Data protection method

ABSTRACT

A data protection method is provided. The data protection method includes the following. A first image is obtained; at least one first object image in the first image is identified; the at least one first object image is analyzed to capture multiple first characteristic values of multiple characteristic points of the at least one first object image; and an encryption key is generated according to the first characteristic values.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the priority benefit of Taiwan applicationserial no. 109145283, filed on Dec. 21, 2020. The entirety of theabove-mentioned patent application is hereby incorporated by referenceherein and made a part of this specification.

BACKGROUND Technical Field

The disclosure relates to a method, and in particular to a dataprotection method.

Description of Related Art

In the existing data protection technology, a confidential file isprotected by a specific unlocking method. Current unlocking methodsinclude, for example, fingerprint unlocking, face ID unlocking, patternunlocking, voice unlocking, and password unlocking. However, therealready exist methods for cracking the data protection technologydescribed above. Therefore, currently, security protection of theconfidential file may be cracked. In other words, a risk of theconfidential file being leaked exists in the current data protectionmethods, so the current data protection methods may not providesufficient data protection.

SUMMARY

In view of the above, the disclosure provides a data protection methodthat generates an encryption key adapted for encrypting a file.

The data protection method of the disclosure includes the following. Afirst image is obtained; at least one first object image in the firstimage is identified; the at least one first object image is analyzed tocapture multiple first characteristic values of multiple firstcharacteristic points of the at least one first object image; and anencryption key is generated according to the first characteristicvalues.

Based on the above, the data protection method of the disclosuregenerates the encryption key corresponding to an image captured by auser, so as to achieve data protection.

In order to present the characteristics of the disclosure in a clearmanner, the embodiments are described in detail as follows in connectionwith the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic view of an electronic device according to anembodiment of the disclosure.

FIG. 2 is a flow chart of a data protection method according to anembodiment of the disclosure.

FIG. 3 is a schematic view of a first image according to an embodimentof the disclosure.

FIGS. 4A to 4E are schematic views of multiple object images accordingto an embodiment of the disclosure.

FIG. 5 is a schematic view of scanning an object image according to anembodiment of the disclosure.

FIG. 6 is a flow chart of generating a decryption key according to anembodiment of the disclosure.

FIG. 7 is a flow chart of decrypting an encrypted file of an embodimentof the disclosure.

DESCRIPTION OF THE EMBODIMENTS

To present the contents of the disclosure in a clear manner, thefollowing embodiments are given as examples based on which thedisclosure may be implemented. In addition, wherever possible, theelements/components/steps denoted by the same reference numeral in thedrawings and embodiments represent the same or similar parts.

FIG. 1 is a schematic view of an electronic device according to anembodiment of the disclosure. Referring to FIG. 1, an electronic device100 includes a processing device 110, an image capture device 120, and astorage device 130. The processing device 110 is coupled to the imagecapture device 120 and the storage device 130. In this embodiment, theelectronic device 100 may be, for example, a portable electronic device,such as a mobile phone or a tablet, and the disclosure is not limitedthereto. In this embodiment, in a process of encrypting file data, auser may operate the electronic device 100 to obtain one or morereal-time images through the image capture device 120. In addition, theprocessing device 110 may identify and analyze the one or more real-timeimages to obtain multiple characteristic values. In this embodiment, theprocessing device 110 may generate an encryption key according to thecharacteristic values, and perform symmetric encryption on an originalfile according to the encryption key to generate an encrypted file.

Correspondingly, in a process of decrypting file data, the user mayoperate the electronic device 100 to obtain another real-time image orother real-time images through the image capture device 120. Inaddition, the processing device 110 may identify and analyze saidanother or other real-time images to obtain other characteristic values.The processing device 110 may generate a decryption key according tosaid other characteristic values, and decrypt the encrypted fileaccording to the decryption key to obtain the original file. In otherwords, the electronic device 100 of the disclosure may dynamicallygenerate the encryption key according to the characteristic values ofthe one or more real-time images, and use the encryption key to encrypta confidential file to generate an encrypted file that is wellprotected. In addition, the encryption key dynamically generated by theelectronic device 100 of the disclosure is difficult to replicate andreproduce, and only a person who encrypted a file can generate a validdecryption key by capturing a correct real-time image (that is, only theperson who encrypted the file knows a correct image content). Therefore,the electronic device 100 of the disclosure may provide data protectionwith a good protection effect.

In this embodiment, the processing device 110 may include, for example,a central processing unit (CPU), or a programmable general purpose orspecial purpose microprocessor, a digital signal processor (DSP), aprogrammable controller, an application specific integrated circuits(ASIC), a programmable logic device (PLD), other similar processingdevices, or a combination of the devices described above.

In this embodiment, the image capture device 120 may include, forexample, a charge coupled device (CCD) or a complementary metal-oxidesemiconductor (CMOS). The image capture device 120 may be used tocapture one or more real-time images, and provide the one or morereal-time images to the processing device 110 for image processing andanalyzing. Each of the one or more real-time images may include one ormore continuous pictures.

In this embodiment, the storage device 130 may include, for example, adynamic random access memory (DRAM), a flash memory, or a non-volatilerandom access memory (NVRAM), etc. The storage device 130 may be used tostore software and data as described in each embodiment of thedisclosure, such as a related image processing module, image analysismodule, key generation module, encryption module, decryption module,encryption password data, decryption password data, file data, a relatedimage and picture, etc. Such software and data may be provided to theprocessing device 110 for the processing device 110 to access andexecute, so as to realize the data protection method of the disclosure.

FIG. 2 is a flow chart of a data protection method according to anembodiment of the disclosure. Referring to FIGS. 1 and 2, the electronicdevice 100 may execute the following steps S210 to S250 to realizefunctions of generating an encryption key and data protection. In stepS210, the electronic device 100 may obtain a first image through theimage capture device 120. In step S220, the processing device 110 of theelectronic device 100 may identify at least one first object image inthe first image. In step S230, the processing device 110 of theelectronic device 100 may analyze the at least one first object image tocapture multiple first characteristic values of multiple firstcharacteristic points of the at least one first object image. In stepS240, the processing device 110 of the electronic device 100 maygenerate an encryption key according to the first characteristic values.In step S250, the processing device 110 of the electronic device 100 mayperform symmetric key encryption on an original file according to theencryption key to generate an encrypted file.

For example, also referring to FIG. 3, FIG. 3 is a schematic view of afirst image according to an embodiment of the disclosure. In step S210described above, when a user wants to encrypt an important file, theuser may capture a first image 300 which contains multiple specificobjects 310 to 350 through the image capture device 120. Alternatively,in an embodiment, the user may capture multiple (for example, three)first images 300, and obtain the specific objects 310 to 350 from thefirst images 300. The specific objects 310 to 350 may be, for example, atelephone, a pen, a mobile phone, a mouse, and a calculator in sequence.However, the specific objects in the first image(s) described in thedisclosure are not limited to FIG. 3. The number and type of objects inthe first image(s) described in the disclosure may be decided by theuser.

In this embodiment, before the processing device 110 detects andidentifies the objects in the first image 300, the processing device 110may first adjust the image format of an image captured and provided bythe image capture device 120. For example, the image may be converted toa preset image format and image size of a 608×608 pixel bitmap. Then,the processing device 110 may perform a grayscale conversion on theadjusted image to generate the first image 300. Lastly, the processingdevice 110 may use the grayscale converted first image 300 to detect andidentify the following objects. In addition, the first image 300 of thisembodiment may include, for example, one picture or multiple continuouspictures.

Also referring to FIGS. 4A to 4E, FIGS. 4A to 4E are schematic views ofmultiple object images according to an embodiment of the disclosure. Instep S220 described above, the processing device 110 may identify thefirst object images 410 to 450 in the first image 300. In thisembodiment, the processing device 110 may perform a convolutional neuralnetwork (CNN) operation on the first image 300. The processing device110 may adopt, for example, a YOLO (you only look once) module to detectand identify objects in the first image 300. Incidentally, a feature ofthe YOLO module is that the CNN operation only needs to be performed onthe image once to be able to determine the category and location of theobjects in the image. In addition, the processing device 110 may furtherperform test training such as picture detection and segmentation ofsmall objects on the YOLO module in advance, so as to increase anidentification rate of small objects of the YOLO module. In addition, inan embodiment, the first object images may be determined by a user byoperating the electronic device 100 to manually select object images inthe first image 300.

In step S230 described above, the processing device 110 may analyze thefirst object images 410 to 450, respectively, to capture the firstcharacteristic values of the first characteristic points correspondingto each of the first object images 410 to 450. The first characteristicvalues may be grayscale values. In this embodiment, the processingdevice 110 may adopt, for example, a speed up robust features (SURF)algorithm to capture the characteristic values of the first objectimages 410 to 450, respectively.

In an embodiment, the processing device 110 may perform a statisticallyoptimized selection operation during a process of capturing thecharacteristic values. Specifically, the first image 300 may include,for example, the multiple continuous pictures, and the processing device110 may determine multiple effective characteristic points (effectiveimage characteristics) of each of the first object images 410-450 in thecontinuous pictures. The characteristic point coordinates and thecharacteristic values of the effective characteristic points inlocations corresponding to the first object images 410 to 450 in each ofthe continuous pictures are the same. The processing device 110 may setthe effective characteristic points as the first characteristic points.In other words, if the processing device 110 determines that a certaincharacteristic point does not appear in the same location of all thecontinuous pictures, it means that the certain characteristic point isnot an effective characteristic point. In another embodiment, theprocessing device 110 may also set different levels in a flash lightsetting, sensitivity, a focal length, or an aperture of the imagecapture device 120 corresponding to each of the continuous pictures, soas to reduce an impact of poor ambient light, hand shaking, or failureon the imaging quality of the pictures. Therefore, the processing device110 may avoid recording the characteristic points that havecharacteristics that are not obvious or the characteristic points thatare mistakenly determined and captured due to an unclear image. In yetanother embodiment, the processing device 110 may further filter out apicture with poor image quality automatically, so as to effectivelyidentify the characteristic points in the image by only identifying andanalyzing a picture with good image quality to facilitate keygeneration.

In step S240 described above, the processing device 110 may determine anencoding range of a number system as shown in table 1 below based on atotal number of the characteristic points of the first characteristicpoints of all the first object images 410 to 450. The number system maybe a binary number system.

TABLE 1 Total number of Encoding range the characteristic Conversion(binary number points level Value system) >128 Binary 0~1 0~1  86~128Quaternary 0~3 00~11 65~85 Octal 0~7 000~111  <65 Hexadecimal 0~F0000~1111

Then, as shown in table 2 below, the processing device 110 may calculatean average characteristic value of the first characteristic points ofall the object images. The processing device 110 may determine apercentage difference between each of the first characteristic values ofthe first characteristic points and the average characteristic value. Inaddition, the processing device 110 may determine multiple first valuesthat comply with the number system according to the percentagedifferences corresponding to the first characteristic values of thefirst characteristic points, respectively.

TABLE 2 Total First value number of the Difference (binary DifferenceFirst value characteristic Percentage between number Percentage between(binary number points Difference % values system) Difference % valuessystem) >128 >50% 0 0  0~50% 1 1  86~128 >75% 0 00 51%~75% 1 01 25%~50%2 10 <25% 3 11 65~85 >87% 0 000 76%~88% 1 001 63%~75% 2 010 51%~62% 3011 38%~50% 4 100 26%~37% 5 101 13%~25% 6 110 <12% 7 111  <65 >94% 00000 88%~94% 1 0001 82%~87% 2 0010 76%~81% 3 0011 70%~75% 4 0100 63%~69%5 0101 57%~62% 6 0110 51%~56% 7 0111 45%~50% 8 1000 38%~44% 9 100132%~37% A 1010 26%~31% B 1011 20%~25% C 1100 13%~19% D 1101  6%~12% E1110  <6% F 1111

Taking the total number of the characteristic points in a range of 86 to128 as an example, as shown in Table 3, assume that the total number ofthe characteristic points of the first characteristic points is in arange of 86 to 128, and the characteristic values of the fourcharacteristic points of the first characteristic points are “90,”“130,” “170,” and “200.” Therefore, as shown in Table 3, the firstvalues corresponding to the four characteristic points are “11,” “10,”“01,” and “00,” respectively.

TABLE 3 Total number Percen- Value in the First value of the Charac-tage quaternary (binary characteristic teristic Average Differ- numbernumber points value value ence system system) 86~128 90 100 10% 3 11 130100 30% 2 10 170 100 70% 1 01 200 100 100%  0 00

Lastly, the processing device 110 may sequentially arrange the firstvalues obtained in the embodiment described above to form an encryptionkey. In this regard, the processing device 110 may scan overall pixels(or at least pixels of a part of the image) of each of the first objectimages 410 to 450 of FIGS. 4A to 4E individually according to a presetimage scanning sequence to capture the first characteristic points. Alsoreferring to FIG. 5, FIG. 5 is a schematic view of scanning an objectimage according to an embodiment of the disclosure. Taking the firstobject image 540 as an example (that is, the image of a mouse in FIG.4D), the processing device 110 may scan each of the pixels of the objectimage 540 (from outside to inside) according to a preset image scanningsequence 500. When the processing device 110 scans and finds a pixelidentified as a characteristic point, the processing device 110 readsthe first value corresponding to the characteristic point, such as “11.”Then, if the processing device 110 reads the first value correspondingto a second characteristic point and a third characteristic point, suchas “10” and “00,” the processing device 110 may sequentially arrange thevalues to form a code “111000.” Similarly, the processing device 110 mayscan each of the first object images 410 to 450 in FIGS. 4A to 4E togenerate a sequence of code as the encryption key.

In this embodiment, the encryption key may be 256-bit password data. Inthis embodiment, the processing device 110 may determine whether thefirst values are sufficient to form the 256-bit password data so as todetermine whether to add multiple default values in sequence after thearrangement of the first values to form the 256-bit password data. Inother words, if the first values are not sufficient to form 256 bits,the processing device 110 may add the default values such as “11,” “01,”“10,” and “00” in sequence after the arrangement of the first values,but the disclosure is not limited thereto.

In addition, in an embodiment, the processing device 110 may furtherdetermine a value arrangement sequence of the first values correspondingto the first characteristic points of the first object images 410 to 450in the encryption key according to a pixel size sequence of each of thefirst object images 410 to 450. In other words, the processing device110 may determine the value arrangement sequence of the first valuescorresponding to each of the first object images in the encryption keyaccording to a sequence of, for example, the first object image 410 (aphone), the first object image 450 (a calculator), the first objectimage 430 (a mobile phone), the first object image 440 (a mouse), andthe first object image 420 (a pen).

For example, the first object image 410 (the phone) may be used togenerate a code “1100” of the first values. The first object image 450(the calculator) may be used to generate a code “1010” of the firstvalues. The first object image 430 (the mobile phone) may be used togenerate a code “1111” of the first values. The first object image 440(the mouse) may be used to generate a code “0000” of the first values.The first object image 420 (the pen) may be used to generate a code“1000” of the first values. The processing device 110 may combine thefirst values corresponding to each of the object images to generate acode of the encryption key, “11001010111100001000.”

It is to be noted that in the implementation scenario of generating thedecryption key, since a key required for file encryption and a keyrequired for file decryption have to be exactly the same, if image dataare affected by light and shadow, shaking, or lighting, the encryptionkey and decryption key generated based on the image will have a greaterdifference, consequently the data content encrypted and data contentafter decryption are different. Therefore, the processing device 110 ofthis embodiment may further generate an error-correcting code based onthe encryption key. The error-correcting code may be Reed-Solomon codes(RS codes) (RS(n, k, t)), but the disclosure is not limited thereto. Inthis regard, the error-correcting code may demonstrate encoding a symbolsequence with a length k into a codeword symbol sequence with a lengthn. Up to t erroneous symbols may be corrected, and a condition of n-k=2tis satisfied. In other words, if the encryption key is 256 bits, theformat of the error-correcting code may be demonstrated as RS (308, 256,26), and the error-correcting code allows a correction of a 10% errorrate. In other words, when the difference between the encryption key andthe decryption key is less than 10%, the processing device 110 mayregard the decryption key as the same key as the encryption key so as tobe used in file decryption. Otherwise, the decryption key is regarded asa different key and may not be used in file decryption.

In step S250 described above, the processing device 110 may, forexample, use the encryption key to encrypt the original file accordingto the advanced encryption standard (AES) to generate the encryptedfile, but the disclosure is not limited thereto. In an embodiment, theprocessing device 110 may also use other symmetric encryption methods toencrypt the original file.

FIG. 6 is a flow chart of generating a decryption key according to anembodiment of the disclosure. Referring to FIGS. 1 and 6, in animplementation scenario where the decryption key has to be additionallygenerated, when a user wants to decrypt the encrypted file described inthe embodiment described above, the electronic device 100 may executethe following steps S610 to S640 to generate the decryption key. In stepS610, the electronic device 100 may obtain a second image through theimage capture device 120. In step S620, the processing device 110 of theelectronic device 100 may identify at least one second object image inthe second image. In step S630, the processing device 110 of theelectronic device 100 may analyze the at least one second object imageto capture multiple second characteristic values of multiple secondcharacteristic points of the at least one second object image. In stepS640, the processing device 110 of the electronic device 100 maygenerate the decryption key according to the second characteristicvalues. In this embodiment, when the user wants to decrypt the encryptedfile, the user may use the second image that contains the same orsimilar multiple object images as the first image (such as the firstimage 300 in FIG. 3) for generating the encryption key to generate thedecryption key.

However, the encryption key of this embodiment is generated in the sameway as the decryption key. The realization form and method of the secondimage, the at least one second object image, the second characteristicpoints, the second characteristic values, and the decryption keydescribed in this embodiment may be found in the descriptions in each ofthe embodiments described above related to the first image, the firstobject image, the first characteristic points, the first characteristicvalues, and the generation of the encryption key in FIGS. 2 to 5, andsufficient teaching, advice, and implementation instructions may beobtained. Therefore, the details thereof are omitted herein. Inaddition, if the user uses the image capture device 120 to capture theobjects that are the same as the specific objects 310 to 350 in FIG. 3to obtain the second image, since the identified characteristic pointsof the image may have the same or similar heights, the processing device110 may generate password data of the decryption key that are the sameor very similar to the encryption key according to the second image. Inother words, the processing device 110 may directly decrypt theencrypted file with the decryption key, thereby obtaining the originalfile.

FIG. 7 is a flow chart of decrypting an encrypted file of an embodimentof the disclosure. However, if a user uses the image capture device 120to capture multiple objects of the same type that are similar to (notthe same as) the specific objects 310 to 350 in FIG. 3 to obtain thesecond image as described above, there may be an error between thepassword data of the decryption key generated by the processing device110 and the password data of the encryption key. In this regard,referring to FIG. 7, the electronic device 100 may perform the followingsteps S710 to S740. In step S710, the processing device 110 may performa consistency comparison between the encryption key and the decryptionkey to determine whether a percentage difference between the encryptionkey and the decryption key is greater than a default percentage. Thedefault percentage difference is, for example, ten percent (10%), whichcorresponds to the allowed correction of the 10% error rate set by theerror-correcting code generated in the embodiment described above. Ifthe percentage difference between the encryption key and the decryptionkey is not greater than the default percentage, the processing device110 executes step S720 to determine that the generation of decryptionkey has failed, and request the user to capture the image again. If thepercentage difference between the encryption key and the decryption keyis greater than the default percentage, the processing device 110executes step S730 to use the error-correcting code in the embodimentdescribed above to correct the decryption key. Then, in step S740, theprocessing device 110 may use the corrected decryption key to decryptthe encrypted file to obtain the original file. Therefore, when the useruses the image capture device 120 to capture multiple objects of thesame type that are the same or similar to the specific objects 310 to350 in FIG. 3 to obtain the second image described above so as togenerate the decryption key, the procedure of the embodiments of FIGS. 6and 7 may enable the electronic device 100 to generate a validdecryption key to decrypt the encrypted file.

It is to be noted that in step S710 described above, in the consistencycomparison, the processing device 110 may compare each bit value of theencryption key and the decryption key in sequence (such as comparing 0to 255 bits in sequence), for example. After the comparison, if theprocessing device 110 determines that a certain bit value (0 or 1) at acoding position in the encryption key and the decryption key is not thesame, the processing device 110 records the number of errors thereof as1, and accumulates a total number of errors. Therefore, the processingdevice 110 may calculate the percentage difference which is equal to thetotal number of errors divided by 256 and multiplied by 100 (thepercentage difference=(the number of errors/256)×100).

In summary, the data protection method of the disclosure may generate anencryption key that is very difficult to crack through the usercapturing the real-time first image that contains one or more specificobject images to effectively encrypt the original file to generate thecorresponding encrypted file. In addition, the data protection method ofthe disclosure requires the user to capture one or more specific objectsthat are the same or similar to those in the first image in the processof decrypting the encrypted file to obtain the second image that is thesame as or highly similar to the first image so as to generate thedecryption key that is similar to the encryption key. Accordingly, theencrypted file may be successfully unlocked. Therefore, the dataprotection method of the disclosure may provide file data protectionwith high protection level.

Although the disclosure has been disclosed as above through theembodiments, the embodiments are not used to limit the disclosure. Thosewith general knowledge in the field may make some changes andmodifications within the spirit and scope of the disclosure. Therefore,the scope of the disclosure shall be subject to the claims attachedhereafter.

What is claimed is:
 1. A data protection method, comprising: obtaining afirst image; identifying at least one first object image in the firstimage; analyzing the at least one first object image to capture aplurality of first characteristic values of a plurality of firstcharacteristic points of the at least one first object image; andgenerating an encryption key according to the first characteristicvalues.
 2. The data protection method according to claim 1, wherein thefirst image comprises a plurality of continuous pictures, and capturingthe first characteristic values of the first characteristic points ofthe at least one first object image comprises: determining a pluralityof effective characteristic points of the at least one first objectimage in the continuous pictures, wherein the effective characteristicpoints have the same characteristic point coordinates and the samecharacteristic values in a location of the continuous picturesrespectively corresponding to the at least one first object image; andsetting the effective characteristic points as the first characteristicpoints of the at least one first object image.
 3. The data protectionmethod according to claim 1, wherein capturing the first characteristicvalues of the first characteristic points of the at least one firstobject image comprises: determining the first characteristic points inthe at least one first object image; and scanning an overall pixel ofeach of the at least one first object image according to a preset imagescanning sequence to capture the first characteristic points.
 4. Thedata protection method according to claim 1, wherein before identifyingthe at least one first object image in the first image, the dataprotection method comprises: converting the first image to a presetimage format; and performing a grayscale conversion on the adjustedfirst image to use the grayscale converted first image to identify theat least one first object image.
 5. The data protection method accordingto claim 4, wherein converting the first image to the preset imageformat comprises: converting the first image to a bitmap image.
 6. Thedata protection method according to claim 4, wherein the firstcharacteristic values are a plurality of grayscale values.
 7. The dataprotection method according to claim 4, wherein analyzing the at leastone first object image comprises: analyzing the at least one firstobject image according to a speed up robust features (SURF) algorithm tocapture the first characteristic values of the first characteristicpoints of the at least one first object image.
 8. The data protectionmethod according to claim 1, wherein identifying the at least one firstobject image in the first image comprises: performing a convolutionalneural network (CNN) operation on the first image to identify the atleast one first object image.
 9. The data protection method according toclaim 1, wherein generating the encryption key according to the firstcharacteristic values comprises: determining a value arrangementsequence in the encryption key according to a pixel size sequence of theat least one first object image.
 10. The data protection methodaccording to claim 1, wherein generating the encryption key according tothe first characteristic values comprises: determining an encoding rangeof a number system according to a total number of characteristic pointsof the first characteristic points of all the first object images;calculating an average characteristic value of the first characteristicpoints of all the first object images; determining a percentagedifference between each of the first characteristic values of the firstcharacteristic points and the average characteristic value; determininga plurality of first values that comply with the number system accordingto a plurality of the percentage differences of the first characteristicvalues corresponding to the first characteristic points, respectively;and arranging the first values in sequence to form the encryption key.11. The data protection method according to claim 10, wherein theencryption key is 256-bit password data.
 12. The data protection methodaccording to claim 11, wherein generating the encryption key accordingto the first characteristic values of the first characteristic pointsfurther comprises: determining whether the first values are sufficientto form the 256-bit password data to determine whether to add aplurality of default values in sequence after the arrangement of thefirst values to form the 256-bit password data.
 13. The data protectionmethod according to claim 10, wherein the number system is a binarynumber system.
 14. The data protection method according to claim 1,further comprising: generating an error-correcting code according to theencryption key.
 15. The data protection method according to claim 14,wherein the error-correcting code is Reed-Solomon codes (RS codes). 16.The data protection method according to claim 1, further comprising:performing symmetric key encryption on an original file according to theencryption key to generate an encrypted file.
 17. The data protectionmethod according to claim 16, comprising: obtaining a second image;identifying at least one second object image in the second image;analyzing the at least one second object image to capture a plurality ofsecond characteristic points of the at least one second object image;and generating a decryption key adapted for decrypting the encryptedfile according to a plurality of second characteristic values of thesecond characteristic points.
 18. The data protection method accordingto claim 17, further comprising: performing a consistency comparisonbetween the encryption key and the decryption key; determining thatgeneration of the decryption key has failed when a percentage differencebetween the encryption key and the decryption key is greater than adefault percentage; and determining that the generation of thedecryption key has been successful when the percentage differencebetween the encryption key and the decryption key is less than or equalto the default percentage.
 19. The data protection method according toclaim 18, wherein the percentage difference is 10%.
 20. The dataprotection method according to claim 18, wherein after determining thatthe decryption key has been successfully generated, the data protectionmethod further comprises: using an error-correcting code to correct thedecryption key; and using the corrected decryption key to decrypt theencrypted file.