CN108459788A - A kind of image display method and terminal - Google Patents

A kind of image display method and terminal Download PDF

Info

Publication number
CN108459788A
CN108459788A CN201810214768.7A CN201810214768A CN108459788A CN 108459788 A CN108459788 A CN 108459788A CN 201810214768 A CN201810214768 A CN 201810214768A CN 108459788 A CN108459788 A CN 108459788A
Authority
CN
China
Prior art keywords
image
target
terminal
display
target image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810214768.7A
Other languages
Chinese (zh)
Other versions
CN108459788B (en
Inventor
杨其豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810214768.7A priority Critical patent/CN108459788B/en
Publication of CN108459788A publication Critical patent/CN108459788A/en
Application granted granted Critical
Publication of CN108459788B publication Critical patent/CN108459788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

An embodiment of the present invention provides a kind of image display method and terminals, wherein the image display method applied to first terminal includes:Obtain target image;Show that preset control, preset control are used to be arranged the cryptographic attributes of target image;Receive first input of the user to preset control, dispaly state of first input for adjusting preset control;The cryptographic attributes of target image are determined according to the target dispaly state of the corresponding preset control of the first input in response to the first input;Target image is sent to second terminal, target image carries cryptographic attributes.The embodiment of the present invention realizes user by the way that different permissions is arranged on an image, you can checks that the user of permission shares corresponding image to difference, simplifies difference and check that the user of permission shares the operating process of picture.

Description

A kind of image display method and terminal
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of image display method and terminals.
Background technology
Nowadays with the development of intelligent mobile terminal equipment, camera has become the most important component part of mobile phone, continues The experience of taking pictures for promoting user becomes the important channel for promoting mobile phone brand value.
User is when using mobile phone photograph, the case where often meeting after taking pictures, send the pictures to other people.But Sometimes user wishes that recipient can clearly view the content of photo, it is sometimes desirable to which recipient can view on photo It is required that partial content, i.e. user check that the mode of photo has to the recipient of photo.The recipient point of permission is checked to difference Image is enjoyed, user needs to edit the corresponding plurality of pictures of different rights, then is sent respectively to everyone, cumbersome and time-consuming.
Invention content
A kind of image display method of offer of the embodiment of the present invention and terminal check permission to solve the prior art to difference User shares the cumbersome and time-consuming problem of operating process of picture.
In order to solve the above-mentioned technical problem, in a first aspect, the embodiment of the present invention provides a kind of image display method, it is applied to First terminal, including:
Obtain target image;
Show that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First input of the user to the preset control is received, first input is for adjusting the aobvious of the preset control Show state;
In response to first input, the target dispaly state for inputting the corresponding preset control according to described first, Determine the cryptographic attributes of the target image;
The target image is sent to second terminal, the target image carries the cryptographic attributes.
Second aspect, the embodiment of the present invention provide a kind of image display method, are applied to second terminal, including:
Receive the target image that first terminal is sent;
Extract the cryptographic attributes in the target image;
According to the cryptographic attributes, the target image is shown.
The third aspect, the embodiment of the present invention provide a kind of terminal, including:
Acquisition module, for obtaining target image;
Display module, for showing preset first operation lines and the second operation lines;
First receiving module, the first input for receiving user, first input is for adjusting first operation The dispaly state of line and the second operation lines;
First respond module, in response to first input, corresponding first behaviour to be inputted according to described first The target dispaly state for making line and the second operation lines, determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the encryption and belongs to Property.
The third aspect, the embodiment of the present invention provide a kind of first terminal, including:
Acquisition module, for obtaining target image;
Display module, for showing that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First receiving module, for receiving first input of the user to the preset control, first input is for adjusting Save the dispaly state of the preset control;
First respond module, in response to first input, the corresponding default control to be inputted according to described first The target dispaly state of part, determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the encryption and belongs to Property.
Fourth aspect, the embodiment of the present invention provide a kind of first terminal, the first terminal include memory, processor and It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing The step of image display method applied to first terminal is realized when device executes.
5th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium It is stored with computer program in matter, realizes that the picture applied to first terminal is shown when the computer program is executed by processor The step of method.
6th aspect, the embodiment of the present invention provide a kind of second terminal, including:
Receiving module, the target image for receiving first terminal transmission;
Extraction module, for extracting the cryptographic attributes in the target image;
Display module, for according to the cryptographic attributes, showing the target image.
7th aspect, the embodiment of the present invention provide a kind of second terminal, the second terminal include memory, processor and It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing The step of image display method applied to second terminal is realized when device executes.
Eighth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium It is stored with computer program in matter, realizes that the picture applied to second terminal is shown when the computer program is executed by processor The step of method.
In embodiments of the present invention, by obtaining target image, and the cryptographic attributes for target image to be arranged are shown Preset control, then in the first input for receiving the dispaly state for adjusting preset control, in response to the first input, root According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined, will finally carry and add The target image of close attribute is sent to second terminal so that user can check permission for different users, send target Before image, by the dispaly state for adjusting preset control, you can target image is arranged different cryptographic attributes, so that Different different terminals users, can be according to the different cryptographic attributes carried in target image to mesh when receiving target image Logo image is shown, realizes user by the way that different permissions is arranged on an image, you can checks permission to difference User shares corresponding image, simplifies difference and checks that the user of permission shares the operating process of picture.
Description of the drawings
Fig. 1 shows the step flow charts for the image display method for being applied to first terminal in the embodiment of the present invention;
Fig. 2 indicates to generate the step flow chart of target image in the embodiment of the present invention;
Fig. 3 indicates to choose the schematic diagram of target object in the embodiment of the present invention on the first image;
Fig. 4 indicates schematic diagram when the second input in the embodiment of the present invention on the first image includes default mark;
Fig. 5 indicates the schematic diagram that suspended window is superimposed on the first image in figure 3;
Fig. 6 indicates the schematic diagram that suspended window is superimposed on the first image in Fig. 4;
Schematic diagram when Fig. 7 indicates to choose third image from Fig. 3;
Fig. 8 shows schematic diagrames when the first image in Fig. 4 to be determined as to third image;
Fig. 9 indicates the step flow chart of the image display method applied to second terminal in the embodiment of the present invention;
Figure 10 indicates the module frame chart of first terminal in the embodiment of the present invention;
Figure 11 indicates the module frame chart of second terminal in the embodiment of the present invention;
Figure 12 indicates the structure diagram of terminal in the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
As shown in Figure 1, the step flow chart of the image display method to be applied to first terminal in the embodiment of the present invention, This method includes:
Step 101:Obtain target image.
In this step, it specifically, when user needs an image being sent to second terminal, needs first to obtain target figure Picture.Specifically, the target image is to receive image that photographing instruction is shot or pre-stored shot image.
Step 102:Show preset control.
In this step, it specifically, after obtaining target image, can be shown on interface where target image default Control, wherein the preset control is used to be arranged the cryptographic attributes of target image.This realizes user can be according to different users It checks permission, target image is arranged different cryptographic attributes, it is different by being arranged on an image to realize user Cryptographic attributes so that corresponding authority user views the image of corresponding authority, simplifies and different checks that the user of permission shares The operating process of picture.
Specifically, preset control can be preset first operation lines and the second operation lines, can also be that sliding is virtually pressed Key or encryption selection option, do not limit the concrete form of preset control herein.
Step 103:Receive first input of the user to preset control.
In this step, specifically, the dispaly state of first input for adjusting preset control.Wherein, preset control May include N kind dispaly states, and each dispaly state corresponds to a kind of cryptographic attributes, N is more than 1, so that can pass through behaviour The dispaly state for making preset control, to realize the setting to the different cryptographic attributes of target image.
Certainly, dispaly state needs are determined according to the form that is particularly shown of preset control.Wherein, dispaly state can be with At least one of in arrangement mode, shape, size and location including preset control.
For example, when preset control is preset first operation lines and the second operation lines, the first operation lines and the second operation The combination of line may include three kinds of dispaly states, and each dispaly state corresponds to a kind of cryptographic attributes.At this time to preset control First input is the rotation process to the first operation lines and the second operation lines.Wherein, when the first operation lines and the second operation lines When dispaly state is intersection but out of plumb display, indicate that the cryptographic attributes of the target image are the first attribute;When the first operation lines With the dispaly state of the second operation lines be parallel display when, indicate the target image cryptographic attributes be the second attribute;When first When the dispaly state of operation lines and the second operation lines is vertically displayed, indicate that the cryptographic attributes of the target image are third attribute. In this way, user can operate the display shape of first operation lines and the second operation lines by checking permission for different users State, and then the cryptographic attributes of target image are set, so that receiving terminal can be docked in display target image according to user Receiving end shows that the actual demand of image is shown.
For another example when preset control is sliding virtual key, sliding virtual key may include sliding virtual key position On the left of sliding groove, sliding virtual key is located among sliding groove and sliding virtual key is located at three kinds of display shapes on the right side of sliding groove State, and each dispaly state corresponds to a kind of cryptographic attributes.At this time to the first input of preset control for sliding virtual key Slide.Certainly, the cryptographic attributes corresponding to each dispaly state can be configured according to demand, herein not specific limit Fixed each dispaly state institute must corresponding cryptographic attributes.
For another example when preset control is encryption selection option, encryption selection option may include the first Encryption Options, the Three display numbers of two Encryption Options and third Encryption Options, and a kind of each corresponding cryptographic attributes of display number, at this time to pre- If the first input of control is the clicking operation to encryption selection option.In this way, user can be by looking into for different users It sees permission, operates the dispaly state of preset control, and then the cryptographic attributes of target image are set, so that receiving terminal is being shown When target image, the actual demand of image, which is shown, can be shown to receiving terminal according to user.
Step 104:It is determined according to the target dispaly state of the corresponding preset control of the first input in response to the first input The cryptographic attributes of target image.
It in this step, can be in response to the first input, root specifically, first terminal is after receiving the first input According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined.It enables a user in this way It is enough that permission is checked according to the different user of receiving terminal, the target dispaly state of preset control is set, and then determines target image Cryptographic attributes so that receiving terminal can show image according to actual demand of the end subscriber to image viewing permission is sent.
Step 105:Target image is sent to second terminal.
In this step, specifically, after determining the cryptographic attributes of target image, target image can be sent to Two terminals, the wherein target image carry cryptographic attributes, so that second terminal can be according to the cryptographic attributes, display target figure Picture.In this way, allowing users to show demand to the image of second terminal according to itself, the cryptographic attributes of target image are carried out Setting, so that second terminal can be shown according to the cryptographic attributes of target image, realizes user and passes through at one Different cryptographic attributes are set on image, you can check that the user of permission shares corresponding image to difference, simplify difference and look into See that the user of permission shares the operating process of picture.
In this way, in embodiments of the present invention, by when obtaining target image, showing the encryption for target image to be arranged The preset control of attribute, and first by responding the dispaly state for adjusting preset control that user inputs preset control Input, determines the cryptographic attributes of target image, the target image for carrying cryptographic attributes is finally sent to second terminal so that uses Family can check permission for different users, before sending target image, by adjusting the dispaly state of preset control, i.e., Different cryptographic attributes target image can be arranged, so that different different terminals user is when receiving target image, energy It is enough that target image is shown according to the different cryptographic attributes carried in target image, user is realized by scheming at one As the different permission of upper setting, you can check that the user of permission shares corresponding image to difference, simplify difference and check permission User share the operating process of picture.
Further, further include following steps as shown in Fig. 2, the embodiment of the present invention is before obtaining target image:
Step 201:Receive the second input of user on the first image.
In this step, specifically, the first image can be the preview image shown in shooting preview interface or advance The shooting image of storage.Such as shown in figure 3, the first image 31 can be the preview image shown in shooting preview interface.
Wherein, when receiving the second input of user on the first image, user can be received and inputted on the first image Different second inputs.It is explained below.
First, when receiving the second input of user on the first image, user can be received and chosen on the first image Second input of target object.Specifically, the second input includes that user inputs for target object on the first image at this time Profile traces or user are directed to the preset pattern track of target object input on the first image, and wherein target object is located at pre- If in graphics track.In this way, choosing the second input of target object on the first image by receiving user, user's root is realized Target object is directly chosen on the first image according to display demand, and easy user chooses the operating process of target object.
It, can be with when user 3 wants using the middle section image in Fig. 3 as when target object for example, with continued reference to Fig. 3 For target object input five-pointed star graphics track 32, the wherein image in the five-pointed star graphics track 32 is target object 33. It allows users in this way according to self-demand, directly chooses target object on the first image, easy user chooses target The operating process of object.
Second, when receiving the second input of user on the first image, the operation trace of second input includes default Mark.Wherein, which is used to indicate startup and presets the corresponding target camera of mark with this.At this time second input include To the clicking operation of default mark.Specifically, default be identified as bends arrow figure or U-shaped figure, and the pre- bidding Knowledge may be embodied in a preset pattern track.Certainly do not limit the default mark specifically herein is particularly shown form.Example Such as, as shown in figure 4, user 4 can first input five-pointed star graphics track 42 on the first image 41, then in five-pointed star figure rail Input bending arrow figure 43 in mark 42.
Step 202:It is inputted in response to second, on the first image Overlapping display suspended window, the second figure is shown in suspended window Picture.
It in this step, can be in response to specifically, when detecting the second input that user inputs on the first image Second input, is superimposed suspended window, wherein the second image is shown in the suspended window on the first image.In this way so that the first figure On picture can the second image of Overlapping display, be highlighted the second image, user facilitated to check the second figure shown in suspended window Picture.
Wherein, when being inputted in response to second, it can be directed to the second different inputs, make different responses.It is right at this This is illustrated.
First, when reception user chooses the second input of target object on the first image, inputted in response to second, Overlapping display suspended window on the first image, in the step of showing the second image in suspended window, can in response to the second input, Overlapping display suspended window on first image, in suspended window display include the second image of target object.In such manner, it is possible to so that outstanding The second image shown in floating window includes the target object of user's selection, realize on the first image Overlapping display user from the The target object selected on one image is highlighted the target object of user's selection.
Specifically, suspended window may include frame region image, wherein frame region image may include terminal frame and The image that the control regions image in the display screen of the first image in addition to the first image is formed is shown, and the second image is aobvious Show in the indication range of the frame region image.For example, as shown in figure 5, for Overlapping display on the first image 31 in figure 3 The schematic diagram of suspended window 51.Wherein, the second image 52 for including the target object 33 in Fig. 3 is shown in the suspended window 51.Certainly, The suspended window further includes frame region image 53, which may include terminal frame and show the first image Display screen in the image that is formed of control regions image in addition to the first image.This to show after the second input of response In the image shown, the first image of Overlapping display and the suspended window of target object can be shown, be highlighted user's selection Target object facilitates and receives the target object that end subscriber views user's meaning.
Second, when the operation trace of the second input includes default mark, inputted in response to second, on the first image Overlapping display suspended window can on the first image be folded in the step of showing the second image in suspended window in response to the second input Add display suspended window, the second image of the corresponding target camera acquisition of default mark is shown in suspended window.Specifically, when first When image is the preview image shown in shooting preview interface, if the first image is the preview graph that the first camera acquires in real time Picture, then the target camera for being used to acquire the second image are second camera;Wherein, when the first camera is front camera When, second camera is rear camera, and when the first camera is rear camera, second camera is front camera. In this way, can so that the second image shown in suspended window is the second figure of the corresponding target camera acquisition of default mark Picture, that is, enable in response to image the first image of Overlapping display and the acquisition of target camera simultaneously of the second input display the Two images increase the display content of display image, realize and integrate the figure that multiple cameras are acquired on same pictures Picture.
Specifically, suspended window may include frame region image, wherein frame region image includes terminal frame and display The image being made of the control regions image in the display screen of the first image in addition to the first image.In addition, the second image is aobvious Show in the indication range of the frame region image.For example, as shown in fig. 6, for Overlapping display on the first image 41 in Fig. 4 The schematic diagram of suspended window 61.Wherein, display includes that the corresponding target camera acquisition of mark is preset in Fig. 4 in the suspended window 61 The second image 62.Certainly, which further includes frame region image 63, which may include terminal edge The image that control regions image in frame and the display screen for showing the first image in addition to the first image is formed.This makes After the second input of response in shown image, the first image of Overlapping display and the second of the acquisition of target camera can be shown Image, this to show multiple camera the image collected in a pictures, and mesh is highlighted in suspended window Camera the image collected is marked, reception end subscriber is facilitated and target camera institute the image collected is checked.
Step 203:Based on the first image and the second image, third image is determined.
It in this step, can be based on the first figure of display specifically, after showing the first image and the second image Picture and the second image, determine third image.
It wherein,, can be according to shown in suspended window when determining third image based on the first image and the second image The picture material of two images, to determine third image.This is specifically described at this.
First, when second image of the display comprising target image in suspended window, based on the first image and the second image, May include at least one of following in the step of determining third image:
1) topography that pre-set image feature is met in the target area of the first image, is determined as third image, mesh It is all image-regions in the first image in addition to target object region to mark region.Specifically, pre-set image feature packet It includes image color value and is more than preset value, meet default textural characteristics and meet at least one in pre-set color feature, exist certainly This does not limit the particular content of pre-set image feature specifically.In this way, by the image-region in addition to target object region The middle topography for meeting pre-set image feature is determined as third image so that and third image can be different from the second image, from And make when needing that the second image is encrypted, it can be encrypted by the second image of third image pair, and third figure The selection of picture disclosure satisfy that display demand of the most users to image.
For example, as shown in fig. 7, third image 71 is that the satisfaction that first terminal is selected from the first image 31 in Fig. 3 is pre- If the topography of characteristics of image realizes the differentiation of third image and the second image.Specifically, the third image 71 is covered in On the first image and the second image 52 in Fig. 5.Certainly, which can also be covered in the second image 52 in Fig. 5 On, this is not limited specifically herein.
2) topography that user chooses in the target area of the first image, is determined as third image, target area For all image-regions in the first image in addition to target object region.In this way, by by user in the first image The topography chosen in image-region in addition to target object region is determined as third image so that user being capable of root Third image is selected from the first image according to self-demand, while distinguishing the first image and the second image, is improved Satisfaction of the user to third image.
3) image input by user is determined as third image.Specifically, image input by user can be user from the The image called in memory space in one terminal.In this way, by the way that image input by user is determined as third image so that use Family can increase the range of choice of third image according to self-demand input picture, and improve user to third image Satisfaction.
Second, when showing the second image of the corresponding target camera acquisition of default mark in suspended window, based on the First image can be determined as third image by one image and the second image in the step of determining third image.In this way, passing through First image is determined as third image so that third image can be different from the second image, so that needing to second When image is encrypted, it can be encrypted by the second image of third image pair.
For example, as shown in figure 8, can the first image 41 in Fig. 4 be directly determined as third image 81.Specifically, should Third image 81 is covered on the second image 62 in Fig. 6.Certainly, which can also be covered in entire in Fig. 6 On display interface, this is not limited specifically herein.
Step 204:Based on the second image, the 4th image is determined.
In this step, specifically, based on the second image, when determining four images, the second image can be determined as 4th image;Alternatively, the composograph generated in the state of the second image of Overlapping display on the first image is determined as the 4th Image.
In this way, passing through the synthesis that will be generated in the state of the second image of Overlapping display on the second image or the first image Image is determined as the 4th image so that when needing that the 4th image is encrypted, can increase the image selection of the 4th image Range.
Step 205:By third image and the 4th image associated storage, target image is generated.
It in this step, can be by third image and the 4th image specifically, when determining third image and four images Associated storage generates target image.This so that target image includes the third image and the 4th image for belonging to different levels, from And, when the cryptographic attributes of target image are arranged, the dispaly state of third image and the 4th image can be arranged, realize The different display images in target image can be viewed according to permission is checked by receiving end subscriber.
Wherein, under different cryptographic attributes, the second terminal image shown in display target image is different, It is explained herein.
First, in the case where cryptographic attributes are the first attribute, the display properties of third image is display, the 4th image Display properties is hiding and readable, hides and the 4th image of readable instruction is received in second terminal and pre-stored permission is believed It is shown in the case of the matched verification information of manner of breathing, and after preset duration, delete target image.Specifically, authority information packet Finger print information or preset password are included, does not limit the particular content of authority information specifically herein.
In this way, by setting the cryptographic attributes of target image to the first attribute so that receive end subscriber and only inputting Verification information and second terminal pre-stored authority information when matching, the 4th image can be viewed, and inputting Verification information and second terminal pre-stored authority information when mismatching, third image can only be viewed, improve target The safety of 4th image in image;In addition, after preset duration, delete target image further improves in target image The safety of 4th image.
Second, in the case where cryptographic attributes are the second attribute, the display properties of third image is display, the 4th image Display properties is hiding and unreadable;It hides and the 4th image of unreadable instruction is invisible to second terminal, and in preset duration Afterwards, delete target image.
In this way, by setting the cryptographic attributes of target image to the second attribute so that receiving end subscriber can only view Third image, and the 4th image cannot be viewed, improve the safety of the 4th image;In addition the delete target after preset duration Image further improves the safety of the 4th image.
Third, in the case where cryptographic attributes are third attribute, the display properties of third image be it is hiding, the 4th image Display properties is display, and the permission of the cryptographic attributes of second terminal setting target image is open state.Specifically, encryption belongs to Property be third attribute when, the dispaly state of the first operation lines and the second operation lines can be vertically displayed.
In this way, by setting the cryptographic attributes of target image to third attribute so that receiving end subscriber can directly look into See the 4th image, and the cryptographic attributes of target image can be configured, realizes and receive end subscriber to target image It checks, store and forwards.
It should be noted that the cryptographic attributes of target image according to be arranged in order from high to low for:Second attribute, One attribute and third attribute.At this point, user to difference check permission users send target image when, can according to from height to Low checks permission, and the cryptographic attributes that target image is arranged are followed successively by the second attribute, the first attribute and third attribute, realize by Permission is checked according to different users, and the cryptographic attributes of same picture are arranged.
In this way, the present embodiment is by when obtaining target image, showing the pre- of the cryptographic attributes for target image to be arranged If control, and the first input by responding the dispaly state for adjusting preset control that user inputs preset control, really Set the goal the cryptographic attributes of image, the target image for carrying cryptographic attributes is finally sent to second terminal so that user can Permission is checked for different users, before sending target image, by the dispaly state for adjusting preset control, you can to mesh Different cryptographic attributes are arranged in logo image, so that different different terminals user is when receiving target image, it being capable of basis The different cryptographic attributes carried in target image show target image, realize user by being set on an image Set different permissions, you can the user of permission, which shares corresponding image, to be checked to difference, simplifies the different users for checking permission Share the operating process of picture.
As shown in figure 9, the flow chart of the image display method to be applied to second terminal in the embodiment of the present invention, the party Method includes:
Step 901:Receive the target image that first terminal is sent.
In this step, specifically, second terminal receives the target image that first terminal is sent.Wherein, the target image In carry the cryptographic attributes of the target image.
Wherein, target image includes the third image and the 4th image of associated storage, wherein in first terminal, receives and uses Family on the first image second input when, in response to second input, Overlapping display shows the second image on the first image Suspended window, be then based on the first image and the second image, determine third image, and be based on the second image, determine the 4th image. Specifically, can be true by the composograph generated in the state of the second image of Overlapping display on the second image or the first image It is set to the 4th image.In addition, the first image can be the preview image shown in first terminal shooting preview interface or advance The shooting image of storage.Second image can be the target object chosen from the first image, can also be target camera Second image of acquisition.This enables target image to include the picture materials of many levels, so that first terminal can It is encrypted according to the dispaly state of third image and the 4th image, realizing reception end subscriber can check according to cryptographic attributes To the different display images in target image.
Step 902:Extract the cryptographic attributes in target image.
In this step, specifically, after receiving target image, the cryptographic attributes of the target image can be extracted.
Wherein, the cryptographic attributes of target image include the first attribute, the second attribute and third attribute.
Specifically, in the case where cryptographic attributes are the first attribute, the display properties of third image is display, the 4th image Display properties be hide and it is readable, hide and the 4th image of readable instruction received and pre-stored permission in second terminal It is shown in the case of the verification information of information match, and after preset duration, delete target image;It is second in cryptographic attributes In the case of attribute, the display properties of third image is display, and the display properties of the 4th image is hiding and unreadable;Hide and The 4th image of unreadable instruction is invisible to second terminal, and after preset duration, delete target image;It is the in cryptographic attributes In the case of three attributes, the display properties of third image is hiding, and the display properties of the 4th image is display, and second terminal is set The permission for setting the cryptographic attributes of target image is open state.
In this way, the cryptographic attributes by extracting target image so that second terminal can be according to the encryption of the target image Attribute shows target image.
Step 903:According to cryptographic attributes, display target image.
In this step, it specifically, after extracting the cryptographic attributes of target image, can be shown according to cryptographic attributes Show target image.
Wherein, when the cryptographic attributes extracted are the first attribute, according to cryptographic attributes, the step of display target image In, it can be with the third image in display target image, and the display properties of the 4th image in target image is hiding and readable; In the case where receiving the verification information to match with pre-stored authority information, the 4th image is shown;In preset duration Afterwards, delete target image.This makes second terminal only in the verification information received and pre-stored authority information phase Timing can view the 4th image, and when the verification information received is mismatched with pre-stored authority information, only Third image can be viewed, the safety of the 4th image in target image is improved;In addition, after preset duration, delete target Image further improves the safety of the 4th image in target image.
When the cryptographic attributes extracted are the second attribute, according to cryptographic attributes, the step of display target image in, can The display properties of the 4th image with the third image in display target image, and in target image is hiding and unreadable; After preset duration, delete target image.This makes second terminal that can only view third image, and cannot view the 4th figure Picture improves the safety of the 4th image;In addition the delete target image after preset duration further improves the 4th image Safety.
When the cryptographic attributes extracted are third attribute, according to cryptographic attributes, the step of display target image in, can The display properties of third image with the 4th image in display target image, and in target image is hiding;Wherein, second eventually The permission of the cryptographic attributes of end setting target image is open state, the setting model of the cryptographic attributes of the target image of second terminal It encloses including the first attribute, the second attribute and third attribute.
Specifically, for the first attribute, the display properties of third image is display, and the display properties of the 4th image is hiding And it is readable, it hides and the 4th image of readable instruction receives the verification to match with pre-stored authority information in third terminal It is shown in the case of information, and after preset duration, delete target image, third terminal is the target for receiving second terminal and sending The terminal of image;
For the second attribute, the display properties of third image is display, and the display properties of the 4th image is hiding and can not It reads;It hides and the 4th image of unreadable instruction is invisible to third terminal, and after preset duration, delete target image;
For third attribute, the display properties of third image is hiding, and the display properties of the 4th image is shows, and third The permission that the cryptographic attributes of target image are arranged in terminal is open state.
Specifically, second terminal when the cryptographic attributes to target image are configured, can receive user to target figure First input of the preset control as shown in upper, the wherein dispaly state of first input for adjusting preset control, and respond The cryptographic attributes of target image are determined according to the target dispaly state of the corresponding preset control of the first input in first input.
In this way, when the cryptographic attributes that second terminal is extracted are third attribute so that second terminal can be directly viewable To the 4th image, and the cryptographic attributes of target image can be configured, realize second terminal to the checking of target image, Storage and forwarding.
In this way, the target image that the embodiment of the present invention is sent by receiving first terminal, is then extracted in target image Cryptographic attributes, and according to cryptographic attributes, display target image so that second terminal can be arranged according to user on first terminal Target image cryptographic attributes, perform image display, realizing receiving terminal can be according to sending end subscriber to the reality of picture Display demand shows the picture received.
As shown in Figure 10, the embodiment of the present invention provides a kind of first terminal, including:
Acquisition module 1001, for obtaining target image;
Display module 1002, for showing that preset control, the preset control are used to be arranged the encryption of the target image Attribute;
First receiving module 1003, for receiving first input of the user to the preset control, first input is used In the dispaly state for adjusting the preset control;
First respond module 1004, in response to first input, being inputted according to described first corresponding described pre- If the target dispaly state of control, determines the cryptographic attributes of the target image;
Sending module 1005, for the target image to be sent to second terminal, the target image carries described add Close attribute.
First terminal provided in an embodiment of the present invention obtains target image by acquisition module, and is shown by display module Preset control is received the first input of user by the first receiving module, and is inputted in response to first by the first respond module, According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined, finally by transmission Target image is sent to second terminal by module, and target image carries cryptographic attributes so that user can be directed to different users Permission is checked, before sending target image, by the dispaly state for adjusting preset control, you can target image is arranged different Cryptographic attributes so that different different terminals user can carry when receiving target image according in target image Different cryptographic attributes target image is shown, realize user by the way that different permissions is arranged on an image, It can check that the user of permission shares corresponding image to difference, simplify difference and check that the user of permission shares the operation of picture Process.
Optionally, the first terminal further includes:
Second receiving module, for receiving the second input of user on the first image;
Second respond module, for being inputted in response to described second, the Overlapping display suspended window in described first image, institute It states and shows the second image in suspended window;
First determining module determines third image for being based on described first image and the second image;
Second determining module determines the 4th image for being based on second image;
Generation module, for by the third image and the 4th image associated storage, generating target image.
Optionally, second determining module includes:
First determination unit, for second image to be determined as the 4th image;
Alternatively, the second determination unit, is used for institute in the state of the second image described in Overlapping display in described first image The composograph of generation is determined as the 4th image.
Optionally, in the case where the cryptographic attributes are the first attribute, the display properties of the third image is display, The display properties of 4th image is hiding and readable, and described hiding and readable instruction the 4th image connects in second terminal It is shown in the case of receiving the verification information to match with pre-stored authority information, and after preset duration, described in deletion Target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, described the The display properties of four images is hiding and unreadable;Described hiding and unreadable instruction the 4th image can not to second terminal See, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are third attribute, the display properties of the third image be it is hiding, described the The display properties of four images is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
Optionally, described first image is the preview image that shows or pre-stored to have been shot in shooting preview interface Image.
Optionally, second receiving module is used for, and is received user and is chosen the second defeated of target object on the first image Enter;
Second respond module is used for, and in response to second input, Overlapping display suspends in described first image Window, in the suspended window display include the second image of the target object.
Optionally, first determining module be used for execute it is following at least one of:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, institute It is all image-regions in described first image in addition to the target object region to state target area;
The topography that user chooses in the target area of described first image is determined as third image, the target Region is all image-regions in addition to the target object region in described first image;
Image input by user is determined as third image.
Optionally, the operation trace of second input includes default mark;
Second respond module is used for, and in response to second input, Overlapping display suspends in described first image Window shows the second image of the corresponding target camera acquisition of the default mark in the suspended window.
Optionally, first determining module is used for, and described first image is determined as third image.
First terminal provided in an embodiment of the present invention, by when obtaining target image, showing for target image to be arranged Cryptographic attributes preset control, and be used to adjust the dispaly state of preset control to what preset control input by responding user First input, determine the cryptographic attributes of target image, the target image for carrying cryptographic attributes be finally sent to second terminal, It allows users to check permission for different users, before sending target image, by the display for adjusting preset control State, you can target image is arranged different cryptographic attributes, so that different different terminals users are receiving target figure When picture, target image can be shown according to the different cryptographic attributes carried in target image, realize user and pass through Different permissions is set on an image, you can the user of permission, which shares corresponding image, to be checked to difference, simplifies difference Check that the user of permission shares the operating process of picture.
As shown in figure 11, a kind of second terminal is provided in the embodiment of the present invention, which includes:
Receiving module 1101, the target image for receiving first terminal transmission;
Extraction module 1102, for extracting the cryptographic attributes in the target image;
Display module 1103, for according to the cryptographic attributes, showing the target image.
Second terminal provided in an embodiment of the present invention receives the target image that first terminal is sent by receiving module, passes through Extraction module extracts the cryptographic attributes in target image, by display module according to cryptographic attributes, display target image so that the Two terminals can be performed image display according to the cryptographic attributes for the target image that user is arranged on first terminal, realize and connect Receiving end can show the picture received according to end subscriber is sent to the actual displayed demand of picture.
Optionally, the cryptographic attributes are the first attribute;
The display module is used for, and shows the third image in the target image, and the in the target image the 4th The display properties of image is hiding and readable;The case where receiving the verification information to match with pre-stored authority information Under, show the 4th image;After preset duration, the target image is deleted.
Optionally, the cryptographic attributes are the second attribute;
The display module is used for, and shows the third image in the target image, and the in the target image the 4th The display properties of image is hiding and unreadable;After preset duration, the target image is deleted.
Optionally, the cryptographic attributes are third attribute;
The display module is used for, and shows the 4th image in the target image, and the third in the target image The display properties of image is hiding;
Wherein, the second terminal be arranged the cryptographic attributes of the target image permission be open state, described second The setting range of the cryptographic attributes of the target image of terminal includes the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, the display properties of the 4th image To be hiding and readable, described hiding and readable instruction the 4th image is received in third terminal and pre-stored permission is believed It is shown in the case of the matched verification information of manner of breathing, and after preset duration, delete the target image, the third terminal is Receive the terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, the display properties of the 4th image It is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and in preset duration Afterwards, the target image is deleted;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is aobvious Show, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in third terminal.
The target image that second terminal provided in an embodiment of the present invention is sent by receiving first terminal, then extracts target Cryptographic attributes in image, and according to cryptographic attributes, display target image so that second terminal can be whole first according to user The cryptographic attributes for the target image being arranged on end, perform image display, and realize the reality that receiving terminal can be according to user to picture Border shows demand, is shown to the picture received.
In addition, a kind of hardware architecture diagram of Figure 12 terminals of each embodiment to realize the present invention.The terminal 1200 Can be above-mentioned first terminal or second terminal, which includes but not limited to:Radio frequency unit 1201, network module 1202, audio output unit 1203, input unit 1204, sensor 1205, display unit 1206, user input unit 1207, The components such as interface unit 1208, memory 1209, processor 1210 and power supply 1211.It will be understood by those skilled in the art that The restriction of the not structure paired terminal of terminal structure shown in Figure 12, terminal may include than illustrating more or fewer components, Either combine certain components or different components arrangement.In embodiments of the present invention, terminal includes but not limited to mobile phone, puts down Plate computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, in the case where terminal 1200 is first terminal, processor 1210 is used for, and obtains target image;Display is pre- If control, the preset control is used to be arranged the cryptographic attributes of the target image;User is received to the of the preset control One input, dispaly state of first input for adjusting the preset control;In response to first input, according to described The target dispaly state of the corresponding preset control of first input, determines the cryptographic attributes of the target image;By the mesh Logo image is sent to second terminal, and the target image carries the cryptographic attributes.
First terminal provided in this embodiment is by when obtaining target image, showing the encryption for target image to be arranged The preset control of attribute, and first by responding the dispaly state for adjusting preset control that user inputs preset control Input, determines the cryptographic attributes of target image, the target image for carrying cryptographic attributes is finally sent to second terminal so that uses Family can check permission for different users, before sending target image, by adjusting the dispaly state of preset control, i.e., Different cryptographic attributes target image can be arranged, so that different different terminals user is when receiving target image, energy It is enough that target image is shown according to the different cryptographic attributes carried in target image, user is realized by scheming at one As the different permission of upper setting, you can check that the user of permission shares corresponding image to difference, simplify difference and check permission User share the operating process of picture.
Wherein, in the case where terminal 1200 is second terminal, processor 1210 is used for, and receives the mesh that first terminal is sent Logo image;Extract the cryptographic attributes in the target image;According to the cryptographic attributes, the target image is shown.
The target image that second terminal provided in an embodiment of the present invention is sent by receiving first terminal, then extracts target Cryptographic attributes in image, and according to cryptographic attributes, display target image so that second terminal can be whole first according to user The cryptographic attributes for the target image being arranged on end, perform image display, and realize the reality that receiving terminal can be according to user to picture Border shows demand, is shown to the picture received.
It should be understood that the embodiment of the present invention in, radio frequency unit 1201 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 1210 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 1201 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1201 can also by radio communication system and network and other Equipment communicates.
Terminal has provided wireless broadband internet to the user by network module 1202 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 1203 can receive radio frequency unit 1201 or network module 1202 or in memory The audio data stored in 1209 is converted into audio signal and exports to be sound.Moreover, audio output unit 1203 can be with The relevant audio output of specific function executed with terminal 1200 is provided (for example, call signal receives sound, message sink sound Etc.).Audio output unit 1203 includes loud speaker, buzzer and receiver etc..
Input unit 1204 is for receiving audio or video signal.Input unit 1204 may include graphics processor (Graphics Processing Unit, GPU) 12041 and microphone 12042, graphics processor 12041 in video to capturing In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into Row processing.Treated, and picture frame may be displayed on display unit 1206.Through treated the picture frame of graphics processor 12041 It can be stored in memory 1209 (or other storage mediums) or be carried out via radio frequency unit 1201 or network module 1202 It sends.Microphone 12042 can receive sound, and can be audio data by such acoustic processing.Audio that treated Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1201 in the case of telephone calling model Formula exports.
Terminal 1200 further includes at least one sensor 1205, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light The light and shade of line adjusts the brightness of display panel 12061, and proximity sensor can close display when terminal 1200 is moved in one's ear Panel 12061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three Axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify terminal posture (such as horizontal/vertical screen Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1205 Can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1206 is for showing information input by user or being supplied to the information of user.Display unit 1206 can Including display panel 12061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 12061.
User input unit 1207 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 1207 include touch panel 12071 and its His input equipment 12072.Touch panel 12071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 12071 or in touch panel Operation near 12071).Touch panel 12071 may include both touch detecting apparatus and touch controller.Wherein, it touches The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1210, It receives the order that processor 1210 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface The multiple types such as sound wave realize touch panel 12071.In addition to touch panel 12071, user input unit 1207 can also include Other input equipments 12072.Specifically, other input equipments 12072 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 12071 can be covered on display panel 12061, when touch panel 12071 detects After touch operation on or near it, processor 1210 is sent to determine the type of touch event, is followed by subsequent processing device 1210 Corresponding visual output is provided on display panel 12061 according to the type of touch event.Although in fig. 12, touch panel 12071 be to realize the function that outputs and inputs of terminal as two independent components with display panel 12061, but certain In embodiment, can touch panel 12071 and display panel 12061 be integrated and be realized the function that outputs and inputs of terminal, tool Body does not limit herein.
Interface unit 1208 is the interface that external device (ED) is connect with terminal 1200.For example, external device (ED) may include wired Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 1208 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal 1200 or it can be used in terminal 1200 and external fill Transmission data between setting.
Memory 1209 can be used for storing software program and various data.Memory 1209 can include mainly storage program Area and storage data field, wherein storing program area can storage program area, needed at least one function application program (such as Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone Such as audio data, phone directory) etc..In addition, memory 1209 may include high-speed random access memory, can also include non- Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1210 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, By running or execute the software program and/or module that are stored in memory 1209, and calls and be stored in memory 1209 Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1210 may include One or more processing units;Preferably, processor 1210 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 1210.
Terminal 1200 can also include the power supply 1211 (such as battery) powered to all parts, it is preferred that power supply 1211 Can be logically contiguous by power-supply management system and processor 1210, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal 1200 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1210, and memory 1209 is stored in On reservoir 1209 and the computer program that can be run on the processor 1210, the computer program are executed by processor 1210 Shi Shixian is applied to each process of the image display method embodiment of first terminal and second terminal, and can reach identical Technique effect, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes the picture display side applied to first terminal and second terminal when the computer program is executed by processor Each process of method embodiment, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, described Computer readable storage medium, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (30)

1. a kind of image display method is applied to first terminal, which is characterized in that including:
Obtain target image;
Show that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
Receive first input of the user to the preset control, display shape of first input for adjusting the preset control State;
In response to first input, the target dispaly state for inputting the corresponding preset control according to described first determines The cryptographic attributes of the target image;
The target image is sent to second terminal, the target image carries the cryptographic attributes.
2. according to the method described in claim 1, it is characterized in that, before the acquisition target image, further include:
Receive the second input of user on the first image;
It is inputted in response to described second, the Overlapping display suspended window in described first image, the second figure is shown in the suspended window Picture;
Based on described first image and the second image, third image is determined;
Based on second image, the 4th image is determined;
By the third image and the 4th image associated storage, target image is generated.
3. according to the method described in claim 2, it is characterized in that, it is described be based on second image, determine the 4th image, wrap It includes:
Second image is determined as the 4th image;
Alternatively, the composograph generated in the state of the second image described in Overlapping display in described first image is determined as Four images.
4. according to the method described in claim 2, it is characterized in that,
In the case where the cryptographic attributes are the first attribute, the display properties of the third image is display, the 4th figure The display properties of picture is to hide and readable, it is described hide and readable instruction the 4th image second terminal receive in advance It is shown in the case of the verification information that the authority information of storage matches, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, the 4th figure The display properties of picture is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to second terminal, And after preset duration, the target image is deleted;
In the case where the cryptographic attributes are third attribute, the display properties of the third image is hiding, the 4th figure The display properties of picture is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
5. according to the method described in claim 2, it is characterized in that, described first image is pre- to be shown in shooting preview interface Look at image or the pre-stored image shot.
6. according to the method described in claim 2, it is characterized in that, it is described receive user on the first image second input, Including:
Receive the second input that user chooses target object on the first image;
It is described in response to second input, the Overlapping display suspended window in described first image shows the in the suspended window Two images, including:
It is inputted in response to described second, the Overlapping display suspended window in described first image, display includes institute in the suspended window State the second image of target object.
7. according to the method described in claim 6, it is characterized in that, described be based on described first image and the second image, determination Third image, including it is at least one of following:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, the mesh It is all image-regions in described first image in addition to the target object region to mark region;
The topography that user chooses in the target area of described first image is determined as third image, the target area For all image-regions in described first image in addition to the target object region;
Image input by user is determined as third image.
8. according to the method described in claim 2, it is characterized in that, the operation trace of second input includes default mark;
It is described in response to second input, the Overlapping display suspended window in described first image shows the in the suspended window Two images, including:
It inputs, the Overlapping display suspended window in described first image, is shown in the suspended window described pre- in response to described second Bidding knows the second image of corresponding target camera acquisition.
9. according to the method described in claim 8, it is characterized in that, described be based on described first image and the second image, determination Third image, including:
Described first image is determined as third image.
10. a kind of image display method is applied to second terminal, which is characterized in that including:
Receive the target image that first terminal is sent;
Extract the cryptographic attributes in the target image;
According to the cryptographic attributes, the target image is shown.
11. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are the first attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the third image in the target image, and the display properties of the 4th image in the target image be hide and It is readable;
In the case where receiving the verification information to match with pre-stored authority information, the 4th image is shown;
After preset duration, the target image is deleted.
12. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are the second attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the third image in the target image, and the display properties of the 4th image in the target image be hide and It is unreadable;
After preset duration, the target image is deleted.
13. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are third attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the 4th image in the target image, and the display properties of the third image in the target image is hiding;
Wherein, the permission that the cryptographic attributes of the target image are arranged in the second terminal is open state, the second terminal The target image cryptographic attributes setting range include the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden It hides and readable, described hiding and readable instruction the 4th image receives and pre-stored authority information phase in third terminal It is shown in the case of matched verification information, and after preset duration, delete the target image, the third terminal is to receive The terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden It hides and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and after preset duration, deletes Except the target image;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is display, and The permission that the cryptographic attributes of the target image are arranged in third terminal is open state.
14. a kind of first terminal, which is characterized in that including:
Acquisition module, for obtaining target image;
Display module, for showing that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First receiving module, for receiving first input of the user to the preset control, first input is for adjusting State the dispaly state of preset control;
First respond module, in response to first input, the corresponding preset control to be inputted according to described first Target dispaly state determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the cryptographic attributes.
15. first terminal according to claim 14, which is characterized in that the terminal further includes:
Second receiving module, for receiving the second input of user on the first image;
Second respond module, in response to second input, the Overlapping display suspended window in described first image to be described outstanding The second image is shown in floating window;
First determining module determines third image for being based on described first image and the second image;
Second determining module determines the 4th image for being based on second image;
Generation module, for by the third image and the 4th image associated storage, generating target image.
16. first terminal according to claim 15, which is characterized in that second determining module includes:
First determination unit, for second image to be determined as the 4th image;
Alternatively, the second determination unit, for will be generated in the state of the second image described in Overlapping display in described first image Composograph be determined as the 4th image.
17. first terminal according to claim 15, which is characterized in that
In the case where the cryptographic attributes are the first attribute, the display properties of the third image is display, the 4th figure The display properties of picture is to hide and readable, it is described hide and readable instruction the 4th image second terminal receive in advance It is shown in the case of the verification information that the authority information of storage matches, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, the 4th figure The display properties of picture is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to second terminal, And after preset duration, the target image is deleted;
In the case where the cryptographic attributes are third attribute, the display properties of the third image is hiding, the 4th figure The display properties of picture is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
18. first terminal according to claim 15, which is characterized in that described first image is to be shown in shooting preview interface The preview image or the pre-stored image shot shown.
19. first terminal according to claim 15, which is characterized in that second receiving module is used for, and receives user The second input of target object is chosen on the first image;
Second respond module is used for, in response to second input, the Overlapping display suspended window in described first image, and institute State the second image that display includes the target object in suspended window.
20. first terminal according to claim 19, which is characterized in that first determining module for execute it is following in At least one of:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, the mesh It is all image-regions in described first image in addition to the target object region to mark region;
The topography that user chooses in the target area of described first image is determined as third image, the target area For all image-regions in described first image in addition to the target object region;
Image input by user is determined as third image.
21. first terminal according to claim 15, which is characterized in that the operation trace of second input includes default Mark;Second respond module is used for, in response to second input, the Overlapping display suspended window in described first image, The second image of the corresponding target camera acquisition of the default mark is shown in the suspended window.
22. first terminal according to claim 21, which is characterized in that first determining module is used for, by described One image is determined as third image.
23. a kind of first terminal, which is characterized in that the first terminal includes memory, processor and is stored in the storage On device and the computer program that can run on the processor, realized such as when the computer program is executed by the processor The step of claim 1 to 9 any one of them image display method.
24. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize image display method as described in any one of claim 1 to 9 when being executed by processor Step.
25. a kind of second terminal, which is characterized in that including:
Receiving module, the target image for receiving first terminal transmission;
Extraction module, for extracting the cryptographic attributes in the target image;
Display module, for according to the cryptographic attributes, showing the target image.
26. second terminal according to claim 25, which is characterized in that the cryptographic attributes are the first attribute;
The display module is used for, and shows the third image in the target image, and the 4th image in the target image Display properties be hide and it is readable;In the case where receiving the verification information to match with pre-stored authority information, Show the 4th image;After preset duration, the target image is deleted.
27. second terminal according to claim 25, which is characterized in that the cryptographic attributes are the second attribute;
The display module is used for, and shows the third image in the target image, and the 4th image in the target image Display properties be hide and it is unreadable;After preset duration, the target image is deleted.
28. second terminal according to claim 25, which is characterized in that the cryptographic attributes are third attribute;
The display module is used for, and shows the 4th image in the target image, and the third image in the target image Display properties be hiding;
Wherein, the permission that the cryptographic attributes of the target image are arranged in the second terminal is open state, the second terminal The target image cryptographic attributes setting range include the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden It hides and readable, described hiding and readable instruction the 4th image receives and pre-stored authority information phase in third terminal It is shown in the case of matched verification information, and after preset duration, delete the target image, the third terminal is to receive The terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden It hides and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and after preset duration, deletes Except the target image;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is display, and The permission that the cryptographic attributes of the target image are arranged in third terminal is open state.
29. a kind of second terminal, which is characterized in that the second terminal includes memory, processor and is stored in the storage On device and the computer program that can run on the processor, realized such as when the computer program is executed by the processor The step of claim 10 to 13 any one of them image display method.
30. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes such as claim 10 to 13 any one of them image display method when the computer program is executed by processor The step of.
CN201810214768.7A 2018-03-15 2018-03-15 Picture display method and terminal Active CN108459788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810214768.7A CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810214768.7A CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Publications (2)

Publication Number Publication Date
CN108459788A true CN108459788A (en) 2018-08-28
CN108459788B CN108459788B (en) 2020-05-22

Family

ID=63236484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810214768.7A Active CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Country Status (1)

Country Link
CN (1) CN108459788B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005368A (en) * 2018-10-15 2018-12-14 Oppo广东移动通信有限公司 A kind of generation method of high dynamic range images, mobile terminal and storage medium
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN110209310A (en) * 2019-04-19 2019-09-06 维沃软件技术有限公司 A kind of image processing method and terminal device
CN110719269A (en) * 2019-09-25 2020-01-21 维沃移动通信有限公司 Data transmission method and mobile terminal
CN115577568A (en) * 2022-11-17 2023-01-06 中国汽车技术研究中心有限公司 Method, device and storage medium for determining operation authority of simulation model

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
US20160110564A1 (en) * 2014-10-16 2016-04-21 City University Of Hong Kong Holographic encryption of multi-dimensional images
CN105681616A (en) * 2015-12-31 2016-06-15 武汉帕菲利尔信息科技有限公司 Multiple-mobile terminal and terminal medical level image data transmission method
CN107423378A (en) * 2017-07-12 2017-12-01 北京小米移动软件有限公司 Image display method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
US20160110564A1 (en) * 2014-10-16 2016-04-21 City University Of Hong Kong Holographic encryption of multi-dimensional images
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
CN105681616A (en) * 2015-12-31 2016-06-15 武汉帕菲利尔信息科技有限公司 Multiple-mobile terminal and terminal medical level image data transmission method
CN107423378A (en) * 2017-07-12 2017-12-01 北京小米移动软件有限公司 Image display method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005368A (en) * 2018-10-15 2018-12-14 Oppo广东移动通信有限公司 A kind of generation method of high dynamic range images, mobile terminal and storage medium
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109886000B (en) * 2019-02-01 2024-03-01 维沃移动通信有限公司 Image encryption method and mobile terminal
CN110209310A (en) * 2019-04-19 2019-09-06 维沃软件技术有限公司 A kind of image processing method and terminal device
CN110719269A (en) * 2019-09-25 2020-01-21 维沃移动通信有限公司 Data transmission method and mobile terminal
CN110719269B (en) * 2019-09-25 2022-07-15 维沃移动通信有限公司 Data transmission method and mobile terminal
CN115577568A (en) * 2022-11-17 2023-01-06 中国汽车技术研究中心有限公司 Method, device and storage medium for determining operation authority of simulation model

Also Published As

Publication number Publication date
CN108459788B (en) 2020-05-22

Similar Documents

Publication Publication Date Title
CN108459788A (en) A kind of image display method and terminal
CN108038393A (en) A kind of application program method for secret protection, mobile terminal
CN109246360A (en) A kind of reminding method and mobile terminal
CN109241775A (en) A kind of method for secret protection and terminal
CN107845057A (en) One kind is taken pictures method for previewing and mobile terminal
CN108833709A (en) A kind of the starting method and mobile terminal of camera
CN108681664A (en) A kind of encryption method and device
CN109145571A (en) A kind of account login method, terminal and server
CN108280337A (en) A kind of message protection method and mobile terminal
CN109886000A (en) A kind of image encryption method and mobile terminal
CN109993010A (en) A kind of information display method and mobile terminal
CN109639569A (en) A kind of social communication method and terminal
CN109669611A (en) Fitting method and terminal
CN110457879A (en) Object displaying method and terminal device
CN109241832A (en) A kind of method and terminal device of face In vivo detection
CN108416203A (en) A kind of unlocking screen method and mobile terminal
CN109981904A (en) A kind of method for controlling volume and terminal device
CN109753202A (en) A kind of screenshotss method and mobile terminal
CN108984143A (en) A kind of display control method and terminal device
CN108616687A (en) A kind of photographic method, device and mobile terminal
CN110213438A (en) A kind of processing method and terminal device of application program
CN110321449A (en) A kind of image display method and terminal
CN108109188A (en) A kind of image processing method and mobile terminal
CN109800606A (en) A kind of display control method and mobile terminal
CN109672845A (en) A kind of method, apparatus and mobile terminal of video calling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant