting the number of the pixel points in each second area to obtain a second quantity value;
determining the number of pixels in the first multimedia data as a second number of pixels;
determining a first ratio value based on the first quantity value and the second pixel point quantity, and determining a second ratio value based on the second quantity value and the second pixel point quantity;
and when the maximum value of the first ratio and the second ratio is larger than or equal to a ratio threshold value, determining that the data content type of the first multimedia data is the target content type.
Wherein the identifying the data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set comprises:
acquiring a data character string corresponding to the first multimedia data, and acquiring a target content address library; the target content address library comprises a plurality of target content addresses; the plurality of target content addresses are all addresses for acquiring the multimedia data of the target content type;
acquiring a source address of the first multimedia data from the data character string;
and if the source address exists in the plurality of target content addresses, determining that the data content type of the first multimedia data is the target content type.
Wherein, still include:
responding to a storage operation aiming at the first multimedia data, and acquiring an original character string of the first multimedia data and the source address;
and adding the source address into the original character string to obtain the data character string corresponding to the first multimedia data, and storing the data character string.
Wherein the identifying the data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set comprises:
Inputting the first multimedia data into an identification plug-in, and outputting a confidence level for the first multimedia data based on the identification plug-in; the identification plug-in is used for identifying the data content type of the multimedia data according to the data content of the multimedia data;
and when the confidence coefficient is equal to or greater than a confidence coefficient threshold value, determining that the data content type of the first multimedia data is the target content type.
Wherein the identifying the data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set comprises:
acquiring reference multimedia data from the multimedia data subjected to encryption processing;
inputting the first multimedia data and the reference multimedia data into the identification plug-in, and outputting data similarity between the first multimedia data and the reference multimedia data based on the identification plug-in;
and when the data similarity is equal to or greater than a similarity threshold, determining that the data content type of the first multimedia data is the target content type.
Wherein the responding to the synchronous encryption operation, obtaining the multimedia data set, comprises:
In response to encryption operation on second multimedia data, carrying out encryption processing on the second multimedia data and outputting an encryption selection box;
responding to the synchronous encryption operation in the encryption selection frame, acquiring the multimedia data set, and identifying the data content type of the second multimedia data;
and determining the data content type of the second multimedia data as the target content type.
Wherein the responding to the synchronous encryption operation, obtaining the multimedia data set, comprises:
in response to encryption operation on second multimedia data, carrying out encryption processing on the second multimedia data and outputting an encryption selection box; the encryption selection box comprises encryption prompt information aiming at the target content type;
and responding to the synchronous encryption operation of the encryption prompt information in the encryption selection box, and acquiring the multimedia data set according to the father storage catalog of the second multimedia data.
Wherein the response is directed to the encryption operation of the second multimedia data, the second multimedia data is encrypted, and an encryption selection box is output, and the method comprises the following steps:
in response to the encryption operation for the second multimedia data, encrypting the second multimedia data, and identifying the data content type of the second multimedia data;
And outputting the encryption selection box when the data content type of the second multimedia data is identified as the target content type.
Wherein the obtaining the multimedia data set according to the father storage catalog of the second multimedia data includes:
acquiring the father storage catalog of the second multimedia data;
determining the father storage catalog, the child storage catalog in the father storage target and the peer storage catalog aiming at the father storage catalog as storage catalogs to be identified;
and adding the multimedia data in the storage catalog to be identified to the multimedia data set.
The encrypting the multimedia data to be encrypted comprises the following steps:
adding the multimedia data to be encrypted to an equipment encryption space;
then, further comprising:
responding to the unfolding operation aiming at the equipment encryption space, and outputting a verification information input frame;
acquiring the verification information recorded in the verification information recording frame;
and outputting the multimedia data in the equipment encryption space when the verification information is the same as the authentication information.
Another aspect of the present application provides a data encryption method, including:
Outputting an encryption selection box in response to an encryption operation for the first image; the encryption selection box is output when the image content type of the first image is identified as the target content type;
responding to synchronous encryption operation in the encryption selection frame, and outputting a first encryption prompt frame; the first encryption prompt box comprises encryption process prompt information aiming at the second image; the second image refers to an image with the image content type of the image set being the target content type.
Wherein after the response to the synchronous encryption operation in the encryption selection frame and the output of the first encryption prompt frame, the method further comprises:
closing the first encryption prompt box and outputting a second encryption prompt box; the second encryption prompt box comprises encryption result prompt information aiming at the second image.
In one aspect, the present application provides a data encryption apparatus, including:
the response module is used for responding to the synchronous encryption operation and acquiring a multimedia data set;
the identification module is used for identifying the data content type of the first multimedia data according to the data content of the first multimedia data in the multimedia data set;
the determining module is used for determining the first multimedia data with the data content type being the target content type as the multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation;
And the encryption module is used for carrying out encryption processing on the multimedia data to be encrypted.
Wherein the first multimedia data is image data; the identification module comprises:
the traversing unit is used for traversing each pixel point in the first multimedia data and acquiring a plurality of target areas in the first multimedia data according to the color tolerance threshold value and the color value of each traversed pixel point in the first multimedia data; the colors of all pixel points in a target area are in a color value interval defined by a target color value and the color tolerance threshold, wherein the target color value refers to the color value of the first pixel point traversed in the target area;
a first determining unit, configured to determine the number of pixels in each target area as a first number of pixels;
and the second determining unit is used for determining the data content type of the first multimedia data according to the target color value interval for matching the target content type, the first pixel point number and the color value of each pixel point in each target area.
Wherein the target color value interval comprises a first type color value interval and a second type color value interval; the second determination unit includes:
An acquisition subunit, configured to acquire a color value of each pixel point in each target area, select a first area from the plurality of target areas based on the first type color value interval, and select a second area from the plurality of target areas based on the second type color value interval; the number of the pixel points, of which the color values are in the first type color value interval, in the first area is larger than the target number; the number of the pixel points, of which the color values are in the second type color value interval, in the second area is larger than the target number; the target number is determined based on the first pixel number and a scaling threshold;
the statistics subunit is used for counting the number of the pixel points in each first area to obtain a first quantity value, and counting the number of the pixel points in each second area to obtain a second quantity value;
a number determination subunit, configured to determine the number of pixels in the first multimedia data as a second number of pixels;
a ratio determining subunit, configured to determine a first ratio based on the first quantity value and the second number of pixels, and determine a second ratio based on the second quantity value and the second number of pixels;
And the type determining subunit is used for determining the data content type of the first multimedia data as the target content type when the maximum value of the first ratio and the second ratio is larger than or equal to a ratio threshold value.
Wherein, the identification module includes:
the address library acquisition unit is used for acquiring a data character string corresponding to the first multimedia data and acquiring a target content address library; the target content address library comprises a plurality of target content addresses; the plurality of target content addresses are all addresses for acquiring the multimedia data of the target content type;
a source address obtaining unit, configured to obtain a source address of the first multimedia data from the data string;
and the judging unit is used for determining that the data content type of the first multimedia data is the target content type if the source address exists in the target content addresses.
Wherein, the data encryption device further includes:
the storage response module is used for responding to the storage operation of the first multimedia data and acquiring an original character string of the first multimedia data and the source address;
And the adding module is used for adding the source address into the original character string to obtain the data character string corresponding to the first multimedia data and storing the data character string.
Wherein, the identification module includes:
a first input unit for inputting the first multimedia data into an identification plug-in, and outputting a confidence level for the first multimedia data based on the identification plug-in; the identification plug-in is used for identifying the data content type of the multimedia data according to the data content of the multimedia data;
and a third determining unit configured to determine that the data content type of the first multimedia data is the target content type when the confidence is equal to or greater than a confidence threshold.
Wherein, the identification module includes:
a reference acquisition unit configured to acquire reference multimedia data from the multimedia data that has undergone encryption processing;
a second input unit for inputting the first multimedia data and the reference multimedia data into the recognition plug-in, and outputting a data similarity between the first multimedia data and the reference multimedia data based on the recognition plug-in;
and a fourth determining unit configured to determine that the data content type of the first multimedia data is the target content type when the data similarity is equal to or greater than a similarity threshold.
Wherein, response module includes:
a first response unit, configured to respond to an encryption operation for second multimedia data, perform encryption processing on the second multimedia data, and output an encryption selection box;
the second response unit is used for responding to the synchronous encryption operation in the encryption selection frame, acquiring the multimedia data set and identifying the data content type of the second multimedia data;
and a fifth determining unit configured to determine a data content type of the second multimedia data as the target content type.
Wherein, response module includes:
a third response unit, configured to respond to an encryption operation for second multimedia data, perform encryption processing on the second multimedia data, and output an encryption selection box; the encryption selection box comprises encryption prompt information aiming at the target content type;
and a fourth response unit, configured to obtain the multimedia data set according to a parent storage directory of the second multimedia data in response to the synchronous encryption operation of the encryption prompt information in the encryption selection box.
Wherein the third response unit includes:
a response subunit, configured to respond to an encryption operation for the second multimedia data, perform encryption processing on the second multimedia data, and identify a data content type of the second multimedia data;
And the output subunit is used for outputting the encryption selection box when the data content type of the second multimedia data is identified as the target content type.
Wherein the fourth response unit includes:
a catalog acquisition subunit, configured to acquire the parent storage catalog of the second multimedia data;
a directory determining subunit, configured to determine the parent storage directory, a child storage directory in the parent storage target, and a peer storage directory for the parent storage directory as storage directories to be identified;
and the adding subunit is used for adding the multimedia data in the storage catalog to be identified to the multimedia data set.
The encryption module is specifically configured to:
adding the multimedia data to be encrypted to an equipment encryption space;
the data encryption device further includes:
the output module is used for responding to the unfolding operation aiming at the equipment encryption space and outputting a verification information input frame;
the verification acquisition module is used for acquiring the verification information recorded in the verification information recording frame;
and the authentication module is used for outputting the multimedia data in the equipment encryption space when the verification information is the same as the authentication information.
Another aspect of the present application provides a data encryption apparatus, including:
a first operation response module for outputting an encryption selection box in response to an encryption operation for the first image; the encryption selection box is output when the image content type of the first image is identified as the target content type;
the second operation response module is used for responding to the synchronous encryption operation in the encryption selection frame and outputting a first encryption prompt frame; the first encryption prompt box comprises encryption process prompt information aiming at the second image; the second image refers to an image with the image content type of the image set being the target content type.
Wherein, after the execution of the second operation response module is completed, the data encryption device is further configured to:
closing the first encryption prompt box and outputting a second encryption prompt box; the second encryption prompt box comprises encryption result prompt information aiming at the second image.
The application provides in one aspect a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the method of one or more of the aspects described above.
The present application provides in one aspect a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of one/another aspect described above.
Firstly, responding to synchronous encryption operation to obtain a multimedia data set; identifying a data content type of first multimedia data in the multimedia data set according to the data content of the first multimedia data; determining the first multimedia data with the data content type as a target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation; and encrypting the multimedia data to be encrypted. Therefore, the method provided by the application can identify the data content type of the first multimedia data in the multimedia data set by responding to the synchronous encryption operation, and encrypt all the first multimedia data with the identified data content type as the target content type, thereby enriching the encryption mode aiming at the multimedia data. Meanwhile, all the multimedia data which are the target content type in the multimedia data can be automatically and synchronously encrypted without intermittently encrypting the multimedia data which are the target content type one by one, so that the encryption efficiency of the multimedia data is improved.
Drawings
In order to more clearly illustrate the application or the technical solutions of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained from them without inventive effort for a person skilled in the art.
FIG. 1a is a schematic diagram of a system architecture according to the present application;
FIG. 1b is a schematic diagram of a scenario of data encryption provided by the present application;
FIG. 2 is a schematic flow chart of a data encryption method provided by the application;
FIG. 3 is a schematic view of a scenario for determining a multimedia data set according to the present application;
fig. 4 is a schematic page diagram of a terminal device according to the present application;
fig. 5 is a schematic view of a scenario for identifying a data content type of multimedia data according to the present application;
FIG. 6 is a schematic diagram of a scenario for acquiring a data string according to the present application;
FIG. 7 is a schematic view of another scenario for identifying a data content type of multimedia data according to the present application;
FIG. 8 is a schematic view of another scenario for identifying a data content type of multimedia data according to the present application;
Fig. 9 is a schematic page diagram of another terminal device provided by the present application;
FIG. 10 is a flow chart of another data encryption method provided by the application;
FIG. 11 is a flow chart of another data encryption method provided by the present application;
fig. 12 is a schematic structural diagram of a data encryption device according to the present application;
FIG. 13 is a schematic diagram of another data encryption device according to the present application;
fig. 14 is a schematic structural diagram of a computer device according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made more apparent and fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the application are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1a is a schematic diagram of a system architecture according to the present application. As shown in fig. 1a, the system architecture diagram includes a server 100 and a plurality of terminal devices, including a terminal device 200a, a terminal device 200b, and a terminal device 200c. The terminal device 200a, the terminal device 200b, and the terminal device 200c can communicate with the server 100 through a network, and the terminal device can be a mobile phone, a tablet computer, a notebook computer, a palm computer, a mobile internet device (mobile internet device, MID), a wearable device (e.g., a smart watch, a smart bracelet, etc.). Here, communication between the terminal device 200a and the server 100 is described as an example.
Fig. 1b is a schematic diagram of a scenario of data encryption according to the present application. As shown in fig. 1b, the multimedia data of the present application will be described as image data. The terminal page 100a in the terminal device 200a is a page for image browsing. There are a total of 50 browsable images, and the image browsed in the terminal page 100a is the first image 100b. Also included in terminal page 100a is button 101b (i.e., a "private save" button). The terminal device 200a may encrypt the image 100b in response to a user operation (e.g., a click operation, a slide operation, a long press operation, or a double click operation, etc.) of the button 101b by a user. Encrypting the image 100b here refers to adding the image 100b to a private space in the terminal device 200a, which is an encrypted folder in the terminal device 200a in which a user can store any multimedia data that he wants to store, such as video-type multimedia data, image-type multimedia data, document-type multimedia data, and the like. The terminal device 200a can recognize the data content type of the image 100b while adding the image 100b to the private space. The data content type for the image data refers to the type of image content specifically contained in an image, such as an image of a nature landscape type, an image of a architectural design type, and an image of a human art type (i.e., a character artwork). Here, it should be noted that the terminal device 200a may download an identification plug-in for identifying the data content type of the image data through the server 100, and the identification plug-in may be an image dedicated to identifying the data content type as a human art type. When the terminal device 200a recognizes that the image 100b is a "character artwork" of a human art type through the plug-in, the terminal device may pop up the encryption selection box 102b (the encryption selection box may be a pop-up sub-window for the terminal page 100a, which is separately displayed on the image 100 b) above the image 100b, as shown in the terminal page 101 a. The encryption selection box 102b includes a hint "saved to private space". Whether to turn on the "one-key encryption character artwork", "cancel" button and "turn on" button. When the user clicks the "cancel" button in the encryption selection frame 102b, the terminal device 200a may close the encryption selection frame 102b; when the user clicks the "on" button in the encryption selection frame, the terminal device 200a may close the encryption selection frame 102b while displaying a pop-up window 103b above the image 100b (as shown in the terminal page 102a, the pop-up window 103b includes the hint information "is being automatically encrypted"). In displaying the pop-up window 103b, the terminal device 200a can recognize the data content type of other images stored in the terminal device 200a (i.e., other images in the terminal device 200a than the image 100 b) through the above-described recognition plug-in scanning. The terminal device 200a may add all of the "character artwork" of the human artistic type in the identified other images described above to the private space. When the terminal device 200a completes the identification of the data content type of the other image and adds the "character artwork" of the identified human body artwork type to the private space, the terminal device may close the popup window 103b and display the prompt message 104b (i.e., "10 pictures have been automatically encrypted"), as shown in the terminal page 103 a. The prompt message 104b is for prompting the user that the data content type of 10 images is identified as "human art type" among the other images described above, and that the identified 10 images have been added to the private space.
Next, the user may open the private space in the terminal device 200a (may set an access password, i.e., the user needs to enter a password to open when opening the private space), as shown in the terminal page 104 a. The private space in the terminal page 104a includes 10 images of which the data content type is "human art type" identified from the other images, in addition to the image 100b added to the private space described above.
By the method provided by the application, when a user encrypts and stores a certain 'figure art figure', the user is prompted to encrypt other 'figure art figures' in the terminal equipment (namely, the function of one-key encryption of the 'figure art figure' is started), and when the user agrees to start the function of one-key encryption of the 'figure art figure' based on the terminal equipment, the terminal equipment can automatically scan and identify the data content types of other images in the equipment, and automatically encrypt all the identified 'figure art figures', so that the encryption intelligence of the 'figure art figure' is improved, and the encryption efficiency of the 'figure art figure' is improved.
Referring to fig. 2, a flow chart of a data encryption method provided by the present application, as shown in fig. 2, the method may include:
Step S101, responding to synchronous encryption operation, and acquiring a multimedia data set;
specifically, the terminal device may obtain the multimedia data set in response to the synchronous encryption operation. The synchronous encryption operation can have multiple operation modes, and through the synchronous encryption operation, the terminal equipment can carry out synchronous intelligent encryption on certain type of multimedia data, and can acquire different multimedia data sets through different operation modes of the synchronous encryption operation.
First mode of operation for synchronous encryption operations: the terminal device can specially provide a synchronous encryption button, the user can click the synchronous encryption button, and the operation of clicking the synchronous encryption button by the user is the synchronous encryption operation. If the synchronous encryption operation is performed through the synchronous encryption button, the multimedia data set acquired by the terminal device may be a set formed by all multimedia data in the terminal device, that is, the terminal device may perform full-disc scanning, and add all scanned multimedia data to the multimedia data set.
It should be noted that, since the multimedia data may be various types of data, such as video type data, image type data, and document type data, the description of the present application is described with the same type of multimedia data, that is, description of video type data, description of image type data, or description of document type data. It will be appreciated, therefore, that the acquired multimedia data set may be a set of all multimedia data of the same type (which may be video type, image type or document type) in the terminal device in response to the above-described synchronous encryption operation performed by the first operation mode.
The second mode of operation of the synchronous encryption operation: the operation is performed through the synchronous encryption gesture, namely one or more gestures (which can be set by themselves) specially used for performing the synchronous encryption operation can be set. For example, the synchronous encryption gesture may be a gesture of simultaneously swiping up two fingers in a terminal page of the terminal device, or a gesture of simultaneously swiping up two fingers separated in the terminal page of the terminal device toward the center of the terminal page. And performing synchronous encryption gesture operation on the terminal page by the user, namely the synchronous encryption operation. The multimedia data set acquired through the synchronous encryption gesture can also be a set formed by all multimedia data of the same type in the terminal device.
Third mode of operation for synchronous encryption operations: the terminal equipment can respond to the encryption operation aiming at the second multimedia data, carry out encryption processing on the second multimedia data and output an encryption selection frame; the terminal device may obtain the multimedia data set in response to the synchronous encryption operation in the encryption selection box, and identify a data content type of the second multimedia data:
the second multimedia data may be any multimedia data stored in the terminal device, such as an image (i.e., a picture). The encryption operation for the second multimedia data is an operation of encrypting the second multimedia data (may be an operation of adding the second multimedia data to the private space, for example, the user operation for the button 101b in the embodiment corresponding to fig. 1b, which is described above, and the image 100b is the second multimedia data). The terminal device may, in response to an encryption operation for the second multimedia data, subject the second multimedia data to an encryption process (e.g. a process of adding the second multimedia data to the private space of the terminal device), while the terminal device may output (i.e. display) an encryption selection box (e.g. the encryption selection box 102b in the embodiment corresponding to fig. 1b described above) in the terminal page, which may be a sub-page, e.g. a popup window, that is displayed separately above the terminal page where the second multimedia data is currently encrypted. The encryption selection box comprises a cancel button and an open button, and the terminal equipment can respond to the click operation of the cancel button in the encryption selection box by a user to close the displayed encryption selection box. The terminal device may further obtain the above-mentioned multimedia data set in response to the clicking operation of the "on" button in the encryption selection box by the user, and identify the data content type of the second multimedia data, and the specific implementation process of identifying the data content type of the second multimedia data may refer to the process of identifying the data content type of the first multimedia data in step S102 described below, that is, the manner of identifying the data content type of the second multimedia data may be the same as the manner of identifying the data content type of the first multimedia data. The clicking operation of the user on the "on" button in the encryption selection box is the synchronous encryption operation in the encryption selection box.
Here, an explanation is made on the type of data content, which refers to the type of image content specifically contained in an image, such as an image of a nature landscape type, an image of a construction type, an image of a human art type (i.e., a character art map), and the like; the data content type of the video refers to the type of video content specifically contained in the video, such as a natural scene type video, a food type video, a make-up type video, a human art type video and the like; the data content type for a document refers to the type of document content specifically contained in the document, such as a job record type document, a reputation type document, and a suspicion type document.
The terminal device may use the identified data content type of the second multimedia data as the data content type indicated by the above-mentioned synchronous encryption operation, that is, the target content type, where the target content type refers to the data content type of the multimedia data that needs to be encrypted in the multimedia data set, and for a specific explanation, see step S102-step S104 below.
If the synchronous encryption operation is performed in the third operation manner, the multimedia data set may be collected according to the parent storage directory of the second multimedia data, specifically: the terminal device may acquire a parent storage directory of the second multimedia data, where the parent storage directory refers to a folder in which the second multimedia data is located. The terminal device may use the parent storage directory, the child storage directory in the parent storage directory (i.e. the folder in the parent storage directory) and the peer storage directory for the parent storage directory (i.e. the folder peer with the parent storage directory) as the storage directories to be identified, and the terminal device may scan each storage directory to be identified, and add all multimedia data except the second multimedia data in each storage directory to be identified (which is directly in the storage directory to be identified and is not in the child storage directory in the storage directory to be identified) to the multimedia data set. For example, please refer to fig. 3, which is a schematic diagram of a scenario for determining a multimedia data set according to the present application. As shown in fig. 3, taking the picture 1 in the terminal page 101c as the second multimedia data as an example, the parent storage directory of the second multimedia data is the folder 1 (because the picture 1 is stored in the folder 1), and the folder 1 in the terminal page 101c further includes the picture 2, the picture 3 and the subfolder 1. The child folder 1 in the folder 1 is a child storage directory in the parent storage directory of the second multimedia data, and the terminal device may respond to the clicking operation of the user on the child folder 1 in the terminal page 101c, display the terminal page 102c, and display the picture 4, the picture 5, and the child folder 2 in the child folder 1 in the terminal page 102 c. Clicking "back" in page 101c, the terminal device will display terminal page 100c, and all folders in "my files" are displayed in terminal page 100c, including folder 1, folder 2, and folder 3. Folder 1, folder 2, and folder 3 are peer folders with respect to each other, and thus, the peer storage directory of the parent storage directory (i.e., folder 1) of the above-described second multimedia data includes folder 2 and folder 3. As shown in fig. 3, the terminal device may also display a click operation by the user on the folder 2 in the terminal page 100c, display the terminal page 103c, and display the picture 6 and the picture 7 included in the folder 2 in the terminal page 103 c. The terminal device may also display a click operation by the user on the folder 3 in the terminal page 100c, display the terminal page 104c, and display the picture 8 and the picture 9 included in the folder 3 in the terminal page 104 c. Therefore, the terminal device may use the folder 1, the folder 2, the folder 3 and the sub-folder 1 as the storage directories to be identified, and then the terminal device may add the picture 2 and the picture 3 in the parent storage directory (i.e. the file 1) to the multimedia data set, add the picture 4 and the picture 5 in the sub-storage directory (i.e. the sub-folder 1) of the parent storage directory to the multimedia data set, and add the picture 6, the picture 7, the picture 8 and the picture 9 in the peer storage directory (i.e. the folder 2 and the folder 3) of the parent storage directory to the multimedia data set, i.e. the multimedia data set includes the picture 2, the picture 3, the picture 4, the picture 5, the picture 6, the picture 7, the picture 8 and the picture 9. Alternatively, the depth of selecting the child storage directory in the parent storage directory may also be set, for example, the depth is set to be 2, and then the child storage directory in the parent storage directory (i.e., the child folder 1) and the multimedia data in the child folder 2 in the child folder 1 may be added to the multimedia data set, that is, the child folder 2 is also used as the storage directory to be identified, where the depth is for the parent storage directory of the second multimedia data, the depth of the child folder 1 for the folder 1 is 1, and the depth of the child folder 2 for the file 1 is 2. The depth of the parent storage directory may be set by itself, for example, set to 1, set to 2, set to 3, or set to infinity, and the like, which is not limited. Alternatively, some other scanning rules may be set, for example, if the peer storage directory (for example, the folders 2 and 3) of the parent storage directory of the second multimedia data is the root storage directory (for example, the root directory of the memory card or the terminal device) of the storage medium, the peer storage directory of the parent storage directory is not used as the storage directory to be identified, that is, the multimedia data in the peer storage directory of the parent storage directory is not added to the multimedia data set, that is, the peer storage directory of the parent storage directory is not scanned.
Fourth mode of operation of the synchronous encryption operation: the terminal equipment can respond to the encryption operation aiming at the second multimedia data, carry out encryption processing on the second multimedia data and output an encryption selection frame; the encryption selection box comprises encryption prompt information aiming at the target content type; responding to the synchronous encryption operation of the encryption prompt information in the encryption selection box, and acquiring the multimedia data set according to a father storage catalog of the second multimedia data:
in fact, the fourth operation mode is different from the third operation mode described above, except that the determination mode of the target content type indicated by the synchronous encryption operation is different, and the ejection condition of the encryption selection box is different. The method comprises the following steps:
for the fourth operation mode, the data content type indicated by the synchronous encryption operation (i.e., the target content type) may be set in advance, that is, a default data content type may be set in advance as the target content type, for example, a "human art type" is selected as the default target content type, and then the terminal device may perform encryption processing on the second multimedia data in response to the encryption operation on the second multimedia data (this process is the same as the encryption process on the second multimedia data in the third operation mode), and identify the data content type of the second multimedia data, where the specific process of identifying the data content type of the second multimedia data is also referred to as the identification process on the data content type of the first multimedia data in step S102 described below. When the terminal device identifies that the data content type of the second multimedia data is the target content type, the terminal device can display an encryption selection frame in the terminal page, and if the terminal device identifies that the data content type of the second multimedia data is not the target content type, the terminal device does not display the encryption selection frame. The encryption selection box may further include encryption hint information for the target content type, for example, the hint information may be "whether or not to encrypt the multimedia data of the target content type by one key? The encryption selection box may include a deny button (equivalent to the "cancel" button in the encryption selection box 102b in fig. 1b described above) and a confirm button (equivalent to the "on" button in the encryption selection box 102b in fig. 1b described above) for the hint information. The terminal device may close the selection encryption frame in response to a click operation of the user on the deny button in the encryption selection frame, and may acquire the multimedia data set according to the parent storage directory of the second multimedia data in response to a click operation of the user on the confirm button in the encryption selection frame. Here, the clicking operation of the user on the confirmation button in the encryption selection box is the synchronous encryption operation on the encryption hint information in the encryption selection box. The process of obtaining the multimedia data set according to the parent storage directory of the second multimedia data is the same as the process described in the third operation mode, and will not be described herein. Alternatively, instead of acquiring the multimedia data set according to the parent storage directory of the second multimedia data, all multimedia data (e.g., all images) stored in the terminal device may be added to the multimedia data set.
Fig. 4 is a schematic page diagram of a terminal device according to the present application. As shown in fig. 4, the display manner of the terminal page of the terminal device described in the process 106g is the manner described in the fourth operation manner described above, and the display manner of the terminal page of the terminal device described in the process 113g is the manner described in the third operation manner described above. In the process 106g, the terminal page 100g is a page for browsing images, the image 103g displayed in the terminal page 100g is the second multimedia data, the terminal device may respond to the clicking operation of the user on the button 104g (i.e. the "private save" button) in the terminal page 100g, encrypt the image 103g, and simultaneously perform the process 101g, that is, identify the data content type of the image 103g, and when the terminal device identifies that the data content type of the image 103g is the target content type (preset), display the encryption selection box 105g, as shown in the terminal page 102g, where the prompt information in the encryption selection box 105g is "saved to the private space". Whether to turn on the one-key encryption function. If the terminal device recognizes that the data content type of the image 103g is not the target content type, the encryption selection box 105g is not displayed. In the process 113g, the terminal page 107g is also an image browsing page, and the image 110g displayed in the terminal page 107g is the second multimedia data. The terminal device may encrypt the image 110g in response to the clicking operation of the button 111g (i.e., the "private save" button) in the terminal page 107g by the user, and simultaneously display an encryption selection box 112g, where the prompt information in the encryption selection box 112g is "saved to the private space" as shown in the terminal page 108 g. Whether to turn on the "one-key encryption type map". When the user clicks the "on" button in the encryption selection box 112g, the terminal device may identify the data content type of the image 110g, and the terminal device may use the identified data content type of the image 110g as the target data content type, for example, if the identified data content type of the image 110g is a building type, the target content type is also a building type.
Step S102, according to the data content of the first multimedia data in the multimedia data set, identifying the data content type of the first multimedia data;
specifically, the multimedia data in the multimedia data set may be referred to as first multimedia data, and the multimedia data set may include a plurality of first multimedia data. The terminal device may identify a data content type of the first multimedia data based on the data content of the first multimedia data. The following processes take the first multimedia data as image data, the target content type is a human artistic type, and the identification process of the data content type of 1 first multimedia data is described by taking as an example, and the identification modes of the first multimedia data specifically include:
first way of identifying the type of data content: whether the first multimedia data is a "character artwork" of a human art type is judged by recognizing the color of the pixel point in the first multimedia data, that is, whether the first multimedia data is a "character artwork" is judged by recognizing the color of the pixel point and the area of the recognized color belonging to the skin.
The terminal equipment can traverse each pixel point in the first multimedia data, and acquire a plurality of target areas in the first multimedia data according to the color tolerance threshold value and the color value of each traversed pixel point in the first multimedia data: the terminal device may traverse each pixel point in the first multimedia data through the principle of the depth traversal algorithm, and may obtain the color value of each pixel point in the traversed first multimedia data. Wherein, the color value of each pixel point is represented by R, G, B and A, R, G, B and A represent 4 channels, R represents a channel corresponding to red, G represents a channel corresponding to green, B represents a channel corresponding to blue, and A represents a channel corresponding to transparent. Each color value is represented by 32 bits (i.e., 32 bits), so each channel (4 total) for which 1 color value corresponds is represented using 8 bits, and thus the value of each channel ranges from 0 to 255. Wherein, for each pixel point, the value of the channel A corresponding to the transparent color is the same.
The color tolerance threshold is for each channel, each channel may correspond to 1 color tolerance threshold, and the color tolerance thresholds corresponding to each channel may be equal or unequal. Since the values of the channel a of the transparent color corresponding to each pixel point are the same, only the color tolerance thresholds of the channel R, the channel G, and the channel B may be set. The plurality of target areas can be acquired in the first multimedia data through the set color tolerance threshold value of each channel and the color value of each pixel point in the traversed first multimedia data. The colors of all pixels in a target area are within a color value interval defined by the target color value (which refers to the color value of the first pixel traversed in the target area) and a color tolerance threshold. In addition, all the pixels in one target area are mutually communicated, that is, one target area is a communicated area (that is, a closed area) in the first multimedia data, in other words, any one pixel in one target area is adjacent to at least one pixel in the target area to which the pixel belongs. Since the plurality of target areas in the first multimedia data are acquired only with respect to the channel R, the channel G, and the channel B, the following processes are all described with respect to the channel R, the channel G, and the channel B, and the channel a is not mentioned. For example, if the color tolerance thresholds corresponding to the channels R, G and B are set to be 16. The pixel point 1 and the pixel point 2 are all traversed pixels in the first multimedia data, the pixel point 1 is a first pixel point in the traversed first multimedia data, and the pixel point 2 is a second pixel point in the traversed first multimedia data. The color value corresponding to the pixel point 1 is: channel R is 100, channel G is 130, and channel B is 113. The color value corresponding to pixel 2 is: channel R is 105, channel G is 145, and channel B is 120. Therefore, the value 105 of the channel R corresponding to the pixel 2 may be subtracted from the value 100 of the channel R corresponding to the pixel 1 to obtain the first difference value 5; the value 145 of channel G corresponding to pixel 2 may be subtracted from the value 130 of channel G corresponding to pixel 1 to obtain a second difference 15; the value 120 of channel B corresponding to pixel 2 may be subtracted from the value 113 of channel B corresponding to pixel 1 to obtain a third difference 7. Since the first difference 5 is smaller than the color tolerance threshold 16 corresponding to the channel R, the second difference 15 is smaller than the color tolerance threshold 16 corresponding to the channel G, and the third difference 7 is smaller than the color tolerance threshold 16 corresponding to the channel B, the pixel 1 and the pixel 2 can be divided into the same target area (and the pixel 1 and the pixel are also connected).
The traversal of the next pixel, e.g., pixel 3, continues, so the value of each channel in the color value of pixel 3 can be subtracted from the value of each channel in the color value of pixel 1, in the same manner as described above. If the values of the color values of the pixel 3 in the channels R, G and B are subtracted from the values of the color values of the pixel 1 in the channels R, G and B, and the obtained 3 differences are smaller than the color tolerance threshold values of the corresponding channels, the pixel 3 may be divided into the target areas where the pixel 1 and the pixel 2 are located (because the pixel 3 is connected to the pixel 2, the pixel 3 is also connected to the target areas where the pixel 1 and the pixel 2 are located). Since the pixel 1 in the target area where the pixel 1, the pixel 2, and the pixel 3 are located is the first pixel traversed, when determining whether the pixel that is traversed subsequently belongs to the target area where the pixel 1, the pixel 2, and the pixel 3 are located, the pixel 1 is based on the pixel 1, that is, the values of the pixel 1 in the channel R, the channel G, and the channel B are used as the minus numbers, the values of the other pixels that are traversed subsequently and are in communication with the target area where the pixel 1 is located in the channel R, the channel G, and the channel B are used as the minus numbers, and whether the pixel that is traversed subsequently belongs to the target area where the pixel 1 is located is determined by comparing whether the difference between the minus numbers is within the color tolerance threshold corresponding to the channel R, the channel G, and the channel B, respectively. If the color value of the pixel 3 is corresponding to the values of the channel R, the channel G and the channel B, subtracting the color value of the pixel 1 from the values of the channel R, the channel G and the channel B, and if at least one difference value is not within the color tolerance threshold of the corresponding channel, then it is determined that the pixel 3 does not belong to the target area where the pixel 1 and the pixel 2 are located, therefore, the pixel 3 can be used as the basis for selecting the next target area, that is, in the target area where the pixel 3 is located, the pixel 3 is the first pixel traversed, and then, when other pixels communicating with the target area where the pixel 3 is located are traversed, the values of the pixel 3 in the channel R, the channel G and the channel B are all used as the decrements, and the values of the other pixels communicating with the target area where the pixel 3 is traversed subsequently in the channel R, the channel G and the channel B are used as the decrements, and by comparing whether the difference value between the decrements and the decrements is within the target area where the channel R, the tolerance G and the channel B are located respectively, the pixel 3 belongs to the target area. Through the method, each pixel point in the first multimedia data can be traversed, all the traversed pixel points in the first multimedia data are divided into a plurality of target areas respectively, the plurality of target areas in the first multimedia data are obtained, the difference value (comprising the difference value corresponding to each of the channel R, the channel G and the channel B) between the color values of any two pixel points in the same target area is smaller than the color value threshold, and the fact that the color difference of the pixel points among the pixel points in the same target area is not large (namely, the color difference is small and the colors are similar) can be understood. Among all the target areas in the acquired first multimedia data, the target area with the too small area may be discarded, for example, the target area with the total number of pixels smaller than the number threshold may be discarded. For example, if the number threshold is set to 500, the target area with the total number of pixels being greater than or equal to 500 may be reserved, and the target area with the total number of pixels being less than 500 may be discarded.
The number of pixels in each target area may be referred to as the first number of pixels.
The terminal device may determine the data content type of the first multimedia data according to a target color value interval for matching the target content type, the first number of pixels, and the color value of each pixel in each target area:
the target color value interval may include a first person's skin color value interval (i.e., one color value interval corresponding to the skin color of the first person), a second person's skin color value interval (i.e., one color value interval corresponding to the skin color of the second person), and a third person's skin color value interval (i.e., one color value interval corresponding to the skin color of the third person). Each color value interval comprises an interval corresponding to a channel R, a channel G and a channel B respectively. The target color value interval may include a first type color value interval and a second type color value interval. The first type color value interval and the second type color value interval refer to two different color value intervals, for example, the first type color value interval and the second type color value interval may refer to the first person's skin color value interval and the second person's skin color value interval, or the first type color value interval and the second type color value interval may refer to the first person's skin color value interval and the third person's skin color value interval, or the first type color value interval and the second type color value interval may refer to the third person's skin color value interval and the second person's skin color value interval. I.e. the first type of color value interval and the second type of color value interval are only used to distinguish between two different color value intervals. I.e. different types of color value intervals, e.g. the first type of color value interval and the second type of color value interval described above, correspond to different types of target areas, e.g. the type of first area and the type of second area described above, one target area corresponding to one type of color value interval. In other words, the first-type color value interval may be any one of a first-type human skin color value interval, a second-type human skin color value interval, and a third-type human skin color value interval, and the second-type color value interval may be any one of the first-type human skin color value interval, the second-type human skin color value interval, and the third-type human skin color value interval, and the first-type color value interval is different from the second-type color value interval.
The server may obtain a color value of each pixel point in each target area, select a first area among the plurality of target areas based on the first type color value interval, and select a second area among the plurality of target areas based on the second type color value interval: the ratio threshold may be set, where each target area corresponds to a target number, and the target number corresponding to one target area is equal to a product of the number of first pixels corresponding to the target area and the ratio threshold. For example, if the ratio threshold is set to 0.5 and the first pixel threshold corresponding to a certain target area is set to 300, the target number corresponding to the target area is set to 150. If the number of the pixel points, in which the color values of the pixel points in all the pixel points in a certain target area fall in the first type color value interval, is larger than the corresponding target number, the target area is judged to be the first area. For example, if the color value of 100 pixels in a certain target area falls in the first type color value interval and the target number corresponding to the target area is 80, the target area is determined to be the first area (100 > 80). Similarly, if the number of the pixel points, of which the color values fall in the second type color value interval, in all the pixel points of a certain target area is larger than the corresponding target number, the target area is determined to be the second area. For example, if the color value of 150 pixels in a certain target area falls in the second type color value interval and the target number corresponding to the target area is 100, the target area is determined to be the second area (150 > 100). The color value of a certain pixel point falling in the color value interval means that the color value of the pixel point is in the interval corresponding to the channel in the color value interval among the channel R, the channel G and the channel B. For example, if the color value of the pixel Q is: the value of channel R is 100, the value of channel G is 130, and the value of channel B is 160. The first type of color value interval is: interval [95, 105] of channel R, interval [125, 135] of channel G, interval [155, 165] of channel B. It can be seen that the value 100 of pixel Q in channel R falls within the interval 95, 105 of channel R, the value 130 of pixel Q in channel G falls within the interval 125, 135 of channel G, the value 160 of pixel Q in channel B falls within the interval 155, 165 of channel B, indicating that pixel Q falls within the interval of the first type of color values.
The terminal equipment can count the number of the pixel points in each first area to obtain a first number value, and count the number of the pixel points in each second area to obtain a second number value; determining a first ratio value based on the first quantity value and the second pixel point quantity, and determining a second ratio value based on the second quantity value and the second pixel point quantity; when the maximum value of the first ratio and the second ratio is greater than or equal to a ratio threshold, determining that the data content type of the first multimedia data is the target content type:
the terminal device may sum the number of pixels in each first area to obtain a first number value, for example, when the first area includes an area 1 and an area 2, the number of first pixels corresponding to the area 1 is 100, and the number of first pixels corresponding to the area 2 is 200, then the first number value is equal to 300 (i.e. 100+200). Similarly, the terminal device may sum the number of pixels in each second area to obtain a second number value, for example, when the second area includes an area 3 and an area 4, the number of first pixels corresponding to the area 3 is 150, and the number of first pixels corresponding to the area 4 is 400, then the second number value is 650 (i.e. 150+400). The total number of pixels in the first multimedia data may be referred to as the second number of pixels, and the terminal device may obtain a ratio between the first number value and the second threshold of pixels, i.e. a first ratio, and may also obtain a ratio between the second number value and the second threshold of pixels, i.e. a second ratio. For example, if the first number is equal to 100, the second number is equal to 200, and the second number of pixels is 600, the first ratio is equal to 1/6 (i.e., 100/600), and the second ratio is equal to 1/3 (i.e., 200/600). And if the maximum value of the first ratio and the second ratio is greater than or equal to the ratio threshold, the data content type of the first multimedia data is considered as the target content type. For example, if the first ratio is 0.7, the second ratio is 0.3, and the ratio threshold is 0.5, the data content type of the first multimedia data is considered to be the target content type (because 0.7> 0.5).
Therefore, it is known from the above-described method that, when the target color value interval includes the skin color value interval of the first person, the skin color value interval of the second person, and the skin color value interval of the third person, it is possible to determine which target areas correspond to the skin color value interval of the first person, which target areas correspond to the skin color value interval of the second person, and which target areas correspond to the skin color value interval of the third person, among all the target areas acquired from the first multimedia data. Furthermore, the terminal device may calculate a ratio between the total number of pixels in all the target areas corresponding to the skin color interval of the first person and the second number of pixels (i.e., the total number of pixels in the first multimedia data), calculate a ratio between the total number of pixels in all the target areas corresponding to the skin color interval of the second person and the second number of pixels (i.e., the total number of pixels in the first multimedia data), and calculate a ratio between the total number of pixels in all the target areas corresponding to the skin color interval of the third person and the second number of pixels (i.e., the total number of pixels in the first multimedia data). When the maximum value of the ratio corresponding to the first person, the ratio corresponding to the second person and the ratio corresponding to the third person is greater than a ratio threshold, the first multimedia data is determined to be a "character artwork" of a human artistic type (i.e., a target content type) (because the ratio is a ratio of the area of the skin of the character in the first multimedia data to the area of the whole image). Optionally, the number of the pixels in all the target areas corresponding to the skin color interval of the first person, the number of the pixels in all the target areas corresponding to the skin color interval of the second person, and the number of the pixels in all the target areas corresponding to the skin color interval of the third person may be summed to obtain a sum value, and a ratio between the sum value and the number of the second pixels is calculated, and if the ratio is greater than a ratio threshold, it is determined that the first multimedia data is a "figure art map" of a human body art type (i.e., a target content type).
Fig. 5 is a schematic view of a scenario for identifying a data content type of multimedia data according to the present application. As shown in fig. 5, the image 103h is taken as the first multimedia data, and the target region 106h, the target region 100h, the target region 101h, and the target region 102h can be obtained by traversing all the pixels in the image 103h (here, the background image of the person in the image 103h is not considered, and in practice, the background image also constitutes 1 or more target regions). As shown in the set 104h, 4 target areas in the acquired image 103 h. By comparing the target color value intervals (including the first person's skin color value interval, the second person's skin color value interval, and the third person's skin color value interval) to which the color values of the pixel points in the target area 106h, the target area 100h, the target area 101h, and the target area 102h belong, it is obtained that the target area 106h does not correspond to any one of the target color value intervals, and therefore, for the subsequent process of judging whether the image 103h is a "character artwork" of a human artistic type (i.e., a target content type), the target area 106h does not participate in the calculation (because it is irrelevant to the target area 106 h). It can also be derived that the target area 100h, the target area 101h and the target area 102h each correspond to a color value interval of the first person, i.e. the target area 100h, the target area 101h and the target area 102h can be regarded as areas corresponding to the skin of the first person. If the first type color value interval is the color value interval of the first person, the target area 100h, the target area 101h, and the target area 102h may be referred to as the first area. The number of pixels in all the first areas may be summed, that is, the number of first pixels corresponding to the target area 100h, the number of first pixels corresponding to the target area 101h, and the number of first pixels corresponding to the target area 102h may be summed to obtain a summed value, so that a ratio between the summed value and the number of second pixels (i.e., the total number of pixels in the image 103 h), that is, a first ratio, may be calculated, and if the first ratio is greater than a ratio threshold, a result 105h may be obtained, that is, the image 103h is a "character artwork" of a human artistic type (i.e., a target content type).
A second way of identifying the type of data content: judging whether the first multimedia data is a character artwork of a human artistic type (namely a target content type) or not through the source of the first multimedia data. The method comprises the following steps:
the user needs to set a filling and storing authority for the character string of the first multimedia data in the terminal device in advance, specifically, when the terminal device downloads and stores the first multimedia data in the network end, the network source address of the first multimedia data needs to be filled in the original character string of the first multimedia data, and the character string filled with the network source address of the first multimedia data is stored. The method comprises the following steps: the terminal equipment can respond to the storage operation aiming at the first multimedia data and acquire an original character string of the first multimedia data and the source address; adding the source address to the original character string to obtain the data character string corresponding to the first multimedia data, and storing the data character string:
the data string is a string in which the source address of the first multimedia data (i.e., the network source address) is filled in the original string of the first multimedia data. Fig. 6 is a schematic diagram of a scenario for acquiring a data string according to the present application. Typically, when downloading an image in jpg (an image format) format on a browser (QB), the image corresponds to a source address (i.e., host of a web address), which is the network address of the downloaded image. An original character string corresponding to an image in jpg format typically includes image data characters (i.e., characters corresponding to the content of the image itself), end characters, and useless characters following the end characters. Therefore, when the terminal device downloads the first multimedia data in the jpg format through the browser, the source address of the first multimedia data and the original character string can be acquired through the browser, and further the source address of the first multimedia data can be filled in useless characters behind the end characters in the original character string of the first multimedia data. As shown in fig. 6, the character string 100j is an original character string of the first multimedia data, and the character string 100j includes an image data character, an end character, and a useless character corresponding to the first multimedia data. The character string 101j is a data character string filled with the source address of the first multimedia data, and in the character string 101j, the image data character and the end character in the character string 100j are reserved, and the positions of the useless characters in the character string 100j are filled with "fill marks", "byte lengths", and "source addresses". The pad flag in the string 101j is a flag (which may be set by itself and has a fixed length) for indicating that the source address of the first multimedia data is padded in the string 101j, and the byte length in the string 101j is the byte length of the source address padded in the string 101j, and the source address in the string 101j is the network address of the first multimedia data acquired through the browser. The byte length in the string 101j is used to read the source address in the string 101j, for example, when the byte length is 10 bytes, then when the string 101j is read, the 10 bytes following the byte length in the string 101j are read as the source address of the first multimedia data. As shown in fig. 6, the character string 102j is an exemplary data character string of the first multimedia data, i.e., the image data character may be 00, 3f, the end character may be FF D9, the pad flag may be 51 42 5F 46 52 4F 4D, the byte length may be 0x 0a (i.e., 10 bytes), and the source address may be www.xx.com (10 bytes total).
When the terminal device is identifying the data content type of the first multimedia data and storing the data character string of the first multimedia data, the terminal device can acquire the data character string of the first multimedia data and read the source address of the first multimedia data in the data character string. Meanwhile, the terminal device may initiate a request to the server to acquire the target content address library, and the server may return the requested target content address library to the terminal device. The target content address library includes a plurality of network addresses, and the network addresses in the target content address library are addresses for acquiring multimedia data of a human art type (target content type). When the terminal device compares the source address of the first multimedia data in the target content address library, the terminal device determines that the first multimedia data is a 'figure art map' of a human art type (namely, a target content type). The identification manner of identifying the data content type of the first multimedia data by the source address of the first multimedia data may become more reliable and accurate with the time of using the multimedia data of the synchronous encryption target content type and the expansion of the user group, which is a continuously perfected manner (because the sample information (including user feedback information, source address information, image content information, etc.) of the "character artwork" of the human art type is also more abundant with the time of use and the expansion of the user group).
Third way of identifying the type of data content: the data content type of the first multimedia data is identified by an identification plug-in, which is a plug-in that the terminal device requests a download to the server. The identification plug-in is a plug-in for identifying multimedia data of a target content type, the identification plug-in can be a plug-in for identifying a 'character artwork' of a human artistic type only, the identification plug-in can be a model trained by a large number of 'character artwork' of the human artistic type, and the model can be understood as a code consisting of a plurality of formulas and a plurality of parameters. The identification plug-in may include two types of identification functions, namely an identification function and a comparison identification function.
Application of the recognition function: the terminal equipment can input the first multimedia data into an identification plug-in, and output the confidence degree for the first multimedia data based on the identification plug-in; when the confidence is equal to or greater than a confidence threshold, determining that the data content type of the first multimedia data is the target content type: when the terminal device inputs the first multimedia data into the identification plug-in, the identification plug-in can call the identification function to carry out image identification on the first multimedia data, and after the identification is completed, the identification plug-in can output the confidence degree aiming at the first multimedia data, wherein the confidence degree can be understood as a probability, and the higher the confidence degree is, the higher the probability that the first multimedia data is the multimedia data of the target content type is. Accordingly, a confidence threshold may be set, and when the confidence of the first multimedia data is greater than or equal to the confidence threshold, the data content type of the first multimedia data is determined to be the target content type. Fig. 7 is a schematic view of another scenario for identifying a data content type of multimedia data according to the present application. As shown in fig. 7, the terminal device may input the first multimedia data 100f into a model m (i.e. an identification plug-in unit), where the model m may perform image identification on the first multimedia data 100f and output a confidence coefficient 101f of the first multimedia data 100f, and when the confidence coefficient 101f is greater than or equal to a confidence coefficient threshold, a identification result 102f may be obtained, i.e. the data content type of the first multimedia data 100f is the target content type.
Application of a contrast recognition function: the terminal device may acquire reference multimedia data from the multimedia data that has undergone encryption processing; inputting the first multimedia data and the reference multimedia data into the identification plug-in, and outputting data similarity between the first multimedia data and the reference multimedia data based on the identification plug-in; when the data similarity is equal to or greater than a similarity threshold, determining that the data content type of the first multimedia data is the target content type: when the data content type of 1 first multimedia data is identified, the terminal device may identify the data content type of the first multimedia data using the multimedia data that has undergone the encryption process (e.g., the multimedia data that has been added to the private space) as reference multimedia data. First, the terminal device may acquire 1 multimedia data as reference multimedia data from among multimedia data that has undergone encryption processing. The terminal device can input the first multimedia data and the acquired reference multimedia data into the identification plug-in, the identification plug-in can identify the data similarity between the first multimedia data and the reference multimedia data, and when the identification is completed, the data similarity between the first multimedia data and the reference multimedia data is output. The greater the data similarity, the more similar the first multimedia data and the reference multimedia data are indicated. A similarity threshold may be set, and when the data similarity between the first multimedia data and the reference multimedia data is greater than or equal to the similarity threshold, the data content type of the first multimedia data is determined to be the target content type. The data similarity may refer to similarity of image content (e.g., color distribution of pixels) between the first multimedia data and the reference multimedia data, and may refer to similarity between a face of a person in the first multimedia data and a face of a person in the reference multimedia data. When the data similarity between the first multimedia data and the reference multimedia data is smaller than the similarity threshold, continuing to acquire another multimedia data from the multimedia data subjected to encryption processing as the reference multimedia data, judging the data content type of the first multimedia data again in the same way, when judging that the data content type of the first multimedia data is not the target content type all the time, continuously selecting the multimedia data subjected to encryption processing as the reference multimedia data in sequence to recognize the data content type of the first multimedia data until all the multimedia data subjected to encryption processing are used as the reference multimedia data, and judging that the data content type of the first multimedia data is not the target content type when still judging that the data content type of the first multimedia data is not the target content type. Fig. 8 is a schematic view of another scenario for identifying a data content type of multimedia data according to the present application. As shown in fig. 8, the first multimedia data 100e from the multimedia data set and the reference multimedia data 101e acquired from the private space may be input with a model m (i.e., an identification plug-in), which may perform image recognition on the first multimedia data 100e and the reference multimedia data 101e, and output the data similarity 102e between the first multimedia data 100e and the reference multimedia data 101 e. When the data similarity 102e is greater than or equal to the similarity threshold, a recognition result 103e is obtained, that is, the data content type of the first multimedia data 100e is the target content type.
The data content type of the first multimedia data may be identified by combining the three identification methods, and recall that the three identification methods are respectively: identifying by traversing the color of the pixel point in the first multimedia data; second kind: identifying by a source address of the first multimedia data; third kind: the identification is performed by the identification plug-in. The manner of combining the data content types identifying the first multimedia data may include: any one of the three identification methods can be selected for identification, i.e. the first identification method can be used for identification, the second identification method can be used for identification, or the third identification method can be used for identification. Any two of the three recognition modes can be selected for recognition, namely, the first recognition mode and the second recognition mode can be used for recognition, the first recognition mode and the third recognition mode can be used for recognition, or the second recognition mode and the third recognition mode can be used for recognition. When two recognition modes are selected for recognition, the recognition sequence of the two recognition modes does not affect the recognition result, and the first multimedia data can be judged to be the multimedia data of the target content type only by recognizing the first multimedia data as the multimedia data of the target content type through the two recognition modes. The three identification modes can be selected for identification, and the identification sequence of the three identification modes does not affect the identification result, because the first multimedia data is required to be identified as the multimedia data of the target content type by the three identification modes, and the first multimedia data can be judged as the multimedia data of the target content type.
Step S103, determining the first multimedia data with the data content type being the target content type as the multimedia data to be encrypted;
specifically, the first multimedia data with the data content type being the target content type in the identified multimedia data set may be called as multimedia data to be encrypted. The target content type is a data content type indicated by the synchronous encryption operation, and may be a default data content type set by the user or be a data content type of the second multimedia data. The specific determination of the target content type can be seen from the above step S102.
Step S104, the multimedia data to be encrypted is encrypted;
specifically, the terminal device may perform encryption processing on the multimedia data to be encrypted. Wherein the encryption process may include: the multimedia data to be encrypted is uploaded to a private space in the cloud disk, or the multimedia data to be encrypted is added to the private space (also referred to as a device encryption space) in the terminal device. After the multimedia data to be encrypted is encrypted, the multimedia data to be encrypted may be deleted from the parent storage directory in which it originally exists. The private space is an encrypted folder, and can be opened to be accessed only by a password, a fingerprint, a sound or a face, namely the private space can be encrypted by using the password or the fingerprint, the sound or the face of the user.
The terminal equipment can respond to the unfolding operation aiming at the equipment encryption space and output a verification information input frame; acquiring the verification information recorded in the verification information recording frame; outputting multimedia data in the device encryption space when the verification information is the same as the authentication information: the terminal device may output a verification information entry box in response to a click command (the click operation is an expansion operation for the device encryption space) of the user for the private space (i.e., the encrypted folder, i.e., the device encryption space), where the verification information entry box may be a sub-page, such as a popup, that is independently displayed on top of the current terminal page. The terminal device may acquire authentication information entered by the user in the authentication information entry frame, where the authentication information may be password information, fingerprint information, sound information, or face information. The user may set authentication information for the device encryption space in the terminal device in advance, through which the device encryption space can be accessed. When the authentication information input by the user in the authentication information input frame acquired by the terminal equipment is the same as the authentication information, the terminal equipment can display the multimedia data in the equipment encryption space in the terminal page for the user to browse. Fig. 9 is a schematic page diagram of another terminal device according to the present application. As shown in fig. 9, there are three buttons in the page 100d of the terminal device, and the terminal device may display a menu bar 103d in response to a click operation of the button by the user, the menu bar 103d including a "private space" menu, a "file setting" menu, a "help and feedback" menu, and an "install desktop entry" menu. The terminal device may display the page 101d in response to a click operation by the user on the "private space" menu in the menu bar 103d (this click operation is the expansion operation for the device encryption space described above). The page 101d is a page for inputting an access password for the private space, and the input window 104d for inputting an unlock password in the page 101d is the verification information input frame. The terminal device may acquire the access password (i.e., the authentication information described above) entered in the page 101d by the user, and when the acquired access password is the same as the authentication password (i.e., the authentication information described above) set in the terminal device in advance by the user, the terminal device may display the page 102d. The page 102d is a page corresponding to a private space (i.e., a device encryption space) in the terminal device, where the page 102d includes all multimedia data (including the second multimedia data and the multimedia data to be encrypted) added to the private space, and the private space includes an image 1, an image 2, an image 3, an image 4, an image 5 and an image 6.
Firstly, responding to synchronous encryption operation to obtain a multimedia data set; identifying a data content type of first multimedia data in the multimedia data set according to the data content of the first multimedia data; determining the first multimedia data with the data content type as a target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation; and encrypting the multimedia data to be encrypted. Therefore, the method provided by the application can identify the first multimedia data in the multimedia data set by responding to the synchronous encryption operation, and encrypt all the first multimedia data with the identified data content type as the target content type, thereby enriching the encryption mode aiming at the multimedia data. Meanwhile, all the multimedia data which are the target content type in the multimedia data can be automatically and synchronously encrypted without intermittently encrypting the multimedia data which are the target content type one by one, so that the encryption efficiency of the multimedia data is improved.
Fig. 10 is a flow chart of another data encryption method provided by the present application. As shown in fig. 10, the data encryption method includes:
step S201, a user encrypts a picture;
specifically, when the user browses a picture in the terminal device, the user encrypts a certain picture (for example, a picture Z, which is the second multimedia data) browsed.
Step S202, a "character artwork" is roughly recognized? The method comprises the steps of carrying out a first treatment on the surface of the
Specifically, if the terminal device roughly recognizes (recognizes by the first recognition method or the second recognition method in step S102) that the picture Z is a "character artwork" of a human art type, the following step S203 is executed. If the terminal device does not roughly recognize (recognize by the first recognition method or the second recognition method in step S102 described above) that the picture Z is a "character artwork" of a human art type, the following step S207 is performed.
Step S203, is the user selecting to turn on the automatic encryption function or to turn on the automatic encryption function? The method comprises the steps of carrying out a first treatment on the surface of the
Specifically, if the user has turned on the automatic encryption function (i.e., the function of synchronously encrypting the multimedia data of the target content type), the following step S204 is performed. If the user does not turn on the automatic encryption function, an encryption selection frame is displayed, and when the user clicks the "on" button in the encryption selection frame (indicating that the user selects to turn on the automatic encryption function), the following step S204 is performed, and when the user clicks the "cancel" button in the encryption selection frame, the following step S207 is performed.
Step S204, is the model required to be updated or downloaded? The method comprises the steps of carrying out a first treatment on the surface of the
Specifically, if the user does not download the model (i.e., the identification plug-in) or the downloaded model needs to update the model (i.e., the model has a new version for the user), the following step S205 is executed. If the user has downloaded the latest version of the model, the following step S206 is performed.
Step S205, downloading a model;
specifically, the terminal device downloads the latest version of the model.
Step S206, executing recognition, and reminding a user after recognition;
specifically, the terminal device identifies multimedia data (i.e., first multimedia data) in a multimedia data set (which may be a picture set obtained according to a parent storage directory of a picture Z, and the specific process of obtaining the multimedia data set is referred to in step S101 above in the process of obtaining the multimedia data set according to a parent storage directory of second multimedia data), adds a "character artwork" of a human artistic type in the identified multimedia data set to the device encryption space, and reminds the user. If 10 'person art drawings' which are of the human art type in the identified multimedia data set are added to the equipment encryption space, the reminding content can be '10 pictures which are encrypted automatically'.
Step S207, ending;
specifically, the picture Z is added to the device encryption space, and the process ends.
Fig. 11 is a flow chart of another data encryption method provided by the present application. As shown in fig. 11, the data encryption method may include:
step S301 of outputting an encryption selection box in response to an encryption operation for the first image;
specifically, the first image may be any one of the terminal devices, and the terminal device may perform encryption processing on the first image in response to an encryption operation (which may be performed when the user browses to the first image in a process of browsing the image on the terminal device) for the first image by the user, and identify an image content type of the first image. When the image content type of the first image is identified as the target content type, then an encryption selection box (e.g., encryption selection box 102b in fig. 1b described above) is output in the terminal page. The target content type may be a preset image content type, such as an image content type for a landscape, an image content type for a building, or an image content type for a human art. The encryption selection box is used for prompting a user whether to start the function of the image which is the target content type in the one-key encryption terminal equipment, and comprises two buttons, wherein one button is a cancel button and the other button is an on button. The terminal device may close the above encryption selection box when the user clicks the "cancel" button, and may perform step S302 described below when the user clicks the "on" button. It is understood that, here, the first image corresponds to the second multimedia data, the image content type corresponds to the data content type, and the target content type corresponding to the image corresponds to the target content type corresponding to the multimedia data. Therefore, for the specific implementation procedure of step S301, reference may also be made to the description procedure of "the fourth encryption mode of the synchronous encryption operation" in step S101 in the embodiment corresponding to fig. 2.
Step S302, responding to synchronous encryption operation in the encryption selection frame, and outputting a first encryption prompt frame;
specifically, the terminal device may output a first encryption prompt box (for example, the popup window 103b in fig. 1 b) in the terminal page in response to the clicking operation of the "on" button in the encryption selection box by the user (the clicking operation is the synchronous encryption operation in the encryption selection box), and identify and encrypt the image with the image content type of the image set being the target content type. The image set (corresponding to the above-described multimedia data set) may be a set made up of all the images (except the first image) in the terminal device, and an image of which the image content type is the target content type in the image set may be referred to as a second image. The first encryption prompt may include encryption process prompt information for the second image. The encryption process prompt is used to prompt the user that the second image is being identified and encrypted, for example, the encryption process prompt may be "the second image is being identified and encrypted".
In the process of identifying and encrypting the second image by the terminal device, the first encryption prompt box can be continuously output (i.e. displayed) on the terminal page. When the terminal device completes encrypting the second image in the image set, the first encryption prompt box in the terminal page may be closed, and a second encryption prompt box (for example, the prompt information 104b in fig. 1 b) may be output in the terminal page, where the second encryption prompt box includes encryption completion prompt information for the second image. The encryption completion prompt is used to prompt the user that the second images in the image set have been encrypted, for example, the encryption completion prompt may be "all second images have been encrypted.
More, when the user shares a certain image (for example, a third image, which may be any one of the images in the terminal device) through the terminal device, the terminal device may identify the image content type of the third image shared by the user. When the third image is identified as the character artwork with the image content type being the human artistic type, the sharing prompt box can be output (i.e. displayed) in the terminal page. The sharing prompt box is used for prompting the user of the type of the image content of the shared third image, and the sharing prompt box may include prompt information (for example, if the image shared by you is a person artwork, may not be shared, and is not shared. The terminal equipment can respond to the click operation of the user on the cancel button in the sharing prompt box, close the sharing prompt box in the terminal page and cancel the sharing operation on the third image. The terminal equipment can also respond to the click operation of the user on the 'confirm' button in the sharing prompt box, close the sharing prompt box in the terminal page, and share out the third image, namely forward to the address which the user wants to share.
Firstly, responding to synchronous encryption operation to obtain a multimedia data set; identifying a data content type of first multimedia data in the multimedia data set according to the data content of the first multimedia data; determining the first multimedia data with the data content type as a target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation; and encrypting the multimedia data to be encrypted. Therefore, the method provided by the application can identify the first multimedia data in the multimedia data set by responding to the synchronous encryption operation, and encrypt all the first multimedia data with the identified data content type as the target content type, thereby enriching the encryption mode aiming at the multimedia data. Meanwhile, all the multimedia data which are the target content type in the multimedia data can be automatically and synchronously encrypted without intermittently encrypting the multimedia data which are the target content type one by one, so that the encryption efficiency of the multimedia data is improved.
Fig. 12 is a schematic structural diagram of a data encryption device according to the present application. As shown in fig. 12, the data encryption apparatus 1 may include: a response module 11, an identification module 12, a determination module 13 and an encryption module 14;
a response module 11, configured to obtain a multimedia data set in response to the synchronous encryption operation;
an identification module 12, configured to identify a data content type of a first multimedia data in the multimedia data set according to a data content of the first multimedia data;
a determining module 13, configured to determine the first multimedia data with the data content type being the target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation;
and the encryption module 14 is used for carrying out encryption processing on the multimedia data to be encrypted.
The specific functional implementation manners of the response module 11, the identification module 12, the determination module 13, and the encryption module 14 refer to step S101-step S104 in the embodiment corresponding to fig. 2, and are not described herein.
Wherein the first multimedia data is image data; the identification module 12 includes: a traversing unit 1201, a first determining unit 1202, and a second determining unit 1203;
A traversing unit 1201, configured to traverse each pixel point in the first multimedia data, and obtain a plurality of target areas in the first multimedia data according to a color tolerance threshold and the color value of each traversed pixel point in the first multimedia data; the colors of all pixel points in a target area are in a color value interval defined by a target color value and the color tolerance threshold, wherein the target color value refers to the color value of the first pixel point traversed in the target area;
a first determining unit 1202 configured to determine the number of pixels in each target area as a first number of pixels;
a second determining unit 1203 is configured to determine a data content type of the first multimedia data according to a target color value interval for matching the target content type, the first number of pixels, and the color value of each pixel in each target area.
The specific functional implementation manner of the traversing unit 1201, the first determining unit 1202 and the second determining unit 1203 refer to step S102 in the corresponding embodiment of fig. 2, and will not be described herein.
Wherein the target color value interval comprises a first type color value interval and a second type color value interval; the second determining unit 1203 includes: an acquisition subunit 12031, a statistics subunit 12032, a number determination subunit 12033, a ratio determination subunit 12034, and a type determination subunit 12035;
An acquisition subunit 12031, configured to acquire a color value of each pixel point in each target area, select a first area from the plurality of target areas based on the first type color value interval, and select a second area from the plurality of target areas based on the second type color value interval; the number of the pixel points, of which the color values are in the first type color value interval, in the first area is larger than the target number; the number of the pixel points, of which the color values are in the second type color value interval, in the second area is larger than the target number; the target number is determined based on the first pixel number and a scaling threshold;
a statistics subunit 12032, configured to count the number of pixels in each first area to obtain a first number value, and count the number of pixels in each second area to obtain a second number value;
a number determination subunit 12033, configured to determine the number of pixels in the first multimedia data as a second number of pixels;
a ratio determining subunit 12034, configured to determine a first ratio based on the first quantity value and the second pixel number, and determine a second ratio based on the second quantity value and the second pixel number;
A type determining subunit 12035, configured to determine, when a maximum value of the first ratio and the second ratio is greater than or equal to a ratio threshold, a data content type of the first multimedia data is the target content type.
The specific functional implementation manner of the obtaining subunit 12031, the statistics subunit 12032, the number determining subunit 12033, the ratio determining subunit 12034, and the type determining subunit 12035 is referred to as step S102 in the corresponding embodiment of fig. 2, and will not be described herein.
Wherein the identification module 12 comprises: an address library acquisition unit 1204, a source address acquisition unit 1205, and a judgment unit 1206;
an address library obtaining unit 1204, configured to obtain a data string corresponding to the first multimedia data, and obtain a target content address library; the target content address library comprises a plurality of target content addresses; the plurality of target content addresses are all addresses for acquiring the multimedia data of the target content type;
a source address obtaining unit 1205, configured to obtain a source address of the first multimedia data from the data string;
the determining unit 1206 is configured to determine that the data content type of the first multimedia data is the target content type if the source address exists in the plurality of target content addresses.
The specific functional implementation manner of the address library obtaining unit 1204, the source address obtaining unit 1205, and the determining unit 1206 is referred to step S102 in the embodiment corresponding to fig. 2, and will not be described herein.
Wherein, the data encryption device 1 further comprises: a store response module 15 and an add module 16;
a storage response module 15, configured to obtain an original string of the first multimedia data and the source address in response to a storage operation for the first multimedia data;
and the adding module 16 is configured to add the source address to the original string, obtain the data string corresponding to the first multimedia data, and store the data string.
In step S102 in the embodiment corresponding to fig. 2, the specific function implementation manner of the storage response module 15 and the adding module 16 is referred to herein, and will not be described in detail.
Wherein the identification module 12 comprises: a first input unit 1207 and a third determination unit 1208;
a first input unit 1207 for inputting the first multimedia data into an identification plug-in, and outputting a confidence level for the first multimedia data based on the identification plug-in; the identification plug-in is used for identifying the data content type of the multimedia data according to the data content of the multimedia data;
A third determining unit 1208 is configured to determine that the data content type of the first multimedia data is the target content type when the confidence is equal to or greater than a confidence threshold.
The specific function implementation manner of the first input unit 1207 and the third determining unit 1208 is referred to as step S102 in the corresponding embodiment of fig. 2, and will not be described herein.
Wherein the identification module 12 comprises: a reference acquisition unit 1209, a second input unit 1210, and a fourth determination unit 1211;
a reference acquisition unit 1209 for acquiring reference multimedia data from the multimedia data that has undergone encryption processing;
a second input unit 1210 for inputting the first multimedia data and the reference multimedia data into the recognition plug-in, and outputting a data similarity between the first multimedia data and the reference multimedia data based on the recognition plug-in;
a fourth determining unit 1211 is configured to determine that the data content type of the first multimedia data is the target content type when the data similarity is equal to or greater than a similarity threshold.
The specific function implementation manners of the reference obtaining unit 1209, the second input unit 1210, and the fourth determining unit 1211 refer to step S102 in the corresponding embodiment of fig. 2, and will not be described herein.
Wherein, the response module 11 includes: a first response unit 111, a second response unit 112, and a fifth determination unit 113;
a first response unit 111 for performing encryption processing on second multimedia data in response to an encryption operation for the second multimedia data, and outputting an encryption selection box;
a second response unit 112, configured to obtain the multimedia data set in response to the synchronous encryption operation in the encryption selection box, and identify a data content type of the second multimedia data;
a fifth determining unit 113, configured to determine a data content type of the second multimedia data as the target content type.
The specific function implementation manner of the first response unit 111, the second response unit 112, and the fifth determination unit 113 is referred to step S101 in the embodiment corresponding to fig. 2, and will not be described herein.
Wherein, the response module 11 includes: a third response unit 114 and a fourth response unit 115;
a third response unit 114, configured to respond to an encryption operation for the second multimedia data, perform encryption processing on the second multimedia data, and output an encryption selection box; the encryption selection box comprises encryption prompt information aiming at the target content type;
And a fourth response unit 115, configured to obtain the multimedia data set according to a parent storage directory of the second multimedia data in response to the synchronous encryption operation of the encryption hint information in the encryption selection box.
In the specific function implementation manner of the third response unit 114 and the fourth response unit 115, please refer to step S101 in the corresponding embodiment of fig. 2, and a detailed description is omitted herein.
Wherein the third response unit 114 includes: a response subunit 1141 and an output subunit 1142;
a response subunit 1141, configured to perform encryption processing on the second multimedia data in response to an encryption operation for the second multimedia data, and identify a data content type of the second multimedia data;
an output subunit 1142, configured to output the encryption selection box when the data content type of the second multimedia data is identified as the target content type.
In step S101 in the embodiment corresponding to fig. 2, the specific function implementation manner of the response subunit 1141 and the output subunit 1142 is shown, and will not be described herein.
Wherein the fourth response unit 115 includes: a catalog acquisition subunit 1151, catalog determination subunit 1152, and addition subunit 1153;
A directory acquiring subunit 1151, configured to acquire the parent storage directory of the second multimedia data;
a directory determining subunit 1152, configured to determine the parent storage directory, the child storage directory in the parent storage target, and the peer storage directory for the parent storage directory as storage directories to be identified;
an adding subunit 1153 is configured to add the multimedia data in the storage directory to be identified to the multimedia data set.
The specific function implementation manner of the catalog acquiring subunit 1151, the catalog determining subunit 1152 and the adding subunit 1153 is referred to step S101 in the embodiment corresponding to fig. 2, and will not be described herein.
Wherein, the encryption module 14 is specifically configured to:
adding the multimedia data to be encrypted to an equipment encryption space;
the data encryption device 1 further includes: an output module 17, a verification acquisition module 18, and an authentication module 19;
an output module 17 for outputting a verification information entry box in response to an expansion operation for the device encryption space;
a verification acquiring module 18, configured to acquire verification information entered in the verification information entry frame;
An authentication module 19, configured to output the multimedia data in the device encryption space when the verification information is the same as the authentication information.
The specific function implementation manner of the output module 17, the verification obtaining module 18, and the authentication module 19 is please refer to step S104 in the embodiment corresponding to fig. 2, and a detailed description thereof is omitted herein.
Firstly, responding to synchronous encryption operation to obtain a multimedia data set; identifying a data content type of first multimedia data in the multimedia data set according to the data content of the first multimedia data; determining the first multimedia data with the data content type as a target content type as multimedia data to be encrypted; the target content type is the data content type indicated by the synchronous encryption operation; and encrypting the multimedia data to be encrypted. Therefore, the method provided by the application can identify the first multimedia data in the multimedia data set by responding to the synchronous encryption operation, and encrypt all the first multimedia data with the identified data content type as the target content type, thereby enriching the encryption mode aiming at the multimedia data. Meanwhile, all the multimedia data which are the target content type in the multimedia data can be automatically and synchronously encrypted without intermittently encrypting the multimedia data which are the target content type one by one, so that the encryption efficiency of the multimedia data is improved.
Fig. 13 is a schematic structural diagram of another data encryption device according to the present application. As shown in fig. 13, the data encryption device 2 may include: a first operation response module 21 and a second operation response module 22;
a first operation response module 21 for outputting an encryption selection box in response to an encryption operation for the first image; the encryption selection box is output when the image content type of the first image is identified as the target content type;
a second operation response module 22, configured to output a first encryption prompt box in response to the synchronous encryption operation in the encryption selection box; the first encryption prompt box comprises encryption process prompt information aiming at the second image; the second image refers to an image with the image content type of the image set being the target content type.
The specific function implementation manner of the first operation response module 21 and the second operation response module 22 is referred to step S301 to step S302 in the embodiment corresponding to fig. 11, and will not be described herein.
Wherein, after the execution of the second operation response module 22 is completed, the data encryption device 2 is further configured to:
closing the first encryption prompt box and outputting a second encryption prompt box; the second encryption prompt box comprises encryption result prompt information aiming at the second image.
Fig. 14 is a schematic structural diagram of a computer device according to the present application. As shown in fig. 14, the computer device 1000 may include: processor 1001, network interface 1004, and memory 1005, and in addition, the data encryption apparatus 1000 may further include: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 14, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 1005, which is one type of computer storage medium.
In the computer device 1000 shown in fig. 14, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be configured to invoke the device control application stored in the memory 1005 to implement the description of the data encryption method in the embodiment corresponding to any of the foregoing fig. 2 and 11. It should be understood that the data encryption device 1000 described in the present application may also perform the description of the data encryption device 1 in the embodiment corresponding to fig. 12, and the description of the data encryption device 2 in the embodiment corresponding to fig. 13, which are not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
Furthermore, it should be noted here that: the present application also provides a computer readable storage medium, in which the aforementioned computer program executed by the data encryption apparatus 1 and the data encryption apparatus 2 is stored, and the computer program includes program instructions, which when executed by the processor, can execute the description of the data encryption method in the embodiment corresponding to any one of fig. 2 and 11, and therefore, will not be described in detail herein. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer storage medium according to the present application, please refer to the description of the method embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
The foregoing disclosure is illustrative of the present application and is not to be construed as limiting the scope of the application, which is defined by the appended claims.

Claims (14)

CN201911083935.XA2019-11-072019-11-07Data encryption method, device and computer readable storage mediumActiveCN110909368B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911083935.XACN110909368B (en)2019-11-072019-11-07Data encryption method, device and computer readable storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911083935.XACN110909368B (en)2019-11-072019-11-07Data encryption method, device and computer readable storage medium

Publications (2)

Publication NumberPublication Date
CN110909368A CN110909368A (en)2020-03-24
CN110909368Btrue CN110909368B (en)2023-09-05

Family

ID=69816381

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911083935.XAActiveCN110909368B (en)2019-11-072019-11-07Data encryption method, device and computer readable storage medium

Country Status (1)

CountryLink
CN (1)CN110909368B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111832043B (en)*2020-06-232023-10-03平安科技(深圳)有限公司Data encryption processing method, device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103207870A (en)*2012-01-172013-07-17华为技术有限公司 A photo classification management method, server, device and system
CN105893449A (en)*2015-12-312016-08-24乐视移动智能信息技术(北京)有限公司Batch processing method and device for pictures
WO2016189105A1 (en)*2015-05-282016-12-01Nagravision S.A.Management of broadcast encrypted digital multimedia data receivers
CN108830820A (en)*2018-05-312018-11-16康键信息技术(深圳)有限公司Electronic device, image-pickup method and computer readable storage medium
CN109977692A (en)*2019-02-262019-07-05北京三快在线科技有限公司Data processing method and device, storage medium and electronic equipment
CN110083735A (en)*2019-04-222019-08-02广州华多网络科技有限公司Method, apparatus, electronic equipment and the computer readable storage medium of optical sieving

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP5205075B2 (en)*2008-02-132013-06-05パナソニック株式会社 Encryption processing method, encryption processing device, decryption processing method, and decryption processing device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103207870A (en)*2012-01-172013-07-17华为技术有限公司 A photo classification management method, server, device and system
WO2016189105A1 (en)*2015-05-282016-12-01Nagravision S.A.Management of broadcast encrypted digital multimedia data receivers
CN105893449A (en)*2015-12-312016-08-24乐视移动智能信息技术(北京)有限公司Batch processing method and device for pictures
CN108830820A (en)*2018-05-312018-11-16康键信息技术(深圳)有限公司Electronic device, image-pickup method and computer readable storage medium
CN109977692A (en)*2019-02-262019-07-05北京三快在线科技有限公司Data processing method and device, storage medium and electronic equipment
CN110083735A (en)*2019-04-222019-08-02广州华多网络科技有限公司Method, apparatus, electronic equipment and the computer readable storage medium of optical sieving

Also Published As

Publication numberPublication date
CN110909368A (en)2020-03-24

Similar Documents

PublicationPublication DateTitle
CA2861712C (en)Mobile terminals and methods for generating electronic documents for the same
CN103544251B (en)Multi-source image processing method and its device
US20210160340A1 (en)Cross-platform digital content storage and sharing system
US10643667B2 (en)Bounding box doubling as redaction boundary
JP2020042834A (en) Account information acquisition method, terminal, server, and system
US20120017178A1 (en)File management and transfer using a remora
US10496696B2 (en)Search method and apparatus
CN106101091B (en)Method and device for processing data between terminals
US10127246B2 (en)Automatic grouping based handling of similar photos
CN109271982B (en)Method for identifying multiple identification areas, identification terminal and readable storage medium
CN107291839A (en)Share the method and apparatus of picture
CN110516458B (en)Data processing method and device based on block chain technology and computer equipment
WO2019011295A1 (en)Minus 1 screen content push and request method, apparatus, server and terminal
CN111601012A (en)Image processing method and device and electronic equipment
CN105095787A (en)Information processing method and device
WO2017113710A1 (en)Method and apparatus for batch processing of photos
US20160050172A1 (en)Digital media message generation
CN110909368B (en)Data encryption method, device and computer readable storage medium
WO2017201999A1 (en)File encryption method, device, terminal and storage medium
CN114020206A (en)Electronic photo storage method and device, storage medium and terminal
WO2024179419A1 (en)Video processing method and apparatus, and electronic device, storage medium and product
CN112330728A (en) Image processing method, apparatus, electronic device, and readable storage medium
HK40022623A (en)Method and device for encrypting data and computer readable storage medium
US20120179676A1 (en)Method and apparatus for annotating image in digital camera
CN114124879A (en)Multimedia file sharing method and device, terminal equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
REGReference to a national code

Ref country code:HK

Ref legal event code:DE

Ref document number:40022623

Country of ref document:HK

GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp