CN108459788B - Picture display method and terminal - Google Patents

Picture display method and terminal Download PDF

Info

Publication number
CN108459788B
CN108459788B CN201810214768.7A CN201810214768A CN108459788B CN 108459788 B CN108459788 B CN 108459788B CN 201810214768 A CN201810214768 A CN 201810214768A CN 108459788 B CN108459788 B CN 108459788B
Authority
CN
China
Prior art keywords
image
attribute
target
terminal
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810214768.7A
Other languages
Chinese (zh)
Other versions
CN108459788A (en
Inventor
杨其豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810214768.7A priority Critical patent/CN108459788B/en
Publication of CN108459788A publication Critical patent/CN108459788A/en
Application granted granted Critical
Publication of CN108459788B publication Critical patent/CN108459788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The embodiment of the invention provides a picture display method and a terminal, wherein the picture display method applied to a first terminal comprises the following steps: acquiring a target image; displaying a preset control, wherein the preset control is used for setting the encryption attribute of the target image; receiving a first input of a user to a preset control, wherein the first input is used for adjusting the display state of the preset control; responding to the first input, and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input; and sending the target image to a second terminal, wherein the target image carries the encryption attribute. According to the embodiment of the invention, the user can share the corresponding images for the users with different viewing permissions by setting different permissions on one image, so that the operation process of sharing the images by the users with different viewing permissions is simplified.

Description

Picture display method and terminal
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a picture display method and a terminal.
Background
With the development of intelligent mobile terminal equipment, a camera becomes the most important component of a mobile phone, so that the photographing experience of a user is continuously improved, and the camera becomes an important way for improving the brand value of the mobile phone.
When a user uses a mobile phone to take a picture, the user often meets the situation that the picture is sent to other people after the picture is taken. However, sometimes a user wants a recipient to clearly view the content of the photo, and sometimes wants a recipient to view part of the content on the photo, that is, the user needs a way for the recipient of the photo to view the photo. The image is shared by receivers with different viewing permissions, a user needs to edit multiple images corresponding to the different permissions, and then the images are respectively sent to everyone, so that the operation is complex and time-consuming.
Disclosure of Invention
The embodiment of the invention provides a picture display method and a terminal, and aims to solve the problems that in the prior art, the operation process of sharing pictures for users with different viewing permissions is complicated and time-consuming.
In order to solve the foregoing technical problem, in a first aspect, an embodiment of the present invention provides a picture display method applied to a first terminal, including:
acquiring a target image;
displaying a preset control, wherein the preset control is used for setting the encryption attribute of the target image;
receiving a first input of a user to the preset control, wherein the first input is used for adjusting the display state of the preset control;
responding to the first input, and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input;
and sending the target image to a second terminal, wherein the target image carries the encryption attribute.
In a second aspect, an embodiment of the present invention provides an image display method applied to a second terminal, including:
receiving a target image sent by a first terminal;
extracting the encryption attribute in the target image;
and displaying the target image according to the encryption attribute.
In a third aspect, an embodiment of the present invention provides a terminal, including:
the acquisition module is used for acquiring a target image;
the display module is used for displaying a preset first operating line and a preset second operating line;
the first receiving module is used for receiving a first input of a user, and the first input is used for adjusting the display states of the first operating line and the second operating line;
the first response module is used for responding to the first input and determining the encryption attribute of the target image according to the target display states of the first operation line and the second operation line corresponding to the first input;
and the sending module is used for sending the target image to a second terminal, and the target image carries the encryption attribute.
In a third aspect, an embodiment of the present invention provides a first terminal, including:
the acquisition module is used for acquiring a target image;
the display module is used for displaying a preset control, and the preset control is used for setting the encryption attribute of the target image;
the first receiving module is used for receiving a first input of a user to the preset control, and the first input is used for adjusting the display state of the preset control;
the first response module is used for responding to the first input and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input;
and the sending module is used for sending the target image to a second terminal, and the target image carries the encryption attribute.
In a fourth aspect, an embodiment of the present invention provides a first terminal, where the first terminal includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the computer program is executed by the processor, the steps of the picture display method applied to the first terminal are implemented.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the picture display method applied to the first terminal.
In a sixth aspect, an embodiment of the present invention provides a second terminal, including:
the receiving module is used for receiving a target image sent by a first terminal;
the extraction module is used for extracting the encryption attribute in the target image;
and the display module is used for displaying the target image according to the encryption attribute.
In a seventh aspect, an embodiment of the present invention provides a second terminal, where the second terminal includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the computer program is executed by the processor, the steps of the image display method applied to the second terminal are implemented.
In an eighth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the picture display method applied to the second terminal.
In the embodiment of the invention, by acquiring a target image, displaying a preset control for setting the encryption attribute of the target image, responding to a first input when receiving the first input for adjusting the display state of the preset control, determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input, and finally sending the target image carrying the encryption attribute to a second terminal, a user can check the authority for different users, and before sending the target image, different encryption attributes can be set for the target image by adjusting the display state of the preset control, so that different terminal users can display the target image according to different encryption attributes carried in the target image when receiving the target image, and the user can set different authorities on one image, corresponding images can be shared by users with different viewing permissions, and the operation process of sharing pictures by the users with different viewing permissions is simplified.
Drawings
Fig. 1 is a flowchart illustrating steps of a picture display method applied to a first terminal according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating the steps of generating a target image in an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating the selection of a target object on a first image in an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a second input on a first image including a predetermined identifier in an embodiment of the present invention;
FIG. 5 shows a schematic view of superimposing a floating window on the first image in FIG. 3;
FIG. 6 shows a schematic view of superimposing a floating window on the first image in FIG. 4;
FIG. 7 is a schematic representation of the selection of a third image from FIG. 3;
fig. 8 is a schematic view showing a case where the first image in fig. 4 is determined as the third image;
fig. 9 is a flowchart illustrating steps of a picture display method applied to a second terminal in an embodiment of the present invention;
fig. 10 shows a block diagram of a first terminal in an embodiment of the invention;
fig. 11 shows a block diagram of a second terminal in an embodiment of the invention;
fig. 12 is a block diagram showing a configuration of a terminal in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, which is a flowchart illustrating steps of a picture displaying method applied to a first terminal in an embodiment of the present invention, the method includes:
step 101: and acquiring a target image.
In this step, specifically, when the user needs to send an image to the second terminal, the target image needs to be acquired first. Specifically, the target image is an image captured by receiving a photographing instruction or a pre-stored captured image.
Step 102: and displaying the preset control.
In this step, specifically, after the target image is obtained, a preset control may be displayed on an interface where the target image is located, where the preset control is used to set an encryption attribute of the target image. The method and the device realize that the user can set different encryption attributes for the target image according to different user viewing permissions, so that the user can view the image with the corresponding permission by setting different encryption attributes on one image, and the operation process of sharing the image by the users with different viewing permissions is simplified.
Specifically, the preset control may be a preset first operation line and a preset second operation line, and may also be a sliding virtual key or an encryption selection option, where a specific form of the preset control is not limited herein.
Step 103: receiving a first input of a user to a preset control.
In this step, specifically, the first input is used to adjust a display state of the preset control. The preset control can comprise N display states, each display state corresponds to one encryption attribute, and N is greater than 1, so that different encryption attributes of the target image can be set by operating the display states of the preset control.
Of course, the display state needs to be determined according to the specific display form of the preset control. Wherein, the display state may include at least one of arrangement, shape, size and position of the preset control.
For example, when the preset control is a preset first operation line and a preset second operation line, the combination of the first operation line and the second operation line may include three display states, and each display state corresponds to one encryption attribute. At this time, the first input to the preset control is the rotation operation of the first operation line and the second operation line. When the display state of the first operating line and the second operating line is crossed but not vertically displayed, indicating that the encryption attribute of the target image is a first attribute; when the display states of the first operating line and the second operating line are parallel display, indicating that the encryption attribute of the target image is a second attribute; and when the display state of the first operation line and the second operation line is vertical display, indicating that the encryption attribute of the target image is a third attribute. Therefore, the user can operate the display states of the first operating line and the second operating line according to different user viewing authorities, and further set the encryption attribute of the target image, so that the receiving end can display the actual requirement of the user for displaying the image on the receiving end when displaying the target image.
For another example, when the preset control is a sliding virtual key, the sliding virtual key may include three display states, that is, the sliding virtual key is located on the left side of the sliding slot, the sliding virtual key is located in the middle of the sliding slot, and the sliding virtual key is located on the right side of the sliding slot, and each display state corresponds to one encryption attribute. At this time, the first input to the preset control is the sliding operation of the sliding virtual key. Of course, the encryption attribute corresponding to each display state may be set according to requirements, and the encryption attribute necessary to correspond to each display state is not specifically limited herein.
For another example, when the preset control is an encryption selection option, the encryption selection option may include three display numbers, namely a first encryption option, a second encryption option, and a third encryption option, and each display number corresponds to one encryption attribute, and at this time, the first input to the preset control is a click operation on the encryption selection option. Therefore, the user can operate the display state of the preset control by aiming at different user viewing authorities, and further set the encryption attribute of the target image, so that the receiving end can display the actual requirement of the receiving end for displaying the image according to the user when displaying the target image.
Step 104: and responding to the first input, and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input.
In this step, specifically, after receiving the first input, the first terminal may determine, in response to the first input, an encryption attribute of the target image according to a target display state of a preset control corresponding to the first input. Therefore, the user can set the target display state of the preset control according to the checking authority of different users of the receiving end, and further determine the encryption attribute of the target image, so that the receiving end can display the image according to the actual requirement of the user of the sending end on the checking authority of the image.
Step 105: and sending the target image to the second terminal.
In this step, specifically, after the encryption attribute of the target image is determined, the target image may be sent to the second terminal, where the target image carries the encryption attribute, so that the second terminal can display the target image according to the encryption attribute. Therefore, the user can set the encryption attribute of the target image according to the image display requirement of the user on the second terminal, the second terminal can display the encryption attribute of the target image, the user can share the corresponding images for users with different viewing authorities by setting different encryption attributes on one image, and the operation process of sharing the images for the users with different viewing authorities is simplified.
Thus, in the embodiment of the invention, when the target image is acquired, the preset control for setting the encryption attribute of the target image is displayed, the encryption attribute of the target image is determined by responding to the first input for adjusting the display state of the preset control input by the user to the preset control, and finally the target image carrying the encryption attribute is sent to the second terminal, so that the user can set different encryption attributes for the target image by adjusting the display state of the preset control before sending the target image, so that different terminal users can display the target image according to different encryption attributes carried in the target image when receiving the target image, and the user can share the corresponding image for users with different viewing authorities by setting different authorities on one image, the operation process of sharing the picture by the users with different viewing permissions is simplified.
Further, as shown in fig. 2, before acquiring the target image, the embodiment of the present invention further includes the following steps:
step 201: a second input by the user on the first image is received.
In this step, specifically, the first image may be a preview image displayed in the shooting preview interface or a previously stored shot image. For example, as shown in fig. 3, the first image 31 may be a preview image displayed in a shooting preview interface.
Wherein, when receiving the second input of the user on the first image, a different second input of the user on the first image can be received. This will be explained below.
First, when receiving a second input of the user on the first image, a second input of the user selecting the target object on the first image may be received. Specifically, the second input includes a contour track input by the user for the target object on the first image or a preset graphic track input by the user for the target object on the first image, where the target object is located in the preset graphic track. Therefore, the second input that the user selects the target object on the first image is received, the user can directly select the target object on the first image according to the display requirement, and the operation process that the user selects the target object is simplified.
For example, with continued reference to fig. 3, when the user 3 wants to take the intermediate partial image in fig. 3 as the target object, a five-pointed star graphic track 32 may be input for the target object, wherein the image within the five-pointed star graphic track 32 is the target object 33. Therefore, the user can directly select the target object on the first image according to the self requirement, and the operation process of selecting the target object by the user is simplified.
Secondly, when a second input of the user on the first image is received, the operation track of the second input comprises a preset identifier. The preset identification is used for indicating to start the target camera corresponding to the preset identification. And the second input comprises clicking operation on the preset identifier. Specifically, the preset mark is a bent arrow pattern or a U-shaped pattern, and the preset mark may be included in a preset pattern track. Of course, the specific display form of the preset mark is not limited in detail here. For example, as shown in fig. 4, the user 4 may first input a five-pointed star graphical trace 42 on the first image 41, and then input a bent arrow graphic 43 within the five-pointed star graphical trace 42.
Step 202: in response to a second input, a floating window is displayed overlying the first image, the second image being displayed in the floating window.
In this step, specifically, when a second input by the user on the first image is detected, a floating window may be superimposed on the first image in response to the second input, wherein the second image is displayed in the floating window. Therefore, the second image can be displayed on the first image in an overlapping mode, the second image is highlighted, and a user can conveniently view the second image displayed in the floating window.
Wherein in responding to the second input, different responses may be made to different second inputs. This is explained here.
First, when a second input that the user selects the target object on the first image is received, in the step of displaying the second image in the floating window by superimposing the floating window on the first image in response to the second input, the floating window may be displayed in the first image in superimposition in response to the second input, and the second image including the target object may be displayed in the floating window. In this way, the second image displayed in the floating window can be made to include the target object selected by the user, and the target object selected by the user from the first image is displayed superimposed on the first image, with the target object selected by the user highlighted.
Specifically, the floating window may include a frame region image, where the frame region image may include an image formed by a terminal frame and a control region image other than the first image in a display screen on which the first image is displayed, and the second image is displayed in a display range of the frame region image. For example, as shown in fig. 5, a schematic diagram of displaying the floating window 51 on the first image 31 in fig. 3 in an overlapping manner is shown. Wherein a second image 52 containing the target object 33 in fig. 3 is displayed in the floating window 51. Of course, the floating window further includes a frame region image 53, and the frame region image 53 may include an image composed of a terminal frame and a control region image other than the first image in the display screen on which the first image is displayed. This enables the first image and the floating window on which the target object is displayed to be superimposed in the image displayed in response to the second input, highlighting the target object selected by the user, and facilitating the user at the receiving end to view the target object pointed by the user.
And secondly, when the operation track of the second input contains the preset identification, in the step of responding to the second input and displaying the suspension window on the first image in an overlapping way, and displaying the second image in the suspension window, responding to the second input and displaying the suspension window on the first image in an overlapping way, and displaying the second image collected by the target camera corresponding to the preset identification in the suspension window. Specifically, when the first image is a preview image displayed in a shooting preview interface, if the first image is a preview image acquired by the first camera in real time, the target camera for acquiring the second image is the second camera; when the first camera is a front camera, the second camera is a rear camera, and when the first camera is a rear camera, the second camera is a front camera. Therefore, the second image displayed in the floating window can be the second image collected by the target camera corresponding to the preset identification, namely the image displayed in response to the second input can be used for simultaneously displaying the first image and the second image collected by the target camera in an overlapping mode, the display content of the displayed image is increased, and the images collected by a plurality of cameras are integrated on the same image.
Specifically, the floating window may include a frame region image, where the frame region image includes an image formed by a terminal frame and a control region image other than the first image in a display screen on which the first image is displayed. In addition, the second image is displayed within the display range of the frame region image. For example, as shown in fig. 6, a schematic diagram of displaying a floating window 61 on the first image 41 in fig. 4 in an overlapping manner is shown. The floating window 61 displays a second image 62 acquired by a target camera corresponding to the preset identifier in fig. 4. Of course, the floating window further includes a frame region image 63, and the frame region image 63 may include an image composed of a terminal frame and a control region image other than the first image in the display screen on which the first image is displayed. The first image and the second image collected by the target camera can be displayed in a superposed mode in the image displayed after the second input is responded, so that the images collected by the multiple cameras can be displayed in one picture, the images collected by the target camera are displayed in a highlighted mode in the floating window, and a receiving end user can conveniently check the images collected by the target camera.
Step 203: based on the first image and the second image, a third image is determined.
In this step, specifically, after the first image and the second image are displayed, the third image may be determined based on the displayed first image and second image.
Wherein, when determining the third image based on the first image and the second image, the third image may be determined according to the image content of the second image displayed in the floating window. This is explained in detail here.
For one, when the second image including the target image is displayed in the floating window, in the step of determining the third image based on the first image and the second image, at least one of the following may be included:
1) and determining a local image meeting the preset image characteristics in the target area of the first image as a third image, wherein the target area is all image areas except the area where the target object is located in the first image. Specifically, the preset image feature includes at least one of a preset texture feature and a preset color feature, where the image color value is greater than the preset value, and the specific content of the preset image feature is not specifically limited herein. In this way, the partial image which meets the preset image characteristics in the image area except the area where the target object is located is determined as the third image, so that the third image can be different from the second image, the second image can be encrypted through the third image when the second image needs to be encrypted, and the selection of the third image can meet the display requirements of most users on the images.
For example, as shown in fig. 7, the third image 71 is a partial image that is selected by the first terminal from the first image 31 in fig. 3 and satisfies the preset image characteristics, and the third image is distinguished from the second image. In particular, the third image 71 is overlaid on the first and second images 52 in fig. 5. Of course, the third image 71 may also be overlaid on the second image 52 in fig. 5, which is not limited in this regard.
2) And determining a local image selected by the user in the target area of the first image as a third image, wherein the target area is all image areas except the area where the target object is located in the first image. In this way, the local image selected by the user in the image area of the first image except the area where the target object is located is determined as the third image, so that the user can select the third image from the first image according to the self requirement, and the satisfaction degree of the user on the third image is improved while the first image and the second image are separated.
3) An image input by the user is determined as a third image. Specifically, the image input by the user may be an image called by the user from a storage space in the first terminal. In this way, the image input by the user is determined as the third image, so that the user can input the image according to the self requirement, the selection range of the third image is enlarged, and the satisfaction degree of the user on the third image is improved.
Secondly, when a second image acquired by a target camera corresponding to the preset identifier is displayed in the floating window, the first image can be determined as a third image in the step of determining the third image based on the first image and the second image. In this way, by determining the first image as the third image, the third image can be made different from the second image, thereby enabling the second image to be encrypted by the third image when the second image needs to be encrypted.
For example, as shown in fig. 8, the first image 41 in fig. 4 may be directly determined as the third image 81. Specifically, the third image 81 is overlaid on the second image 62 in fig. 6. Of course, the third image 81 may also be overlaid on the whole display interface in fig. 6, and this is not particularly limited herein.
Step 204: based on the second image, a fourth image is determined.
In this step, specifically, when the fourth image is determined based on the second image, the second image may be determined as the fourth image; alternatively, a composite image generated in a state where the second image is superimposed and displayed on the first image is determined as the fourth image.
In this way, by determining the second image or the composite image generated in a state where the second image is superimposed and displayed on the first image as the fourth image, when the fourth image needs to be encrypted, the image selection range of the fourth image can be increased.
Step 205: and storing the third image and the fourth image in a correlation manner to generate a target image.
In this step, specifically, when the third image and the fourth image are determined, the third image and the fourth image may be stored in association with each other to generate the target image. The target image comprises a third image and a fourth image which belong to different layers, so that when the encryption attribute of the target image is set, the display states of the third image and the fourth image can be set, and a receiving end user can view different display images in the target image according to the viewing authority.
The image displayed by the second terminal when displaying the target image is different under different encryption attributes, which will be described herein.
Firstly, under the condition that the encryption attribute is the first attribute, the display attribute of the third image is displayed, the display attribute of the fourth image is hidden and readable, the hidden and readable indication indicates that the fourth image is displayed under the condition that the second terminal receives verification information matched with the prestored authority information, and the target image is deleted after the preset time length. Specifically, the authority information includes fingerprint information or a preset password, and the specific content of the authority information is not specifically limited herein.
In this way, by setting the encryption attribute of the target image as the first attribute, the receiving end user can only check the fourth image when the input verification information is matched with the authority information pre-stored in the second terminal, and can only check the third image when the input verification information is not matched with the authority information pre-stored in the second terminal, so that the safety of the fourth image in the target image is improved; in addition, after the preset time length, the target image is deleted, and the safety of the fourth image in the target image is further improved.
Secondly, under the condition that the encryption attribute is a second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; and hiding and indicating that the fourth image is invisible to the second terminal in an unreadable manner, and deleting the target image after preset duration.
Therefore, the encryption attribute of the target image is set as the second attribute, so that the receiving end user can only view the third image but not the fourth image, and the safety of the fourth image is improved; in addition, the target image is deleted after the preset time length, and the safety of the fourth image is further improved.
And thirdly, under the condition that the encryption attribute is the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the authority of the encryption attribute of the target image is set to be in an open state by the second terminal. Specifically, when the encryption attribute is the third attribute, the display states of the first operation line and the second operation line may be displayed vertically.
Therefore, the encryption attribute of the target image is set as the third attribute, so that the receiving end user can directly view the fourth image, and can set the encryption attribute of the target image, and the viewing, storage and forwarding of the target image by the receiving end user are realized.
It should be noted here that the encryption attributes of the target image are arranged in order from high to low: a second attribute, a first attribute, and a third attribute. At this time, when the user sends the target image to the users with different viewing permissions, the encryption attribute of the target image can be set to be the second attribute, the first attribute and the third attribute in sequence according to the viewing permissions from high to low, so that the encryption attribute of the same picture can be set according to the viewing permissions of different users.
Thus, the embodiment displays the preset control for setting the encryption attribute of the target image when the target image is obtained, determines the encryption attribute of the target image by responding to the first input for adjusting the display state of the preset control, which is input by the user to the preset control, and finally transmits the target image carrying the encryption attribute to the second terminal, so that the user can set different encryption attributes for the target image by adjusting the display state of the preset control before transmitting the target image, thereby displaying the target image according to different encryption attributes carried in the target image when different terminal users receive the target image, realizing that the user can share images corresponding to users with different viewing authorities by setting different authorities on one image, the operation process of sharing the picture by the users with different viewing permissions is simplified.
As shown in fig. 9, which is a flowchart of a picture displaying method applied to a second terminal in an embodiment of the present invention, the method includes:
step 901: and receiving the target image sent by the first terminal.
In this step, specifically, the second terminal receives the target image sent by the first terminal. The target image carries the encryption attribute of the target image.
Wherein the target image includes a third image and a fourth image stored in association, wherein in the first terminal, a second input of the user on the first image is received, in response to the second input, a floating window in which the second image is displayed is superimposed on the first image, and then the third image is determined based on the first image and the second image, and the fourth image is determined based on the second image. Specifically, the second image or the composite image generated in a state where the second image is displayed superimposed on the first image may be determined as the fourth image. In addition, the first image may be a preview image displayed in the first terminal photographing preview interface or a previously stored photographed image. The second image can be a target object selected from the first image and can also be a second image acquired by a target camera. This enables the target image to include image contents of a plurality of levels, thereby enabling the first terminal to encrypt according to the display states of the third image and the fourth image, enabling a receiving end user to view different display images in the target image according to the encryption attribute.
Step 902: and extracting the encryption attribute in the target image.
In this step, specifically, after the target image is received, the encryption attribute of the target image may be extracted.
The encryption attribute of the target image comprises a first attribute, a second attribute and a third attribute.
Specifically, under the condition that the encryption attribute is the first attribute, the display attribute of the third image is displayed, the display attribute of the fourth image is hidden and readable, the hidden and readable indication indicates that the fourth image is displayed under the condition that the second terminal receives verification information matched with the pre-stored authority information, and the target image is deleted after the preset time length; under the condition that the encryption attribute is the second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; hiding and indicating that the fourth image is invisible to the second terminal in an unreadable manner, and deleting the target image after preset duration; and under the condition that the encryption attribute is the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the authority of the encryption attribute of the target image is set to be in an open state by the second terminal.
In this way, by extracting the encryption attribute of the target image, the second terminal can display the target image according to the encryption attribute of the target image.
Step 903: and displaying the target image according to the encryption attribute.
In this step, specifically, after the encryption attribute of the target image is extracted, the target image may be displayed according to the encryption attribute.
When the extracted encryption attribute is the first attribute, in the step of displaying the target image according to the encryption attribute, a third image in the target image can be displayed, and the display attribute of a fourth image in the target image is hidden and readable; displaying a fourth image in the case of receiving verification information matched with the pre-stored authority information; and deleting the target image after the preset time length. The second terminal can only check the fourth image when the received verification information is matched with the pre-stored authority information, and can only check the third image when the received verification information is not matched with the pre-stored authority information, so that the safety of the fourth image in the target image is improved; in addition, after the preset time length, the target image is deleted, and the safety of the fourth image in the target image is further improved.
When the extracted encryption attribute is the second attribute, in the step of displaying the target image according to the encryption attribute, a third image in the target image can be displayed, and the display attribute of a fourth image in the target image is hidden and unreadable; and deleting the target image after the preset time length. The second terminal can only see the third image but cannot see the fourth image, so that the safety of the fourth image is improved; in addition, the target image is deleted after the preset time length, and the safety of the fourth image is further improved.
When the extracted encryption attribute is a third attribute, in the step of displaying the target image according to the encryption attribute, a fourth image in the target image can be displayed, and the display attribute of the third image in the target image is hidden; the second terminal sets the authority of the encryption attribute of the target image to be in an open state, and the setting range of the encryption attribute of the target image of the second terminal comprises a first attribute, a second attribute and a third attribute.
Specifically, for the first attribute, the display attribute of the third image is display, the display attribute of the fourth image is hidden and readable, the hidden and readable indicates that the fourth image is displayed when the third terminal receives verification information matched with the prestored authority information, and the target image is deleted after a preset time period, and the third terminal is a terminal for receiving the target image sent by the second terminal;
for the second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; hiding and indicating that the fourth image is invisible to the third terminal in an unreadable manner, and deleting the target image after preset duration;
and for the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the authority of the encryption attribute of the target image is set to be in an open state by the third terminal.
Specifically, when the encryption attribute of the target image is set, the second terminal may receive a first input of a preset control displayed on the target image from a user, where the first input is used to adjust a display state of the preset control, and determine the encryption attribute of the target image according to a target display state of the preset control corresponding to the first input in response to the first input.
Therefore, when the encryption attribute extracted by the second terminal is the third attribute, the second terminal can directly view the fourth image, and can set the encryption attribute of the target image, so that the second terminal can view, store and forward the target image.
Therefore, the embodiment of the invention receives the target image sent by the first terminal, extracts the encryption attribute in the target image, and displays the target image according to the encryption attribute, so that the second terminal can display the image according to the encryption attribute of the target image set on the first terminal by the user, and the receiving end can display the received image according to the actual display requirement of the user on the image at the sending end.
As shown in fig. 10, an embodiment of the present invention provides a first terminal, including:
an obtaining module 1001 configured to obtain a target image;
a display module 1002, configured to display a preset control, where the preset control is used to set an encryption attribute of the target image;
a first receiving module 1003, configured to receive a first input to the preset control from a user, where the first input is used to adjust a display state of the preset control;
a first response module 1004, configured to, in response to the first input, determine an encryption attribute of the target image according to a target display state of the preset control corresponding to the first input;
a sending module 1005, configured to send the target image to a second terminal, where the target image carries the encryption attribute.
The first terminal provided by the embodiment of the invention acquires a target image through the acquisition module, displays the preset control through the display module, receives a first input of a user through the first receiving module, responds to the first input through the first response module, determines the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input, and finally sends the target image to the second terminal through the sending module, wherein the target image carries the encryption attribute, so that the user can check the authority aiming at different users, and different encryption attributes can be set for the target image by adjusting the display state of the preset control before sending the target image, so that different terminal users can display the target image according to different encryption attributes carried in the target image when receiving the target image, and the user can set different authorities on one image, corresponding images can be shared by users with different viewing permissions, and the operation process of sharing pictures by the users with different viewing permissions is simplified.
Optionally, the first terminal further includes:
the second receiving module is used for receiving a second input of the user on the first image;
a second response module, configured to display a floating window in which a second image is displayed in an overlapping manner on the first image in response to the second input;
a first determining module for determining a third image based on the first and second images;
a second determining module for determining a fourth image based on the second image;
and the generating module is used for storing the third image and the fourth image in a correlation mode to generate a target image.
Optionally, the second determining module includes:
a first determination unit configured to determine the second image as a fourth image;
or, a second determination unit configured to determine a composite image generated in a state where the second image is displayed superimposed on the first image as a fourth image.
Optionally, when the encryption attribute is a first attribute, the display attribute of the third image is display, the display attribute of the fourth image is hidden and readable, the hidden and readable indication indicates that the fourth image is displayed when the second terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time period;
when the encryption attribute is a second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the second terminal, and the target image is deleted after a preset time length;
and under the condition that the encryption attribute is a third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the second terminal sets the authority of the encryption attribute of the target image to be in an open state.
Optionally, the first image is a preview image displayed in a shooting preview interface or a pre-stored shot image.
Optionally, the second receiving module is configured to receive a second input that the user selects the target object on the first image;
the second response module is configured to, in response to the second input, display a floating window on the first image in an overlapping manner, where a second image including the target object is displayed in the floating window.
Optionally, the first determining module is configured to perform at least one of:
determining a local image meeting preset image characteristics in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
determining a local image selected by a user in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
an image input by the user is determined as a third image.
Optionally, the operation track of the second input includes a preset identifier;
and the second response module is used for responding to the second input, superposing and displaying a suspension window on the first image, and displaying a second image acquired by the target camera corresponding to the preset identifier in the suspension window.
Optionally, the first determining module is configured to determine the first image as a third image.
The first terminal provided by the embodiment of the invention displays the preset control for setting the encryption attribute of the target image when the target image is acquired, determines the encryption attribute of the target image by responding to the first input for adjusting the display state of the preset control, which is input by a user to the preset control, and finally sends the target image carrying the encryption attribute to the second terminal, so that the user can view the authority for different users, and different encryption attributes can be set for the target image by adjusting the display state of the preset control before the target image is sent, so that different terminal users can display the target image according to different encryption attributes carried in the target image when receiving the target image, and the user can share the corresponding image for users with different viewing authorities by setting different authorities on one image, the operation process of sharing the picture by the users with different viewing permissions is simplified.
As shown in fig. 11, an embodiment of the present invention provides a second terminal, including:
a receiving module 1101, configured to receive a target image sent by a first terminal;
an extracting module 1102, configured to extract an encryption attribute in the target image;
a display module 1103, configured to display the target image according to the encryption attribute.
The second terminal provided by the embodiment of the invention receives the target image sent by the first terminal through the receiving module, extracts the encryption attribute in the target image through the extracting module, and displays the target image according to the encryption attribute through the display module, so that the second terminal can display the image according to the encryption attribute of the target image set on the first terminal by a user, and the receiving end can display the received image according to the actual display requirement of the user on the image at the sending end.
Optionally, the encryption attribute is a first attribute;
the display module is used for displaying a third image in the target images, and the display attribute of a fourth image in the target images is hidden and readable; displaying the fourth image in the case of receiving verification information matched with pre-stored authority information; and deleting the target image after a preset time length.
Optionally, the encryption attribute is a second attribute;
the display module is used for displaying a third image in the target images, and the display attribute of a fourth image in the target images is hidden and unreadable; and deleting the target image after a preset time length.
Optionally, the encryption attribute is a third attribute;
the display module is used for displaying a fourth image in the target images, and the display attribute of the third image in the target images is hidden;
the second terminal sets the authority of the encryption attribute of the target image to be in an open state, and the setting range of the encryption attribute of the target image of the second terminal comprises a first attribute, a second attribute and a third attribute;
for the first attribute, the display attribute of the third image is display, the display attribute of the fourth image is hidden and readable, the hidden and readable indicates that the fourth image is displayed under the condition that a third terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time length, wherein the third terminal is a terminal for receiving the target image sent by the second terminal;
for the second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the third terminal, and the target image is deleted after a preset time length;
and for the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the third terminal sets the authority of the encryption attribute of the target image to be in an open state.
The second terminal provided by the embodiment of the invention receives the target image sent by the first terminal, extracts the encryption attribute in the target image, and displays the target image according to the encryption attribute, so that the second terminal can display the image according to the encryption attribute of the target image set on the first terminal by a user, and a receiving end can display the received image according to the actual display requirement of the user on the image.
Fig. 12 is a schematic diagram of a hardware structure of a terminal implementing various embodiments of the present invention. The terminal 1200 may be the first terminal or the second terminal, and the terminal 1200 includes but is not limited to: radio frequency unit 1201, network module 1202, audio output unit 1203, input unit 1204, sensor 1205, display unit 1206, user input unit 1207, interface unit 1208, memory 1209, processor 1210, and power source 1211. Those skilled in the art will appreciate that the terminal configuration shown in fig. 12 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, in case the terminal 1200 is a first terminal, the processor 1210 is configured to obtain a target image; displaying a preset control, wherein the preset control is used for setting the encryption attribute of the target image; receiving a first input of a user to the preset control, wherein the first input is used for adjusting the display state of the preset control; responding to the first input, and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input; and sending the target image to a second terminal, wherein the target image carries the encryption attribute.
The first terminal provided in this embodiment displays a preset control for setting an encryption attribute of a target image when acquiring the target image, determines an encryption attribute of the target image by responding to a first input for adjusting a display state of the preset control, which is input to the preset control by a user, and finally transmits the target image carrying the encryption attribute to the second terminal, so that the user can set different encryption attributes for the target image by adjusting the display state of the preset control before transmitting the target image, so that different terminal users can display the target image according to different encryption attributes carried in the target image when receiving the target image, and the user can share corresponding images for users with different viewing authorities by setting different authorities on one image, the operation process of sharing the picture by the users with different viewing permissions is simplified.
Wherein, in case that the terminal 1200 is a second terminal, the processor 1210 is configured to receive a target image sent by a first terminal; extracting the encryption attribute in the target image; and displaying the target image according to the encryption attribute.
The second terminal provided by the embodiment of the invention receives the target image sent by the first terminal, extracts the encryption attribute in the target image, and displays the target image according to the encryption attribute, so that the second terminal can display the image according to the encryption attribute of the target image set on the first terminal by a user, and a receiving end can display the received image according to the actual display requirement of the user on the image.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 1201 may be used for receiving and sending signals during information transmission and reception or during a call, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 1210; in addition, the uplink data is transmitted to the base station. Typically, the radio frequency unit 1201 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 1201 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 1202, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 1203 may convert audio data received by the radio frequency unit 1201 or the network module 1202 or stored in the memory 1209 into an audio signal and output as sound. Also, the audio output unit 1203 may also provide audio output related to a specific function performed by the terminal 1200 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 1203 includes a speaker, a buzzer, a receiver, and the like.
The input unit 1204 is used to receive audio or video signals. The input Unit 1204 may include a Graphics Processing Unit (GPU) 12041 and a microphone 12042, and the Graphics processor 12041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 1206. The image frames processed by the graphics processor 12041 may be stored in the memory 1209 (or other storage medium) or transmitted via the radio frequency unit 1201 or the network module 1202. The microphone 12042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 1201 in case of the phone call mode.
The terminal 1200 also includes at least one sensor 1205, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 12061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 12061 and/or backlight when the terminal 1200 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 1205 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., and will not be described further herein.
The display unit 1206 is used to display information input by the user or information provided to the user. The Display unit 1206 may include a Display panel 12061, and the Display panel 12061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 1207 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 1207 includes a touch panel 12071 and other input devices 12072. The touch panel 12071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 12071 (e.g., operations by a user on or near the touch panel 12071 using a finger, a stylus, or any suitable object or attachment). The touch panel 12071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1210, receives a command from the processor 1210, and executes the command. In addition, the touch panel 12071 may be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 1207 may include other input devices 12072 in addition to the touch panel 12071. In particular, the other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 12071 may be overlaid on the display panel 12061, and when the touch panel 12071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 1210 to determine the type of the touch event, and then the processor 1210 provides a corresponding visual output on the display panel 12061 according to the type of the touch event. Although the touch panel 12071 and the display panel 12061 are shown as two separate components in fig. 12 to implement the input and output functions of the terminal, in some embodiments, the touch panel 12071 and the display panel 12061 may be integrated to implement the input and output functions of the terminal, and this is not limited herein.
An interface unit 1208 is an interface for connecting an external device to the terminal 1200. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 1208 may be used to receive input from an external device (e.g., data information, power, etc.) and transmit the received input to one or more elements within the terminal 1200 or may be used to transmit data between the terminal 1200 and the external device.
The memory 1209 may be used to store software programs as well as various data. The memory 1209 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1209 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 1210 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing software programs and/or modules stored in the memory 1209 and calling data stored in the memory 1209, thereby monitoring the entire terminal. Processor 1210 may include one or more processing units; preferably, the processor 1210 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1210.
The terminal 1200 may also include a power source 1211 (e.g., a battery) for powering the various components, and preferably, the power source 1211 is logically connected to the processor 1210 via a power management system such that the functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, the terminal 1200 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal, including a processor 1210, a memory 1209, and a computer program stored in the memory 1209 and capable of running on the processor 1210, where the computer program, when executed by the processor 1210, implements each process of the embodiment of the picture display method applied to the first terminal and the second terminal, and can achieve the same technical effect, and in order to avoid repetition, the details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the embodiment of the image display method applied to the first terminal and the second terminal, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (30)

1. A picture display method is applied to a first terminal and is characterized by comprising the following steps:
acquiring a target image;
displaying a preset control, wherein the preset control is used for setting the encryption attribute of the target image;
receiving a first input of a user to the preset control, wherein the first input is used for adjusting the display state of the preset control;
responding to the first input, and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input;
and sending the target image to a second terminal, wherein the target image carries the encryption attribute.
2. The method of claim 1, wherein prior to acquiring the target image, further comprising:
receiving a second input of the user on the first image;
in response to the second input, displaying a floating window in which a second image is displayed, superimposed on the first image;
determining a third image based on the first image and the second image;
determining a fourth image based on the second image;
and storing the third image and the fourth image in a correlation manner to generate a target image.
3. The method of claim 2, wherein determining a fourth image based on the second image comprises:
determining the second image as a fourth image;
alternatively, a composite image generated in a state where the second image is superimposed and displayed on the first image is determined as a fourth image.
4. The method of claim 2,
under the condition that the encryption attribute is a first attribute, displaying the display attribute of the third image, hiding and reading the display attribute of the fourth image, wherein the hiding and reading indicates that the fourth image is displayed under the condition that the second terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time length;
when the encryption attribute is a second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the second terminal, and the target image is deleted after a preset time length;
and under the condition that the encryption attribute is a third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the second terminal sets the authority of the encryption attribute of the target image to be in an open state.
5. The method according to claim 2, wherein the first image is a preview image displayed in a capture preview interface or a previously stored captured image.
6. The method of claim 2, wherein receiving a second input from the user on the first image comprises:
receiving a second input of the user selecting the target object on the first image;
the displaying, in response to the second input, a floating window on the first image, the floating window displaying a second image therein, comprising:
in response to the second input, displaying a floating window in which a second image containing the target object is displayed superimposed on the first image.
7. The method of claim 6, wherein determining a third image based on the first and second images comprises at least one of:
determining a local image meeting preset image characteristics in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
determining a local image selected by a user in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
an image input by the user is determined as a third image.
8. The method according to claim 2, wherein the operation track of the second input contains a preset identifier;
the displaying, in response to the second input, a floating window on the first image, the floating window displaying a second image therein, comprising:
and responding to the second input, superposing and displaying a suspension window on the first image, and displaying a second image acquired by the target camera corresponding to the preset identifier in the suspension window.
9. The method of claim 8, wherein determining a third image based on the first and second images comprises:
determining the first image as a third image.
10. A picture display method is applied to a second terminal and is characterized by comprising the following steps:
receiving a target image sent by a first terminal;
extracting the encryption attribute in the target image;
displaying the target image according to the encryption attribute;
the encryption attribute is the encryption attribute of the target image determined by the first terminal according to the target display state of the preset control corresponding to the first input after the first terminal receives the first input of the preset control from the user, and the first input is used for adjusting the display state of the preset control.
11. The method of claim 10, wherein the encryption attribute is a first attribute;
the displaying the target image according to the encryption attribute comprises:
displaying a third image of the target images, and a display attribute of a fourth image of the target images being hidden and readable;
displaying the fourth image in the case of receiving verification information matched with pre-stored authority information;
and deleting the target image after a preset time length.
12. The method of claim 10, wherein the encryption attribute is a second attribute;
the displaying the target image according to the encryption attribute comprises:
displaying a third image of the target images, and displaying an attribute of a fourth image of the target images as hidden and unreadable;
and deleting the target image after a preset time length.
13. The method of claim 10, wherein the encryption attribute is a third attribute;
the displaying the target image according to the encryption attribute comprises:
displaying a fourth image in the target images, wherein the display attribute of a third image in the target images is hidden;
the second terminal sets the authority of the encryption attribute of the target image to be in an open state, and the setting range of the encryption attribute of the target image of the second terminal comprises a first attribute, a second attribute and a third attribute;
for the first attribute, the display attribute of the third image is display, the display attribute of the fourth image is hidden and readable, the hidden and readable indicates that the fourth image is displayed under the condition that a third terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time length, wherein the third terminal is a terminal for receiving the target image sent by the second terminal;
for the second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the third terminal, and the target image is deleted after a preset time length;
and for the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the third terminal sets the authority of the encryption attribute of the target image to be in an open state.
14. A first terminal, comprising:
the acquisition module is used for acquiring a target image;
the display module is used for displaying a preset control, and the preset control is used for setting the encryption attribute of the target image;
the first receiving module is used for receiving a first input of a user to the preset control, and the first input is used for adjusting the display state of the preset control;
the first response module is used for responding to the first input and determining the encryption attribute of the target image according to the target display state of the preset control corresponding to the first input;
and the sending module is used for sending the target image to a second terminal, and the target image carries the encryption attribute.
15. The first terminal of claim 14, wherein the terminal further comprises:
the second receiving module is used for receiving a second input of the user on the first image;
a second response module, configured to display a floating window in which a second image is displayed in an overlapping manner on the first image in response to the second input;
a first determining module for determining a third image based on the first and second images;
a second determining module for determining a fourth image based on the second image;
and the generating module is used for storing the third image and the fourth image in a correlation mode to generate a target image.
16. The first terminal of claim 15, wherein the second determining module comprises:
a first determination unit configured to determine the second image as a fourth image;
or, a second determination unit configured to determine a composite image generated in a state where the second image is displayed superimposed on the first image as a fourth image.
17. The first terminal of claim 15,
under the condition that the encryption attribute is a first attribute, displaying the display attribute of the third image, hiding and reading the display attribute of the fourth image, wherein the hiding and reading indicates that the fourth image is displayed under the condition that the second terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time length;
when the encryption attribute is a second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the second terminal, and the target image is deleted after a preset time length;
and under the condition that the encryption attribute is a third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the second terminal sets the authority of the encryption attribute of the target image to be in an open state.
18. The first terminal according to claim 15, wherein the first image is a preview image displayed in a shooting preview interface or a previously stored shot image.
19. The first terminal of claim 15, wherein the second receiving module is configured to receive a second input of a user selecting a target object on the first image;
the second response module is configured to, in response to the second input, display a floating window on the first image in an overlapping manner, where a second image including the target object is displayed in the floating window.
20. The first terminal of claim 19, wherein the first determining module is configured to perform at least one of:
determining a local image meeting preset image characteristics in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
determining a local image selected by a user in a target area of the first image as a third image, wherein the target area is all image areas except an area where the target object is located in the first image;
an image input by the user is determined as a third image.
21. The first terminal according to claim 15, wherein the operation track of the second input includes a preset identifier; and the second response module is used for responding to the second input, superposing and displaying a suspension window on the first image, and displaying a second image acquired by the target camera corresponding to the preset identifier in the suspension window.
22. The first terminal of claim 21, wherein the first determining module is configured to determine the first image as a third image.
23. A first terminal, characterized in that the first terminal comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the picture display method according to any one of claims 1 to 9.
24. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the picture display method according to one of claims 1 to 9.
25. A second terminal, comprising:
the receiving module is used for receiving a target image sent by a first terminal;
the extraction module is used for extracting the encryption attribute in the target image;
the display module is used for displaying the target image according to the encryption attribute;
the encryption attribute is the encryption attribute of the target image determined by the first terminal according to the target display state of the preset control corresponding to the first input after the first terminal receives the first input of the preset control from the user, and the first input is used for adjusting the display state of the preset control.
26. The second terminal in accordance with claim 25, wherein the encryption attribute is a first attribute;
the display module is used for displaying a third image in the target images, and the display attribute of a fourth image in the target images is hidden and readable; displaying the fourth image in the case of receiving verification information matched with pre-stored authority information; and deleting the target image after a preset time length.
27. The second terminal of claim 25, wherein the encryption attribute is a second attribute;
the display module is used for displaying a third image in the target images, and the display attribute of a fourth image in the target images is hidden and unreadable; and deleting the target image after a preset time length.
28. The second terminal in accordance with claim 25, wherein the encryption attribute is a third attribute;
the display module is used for displaying a fourth image in the target images, and the display attribute of the third image in the target images is hidden;
the second terminal sets the authority of the encryption attribute of the target image to be in an open state, and the setting range of the encryption attribute of the target image of the second terminal comprises a first attribute, a second attribute and a third attribute;
for the first attribute, the display attribute of the third image is display, the display attribute of the fourth image is hidden and readable, the hidden and readable indicates that the fourth image is displayed under the condition that a third terminal receives verification information matched with pre-stored authority information, and the target image is deleted after a preset time length, wherein the third terminal is a terminal for receiving the target image sent by the second terminal;
for the second attribute, the display attribute of the third image is display, and the display attribute of the fourth image is hidden and unreadable; the hidden and unreadable indication that the fourth image is invisible to the third terminal, and the target image is deleted after a preset time length;
and for the third attribute, the display attribute of the third image is hidden, the display attribute of the fourth image is displayed, and the third terminal sets the authority of the encryption attribute of the target image to be in an open state.
29. A second terminal, characterized in that the second terminal comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the picture display method according to any one of claims 10 to 13.
30. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the picture display method according to one of claims 10 to 13.
CN201810214768.7A 2018-03-15 2018-03-15 Picture display method and terminal Active CN108459788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810214768.7A CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810214768.7A CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Publications (2)

Publication Number Publication Date
CN108459788A CN108459788A (en) 2018-08-28
CN108459788B true CN108459788B (en) 2020-05-22

Family

ID=63236484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810214768.7A Active CN108459788B (en) 2018-03-15 2018-03-15 Picture display method and terminal

Country Status (1)

Country Link
CN (1) CN108459788B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005368B (en) * 2018-10-15 2020-07-31 Oppo广东移动通信有限公司 High dynamic range image generation method, mobile terminal and storage medium
CN109886000B (en) * 2019-02-01 2024-03-01 维沃移动通信有限公司 Image encryption method and mobile terminal
CN110209310B (en) * 2019-04-19 2021-04-27 维沃软件技术有限公司 Picture processing method and terminal equipment
CN110719269B (en) * 2019-09-25 2022-07-15 维沃移动通信有限公司 Data transmission method and mobile terminal
CN115577568B (en) * 2022-11-17 2023-03-28 中国汽车技术研究中心有限公司 Method, device and storage medium for determining operation authority of simulation model

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
CN105681616A (en) * 2015-12-31 2016-06-15 武汉帕菲利尔信息科技有限公司 Multiple-mobile terminal and terminal medical level image data transmission method
CN107423378A (en) * 2017-07-12 2017-12-01 北京小米移动软件有限公司 Image display method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9773128B2 (en) * 2014-10-16 2017-09-26 City University Of Hong Kong Holographic encryption of multi-dimensional images

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
CN105681616A (en) * 2015-12-31 2016-06-15 武汉帕菲利尔信息科技有限公司 Multiple-mobile terminal and terminal medical level image data transmission method
CN107423378A (en) * 2017-07-12 2017-12-01 北京小米移动软件有限公司 Image display method and device

Also Published As

Publication number Publication date
CN108459788A (en) 2018-08-28

Similar Documents

Publication Publication Date Title
CN108459788B (en) Picture display method and terminal
CN107977144B (en) Screen capture processing method and mobile terminal
CN110365907B (en) Photographing method and device and electronic equipment
CN108495029B (en) Photographing method and mobile terminal
CN109002340B (en) Screen locking method and electronic equipment
CN110933306A (en) Method for sharing shooting parameters and electronic equipment
CN109639969B (en) Image processing method, terminal and server
CN109241775B (en) Privacy protection method and terminal
CN107784232B (en) Picture processing method and mobile terminal
CN111263071B (en) Shooting method and electronic equipment
CN107784089B (en) Multimedia data storage method, processing method and mobile terminal
CN110602565A (en) Image processing method and electronic equipment
CN109862266B (en) Image sharing method and terminal
CN108108079B (en) Icon display processing method and mobile terminal
CN109993010B (en) Information display method and mobile terminal
CN111159449B (en) Image display method and electronic equipment
CN109246351B (en) Composition method and terminal equipment
CN111752450A (en) Display method and device and electronic equipment
CN108174110B (en) Photographing method and flexible screen terminal
CN111125800B (en) Icon display method and electronic equipment
CN110650367A (en) Video processing method, electronic device, and medium
CN111143596A (en) Article searching method and electronic equipment
CN108132749B (en) Image editing method and mobile terminal
CN111083374B (en) Filter adding method and electronic equipment
CN110086998B (en) Shooting method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant