CN108459788A - A kind of image display method and terminal - Google Patents
A kind of image display method and terminal Download PDFInfo
- Publication number
- CN108459788A CN108459788A CN201810214768.7A CN201810214768A CN108459788A CN 108459788 A CN108459788 A CN 108459788A CN 201810214768 A CN201810214768 A CN 201810214768A CN 108459788 A CN108459788 A CN 108459788A
- Authority
- CN
- China
- Prior art keywords
- image
- target
- terminal
- display
- target image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
An embodiment of the present invention provides a kind of image display method and terminals, wherein the image display method applied to first terminal includes:Obtain target image;Show that preset control, preset control are used to be arranged the cryptographic attributes of target image;Receive first input of the user to preset control, dispaly state of first input for adjusting preset control;The cryptographic attributes of target image are determined according to the target dispaly state of the corresponding preset control of the first input in response to the first input;Target image is sent to second terminal, target image carries cryptographic attributes.The embodiment of the present invention realizes user by the way that different permissions is arranged on an image, you can checks that the user of permission shares corresponding image to difference, simplifies difference and check that the user of permission shares the operating process of picture.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of image display method and terminals.
Background technology
Nowadays with the development of intelligent mobile terminal equipment, camera has become the most important component part of mobile phone, continues
The experience of taking pictures for promoting user becomes the important channel for promoting mobile phone brand value.
User is when using mobile phone photograph, the case where often meeting after taking pictures, send the pictures to other people.But
Sometimes user wishes that recipient can clearly view the content of photo, it is sometimes desirable to which recipient can view on photo
It is required that partial content, i.e. user check that the mode of photo has to the recipient of photo.The recipient point of permission is checked to difference
Image is enjoyed, user needs to edit the corresponding plurality of pictures of different rights, then is sent respectively to everyone, cumbersome and time-consuming.
Invention content
A kind of image display method of offer of the embodiment of the present invention and terminal check permission to solve the prior art to difference
User shares the cumbersome and time-consuming problem of operating process of picture.
In order to solve the above-mentioned technical problem, in a first aspect, the embodiment of the present invention provides a kind of image display method, it is applied to
First terminal, including:
Obtain target image;
Show that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First input of the user to the preset control is received, first input is for adjusting the aobvious of the preset control
Show state;
In response to first input, the target dispaly state for inputting the corresponding preset control according to described first,
Determine the cryptographic attributes of the target image;
The target image is sent to second terminal, the target image carries the cryptographic attributes.
Second aspect, the embodiment of the present invention provide a kind of image display method, are applied to second terminal, including:
Receive the target image that first terminal is sent;
Extract the cryptographic attributes in the target image;
According to the cryptographic attributes, the target image is shown.
The third aspect, the embodiment of the present invention provide a kind of terminal, including:
Acquisition module, for obtaining target image;
Display module, for showing preset first operation lines and the second operation lines;
First receiving module, the first input for receiving user, first input is for adjusting first operation
The dispaly state of line and the second operation lines;
First respond module, in response to first input, corresponding first behaviour to be inputted according to described first
The target dispaly state for making line and the second operation lines, determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the encryption and belongs to
Property.
The third aspect, the embodiment of the present invention provide a kind of first terminal, including:
Acquisition module, for obtaining target image;
Display module, for showing that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First receiving module, for receiving first input of the user to the preset control, first input is for adjusting
Save the dispaly state of the preset control;
First respond module, in response to first input, the corresponding default control to be inputted according to described first
The target dispaly state of part, determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the encryption and belongs to
Property.
Fourth aspect, the embodiment of the present invention provide a kind of first terminal, the first terminal include memory, processor and
It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing
The step of image display method applied to first terminal is realized when device executes.
5th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium
It is stored with computer program in matter, realizes that the picture applied to first terminal is shown when the computer program is executed by processor
The step of method.
6th aspect, the embodiment of the present invention provide a kind of second terminal, including:
Receiving module, the target image for receiving first terminal transmission;
Extraction module, for extracting the cryptographic attributes in the target image;
Display module, for according to the cryptographic attributes, showing the target image.
7th aspect, the embodiment of the present invention provide a kind of second terminal, the second terminal include memory, processor and
It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing
The step of image display method applied to second terminal is realized when device executes.
Eighth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium
It is stored with computer program in matter, realizes that the picture applied to second terminal is shown when the computer program is executed by processor
The step of method.
In embodiments of the present invention, by obtaining target image, and the cryptographic attributes for target image to be arranged are shown
Preset control, then in the first input for receiving the dispaly state for adjusting preset control, in response to the first input, root
According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined, will finally carry and add
The target image of close attribute is sent to second terminal so that user can check permission for different users, send target
Before image, by the dispaly state for adjusting preset control, you can target image is arranged different cryptographic attributes, so that
Different different terminals users, can be according to the different cryptographic attributes carried in target image to mesh when receiving target image
Logo image is shown, realizes user by the way that different permissions is arranged on an image, you can checks permission to difference
User shares corresponding image, simplifies difference and checks that the user of permission shares the operating process of picture.
Description of the drawings
Fig. 1 shows the step flow charts for the image display method for being applied to first terminal in the embodiment of the present invention;
Fig. 2 indicates to generate the step flow chart of target image in the embodiment of the present invention;
Fig. 3 indicates to choose the schematic diagram of target object in the embodiment of the present invention on the first image;
Fig. 4 indicates schematic diagram when the second input in the embodiment of the present invention on the first image includes default mark;
Fig. 5 indicates the schematic diagram that suspended window is superimposed on the first image in figure 3;
Fig. 6 indicates the schematic diagram that suspended window is superimposed on the first image in Fig. 4;
Schematic diagram when Fig. 7 indicates to choose third image from Fig. 3;
Fig. 8 shows schematic diagrames when the first image in Fig. 4 to be determined as to third image;
Fig. 9 indicates the step flow chart of the image display method applied to second terminal in the embodiment of the present invention;
Figure 10 indicates the module frame chart of first terminal in the embodiment of the present invention;
Figure 11 indicates the module frame chart of second terminal in the embodiment of the present invention;
Figure 12 indicates the structure diagram of terminal in the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
As shown in Figure 1, the step flow chart of the image display method to be applied to first terminal in the embodiment of the present invention,
This method includes:
Step 101:Obtain target image.
In this step, it specifically, when user needs an image being sent to second terminal, needs first to obtain target figure
Picture.Specifically, the target image is to receive image that photographing instruction is shot or pre-stored shot image.
Step 102:Show preset control.
In this step, it specifically, after obtaining target image, can be shown on interface where target image default
Control, wherein the preset control is used to be arranged the cryptographic attributes of target image.This realizes user can be according to different users
It checks permission, target image is arranged different cryptographic attributes, it is different by being arranged on an image to realize user
Cryptographic attributes so that corresponding authority user views the image of corresponding authority, simplifies and different checks that the user of permission shares
The operating process of picture.
Specifically, preset control can be preset first operation lines and the second operation lines, can also be that sliding is virtually pressed
Key or encryption selection option, do not limit the concrete form of preset control herein.
Step 103:Receive first input of the user to preset control.
In this step, specifically, the dispaly state of first input for adjusting preset control.Wherein, preset control
May include N kind dispaly states, and each dispaly state corresponds to a kind of cryptographic attributes, N is more than 1, so that can pass through behaviour
The dispaly state for making preset control, to realize the setting to the different cryptographic attributes of target image.
Certainly, dispaly state needs are determined according to the form that is particularly shown of preset control.Wherein, dispaly state can be with
At least one of in arrangement mode, shape, size and location including preset control.
For example, when preset control is preset first operation lines and the second operation lines, the first operation lines and the second operation
The combination of line may include three kinds of dispaly states, and each dispaly state corresponds to a kind of cryptographic attributes.At this time to preset control
First input is the rotation process to the first operation lines and the second operation lines.Wherein, when the first operation lines and the second operation lines
When dispaly state is intersection but out of plumb display, indicate that the cryptographic attributes of the target image are the first attribute;When the first operation lines
With the dispaly state of the second operation lines be parallel display when, indicate the target image cryptographic attributes be the second attribute;When first
When the dispaly state of operation lines and the second operation lines is vertically displayed, indicate that the cryptographic attributes of the target image are third attribute.
In this way, user can operate the display shape of first operation lines and the second operation lines by checking permission for different users
State, and then the cryptographic attributes of target image are set, so that receiving terminal can be docked in display target image according to user
Receiving end shows that the actual demand of image is shown.
For another example when preset control is sliding virtual key, sliding virtual key may include sliding virtual key position
On the left of sliding groove, sliding virtual key is located among sliding groove and sliding virtual key is located at three kinds of display shapes on the right side of sliding groove
State, and each dispaly state corresponds to a kind of cryptographic attributes.At this time to the first input of preset control for sliding virtual key
Slide.Certainly, the cryptographic attributes corresponding to each dispaly state can be configured according to demand, herein not specific limit
Fixed each dispaly state institute must corresponding cryptographic attributes.
For another example when preset control is encryption selection option, encryption selection option may include the first Encryption Options, the
Three display numbers of two Encryption Options and third Encryption Options, and a kind of each corresponding cryptographic attributes of display number, at this time to pre-
If the first input of control is the clicking operation to encryption selection option.In this way, user can be by looking into for different users
It sees permission, operates the dispaly state of preset control, and then the cryptographic attributes of target image are set, so that receiving terminal is being shown
When target image, the actual demand of image, which is shown, can be shown to receiving terminal according to user.
Step 104:It is determined according to the target dispaly state of the corresponding preset control of the first input in response to the first input
The cryptographic attributes of target image.
It in this step, can be in response to the first input, root specifically, first terminal is after receiving the first input
According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined.It enables a user in this way
It is enough that permission is checked according to the different user of receiving terminal, the target dispaly state of preset control is set, and then determines target image
Cryptographic attributes so that receiving terminal can show image according to actual demand of the end subscriber to image viewing permission is sent.
Step 105:Target image is sent to second terminal.
In this step, specifically, after determining the cryptographic attributes of target image, target image can be sent to
Two terminals, the wherein target image carry cryptographic attributes, so that second terminal can be according to the cryptographic attributes, display target figure
Picture.In this way, allowing users to show demand to the image of second terminal according to itself, the cryptographic attributes of target image are carried out
Setting, so that second terminal can be shown according to the cryptographic attributes of target image, realizes user and passes through at one
Different cryptographic attributes are set on image, you can check that the user of permission shares corresponding image to difference, simplify difference and look into
See that the user of permission shares the operating process of picture.
In this way, in embodiments of the present invention, by when obtaining target image, showing the encryption for target image to be arranged
The preset control of attribute, and first by responding the dispaly state for adjusting preset control that user inputs preset control
Input, determines the cryptographic attributes of target image, the target image for carrying cryptographic attributes is finally sent to second terminal so that uses
Family can check permission for different users, before sending target image, by adjusting the dispaly state of preset control, i.e.,
Different cryptographic attributes target image can be arranged, so that different different terminals user is when receiving target image, energy
It is enough that target image is shown according to the different cryptographic attributes carried in target image, user is realized by scheming at one
As the different permission of upper setting, you can check that the user of permission shares corresponding image to difference, simplify difference and check permission
User share the operating process of picture.
Further, further include following steps as shown in Fig. 2, the embodiment of the present invention is before obtaining target image:
Step 201:Receive the second input of user on the first image.
In this step, specifically, the first image can be the preview image shown in shooting preview interface or advance
The shooting image of storage.Such as shown in figure 3, the first image 31 can be the preview image shown in shooting preview interface.
Wherein, when receiving the second input of user on the first image, user can be received and inputted on the first image
Different second inputs.It is explained below.
First, when receiving the second input of user on the first image, user can be received and chosen on the first image
Second input of target object.Specifically, the second input includes that user inputs for target object on the first image at this time
Profile traces or user are directed to the preset pattern track of target object input on the first image, and wherein target object is located at pre-
If in graphics track.In this way, choosing the second input of target object on the first image by receiving user, user's root is realized
Target object is directly chosen on the first image according to display demand, and easy user chooses the operating process of target object.
It, can be with when user 3 wants using the middle section image in Fig. 3 as when target object for example, with continued reference to Fig. 3
For target object input five-pointed star graphics track 32, the wherein image in the five-pointed star graphics track 32 is target object 33.
It allows users in this way according to self-demand, directly chooses target object on the first image, easy user chooses target
The operating process of object.
Second, when receiving the second input of user on the first image, the operation trace of second input includes default
Mark.Wherein, which is used to indicate startup and presets the corresponding target camera of mark with this.At this time second input include
To the clicking operation of default mark.Specifically, default be identified as bends arrow figure or U-shaped figure, and the pre- bidding
Knowledge may be embodied in a preset pattern track.Certainly do not limit the default mark specifically herein is particularly shown form.Example
Such as, as shown in figure 4, user 4 can first input five-pointed star graphics track 42 on the first image 41, then in five-pointed star figure rail
Input bending arrow figure 43 in mark 42.
Step 202:It is inputted in response to second, on the first image Overlapping display suspended window, the second figure is shown in suspended window
Picture.
It in this step, can be in response to specifically, when detecting the second input that user inputs on the first image
Second input, is superimposed suspended window, wherein the second image is shown in the suspended window on the first image.In this way so that the first figure
On picture can the second image of Overlapping display, be highlighted the second image, user facilitated to check the second figure shown in suspended window
Picture.
Wherein, when being inputted in response to second, it can be directed to the second different inputs, make different responses.It is right at this
This is illustrated.
First, when reception user chooses the second input of target object on the first image, inputted in response to second,
Overlapping display suspended window on the first image, in the step of showing the second image in suspended window, can in response to the second input,
Overlapping display suspended window on first image, in suspended window display include the second image of target object.In such manner, it is possible to so that outstanding
The second image shown in floating window includes the target object of user's selection, realize on the first image Overlapping display user from the
The target object selected on one image is highlighted the target object of user's selection.
Specifically, suspended window may include frame region image, wherein frame region image may include terminal frame and
The image that the control regions image in the display screen of the first image in addition to the first image is formed is shown, and the second image is aobvious
Show in the indication range of the frame region image.For example, as shown in figure 5, for Overlapping display on the first image 31 in figure 3
The schematic diagram of suspended window 51.Wherein, the second image 52 for including the target object 33 in Fig. 3 is shown in the suspended window 51.Certainly,
The suspended window further includes frame region image 53, which may include terminal frame and show the first image
Display screen in the image that is formed of control regions image in addition to the first image.This to show after the second input of response
In the image shown, the first image of Overlapping display and the suspended window of target object can be shown, be highlighted user's selection
Target object facilitates and receives the target object that end subscriber views user's meaning.
Second, when the operation trace of the second input includes default mark, inputted in response to second, on the first image
Overlapping display suspended window can on the first image be folded in the step of showing the second image in suspended window in response to the second input
Add display suspended window, the second image of the corresponding target camera acquisition of default mark is shown in suspended window.Specifically, when first
When image is the preview image shown in shooting preview interface, if the first image is the preview graph that the first camera acquires in real time
Picture, then the target camera for being used to acquire the second image are second camera;Wherein, when the first camera is front camera
When, second camera is rear camera, and when the first camera is rear camera, second camera is front camera.
In this way, can so that the second image shown in suspended window is the second figure of the corresponding target camera acquisition of default mark
Picture, that is, enable in response to image the first image of Overlapping display and the acquisition of target camera simultaneously of the second input display the
Two images increase the display content of display image, realize and integrate the figure that multiple cameras are acquired on same pictures
Picture.
Specifically, suspended window may include frame region image, wherein frame region image includes terminal frame and display
The image being made of the control regions image in the display screen of the first image in addition to the first image.In addition, the second image is aobvious
Show in the indication range of the frame region image.For example, as shown in fig. 6, for Overlapping display on the first image 41 in Fig. 4
The schematic diagram of suspended window 61.Wherein, display includes that the corresponding target camera acquisition of mark is preset in Fig. 4 in the suspended window 61
The second image 62.Certainly, which further includes frame region image 63, which may include terminal edge
The image that control regions image in frame and the display screen for showing the first image in addition to the first image is formed.This makes
After the second input of response in shown image, the first image of Overlapping display and the second of the acquisition of target camera can be shown
Image, this to show multiple camera the image collected in a pictures, and mesh is highlighted in suspended window
Camera the image collected is marked, reception end subscriber is facilitated and target camera institute the image collected is checked.
Step 203:Based on the first image and the second image, third image is determined.
It in this step, can be based on the first figure of display specifically, after showing the first image and the second image
Picture and the second image, determine third image.
It wherein,, can be according to shown in suspended window when determining third image based on the first image and the second image
The picture material of two images, to determine third image.This is specifically described at this.
First, when second image of the display comprising target image in suspended window, based on the first image and the second image,
May include at least one of following in the step of determining third image:
1) topography that pre-set image feature is met in the target area of the first image, is determined as third image, mesh
It is all image-regions in the first image in addition to target object region to mark region.Specifically, pre-set image feature packet
It includes image color value and is more than preset value, meet default textural characteristics and meet at least one in pre-set color feature, exist certainly
This does not limit the particular content of pre-set image feature specifically.In this way, by the image-region in addition to target object region
The middle topography for meeting pre-set image feature is determined as third image so that and third image can be different from the second image, from
And make when needing that the second image is encrypted, it can be encrypted by the second image of third image pair, and third figure
The selection of picture disclosure satisfy that display demand of the most users to image.
For example, as shown in fig. 7, third image 71 is that the satisfaction that first terminal is selected from the first image 31 in Fig. 3 is pre-
If the topography of characteristics of image realizes the differentiation of third image and the second image.Specifically, the third image 71 is covered in
On the first image and the second image 52 in Fig. 5.Certainly, which can also be covered in the second image 52 in Fig. 5
On, this is not limited specifically herein.
2) topography that user chooses in the target area of the first image, is determined as third image, target area
For all image-regions in the first image in addition to target object region.In this way, by by user in the first image
The topography chosen in image-region in addition to target object region is determined as third image so that user being capable of root
Third image is selected from the first image according to self-demand, while distinguishing the first image and the second image, is improved
Satisfaction of the user to third image.
3) image input by user is determined as third image.Specifically, image input by user can be user from the
The image called in memory space in one terminal.In this way, by the way that image input by user is determined as third image so that use
Family can increase the range of choice of third image according to self-demand input picture, and improve user to third image
Satisfaction.
Second, when showing the second image of the corresponding target camera acquisition of default mark in suspended window, based on the
First image can be determined as third image by one image and the second image in the step of determining third image.In this way, passing through
First image is determined as third image so that third image can be different from the second image, so that needing to second
When image is encrypted, it can be encrypted by the second image of third image pair.
For example, as shown in figure 8, can the first image 41 in Fig. 4 be directly determined as third image 81.Specifically, should
Third image 81 is covered on the second image 62 in Fig. 6.Certainly, which can also be covered in entire in Fig. 6
On display interface, this is not limited specifically herein.
Step 204:Based on the second image, the 4th image is determined.
In this step, specifically, based on the second image, when determining four images, the second image can be determined as
4th image;Alternatively, the composograph generated in the state of the second image of Overlapping display on the first image is determined as the 4th
Image.
In this way, passing through the synthesis that will be generated in the state of the second image of Overlapping display on the second image or the first image
Image is determined as the 4th image so that when needing that the 4th image is encrypted, can increase the image selection of the 4th image
Range.
Step 205:By third image and the 4th image associated storage, target image is generated.
It in this step, can be by third image and the 4th image specifically, when determining third image and four images
Associated storage generates target image.This so that target image includes the third image and the 4th image for belonging to different levels, from
And, when the cryptographic attributes of target image are arranged, the dispaly state of third image and the 4th image can be arranged, realize
The different display images in target image can be viewed according to permission is checked by receiving end subscriber.
Wherein, under different cryptographic attributes, the second terminal image shown in display target image is different,
It is explained herein.
First, in the case where cryptographic attributes are the first attribute, the display properties of third image is display, the 4th image
Display properties is hiding and readable, hides and the 4th image of readable instruction is received in second terminal and pre-stored permission is believed
It is shown in the case of the matched verification information of manner of breathing, and after preset duration, delete target image.Specifically, authority information packet
Finger print information or preset password are included, does not limit the particular content of authority information specifically herein.
In this way, by setting the cryptographic attributes of target image to the first attribute so that receive end subscriber and only inputting
Verification information and second terminal pre-stored authority information when matching, the 4th image can be viewed, and inputting
Verification information and second terminal pre-stored authority information when mismatching, third image can only be viewed, improve target
The safety of 4th image in image;In addition, after preset duration, delete target image further improves in target image
The safety of 4th image.
Second, in the case where cryptographic attributes are the second attribute, the display properties of third image is display, the 4th image
Display properties is hiding and unreadable;It hides and the 4th image of unreadable instruction is invisible to second terminal, and in preset duration
Afterwards, delete target image.
In this way, by setting the cryptographic attributes of target image to the second attribute so that receiving end subscriber can only view
Third image, and the 4th image cannot be viewed, improve the safety of the 4th image;In addition the delete target after preset duration
Image further improves the safety of the 4th image.
Third, in the case where cryptographic attributes are third attribute, the display properties of third image be it is hiding, the 4th image
Display properties is display, and the permission of the cryptographic attributes of second terminal setting target image is open state.Specifically, encryption belongs to
Property be third attribute when, the dispaly state of the first operation lines and the second operation lines can be vertically displayed.
In this way, by setting the cryptographic attributes of target image to third attribute so that receiving end subscriber can directly look into
See the 4th image, and the cryptographic attributes of target image can be configured, realizes and receive end subscriber to target image
It checks, store and forwards.
It should be noted that the cryptographic attributes of target image according to be arranged in order from high to low for:Second attribute,
One attribute and third attribute.At this point, user to difference check permission users send target image when, can according to from height to
Low checks permission, and the cryptographic attributes that target image is arranged are followed successively by the second attribute, the first attribute and third attribute, realize by
Permission is checked according to different users, and the cryptographic attributes of same picture are arranged.
In this way, the present embodiment is by when obtaining target image, showing the pre- of the cryptographic attributes for target image to be arranged
If control, and the first input by responding the dispaly state for adjusting preset control that user inputs preset control, really
Set the goal the cryptographic attributes of image, the target image for carrying cryptographic attributes is finally sent to second terminal so that user can
Permission is checked for different users, before sending target image, by the dispaly state for adjusting preset control, you can to mesh
Different cryptographic attributes are arranged in logo image, so that different different terminals user is when receiving target image, it being capable of basis
The different cryptographic attributes carried in target image show target image, realize user by being set on an image
Set different permissions, you can the user of permission, which shares corresponding image, to be checked to difference, simplifies the different users for checking permission
Share the operating process of picture.
As shown in figure 9, the flow chart of the image display method to be applied to second terminal in the embodiment of the present invention, the party
Method includes:
Step 901:Receive the target image that first terminal is sent.
In this step, specifically, second terminal receives the target image that first terminal is sent.Wherein, the target image
In carry the cryptographic attributes of the target image.
Wherein, target image includes the third image and the 4th image of associated storage, wherein in first terminal, receives and uses
Family on the first image second input when, in response to second input, Overlapping display shows the second image on the first image
Suspended window, be then based on the first image and the second image, determine third image, and be based on the second image, determine the 4th image.
Specifically, can be true by the composograph generated in the state of the second image of Overlapping display on the second image or the first image
It is set to the 4th image.In addition, the first image can be the preview image shown in first terminal shooting preview interface or advance
The shooting image of storage.Second image can be the target object chosen from the first image, can also be target camera
Second image of acquisition.This enables target image to include the picture materials of many levels, so that first terminal can
It is encrypted according to the dispaly state of third image and the 4th image, realizing reception end subscriber can check according to cryptographic attributes
To the different display images in target image.
Step 902:Extract the cryptographic attributes in target image.
In this step, specifically, after receiving target image, the cryptographic attributes of the target image can be extracted.
Wherein, the cryptographic attributes of target image include the first attribute, the second attribute and third attribute.
Specifically, in the case where cryptographic attributes are the first attribute, the display properties of third image is display, the 4th image
Display properties be hide and it is readable, hide and the 4th image of readable instruction received and pre-stored permission in second terminal
It is shown in the case of the verification information of information match, and after preset duration, delete target image;It is second in cryptographic attributes
In the case of attribute, the display properties of third image is display, and the display properties of the 4th image is hiding and unreadable;Hide and
The 4th image of unreadable instruction is invisible to second terminal, and after preset duration, delete target image;It is the in cryptographic attributes
In the case of three attributes, the display properties of third image is hiding, and the display properties of the 4th image is display, and second terminal is set
The permission for setting the cryptographic attributes of target image is open state.
In this way, the cryptographic attributes by extracting target image so that second terminal can be according to the encryption of the target image
Attribute shows target image.
Step 903:According to cryptographic attributes, display target image.
In this step, it specifically, after extracting the cryptographic attributes of target image, can be shown according to cryptographic attributes
Show target image.
Wherein, when the cryptographic attributes extracted are the first attribute, according to cryptographic attributes, the step of display target image
In, it can be with the third image in display target image, and the display properties of the 4th image in target image is hiding and readable;
In the case where receiving the verification information to match with pre-stored authority information, the 4th image is shown;In preset duration
Afterwards, delete target image.This makes second terminal only in the verification information received and pre-stored authority information phase
Timing can view the 4th image, and when the verification information received is mismatched with pre-stored authority information, only
Third image can be viewed, the safety of the 4th image in target image is improved;In addition, after preset duration, delete target
Image further improves the safety of the 4th image in target image.
When the cryptographic attributes extracted are the second attribute, according to cryptographic attributes, the step of display target image in, can
The display properties of the 4th image with the third image in display target image, and in target image is hiding and unreadable;
After preset duration, delete target image.This makes second terminal that can only view third image, and cannot view the 4th figure
Picture improves the safety of the 4th image;In addition the delete target image after preset duration further improves the 4th image
Safety.
When the cryptographic attributes extracted are third attribute, according to cryptographic attributes, the step of display target image in, can
The display properties of third image with the 4th image in display target image, and in target image is hiding;Wherein, second eventually
The permission of the cryptographic attributes of end setting target image is open state, the setting model of the cryptographic attributes of the target image of second terminal
It encloses including the first attribute, the second attribute and third attribute.
Specifically, for the first attribute, the display properties of third image is display, and the display properties of the 4th image is hiding
And it is readable, it hides and the 4th image of readable instruction receives the verification to match with pre-stored authority information in third terminal
It is shown in the case of information, and after preset duration, delete target image, third terminal is the target for receiving second terminal and sending
The terminal of image;
For the second attribute, the display properties of third image is display, and the display properties of the 4th image is hiding and can not
It reads;It hides and the 4th image of unreadable instruction is invisible to third terminal, and after preset duration, delete target image;
For third attribute, the display properties of third image is hiding, and the display properties of the 4th image is shows, and third
The permission that the cryptographic attributes of target image are arranged in terminal is open state.
Specifically, second terminal when the cryptographic attributes to target image are configured, can receive user to target figure
First input of the preset control as shown in upper, the wherein dispaly state of first input for adjusting preset control, and respond
The cryptographic attributes of target image are determined according to the target dispaly state of the corresponding preset control of the first input in first input.
In this way, when the cryptographic attributes that second terminal is extracted are third attribute so that second terminal can be directly viewable
To the 4th image, and the cryptographic attributes of target image can be configured, realize second terminal to the checking of target image,
Storage and forwarding.
In this way, the target image that the embodiment of the present invention is sent by receiving first terminal, is then extracted in target image
Cryptographic attributes, and according to cryptographic attributes, display target image so that second terminal can be arranged according to user on first terminal
Target image cryptographic attributes, perform image display, realizing receiving terminal can be according to sending end subscriber to the reality of picture
Display demand shows the picture received.
As shown in Figure 10, the embodiment of the present invention provides a kind of first terminal, including:
Acquisition module 1001, for obtaining target image;
Display module 1002, for showing that preset control, the preset control are used to be arranged the encryption of the target image
Attribute;
First receiving module 1003, for receiving first input of the user to the preset control, first input is used
In the dispaly state for adjusting the preset control;
First respond module 1004, in response to first input, being inputted according to described first corresponding described pre-
If the target dispaly state of control, determines the cryptographic attributes of the target image;
Sending module 1005, for the target image to be sent to second terminal, the target image carries described add
Close attribute.
First terminal provided in an embodiment of the present invention obtains target image by acquisition module, and is shown by display module
Preset control is received the first input of user by the first receiving module, and is inputted in response to first by the first respond module,
According to the target dispaly state of the corresponding preset control of the first input, the cryptographic attributes of target image are determined, finally by transmission
Target image is sent to second terminal by module, and target image carries cryptographic attributes so that user can be directed to different users
Permission is checked, before sending target image, by the dispaly state for adjusting preset control, you can target image is arranged different
Cryptographic attributes so that different different terminals user can carry when receiving target image according in target image
Different cryptographic attributes target image is shown, realize user by the way that different permissions is arranged on an image,
It can check that the user of permission shares corresponding image to difference, simplify difference and check that the user of permission shares the operation of picture
Process.
Optionally, the first terminal further includes:
Second receiving module, for receiving the second input of user on the first image;
Second respond module, for being inputted in response to described second, the Overlapping display suspended window in described first image, institute
It states and shows the second image in suspended window;
First determining module determines third image for being based on described first image and the second image;
Second determining module determines the 4th image for being based on second image;
Generation module, for by the third image and the 4th image associated storage, generating target image.
Optionally, second determining module includes:
First determination unit, for second image to be determined as the 4th image;
Alternatively, the second determination unit, is used for institute in the state of the second image described in Overlapping display in described first image
The composograph of generation is determined as the 4th image.
Optionally, in the case where the cryptographic attributes are the first attribute, the display properties of the third image is display,
The display properties of 4th image is hiding and readable, and described hiding and readable instruction the 4th image connects in second terminal
It is shown in the case of receiving the verification information to match with pre-stored authority information, and after preset duration, described in deletion
Target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, described the
The display properties of four images is hiding and unreadable;Described hiding and unreadable instruction the 4th image can not to second terminal
See, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are third attribute, the display properties of the third image be it is hiding, described the
The display properties of four images is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
Optionally, described first image is the preview image that shows or pre-stored to have been shot in shooting preview interface
Image.
Optionally, second receiving module is used for, and is received user and is chosen the second defeated of target object on the first image
Enter;
Second respond module is used for, and in response to second input, Overlapping display suspends in described first image
Window, in the suspended window display include the second image of the target object.
Optionally, first determining module be used for execute it is following at least one of:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, institute
It is all image-regions in described first image in addition to the target object region to state target area;
The topography that user chooses in the target area of described first image is determined as third image, the target
Region is all image-regions in addition to the target object region in described first image;
Image input by user is determined as third image.
Optionally, the operation trace of second input includes default mark;
Second respond module is used for, and in response to second input, Overlapping display suspends in described first image
Window shows the second image of the corresponding target camera acquisition of the default mark in the suspended window.
Optionally, first determining module is used for, and described first image is determined as third image.
First terminal provided in an embodiment of the present invention, by when obtaining target image, showing for target image to be arranged
Cryptographic attributes preset control, and be used to adjust the dispaly state of preset control to what preset control input by responding user
First input, determine the cryptographic attributes of target image, the target image for carrying cryptographic attributes be finally sent to second terminal,
It allows users to check permission for different users, before sending target image, by the display for adjusting preset control
State, you can target image is arranged different cryptographic attributes, so that different different terminals users are receiving target figure
When picture, target image can be shown according to the different cryptographic attributes carried in target image, realize user and pass through
Different permissions is set on an image, you can the user of permission, which shares corresponding image, to be checked to difference, simplifies difference
Check that the user of permission shares the operating process of picture.
As shown in figure 11, a kind of second terminal is provided in the embodiment of the present invention, which includes:
Receiving module 1101, the target image for receiving first terminal transmission;
Extraction module 1102, for extracting the cryptographic attributes in the target image;
Display module 1103, for according to the cryptographic attributes, showing the target image.
Second terminal provided in an embodiment of the present invention receives the target image that first terminal is sent by receiving module, passes through
Extraction module extracts the cryptographic attributes in target image, by display module according to cryptographic attributes, display target image so that the
Two terminals can be performed image display according to the cryptographic attributes for the target image that user is arranged on first terminal, realize and connect
Receiving end can show the picture received according to end subscriber is sent to the actual displayed demand of picture.
Optionally, the cryptographic attributes are the first attribute;
The display module is used for, and shows the third image in the target image, and the in the target image the 4th
The display properties of image is hiding and readable;The case where receiving the verification information to match with pre-stored authority information
Under, show the 4th image;After preset duration, the target image is deleted.
Optionally, the cryptographic attributes are the second attribute;
The display module is used for, and shows the third image in the target image, and the in the target image the 4th
The display properties of image is hiding and unreadable;After preset duration, the target image is deleted.
Optionally, the cryptographic attributes are third attribute;
The display module is used for, and shows the 4th image in the target image, and the third in the target image
The display properties of image is hiding;
Wherein, the second terminal be arranged the cryptographic attributes of the target image permission be open state, described second
The setting range of the cryptographic attributes of the target image of terminal includes the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, the display properties of the 4th image
To be hiding and readable, described hiding and readable instruction the 4th image is received in third terminal and pre-stored permission is believed
It is shown in the case of the matched verification information of manner of breathing, and after preset duration, delete the target image, the third terminal is
Receive the terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, the display properties of the 4th image
It is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and in preset duration
Afterwards, the target image is deleted;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is aobvious
Show, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in third terminal.
The target image that second terminal provided in an embodiment of the present invention is sent by receiving first terminal, then extracts target
Cryptographic attributes in image, and according to cryptographic attributes, display target image so that second terminal can be whole first according to user
The cryptographic attributes for the target image being arranged on end, perform image display, and realize the reality that receiving terminal can be according to user to picture
Border shows demand, is shown to the picture received.
In addition, a kind of hardware architecture diagram of Figure 12 terminals of each embodiment to realize the present invention.The terminal 1200
Can be above-mentioned first terminal or second terminal, which includes but not limited to:Radio frequency unit 1201, network module
1202, audio output unit 1203, input unit 1204, sensor 1205, display unit 1206, user input unit 1207,
The components such as interface unit 1208, memory 1209, processor 1210 and power supply 1211.It will be understood by those skilled in the art that
The restriction of the not structure paired terminal of terminal structure shown in Figure 12, terminal may include than illustrating more or fewer components,
Either combine certain components or different components arrangement.In embodiments of the present invention, terminal includes but not limited to mobile phone, puts down
Plate computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, in the case where terminal 1200 is first terminal, processor 1210 is used for, and obtains target image;Display is pre-
If control, the preset control is used to be arranged the cryptographic attributes of the target image;User is received to the of the preset control
One input, dispaly state of first input for adjusting the preset control;In response to first input, according to described
The target dispaly state of the corresponding preset control of first input, determines the cryptographic attributes of the target image;By the mesh
Logo image is sent to second terminal, and the target image carries the cryptographic attributes.
First terminal provided in this embodiment is by when obtaining target image, showing the encryption for target image to be arranged
The preset control of attribute, and first by responding the dispaly state for adjusting preset control that user inputs preset control
Input, determines the cryptographic attributes of target image, the target image for carrying cryptographic attributes is finally sent to second terminal so that uses
Family can check permission for different users, before sending target image, by adjusting the dispaly state of preset control, i.e.,
Different cryptographic attributes target image can be arranged, so that different different terminals user is when receiving target image, energy
It is enough that target image is shown according to the different cryptographic attributes carried in target image, user is realized by scheming at one
As the different permission of upper setting, you can check that the user of permission shares corresponding image to difference, simplify difference and check permission
User share the operating process of picture.
Wherein, in the case where terminal 1200 is second terminal, processor 1210 is used for, and receives the mesh that first terminal is sent
Logo image;Extract the cryptographic attributes in the target image;According to the cryptographic attributes, the target image is shown.
The target image that second terminal provided in an embodiment of the present invention is sent by receiving first terminal, then extracts target
Cryptographic attributes in image, and according to cryptographic attributes, display target image so that second terminal can be whole first according to user
The cryptographic attributes for the target image being arranged on end, perform image display, and realize the reality that receiving terminal can be according to user to picture
Border shows demand, is shown to the picture received.
It should be understood that the embodiment of the present invention in, radio frequency unit 1201 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 1210 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 1201 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1201 can also by radio communication system and network and other
Equipment communicates.
Terminal has provided wireless broadband internet to the user by network module 1202 and has accessed, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 1203 can receive radio frequency unit 1201 or network module 1202 or in memory
The audio data stored in 1209 is converted into audio signal and exports to be sound.Moreover, audio output unit 1203 can be with
The relevant audio output of specific function executed with terminal 1200 is provided (for example, call signal receives sound, message sink sound
Etc.).Audio output unit 1203 includes loud speaker, buzzer and receiver etc..
Input unit 1204 is for receiving audio or video signal.Input unit 1204 may include graphics processor
(Graphics Processing Unit, GPU) 12041 and microphone 12042, graphics processor 12041 in video to capturing
In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into
Row processing.Treated, and picture frame may be displayed on display unit 1206.Through treated the picture frame of graphics processor 12041
It can be stored in memory 1209 (or other storage mediums) or be carried out via radio frequency unit 1201 or network module 1202
It sends.Microphone 12042 can receive sound, and can be audio data by such acoustic processing.Audio that treated
Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1201 in the case of telephone calling model
Formula exports.
Terminal 1200 further includes at least one sensor 1205, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
The light and shade of line adjusts the brightness of display panel 12061, and proximity sensor can close display when terminal 1200 is moved in one's ear
Panel 12061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three
Axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify terminal posture (such as horizontal/vertical screen
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1205
Can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature
Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1206 is for showing information input by user or being supplied to the information of user.Display unit 1206 can
Including display panel 12061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used
Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 12061.
User input unit 1207 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 1207 include touch panel 12071 and its
His input equipment 12072.Touch panel 12071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 12071 or in touch panel
Operation near 12071).Touch panel 12071 may include both touch detecting apparatus and touch controller.Wherein, it touches
The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller;
Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1210,
It receives the order that processor 1210 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface
The multiple types such as sound wave realize touch panel 12071.In addition to touch panel 12071, user input unit 1207 can also include
Other input equipments 12072.Specifically, other input equipments 12072 can include but is not limited to physical keyboard, function key (ratio
Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 12071 can be covered on display panel 12061, when touch panel 12071 detects
After touch operation on or near it, processor 1210 is sent to determine the type of touch event, is followed by subsequent processing device 1210
Corresponding visual output is provided on display panel 12061 according to the type of touch event.Although in fig. 12, touch panel
12071 be to realize the function that outputs and inputs of terminal as two independent components with display panel 12061, but certain
In embodiment, can touch panel 12071 and display panel 12061 be integrated and be realized the function that outputs and inputs of terminal, tool
Body does not limit herein.
Interface unit 1208 is the interface that external device (ED) is connect with terminal 1200.For example, external device (ED) may include wired
Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 1208 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal 1200 or it can be used in terminal 1200 and external fill
Transmission data between setting.
Memory 1209 can be used for storing software program and various data.Memory 1209 can include mainly storage program
Area and storage data field, wherein storing program area can storage program area, needed at least one function application program (such as
Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone
Such as audio data, phone directory) etc..In addition, memory 1209 may include high-speed random access memory, can also include non-
Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1210 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection,
By running or execute the software program and/or module that are stored in memory 1209, and calls and be stored in memory 1209
Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1210 may include
One or more processing units;Preferably, processor 1210 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 1210.
Terminal 1200 can also include the power supply 1211 (such as battery) powered to all parts, it is preferred that power supply 1211
Can be logically contiguous by power-supply management system and processor 1210, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal 1200 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1210, and memory 1209 is stored in
On reservoir 1209 and the computer program that can be run on the processor 1210, the computer program are executed by processor 1210
Shi Shixian is applied to each process of the image display method embodiment of first terminal and second terminal, and can reach identical
Technique effect, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes the picture display side applied to first terminal and second terminal when the computer program is executed by processor
Each process of method embodiment, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, described
Computer readable storage medium, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory
(Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (30)
1. a kind of image display method is applied to first terminal, which is characterized in that including:
Obtain target image;
Show that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
Receive first input of the user to the preset control, display shape of first input for adjusting the preset control
State;
In response to first input, the target dispaly state for inputting the corresponding preset control according to described first determines
The cryptographic attributes of the target image;
The target image is sent to second terminal, the target image carries the cryptographic attributes.
2. according to the method described in claim 1, it is characterized in that, before the acquisition target image, further include:
Receive the second input of user on the first image;
It is inputted in response to described second, the Overlapping display suspended window in described first image, the second figure is shown in the suspended window
Picture;
Based on described first image and the second image, third image is determined;
Based on second image, the 4th image is determined;
By the third image and the 4th image associated storage, target image is generated.
3. according to the method described in claim 2, it is characterized in that, it is described be based on second image, determine the 4th image, wrap
It includes:
Second image is determined as the 4th image;
Alternatively, the composograph generated in the state of the second image described in Overlapping display in described first image is determined as
Four images.
4. according to the method described in claim 2, it is characterized in that,
In the case where the cryptographic attributes are the first attribute, the display properties of the third image is display, the 4th figure
The display properties of picture is to hide and readable, it is described hide and readable instruction the 4th image second terminal receive in advance
It is shown in the case of the verification information that the authority information of storage matches, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, the 4th figure
The display properties of picture is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to second terminal,
And after preset duration, the target image is deleted;
In the case where the cryptographic attributes are third attribute, the display properties of the third image is hiding, the 4th figure
The display properties of picture is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
5. according to the method described in claim 2, it is characterized in that, described first image is pre- to be shown in shooting preview interface
Look at image or the pre-stored image shot.
6. according to the method described in claim 2, it is characterized in that, it is described receive user on the first image second input,
Including:
Receive the second input that user chooses target object on the first image;
It is described in response to second input, the Overlapping display suspended window in described first image shows the in the suspended window
Two images, including:
It is inputted in response to described second, the Overlapping display suspended window in described first image, display includes institute in the suspended window
State the second image of target object.
7. according to the method described in claim 6, it is characterized in that, described be based on described first image and the second image, determination
Third image, including it is at least one of following:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, the mesh
It is all image-regions in described first image in addition to the target object region to mark region;
The topography that user chooses in the target area of described first image is determined as third image, the target area
For all image-regions in described first image in addition to the target object region;
Image input by user is determined as third image.
8. according to the method described in claim 2, it is characterized in that, the operation trace of second input includes default mark;
It is described in response to second input, the Overlapping display suspended window in described first image shows the in the suspended window
Two images, including:
It inputs, the Overlapping display suspended window in described first image, is shown in the suspended window described pre- in response to described second
Bidding knows the second image of corresponding target camera acquisition.
9. according to the method described in claim 8, it is characterized in that, described be based on described first image and the second image, determination
Third image, including:
Described first image is determined as third image.
10. a kind of image display method is applied to second terminal, which is characterized in that including:
Receive the target image that first terminal is sent;
Extract the cryptographic attributes in the target image;
According to the cryptographic attributes, the target image is shown.
11. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are the first attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the third image in the target image, and the display properties of the 4th image in the target image be hide and
It is readable;
In the case where receiving the verification information to match with pre-stored authority information, the 4th image is shown;
After preset duration, the target image is deleted.
12. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are the second attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the third image in the target image, and the display properties of the 4th image in the target image be hide and
It is unreadable;
After preset duration, the target image is deleted.
13. according to the method described in claim 10, it is characterized in that, the cryptographic attributes are third attribute;
It is described to show the target image according to the cryptographic attributes, including:
Show the 4th image in the target image, and the display properties of the third image in the target image is hiding;
Wherein, the permission that the cryptographic attributes of the target image are arranged in the second terminal is open state, the second terminal
The target image cryptographic attributes setting range include the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden
It hides and readable, described hiding and readable instruction the 4th image receives and pre-stored authority information phase in third terminal
It is shown in the case of matched verification information, and after preset duration, delete the target image, the third terminal is to receive
The terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden
It hides and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and after preset duration, deletes
Except the target image;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is display, and
The permission that the cryptographic attributes of the target image are arranged in third terminal is open state.
14. a kind of first terminal, which is characterized in that including:
Acquisition module, for obtaining target image;
Display module, for showing that preset control, the preset control are used to be arranged the cryptographic attributes of the target image;
First receiving module, for receiving first input of the user to the preset control, first input is for adjusting
State the dispaly state of preset control;
First respond module, in response to first input, the corresponding preset control to be inputted according to described first
Target dispaly state determines the cryptographic attributes of the target image;
Sending module, for the target image to be sent to second terminal, the target image carries the cryptographic attributes.
15. first terminal according to claim 14, which is characterized in that the terminal further includes:
Second receiving module, for receiving the second input of user on the first image;
Second respond module, in response to second input, the Overlapping display suspended window in described first image to be described outstanding
The second image is shown in floating window;
First determining module determines third image for being based on described first image and the second image;
Second determining module determines the 4th image for being based on second image;
Generation module, for by the third image and the 4th image associated storage, generating target image.
16. first terminal according to claim 15, which is characterized in that second determining module includes:
First determination unit, for second image to be determined as the 4th image;
Alternatively, the second determination unit, for will be generated in the state of the second image described in Overlapping display in described first image
Composograph be determined as the 4th image.
17. first terminal according to claim 15, which is characterized in that
In the case where the cryptographic attributes are the first attribute, the display properties of the third image is display, the 4th figure
The display properties of picture is to hide and readable, it is described hide and readable instruction the 4th image second terminal receive in advance
It is shown in the case of the verification information that the authority information of storage matches, and after preset duration, deletes the target image;
In the case where the cryptographic attributes are the second attribute, the display properties of the third image is display, the 4th figure
The display properties of picture is hiding and unreadable;Described hiding and unreadable instruction the 4th image is invisible to second terminal,
And after preset duration, the target image is deleted;
In the case where the cryptographic attributes are third attribute, the display properties of the third image is hiding, the 4th figure
The display properties of picture is display, and it is open state that the permission of the cryptographic attributes of the target image, which is arranged, in second terminal.
18. first terminal according to claim 15, which is characterized in that described first image is to be shown in shooting preview interface
The preview image or the pre-stored image shot shown.
19. first terminal according to claim 15, which is characterized in that second receiving module is used for, and receives user
The second input of target object is chosen on the first image;
Second respond module is used for, in response to second input, the Overlapping display suspended window in described first image, and institute
State the second image that display includes the target object in suspended window.
20. first terminal according to claim 19, which is characterized in that first determining module for execute it is following in
At least one of:
The topography for meeting pre-set image feature in the target area of described first image is determined as third image, the mesh
It is all image-regions in described first image in addition to the target object region to mark region;
The topography that user chooses in the target area of described first image is determined as third image, the target area
For all image-regions in described first image in addition to the target object region;
Image input by user is determined as third image.
21. first terminal according to claim 15, which is characterized in that the operation trace of second input includes default
Mark;Second respond module is used for, in response to second input, the Overlapping display suspended window in described first image,
The second image of the corresponding target camera acquisition of the default mark is shown in the suspended window.
22. first terminal according to claim 21, which is characterized in that first determining module is used for, by described
One image is determined as third image.
23. a kind of first terminal, which is characterized in that the first terminal includes memory, processor and is stored in the storage
On device and the computer program that can run on the processor, realized such as when the computer program is executed by the processor
The step of claim 1 to 9 any one of them image display method.
24. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, the computer program realize image display method as described in any one of claim 1 to 9 when being executed by processor
Step.
25. a kind of second terminal, which is characterized in that including:
Receiving module, the target image for receiving first terminal transmission;
Extraction module, for extracting the cryptographic attributes in the target image;
Display module, for according to the cryptographic attributes, showing the target image.
26. second terminal according to claim 25, which is characterized in that the cryptographic attributes are the first attribute;
The display module is used for, and shows the third image in the target image, and the 4th image in the target image
Display properties be hide and it is readable;In the case where receiving the verification information to match with pre-stored authority information,
Show the 4th image;After preset duration, the target image is deleted.
27. second terminal according to claim 25, which is characterized in that the cryptographic attributes are the second attribute;
The display module is used for, and shows the third image in the target image, and the 4th image in the target image
Display properties be hide and it is unreadable;After preset duration, the target image is deleted.
28. second terminal according to claim 25, which is characterized in that the cryptographic attributes are third attribute;
The display module is used for, and shows the 4th image in the target image, and the third image in the target image
Display properties be hiding;
Wherein, the permission that the cryptographic attributes of the target image are arranged in the second terminal is open state, the second terminal
The target image cryptographic attributes setting range include the first attribute, the second attribute and third attribute;
For first attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden
It hides and readable, described hiding and readable instruction the 4th image receives and pre-stored authority information phase in third terminal
It is shown in the case of matched verification information, and after preset duration, delete the target image, the third terminal is to receive
The terminal for the target image that the second terminal is sent;
For second attribute, the display properties of the third image is display, and the display properties of the 4th image is hidden
It hides and unreadable;Described hiding and unreadable instruction the 4th image is invisible to third terminal, and after preset duration, deletes
Except the target image;
For third attribute, the display properties of the third image is hiding, and the display properties of the 4th image is display, and
The permission that the cryptographic attributes of the target image are arranged in third terminal is open state.
29. a kind of second terminal, which is characterized in that the second terminal includes memory, processor and is stored in the storage
On device and the computer program that can run on the processor, realized such as when the computer program is executed by the processor
The step of claim 10 to 13 any one of them image display method.
30. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes such as claim 10 to 13 any one of them image display method when the computer program is executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810214768.7A CN108459788B (en) | 2018-03-15 | 2018-03-15 | Picture display method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810214768.7A CN108459788B (en) | 2018-03-15 | 2018-03-15 | Picture display method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108459788A true CN108459788A (en) | 2018-08-28 |
CN108459788B CN108459788B (en) | 2020-05-22 |
Family
ID=63236484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810214768.7A Active CN108459788B (en) | 2018-03-15 | 2018-03-15 | Picture display method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108459788B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005368A (en) * | 2018-10-15 | 2018-12-14 | Oppo广东移动通信有限公司 | A kind of generation method of high dynamic range images, mobile terminal and storage medium |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN110209310A (en) * | 2019-04-19 | 2019-09-06 | 维沃软件技术有限公司 | A kind of image processing method and terminal device |
CN110719269A (en) * | 2019-09-25 | 2020-01-21 | 维沃移动通信有限公司 | Data transmission method and mobile terminal |
CN115577568A (en) * | 2022-11-17 | 2023-01-06 | 中国汽车技术研究中心有限公司 | Method, device and storage medium for determining operation authority of simulation model |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547254A (en) * | 2010-11-26 | 2012-07-04 | 中国科学院声学研究所 | Method and system for digital video image copyright protection based on watermarks and encryption |
CN104333449A (en) * | 2014-09-29 | 2015-02-04 | 形山科技(深圳)有限公司 | Picture encryption method and system |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105279443A (en) * | 2015-11-30 | 2016-01-27 | 东莞酷派软件技术有限公司 | Picture encrypting and decrypting methods and devices |
US20160110564A1 (en) * | 2014-10-16 | 2016-04-21 | City University Of Hong Kong | Holographic encryption of multi-dimensional images |
CN105681616A (en) * | 2015-12-31 | 2016-06-15 | 武汉帕菲利尔信息科技有限公司 | Multiple-mobile terminal and terminal medical level image data transmission method |
CN107423378A (en) * | 2017-07-12 | 2017-12-01 | 北京小米移动软件有限公司 | Image display method and device |
-
2018
- 2018-03-15 CN CN201810214768.7A patent/CN108459788B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547254A (en) * | 2010-11-26 | 2012-07-04 | 中国科学院声学研究所 | Method and system for digital video image copyright protection based on watermarks and encryption |
CN104333449A (en) * | 2014-09-29 | 2015-02-04 | 形山科技(深圳)有限公司 | Picture encryption method and system |
US20160110564A1 (en) * | 2014-10-16 | 2016-04-21 | City University Of Hong Kong | Holographic encryption of multi-dimensional images |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105279443A (en) * | 2015-11-30 | 2016-01-27 | 东莞酷派软件技术有限公司 | Picture encrypting and decrypting methods and devices |
CN105681616A (en) * | 2015-12-31 | 2016-06-15 | 武汉帕菲利尔信息科技有限公司 | Multiple-mobile terminal and terminal medical level image data transmission method |
CN107423378A (en) * | 2017-07-12 | 2017-12-01 | 北京小米移动软件有限公司 | Image display method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005368A (en) * | 2018-10-15 | 2018-12-14 | Oppo广东移动通信有限公司 | A kind of generation method of high dynamic range images, mobile terminal and storage medium |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109886000B (en) * | 2019-02-01 | 2024-03-01 | 维沃移动通信有限公司 | Image encryption method and mobile terminal |
CN110209310A (en) * | 2019-04-19 | 2019-09-06 | 维沃软件技术有限公司 | A kind of image processing method and terminal device |
CN110719269A (en) * | 2019-09-25 | 2020-01-21 | 维沃移动通信有限公司 | Data transmission method and mobile terminal |
CN110719269B (en) * | 2019-09-25 | 2022-07-15 | 维沃移动通信有限公司 | Data transmission method and mobile terminal |
CN115577568A (en) * | 2022-11-17 | 2023-01-06 | 中国汽车技术研究中心有限公司 | Method, device and storage medium for determining operation authority of simulation model |
Also Published As
Publication number | Publication date |
---|---|
CN108459788B (en) | 2020-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108459788A (en) | A kind of image display method and terminal | |
CN108038393A (en) | A kind of application program method for secret protection, mobile terminal | |
CN109246360A (en) | A kind of reminding method and mobile terminal | |
CN109241775A (en) | A kind of method for secret protection and terminal | |
CN107845057A (en) | One kind is taken pictures method for previewing and mobile terminal | |
CN108833709A (en) | A kind of the starting method and mobile terminal of camera | |
CN108681664A (en) | A kind of encryption method and device | |
CN109145571A (en) | A kind of account login method, terminal and server | |
CN108280337A (en) | A kind of message protection method and mobile terminal | |
CN109886000A (en) | A kind of image encryption method and mobile terminal | |
CN109993010A (en) | A kind of information display method and mobile terminal | |
CN109639569A (en) | A kind of social communication method and terminal | |
CN109669611A (en) | Fitting method and terminal | |
CN110457879A (en) | Object displaying method and terminal device | |
CN109241832A (en) | A kind of method and terminal device of face In vivo detection | |
CN108416203A (en) | A kind of unlocking screen method and mobile terminal | |
CN109981904A (en) | A kind of method for controlling volume and terminal device | |
CN109753202A (en) | A kind of screenshotss method and mobile terminal | |
CN108984143A (en) | A kind of display control method and terminal device | |
CN108616687A (en) | A kind of photographic method, device and mobile terminal | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN110321449A (en) | A kind of image display method and terminal | |
CN108109188A (en) | A kind of image processing method and mobile terminal | |
CN109800606A (en) | A kind of display control method and mobile terminal | |
CN109672845A (en) | A kind of method, apparatus and mobile terminal of video calling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |