WO2020020095A1 - 编辑工具的配置方法和配置参数的生成方法 - Google Patents

编辑工具的配置方法和配置参数的生成方法 Download PDF

Info

Publication number
WO2020020095A1
WO2020020095A1 PCT/CN2019/097036 CN2019097036W WO2020020095A1 WO 2020020095 A1 WO2020020095 A1 WO 2020020095A1 CN 2019097036 W CN2019097036 W CN 2019097036W WO 2020020095 A1 WO2020020095 A1 WO 2020020095A1
Authority
WO
WIPO (PCT)
Prior art keywords
target image
identifier
editing
tool
image
Prior art date
Application number
PCT/CN2019/097036
Other languages
English (en)
French (fr)
Inventor
陈晓磊
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2020020095A1 publication Critical patent/WO2020020095A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/60Editing figures and text; Combining figures or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/80Creating or modifying a manually drawn or painted image using a manual input device, e.g. mouse, light pen, direction keys on keyboard

Definitions

  • the embodiments of the present application relate to the field of computer technology, and in particular, to a method for configuring an editing tool and a method for generating a configuration parameter.
  • a common editing method is that a user opens an editing tool provided on a terminal used by the user or a retouching software installed for manual editing processing.
  • the functional menus presented in the editing tools are often the same.
  • the embodiment of the present application proposes a method for configuring an editing tool and a method for generating configuration parameters.
  • an embodiment of the present application provides a method for configuring an editing tool, which is used in a terminal and includes: monitoring an editing operation on a target image to obtain a target image; performing image recognition processing on the target image to determine the target image To obtain a configuration parameter matching the identification of the target image, wherein the configuration parameter is used to represent an editing tool configured in the editing application; and the editing tool indicated by the obtained configuration parameter is presented in the editing application.
  • obtaining configuration parameters matching the identifier of the target image includes: sending an acquisition request including the identifier of the target image to the server; and receiving configuration parameters corresponding to the acquisition request sent by the server.
  • obtaining configuration parameters that match the identifier of the target image includes: selecting a tool identifier that matches the identifier of the target image in a locally pre-stored configuration database, and generating the configuration parameter according to the selected tool identifier, where The configuration database stores the correspondence between the image identifier and the tool identifier of each editing tool in the editing application.
  • performing image recognition processing on the target image to determine the identity of the target image includes: performing image recognition processing on the target image to determine whether the target image is an image of a third-party application; and in response to determining that the target image is a third-party application The image of the target image, and determine the target image identifier according to the application information of the third-party application.
  • determining the identifier of the target image according to the application information of the third-party application includes: determining the icon, name, or type of the third-party application as the identifier of the target image.
  • the configuration database includes first-type configuration data; and in a locally pre-stored configuration database, selecting a tool identifier that matches the identifier of the target image includes: in the first-type configuration data, selecting and the target The image ID matches the tool ID.
  • the configuration database further includes second-type configuration data; and in a locally pre-stored configuration database, selecting a tool identifier that matches the identifier of the target image, further includes: if the first-type configuration data includes If there is no tool identifier matching the identifier of the target image, the type of the third-party application corresponding to the target image is determined; and in the second type of configuration data, a tool identifier matching the type of the third-party application is selected.
  • performing image recognition processing on the target image to determine the identity of the target image includes: performing image recognition processing on the target image to determine whether the target image is a face image; and in response to determining that the target image is a face image, from a preset The identifier corresponding to the face image is selected as the identifier of the target image.
  • presenting the editing tool indicated by the selected configuration parameter in the editing application includes: displaying the editing tool indicated by the selected configuration parameter in the editing application and hiding other editing tools; or displaying the selected The editing tool indicated by the configuration parameter is highlighted in the editing application; or the editing tool indicated by the selected configuration parameter is displayed in the editing application, and other editing tools are contracted and displayed.
  • the method before the editing operation on the target image is monitored, the method further comprises: in response to detecting a screenshot operation, using the captured image as the target image; or in response to detecting a photographing operation, using the photographed image As the target image.
  • an embodiment of the present application proposes an apparatus for configuring an editing tool.
  • the apparatus is disposed on a terminal and includes: a first monitoring unit configured to monitor an editing operation on a target image to obtain a target image; Configured to perform image recognition processing on the target image to determine the identity of the target image; the acquisition unit is configured to obtain configuration parameters that match the identity of the target image, wherein the configuration parameter is used to characterize an editing tool configured in an editing application; The presentation unit is configured to present an editing tool indicated by the acquired configuration parameters in an editing application.
  • the obtaining unit includes: a first obtaining subunit configured to send an obtaining request including an identification of the target image to the server; and receiving configuration parameters corresponding to the obtaining request sent by the server.
  • the obtaining unit includes: a second obtaining subunit configured to select a tool identifier that matches the identifier of the target image in a locally pre-stored configuration database, and generate configuration parameters according to the selected tool identifier, where
  • the configuration database stores the correspondence between the image identifier and the tool identifier of each editing tool in the editing application.
  • the determination unit includes: a first determination subunit configured to perform image recognition processing on the target image to determine whether the target image is an image of a third-party application; and a second determination subunit configured to respond to the determination
  • the target image is an image of a third-party application, and the identifier of the target image is determined according to the application information of the third-party application.
  • the second determining sub-unit is further configured to determine an icon, name, or type of the third-party application as an identification of the target image.
  • the configuration database includes first-type configuration data; and the second acquisition subunit includes: a first acquisition module configured to select, in the first-type configuration data, a tool identifier that matches the identifier of the target image .
  • the configuration database further includes second-type configuration data; and the second acquisition subunit further includes: a second acquisition module configured to, if there is no identification with the target image in the first-type configuration data, The matched tool identifier determines the type of the third-party application corresponding to the target image; and in the second type of configuration data, a tool identifier that matches the type of the third-party application is selected.
  • the determination unit is further configured to perform image recognition processing on the target image to determine whether the target image is a face image; and in response to determining that the target image is a face image, select a corresponding one of the face image from a preset identifier.
  • logo as the logo of the target image.
  • the presentation unit includes: a first presentation sub-unit configured to display an editing tool indicated by the selected configuration parameter in an editing application and hiding other editing tools; or a second presentation sub-unit configured to To highlight the editing tool indicated by the selected configuration parameter in the editing application; or a third presentation sub-unit configured to display the editing tool indicated by the selected configuration parameter in the editing application and shrink other editing tools display.
  • the apparatus further includes: a second monitoring unit configured to use the image obtained by the screenshot as a target image in response to detecting a screenshot operation; or use the image obtained by the photograph as a target in response to detecting a photographing operation image.
  • a second monitoring unit configured to use the image obtained by the screenshot as a target image in response to detecting a screenshot operation; or use the image obtained by the photograph as a target in response to detecting a photographing operation image.
  • an embodiment of the present application proposes a method for generating configuration parameter of an editing tool, which method is used by a server and includes: receiving a request for obtaining an identifier including a target image sent by a terminal, where the identifier of the target image is When the terminal detects the editing operation on the target image, it is determined by acquiring the target image and performing image recognition processing on the target image; in a pre-stored configuration database, selecting a tool identifier that matches the identifier of the target image, where the configuration
  • the database stores the correspondence between the image identifier and the tool identifier of each editing tool in the editing application; the configuration parameters are generated according to the selected tool identifier, and the configuration parameters are sent to the terminal, so that the terminal sends the editing tool indicated by the configuration parameter Presented in the editing application.
  • the target image is an image of a third-party application
  • the identification of the target image is determined according to the application information of the third-party application, in a pre-stored configuration database
  • a match is selected with the identification of the target image.
  • the tool identifier includes: selecting a tool identifier that matches the identifier of the target image in the first type of configuration data of the configuration database.
  • selecting a tool identifier that matches the identifier of the target image in a configuration database that is locally stored in advance further includes: if there is no tool identifier that matches the identifier of the target image in the first type of configuration data, Then determine the type of the third-party application corresponding to the target image; and in the second type of configuration data of the configuration database, select a tool identifier that matches the type of the third-party application.
  • the method further includes: obtaining and analyzing a user's editing operation behavior on the terminal to update the configuration database, wherein the editing operation behavior includes an editing tool and the number of uses when editing the image.
  • acquiring and analyzing a user's editing operation behavior on the terminal to update the configuration database includes: if the configuration database does not store an identification of the target image, determining the The tool ID corresponding to the target image ID and the corresponding relationship is stored in the configuration database; or if the target database ID is stored in the configuration database, the total number of times the user uses each editing tool when editing the target image; From the largest to the smallest, a preset number of editing tools are selected from the large end; the tool identifiers of the selected preset number of editing tools are updated to the tool identifiers corresponding to the target image identifiers in the configuration database.
  • an embodiment of the present application proposes an apparatus for generating configuration parameter of an editing tool.
  • the apparatus is provided on a server and includes a receiving unit configured to receive an acquisition request including a target image identifier sent by a terminal, where The identification of the target image is determined when the terminal detects the editing operation of the target image, obtains the target image, and performs image recognition processing on the target image;
  • the selection unit is configured to select a pre-stored configuration database from A tool identifier matching the identifier of the target image, wherein the configuration database stores the correspondence between the identifier of the image and the tool identifier of each editing tool in the editing application;
  • the generating unit is configured to generate configuration parameters according to the selected tool identifier, and Send the configuration parameter to the terminal, so that the terminal presents the editing tool indicated by the configuration parameter in the editing application.
  • the selecting unit includes: a first selecting sub-unit configured to configure the database In the first type of configuration data, a tool identifier that matches the identifier of the target image is selected.
  • the selecting unit further includes: a second selecting subunit configured to determine a third-party application corresponding to the target image if there is no tool identifier matching the identifier of the target image in the first type of configuration data. And the second type of configuration data in the configuration database, select a tool identifier that matches the type of the third-party application.
  • the apparatus further includes: an update unit configured to acquire and analyze a user's editing operation behavior on the terminal to update the configuration database, wherein the editing operation behavior includes an editing tool and the number of times used when editing the image .
  • the update unit includes: a first update subunit configured to determine a target image corresponding to the target image according to a user's editing operation behavior of the target image if the target database has no identifier stored in the configuration database. Tool identification, and stores the corresponding relationship in the configuration database; or the second update subunit is configured to count the total number of times each user uses each editing tool when editing the target image if the identification of the target image is stored in the configuration database; In accordance with the total number of times, a preset number of editing tools are selected from the large end; the tool IDs of the selected preset number of editing tools are updated to the tool ID corresponding to the target image ID in the configuration database.
  • an embodiment of the present application provides an electronic device, including: one or more processors; a storage device on which one or more programs are stored; when one or more programs are processed by one or more processors Execution causes one or more processors to implement the method as described in any one of the first aspect or the third aspect above.
  • an embodiment of the present application provides a computer-readable medium on which a computer program is stored, wherein when the computer program is executed by a processor, the computer program is implemented as in any one of the first or third aspects described above. Describe the method.
  • the method for configuring an editing tool and the method for generating configuration parameters provided in the embodiments of the present application can obtain a target image when an editing operation on a target image is monitored. Thereby, image recognition processing can be performed on the target image to determine the identification of the target image. Further, configuration parameters matching the identifier of the target image can be obtained.
  • the configuration parameters may be used to represent an editing tool configured in an editing application. In this way, the editing tools indicated by the obtained configuration parameters can be presented in the editing application. That is, according to different target images, different editing tools can be presented in the editing application. In this way, it will not only help improve the editing efficiency of the image, but also improve the user experience.
  • FIG. 1 is an exemplary system architecture diagram to which an embodiment of the present application can be applied;
  • FIG. 1 is an exemplary system architecture diagram to which an embodiment of the present application can be applied;
  • FIG. 2 is a flowchart of an embodiment of a method for configuring an editing tool according to the present application
  • FIG. 3 is a flowchart of another embodiment of a method for configuring an editing tool according to the present application.
  • FIG. 4 is a flowchart of an embodiment of a method for generating configuration parameters of an editing tool according to the present application
  • FIG. 5 is a schematic diagram of an application scenario of the method for generating configuration parameters of the editing tool shown in FIG. 4;
  • FIG. 6 is a schematic structural diagram of a computer system suitable for implementing an electronic device according to an embodiment of the present application.
  • FIG. 1 illustrates an exemplary system architecture 100 to which a configuration method of an editing tool or a configuration parameter generating method of an editing tool can be applied.
  • the system architecture 100 may include terminals 101, 102, and 103, networks 104 and 105, and a server 106.
  • the network 104 may be used to provide a medium for communication links between the terminals 101, 102, 103.
  • the network 105 may be used to provide a medium for a communication link between the terminals 101, 102, 103 and the server 106.
  • the networks 104, 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables, and so on.
  • terminals 101, 102, and 103 Users can use terminals 101, 102, and 103 to interact through the network 104 to receive or send messages and the like. At the same time, the user can also use the terminals 101, 102, 103 to interact with the server 106 through the network 105 to obtain information and the like.
  • client applications such as image editing applications, chat applications, shopping applications, and instant messaging tools, can be installed on the terminals 101, 102, and 103.
  • Users can use chat applications installed on terminals 101, 102, and 103 to send messages or post status.
  • the user can also use the image editing applications provided or installed on the terminals 101, 102, 103 to edit and process the images.
  • the terminal 101, 102, 103 detects a user's editing operation on an image
  • the terminal 101, 102, 103 may acquire the image to perform analysis processing on the image.
  • the analysis processing result for example, a configuration parameter matching the image identification
  • a corresponding editing tool is presented in the image editing application for use by the user.
  • the terminals 101, 102, and 103 may be hardware or software.
  • the terminals 101, 102, and 103 can be various electronic devices with display screens, including but not limited to smartphones, tablets, wearable devices, e-book readers, MP3 players (Moving Pictures Experts Group Audio Layer III, motion picture expert compression standard audio layer 3), laptop portable computers and desktop computers, etc.
  • the terminals 101, 102, and 103 are software, they can be installed in the electronic devices listed above. It can be implemented as multiple software or software modules (for example, to provide distributed services), or it can be implemented as a single software or software module. It is not specifically limited here.
  • the server 106 may be a server that provides various services, such as a background server that provides support for various applications installed on the terminals 101, 102, and 103.
  • the background server can receive the acquisition request containing the image identifier sent by the terminals 101, 102, and 103, so that the acquisition request can be analyzed and processed.
  • the analysis processing result (for example, a configuration parameter generated according to the selected tool identifier) may be sent to the terminal. In this way, the terminal can present the editing tools indicated by the configuration parameters in an image editing application for use by the user.
  • the server 106 here may also be hardware or software.
  • the server 106 can be implemented as a distributed server cluster consisting of multiple servers, or as a single server.
  • the server 106 is software, it can be implemented as multiple software or software modules (for example, to provide distributed services), or it can be implemented as a single software or software module. It is not specifically limited here.
  • the method for configuring the editing tool provided in the embodiment of the present application is generally executed by the terminals 101, 102, and 103.
  • the method for generating the configuration parameters of the editing tool provided by the embodiment of the present application is generally executed by the server 106.
  • terminals, networks, and servers in FIG. 1 are merely exemplary. According to implementation needs, there can be any number of terminals, networks, and servers.
  • the configuration method may include the following steps:
  • Step 201 An editing operation on a target image is monitored, and a target image is acquired.
  • an execution subject (for example, the terminals 101, 102, and 103 shown in FIG. 1) of the method for configuring the editing tool may acquire the target image when the user performs an editing operation on the target image.
  • the target image may be any image that the execution subject can identify and display, such as a photo, a screenshot, or an image downloaded from the Internet.
  • the execution subject may determine that an editing operation on the target image is detected.
  • the execution subject may determine that an editing operation on the target image is detected.
  • the execution subject can directly obtain the target image from the local. Or you can get the target image by taking a screenshot or according to the import path.
  • Step 202 Perform image recognition processing on the target image to determine an identifier of the target image.
  • the execution subject may perform image recognition processing on the target image obtained in step 201, so that the identifier of the target image may be determined.
  • the identification of the target image may include, but is not limited to, at least one of the following: characters (such as text, numbers, letters, symbols, etc.), images, or trademarks.
  • the execution subject may perform image recognition processing on the target image to determine whether the target image is a face image. If it is determined that the target image is a face image, an identifier corresponding to the face image may be selected from the preset identifiers as the identifier of the target image.
  • the storage location of the preset identifier is not limited in this application. For example, it can be stored locally on the execution subject, or it can be stored on the server (such as the server 106 shown in FIG. 1).
  • the execution subject may perform face detection on the target image. If a human face is detected, it can be determined that the target image is a human face image. In this way, the execution subject may determine the identifier corresponding to the face image (such as the word "face", the head image, or the number "0") in the preset identifier as the identifier of the target image. As another example, if the execution subject detects a human face, the human face can be further recognized. And according to the recognition result of the face, the identification of the target image can be determined. As an example, personal information (such as a name) of a user corresponding to a face may be determined as an identification of a target image. The identifier corresponding to the user in the preset identifier may also be determined as the identifier of the target image.
  • the execution subject may also perform image recognition processing on the target image, so as to select an image that matches the target image (for example, the similarity is not less than 80%) from the pre-stored image set.
  • the images in the image collection may be preset with an image identifier (such as an image name, number, or type). In this way, the image identifier of the selected image can be used as the identifier of the target image.
  • the execution subject may also perform image recognition processing on the target image to determine whether the target image is an image of a third-party application. If it is determined that the target image is an image of a third-party application, the identification of the target image may be determined according to the application information of the third-party application.
  • the third-party application may be an application installed on the execution body, or may be an application that has been released but not installed on the execution body.
  • Step 203 Obtain a configuration parameter that matches the identifier of the target image.
  • the execution subject may obtain configuration parameters that match the identification of the target image.
  • the configuration parameters may be used to represent an editing tool configured in an editing application.
  • the editing application here can be various applications for editing and processing images, such as PS (photoshop) software.
  • the editing tool can be various tools in the function menu of the editing application, such as cutting, graffiti, and the like.
  • the tool identification can be used to uniquely identify each editing tool in the editing application.
  • the tool identification may include, but is not limited to, at least one of characters such as numbers, letters, and characters.
  • the editing tools required may be different.
  • editing tools such as noise reduction and whitening, stretching, and decoration are generally required.
  • privacy-related images such as chat history
  • the execution subject when it determines the identity of the target image, it may generate an acquisition request that includes the identity of the target image.
  • the acquisition request can be used to request configuration parameters.
  • the execution body can send an acquisition request to the server. It can also receive the configuration parameters corresponding to the acquisition request sent by the server, that is, the configuration parameters that match the identification of the target image.
  • the execution subject may also select a tool identifier that matches the identifier of the target image in a configuration database stored locally in advance.
  • the configuration database may store a correspondence between an image identifier and a tool identifier of each editing tool in an editing application.
  • the execution body can generate configuration parameters according to the selected tool identification.
  • the selected tool identifier can be directly used as a configuration parameter.
  • the selected tool identifiers can be sorted according to the user's usage habits or the sequence of letters (numbers). Thus, the sorted tool identifier is used as a configuration parameter.
  • Step 204 Present the editing tool indicated by the obtained configuration parameters in an editing application.
  • the execution body may present the editing tool indicated by the obtained configuration parameters in the editing application.
  • the user can edit the target image according to the editing tools presented in the editing application.
  • the presentation mode and presentation position can be set according to the actual situation.
  • the execution body may display the editing tools indicated by the selected configuration parameter in the editing application, and hide other editing tools.
  • the execution body may highlight an editing tool indicated by the selected configuration parameter in the editing application.
  • the highlighting may include, but is not limited to, at least one of the following: increasing an icon, adding a shading or background color, changing a color, bolding, or displaying in a specified area (such as the right side of an editing application).
  • other editing tools can be shown or hidden normally.
  • the execution body may display the editing tool indicated by the selected configuration parameter in the editing application, and shrink and display other editing tools.
  • the shrink display here can be to reduce the icons of other editing tools. You can also place the icons of other editing tools in a menu or toolbar. This allows users to quickly find the editing tools they need, thereby improving the efficiency of image editing processing.
  • the foregoing presentation manner may be fixed or adjustable.
  • the user can switch and adjust the presentation mode according to personal needs. This can facilitate user operations, improve the efficiency of image editing, and help improve the user experience.
  • the method for configuring an editing tool can acquire a target image when an editing operation on the target image is monitored. Thereby, image recognition processing can be performed on the target image to determine the identification of the target image. Further, configuration parameters matching the identifier of the target image can be obtained.
  • the configuration parameters may be used to represent an editing tool configured in an editing application. In this way, the editing tools indicated by the obtained configuration parameters can be presented in the editing application. That is, according to different target images, different editing tools can be presented in the editing application. In this way, it will not only help improve the editing efficiency of the image, but also improve the user experience.
  • FIG. 3 it illustrates a flow 300 of still another embodiment of a method for configuring an editing tool according to the present application.
  • the configuration method may include the following steps:
  • step 301a in response to detecting a screenshot operation, the captured image is used as a target image.
  • an execution subject of the configuration method of the editing tool detects a screenshot operation, for example, when a screenshot button is triggered, the screenshot obtained The image is used as the target image.
  • the screenshot operation here can be a screenshot operation or a partial screenshot operation.
  • the execution subject may store the image obtained by the screenshot in a folder for storing the target image. And / or a label used to characterize the target image may be added to the captured image.
  • Step 301b In response to detecting a photographing operation, use a photographed image as a target image.
  • the image obtained by the photographing may be used as the target image.
  • the execution subject may store an image obtained by taking a picture in a folder for storing a target image. And / or a label used to characterize the target image may be added to the image obtained by taking the picture.
  • step 302 an editing operation on a target image is monitored, and a target image is acquired.
  • the target image when the execution subject monitors the editing operation on the target image, the target image may be acquired. For example, if the execution subject detects that the user edits the image in the folder for storing the target image, it can be determined that the editing operation on the target image is detected. As another example, if the execution subject detects that the image edited by the user has a label used to characterize the target image, it can be determined that the editing operation on the target image is detected.
  • Step 303 Perform image recognition processing on the target image to determine whether the target image is an image of a third-party application.
  • the execution subject may perform image recognition processing on the target image to determine whether the target image is an image of a third-party application.
  • the third-party application here may be an application installed on the execution main body, or may be an application that has been released and is not installed on the execution main body.
  • the image of the third-party application may be obtained by the user using the execution subject to perform a screenshot operation, or may be obtained by the user using a camera on the execution subject.
  • the execution subject may identify whether the target image contains application information (such as a name, icon, etc.) of a third-party application. If the application information of the third-party application is identified in the target image, it can be determined that the target image is an image of the third-party application.
  • application information such as a name, icon, etc.
  • the execution subject may recognize the overall layout structure of the target image (such as the display position and arrangement of the content). And can determine whether there are pages of third-party applications with the same layout structure. If there is a page of a third-party application with the same layout structure, it can be determined that the target image is an image of the third-party application.
  • the execution subject may also input the target image into a pre-trained image recognition model.
  • the image recognition model can be used to identify whether the input image is an image of a third-party application. In this way, the execution subject can determine whether the target image is an image of a third-party application according to the output result of the image recognition model.
  • an image recognition model can be trained by the following steps: First, a sample set can be collected. The samples in the sample set may include images of various pages in the third-party application and image tags corresponding to the images.
  • the image tag may be used to characterize an image as an image of a third-party application and / or a third-party application to which the image belongs.
  • the image of various pages in the sample can be used as an input, and the image label corresponding to the input image is used as an output to train the initial model to obtain an image recognition model.
  • the initial model may be various existing learning models created based on machine learning technology.
  • Step 304 In response to determining that the target image is an image of a third-party application, determine an identifier of the target image according to the application information of the third-party application.
  • the identifier of the target image may be determined according to the application information of the third-party application.
  • the execution subject may use the name or icon of the third-party application as the identification of the target image.
  • the execution subject may determine the type of the third-party application, such as shopping, news, chat, etc., so that the type of the third-party application may be used as the target image identifier.
  • a list of commonly used applications may be set in advance. The list can store the names and numbers of commonly used third-party applications.
  • the execution subject may determine whether there is a third-party application corresponding to the target image in the commonly used application list. If it exists, the number of the third-party application may be determined as the identifier of the target image. If it does not exist, the third-party application can be stored in the frequently used application list in order. At this time, the number of the third-party application may be determined as the identifier of the target image.
  • Step 305a In the first type of configuration data, select a tool identifier that matches the identifier of the target image.
  • the configuration database stored locally in advance by the execution subject may include the first type of configuration data.
  • the first type of configuration data may be used to describe a preset tool identifier corresponding to a third-party application.
  • the execution subject may select a tool identifier that matches the identifier of the target image in the first type of configuration data.
  • the preset third-party applications here can be various published applications, such as applications commonly used by users. That is, the tool identifiers corresponding to several third-party applications can be preset in the configuration database, as shown in Table 1.
  • the name, icon, or the above-mentioned number of the third-party application may be associated with the tool identifier.
  • the identification of the target image is determined according to the application information of the third-party application. Therefore, if the preset third-party application includes a third-party application corresponding to the target image, a tool identifier that matches the identifier of the target image may be selected in the first type of configuration data. Then, step 306 can be continued. If the preset third-party application does not include a third-party application corresponding to the target image, it may be explained that there is no tool identifier matching the identifier of the target image in the first type of configuration data. At this point, step 305b can be continued.
  • the first type of configuration data may also be used to describe a tool identifier corresponding to a preset type of third-party application.
  • the preset type here may be a type to which various published third-party applications belong, such as shopping, video, and game.
  • the type of the third-party application can be user-defined or defined by the publisher of the third-party application. That is, several types of third-party application common tool identifiers can be preset in the configuration database, as shown in Table 2.
  • a tool identification that matches the identification of the target image may be selected in the first type of configuration data. That is, the tool identifier corresponding to the type of the third-party application indicated by the identifier of the target image. Or the execution subject may determine the type of the third-party application corresponding to the target image (or the identification of the target image). Furthermore, in the first type of configuration data, a tool identifier corresponding to the type of the third-party application can be selected. It is the tool ID that matches the ID of the target image.
  • Step 305b if there is no tool identifier matching the identifier of the target image in the first type of configuration data, determine the type of the third-party application corresponding to the target image.
  • the execution subject may further determine the type of the third-party application corresponding to the target image. As an example, the execution subject may determine the type of the third-party application according to the type defined by the third-party application at the time of release, or may be based on statistical analysis of big data.
  • Step 305c In the second type of configuration data, select a tool identifier that matches the type of the third-party application.
  • the configuration database may further include a second type of configuration data.
  • the second type of configuration data may be used to describe a tool identifier corresponding to a preset type of third-party application.
  • the execution entity may select a tool identifier that matches the type of the third-party application determined in step 305b in the second type of configuration data.
  • Step 306 Generate configuration parameters according to the selected tool identifier, and present the editing tools indicated by the configuration parameters in the editing application.
  • the execution body may generate configuration parameters according to the selected tool identifier.
  • the configuration parameters may be used to represent an editing tool configured in an editing application.
  • step 203 in the embodiment of FIG. 2, and details are not described herein again.
  • the editing tools indicated by the generated configuration parameters can be presented in an editing application for use by the user.
  • step 204 in the embodiment of FIG. 2, and details are not described herein again.
  • the tool identifiers corresponding to different third-party applications are set in the configuration database. This results in targeted configuration parameters that can render the editing tools you need in your editing application. Not only helps to improve the efficiency of image processing, but also helps improve the user experience. And the tool identifiers corresponding to different types of third-party applications are set in the configuration database, that is, the tool identifiers corresponding to the same type of third-party applications are universal. This can reduce or avoid the occurrence of matching failures and increase the scope of the method. It should be noted that if no configuration parameter matching the identifier of the target image is obtained, the execution body may not perform any processing on the editing tools in the editing application, that is, display the editing application normally.
  • the method for configuring an editing tool describes, in detail, for a target image of an image belonging to a third-party application, an identification of the target image and a process of generating corresponding configuration parameters.
  • the process of the configuration method is enriched and improved, which helps to make the configuration result (that is, the editing tool indicated by the configuration parameter) more in line with the user's needs.
  • FIG. 4 illustrates a process 400 of an embodiment of a method for generating configuration parameters of an editing tool according to the present application.
  • the generating method may include the following steps:
  • Step 401 Receive an acquisition request including an identifier of a target image sent by a terminal.
  • the execution subject of the method for generating the configuration parameters of the editing tool may receive a terminal (for example, the terminal 101 shown in FIG. (102, 103) an acquisition request that includes an identifier of a target image.
  • the target image may be any image that the terminal can recognize and display, such as a photo, a screenshot, or an image downloaded from the network.
  • the identification of the target image may be determined by the terminal acquiring the target image and performing image recognition processing on the target image when the terminal detects an editing operation on the target image. Reference may be made to the related descriptions in the embodiments of FIG. 2 and FIG. 3, and details are not described herein again.
  • Step 402 Select a tool identifier that matches the identifier of the target image from a pre-stored configuration database.
  • the execution subject may select a tool identifier that matches the identifier of the target image in a pre-stored configuration database.
  • the configuration database may store a correspondence between an image identifier and a tool identifier of each editing tool in an editing application.
  • the target image is a face image.
  • the execution subject may select a tool identifier matching the face identifier in the configuration database.
  • the editing application may be various applications for editing a processed image.
  • the editing tool can be various tools in the function menu of the editing application, such as cutting, graffiti, and the like.
  • the tool identification can be used to uniquely identify each editing tool in the editing application.
  • the tool identification may include, but is not limited to, at least one of characters such as numbers, letters, and characters.
  • the target image may be an image of a third-party application.
  • the identification of the target image may be determined according to the application information of the third-party application.
  • the configuration database may include the first type of configuration data.
  • the first type of configuration data may be used to describe a preset tool identifier corresponding to a third-party application. In this way, the execution subject may select a tool identifier that matches the identifier of the target image in the first type of configuration data.
  • the first type of configuration data may also be used to describe a tool identifier corresponding to a preset type of third-party application.
  • the execution subject may determine the type of the third-party application corresponding to the target image. Therefore, in the first type of configuration data, a tool identifier corresponding to the type can be selected, that is, a tool identifier that matches the identifier of the target image. For details, reference may be made to step 305a in the embodiment of FIG. 3, and details are not described herein again.
  • the configuration database may further include a second type of configuration data.
  • the second type of configuration data may be used to describe a tool identifier corresponding to a preset type of third-party application.
  • the execution subject may determine the type of the third-party application corresponding to the target image.
  • a tool identifier that matches the type of the third-party application can be selected. For details, reference may be made to the description in steps 305b to 305c in the embodiment of FIG. 3, and details are not described herein again.
  • Step 403 Generate configuration parameters according to the selected tool identifier, and send the configuration parameters to the terminal.
  • the execution body may generate configuration parameters according to the selected tool identifier.
  • the configuration parameters can be sent to the terminal through wired or wireless connection.
  • the terminal can be caused to present the editing tool indicated by the configuration parameter in the editing application.
  • the execution subject may also obtain and analyze the editing operation behavior of the user on the terminal to update the configuration database.
  • the editing operation behavior may include an editing tool and the number of times used when editing an image.
  • the execution subject may determine a tool identifier corresponding to the identifier of the target image according to a user's editing operation behavior of the target image.
  • the tool identifiers of all editing tools used when the user edits the target image may be determined as the tool identifiers corresponding to the identifiers of the target image.
  • the total number of times each editing tool is used when the user edits the target image can be counted. In accordance with the total number of times, select a certain number of editing tools (such as 5 or half of the total) from the big end.
  • the tool identifier of the selected editing tool is determined as the tool identifier corresponding to the identifier of the target image.
  • the selection method here is not limited in this application. For example, you can choose in order, lottery or interval.
  • the execution subject can store the corresponding relationship (that is, the tool identifier corresponding to the identifier of the target image) into the configuration database. That is, new data can be added to the configuration data. This will help improve the accuracy of the generated results.
  • the execution subject may count the total number of times the user uses each editing tool when editing the target image. You can select a preset number of editing tools from the big end in the order of the total number of times. In this way, the tool identifiers of the selected preset number of editing tools can be updated to the tool identifiers corresponding to the identifiers of the target image in the configuration database. In other words, you can update the existing data in the configuration data. This can make the generated results more consistent with user needs.
  • the terminal may periodically (for example, every 3 days) obtain data from the execution subject to update the local configuration database.
  • the execution body can send an update notification to the terminal.
  • the update notification may be used to indicate that the configuration database is updated.
  • the terminal receives the update notification, it can obtain data from the execution subject to update the local configuration database. This helps improve the accuracy of the configuration results on the terminal and also makes the configuration results more in line with user requirements.
  • the data obtained here can be all the data of the updated configuration database. In order to improve the data transmission efficiency, the acquired data may also be only the updated data in the configuration database.
  • FIG. 5 is a schematic diagram of an application scenario of a method for generating configuration parameters of an editing tool according to the embodiment in FIG. 4.
  • a user may install a chat application on the terminal 101 used by the user. And you can communicate with other users through the chat app. For example, the chat history with user A may be sent to user B.
  • the user can open a dialog page with the user A on the terminal 101. Then, a screenshot operation is performed to obtain a screenshot image of the chat record with the user A. But before sending the screenshot image to user B, the user wants to process some information in the screenshot image. At this time, the user may perform an editing operation using an editing application provided in the terminal 101.
  • the terminal 101 When the terminal 101 detects a user's editing operation on the screenshot image, it can perform image recognition processing on the screenshot image. In the case where it is determined that it is an image of the chat application “**”, the name ** of the chat application may be used as the identifier of the screenshot image. Further, an acquisition request including an identification ** can be generated and sent to the server 106.
  • the server 106 may select a tool identification that matches the identification ** in a pre-stored configuration database, such as tool identifications 1 and 2. Then, the configuration parameters can be generated according to the tool IDs 1 and 2. The configuration parameter may be fed back to the terminal 101.
  • the terminal 101 may present the editing tools (such as erasure and graffiti) indicated by the configuration parameters (that is, the tool identifications 1 and 2) in the editing application.
  • the editing tools such as erasure and graffiti
  • users can use these editing tools to quickly process screenshots. For example, erasing the hidden information in the screenshot image, and using the red circle to highlight the information that you want to highlight. In this way, the user can use the terminal 101 to send the processed screenshot image to the terminal 102 used by the user B.
  • the method for generating configuration parameters of the editing tool may select a tool identifier that matches the identifier of the target image in a pre-stored configuration database according to the identifier of the target image in the received acquisition request.
  • the identification of the target image is determined when the terminal detects the editing operation on the target image, obtains the target image, and performs image recognition processing on the target image. Therefore, configuration parameters can be generated according to the selected tool identifier. Further, the configuration parameters can be fed back to the terminal as response information of the acquisition request. In this way, the terminal can be made to present the editing tool indicated by the configuration parameters in the editing application for use by the user.
  • different editing tools can be presented in the editing application according to different target images. This helps to improve the editing efficiency of the image and also enhances the user experience.
  • FIG. 6 a schematic structural diagram of a computer system 600 suitable for implementing an electronic device (such as the terminals 101, 102, 103, or the server 106 shown in FIG. 1) according to the embodiment of the present application is shown.
  • the electronic device shown in FIG. 6 is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present application.
  • the computer system 600 includes a central processing unit (CPU) 601, which can be loaded into a random access memory (RAM) 603 according to a program stored in a read-only memory (ROM) 602 or from a storage portion 608. Instead, perform various appropriate actions and processes.
  • RAM random access memory
  • ROM read-only memory
  • various programs and data required for the operation of the system 600 are also stored.
  • the CPU 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604.
  • An input / output (I / O) interface 605 is also connected to the bus 604.
  • the following components are connected to the I / O interface 605: an input portion 606 including a touch screen, buttons, a mouse, a microphone, a camera, etc .; an output portion 607 including a cathode ray tube (CRT) and / or a liquid crystal display (LCD), and a speaker, etc.
  • a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, and the like.
  • the communication section 609 performs communication processing via a network such as the Internet.
  • the driver 610 is also connected to the I / O interface 605 as necessary.
  • a removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 610 as needed, so that a computer program read therefrom is installed into the storage section 608 as needed.
  • the process described above with reference to the flowchart may be implemented as a computer software program.
  • embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing a method shown in a flowchart.
  • the computer program may be downloaded and installed from a network through the communication portion 609, and / or installed from a removable medium 611.
  • CPU central processing unit
  • the computer-readable medium of the present application may be a computer-readable signal medium or a computer-readable storage medium or any combination of the foregoing.
  • the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programming read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • a computer-readable medium may be any tangible medium that contains or stores a program that can be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal that is included in baseband or propagated as part of a carrier wave, and which carries computer-readable program code. Such a propagated data signal may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device .
  • Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • each block in the flowchart or block diagram may represent a module, a program segment, or a part of code, which contains one or more functions to implement a specified logical function Executable instructions.
  • the functions noted in the blocks may also occur in a different order than those marked in the drawings. For example, two successively represented boxes may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagrams and / or flowcharts, and combinations of blocks in the block diagrams and / or flowcharts can be implemented by a dedicated hardware-based system that performs the specified function or operation , Or it can be implemented with a combination of dedicated hardware and computer instructions.
  • the units described in the embodiments of the present application may be implemented by software or hardware.
  • the described unit may also be provided in a processor, for example, it may be described as: a processor includes a first monitoring unit, a determining unit, an obtaining unit, and a presentation unit.
  • a processor includes a receiving unit, a selecting unit, and a generating unit.
  • the names of these units do not constitute a limitation on the unit itself in some cases.
  • the first monitoring unit may also be described as a “unit that detects an editing operation on a target image and obtains a target image”.
  • the present application also provides a computer-readable medium, which may be included in the electronic device described in the foregoing embodiments; or may exist alone without being assembled into the electronic device in.
  • the computer-readable medium carries one or more programs, and when the one or more programs are executed by the electronic device, the electronic device: monitors an editing operation on a target image to obtain a target image; Perform image recognition processing to determine the identity of the target image; obtain configuration parameters that match the identity of the target image, where the configuration parameters are used to characterize the editing tools configured in the editing application; present the editing tools indicated by the obtained configuration parameters in Editing application.
  • the electronic device may be further configured to: receive an acquisition request that includes an identifier of a target image sent by the terminal, where the identifier of the target image is that the terminal is monitoring the target.
  • the image is edited, it is determined by obtaining the target image and performing image recognition processing on the target image.
  • a tool identifier matching the identifier of the target image is selected, where the configuration database stores the image of the The correspondence between the identifier and the tool identifier of each editing tool in the editing application; generating configuration parameters according to the selected tool identifier, and sending the configuration parameters to the terminal, so that the terminal presents the editing tool indicated by the configuration parameter in the editing application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本申请实施例公开了编辑工具的配置方法和配置参数的生成方法。该方法的一具体实施方式包括:监测到对目标图像的编辑操作,获取目标图像;对目标图像进行图像识别处理,确定目标图像的标识;获取与目标图像的标识匹配的配置参数,其中,配置参数用于表征编辑应用中所配置的编辑工具;将获取的配置参数所指示的编辑工具呈现在编辑应用中。该实施方式可以根据目标图像的不同,从而在编辑应用中呈现不同的编辑工具。这样有助于提高图像的编辑效率,也有利于提升用户体验。

Description

编辑工具的配置方法和配置参数的生成方法 技术领域
本申请实施例涉及计算机技术领域,具体涉及编辑工具的配置方法和配置参数的生成方法。
背景技术
随着互联网技术的发展,人们普遍会使用一些应用软件,来分享日常生活或进行交流联络。例如,人们可以利用应用软件将图像发送给其他人或进行分享。
通常情况下,由于图像中常常会涉及敏感信息,如个人信息等,因此人们在发送或分享之前,需要对图像进行一定的编辑处理。目前常用的编辑方法是,用户打开其所使用的终端上自带的编辑工具或安装的修图软件进行手动编辑处理。然而,对于不同的图像,编辑工具中呈现的功能菜单往往是相同的。
发明内容
本申请实施例提出了编辑工具的配置方法和配置参数的生成方法。
第一方面,本申请实施例提出了一种编辑工具的配置方法,该方法用于终端,包括:监测到对目标图像的编辑操作,获取目标图像;对目标图像进行图像识别处理,确定目标图像的标识;获取与目标图像的标识匹配的配置参数,其中,配置参数用于表征编辑应用中所配置的编辑工具;将获取的配置参数所指示的编辑工具呈现在编辑应用中。
在一些实施例中,获取与目标图像的标识匹配的配置参数,包括:向服务端发送包括目标图像的标识的获取请求;以及接收服务端发送的与获取请求对应的配置参数。
在一些实施例中,获取与目标图像的标识匹配的配置参数,包括:在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,并根据选 取的工具标识生成配置参数,其中,配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系。
在一些实施例中,对目标图像进行图像识别处理,确定目标图像的标识,包括:对目标图像进行图像识别处理,确定目标图像是否为第三方应用的图像;响应于确定目标图像为第三方应用的图像,根据第三方应用的应用信息确定目标图像的标识。
在一些实施例中,根据第三方应用的应用信息确定目标图像的标识,包括:将第三方应用的图标、名称或类型确定为目标图像的标识。
在一些实施例中,配置数据库中包括第一类配置数据;以及在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,包括:在第一类配置数据中,选取与目标图像的标识匹配的工具标识。
在一些实施例中,配置数据库中还包括第二类配置数据;以及在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,还包括:若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则确定目标图像对应的第三方应用的类型;以及在第二类配置数据中,选取与第三方应用的类型匹配的工具标识。
在一些实施例中,对目标图像进行图像识别处理,确定目标图像的标识,包括:对目标图像进行图像识别处理,确定目标图像是否为人脸图像;响应于确定目标图像为人脸图像,从预设标识中选取与人脸图像对应的标识,作为目标图像的标识。
在一些实施例中,将选取的配置参数所指示的编辑工具呈现在编辑应用中,包括:将选取的配置参数所指示的编辑工具显示在编辑应用中,且隐藏其他编辑工具;或者将选取的配置参数所指示的编辑工具突出显示在编辑应用中;或者将选取的配置参数所指示的编辑工具显示在编辑应用中,且将其他编辑工具收缩显示。
在一些实施例中,监测到对目标图像的编辑操作之前,该方法还包括:响应于监测到截图操作,将截图得到的图像作为目标图像;或者响应于监测到拍照操作,将拍照得到的图像作为目标图像。
第二方面,本申请实施例提出了一种编辑工具的配置装置,该装置设置于 终端,包括:第一监测单元,被配置成监测到对目标图像的编辑操作,获取目标图像;确定单元,被配置成对目标图像进行图像识别处理,确定目标图像的标识;获取单元,被配置成获取与目标图像的标识匹配的配置参数,其中,配置参数用于表征编辑应用中所配置的编辑工具;呈现单元,被配置成将获取的配置参数所指示的编辑工具呈现在编辑应用中。
在一些实施例中,获取单元包括:第一获取子单元,被配置成向服务端发送包括目标图像的标识的获取请求;以及接收服务端发送的与获取请求对应的配置参数。
在一些实施例中,获取单元包括:第二获取子单元,被配置成在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,并根据选取的工具标识生成配置参数,其中,配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系。
在一些实施例中,确定单元包括:第一确定子单元,被配置成对目标图像进行图像识别处理,确定目标图像是否为第三方应用的图像;第二确定子单元,被配置成响应于确定目标图像为第三方应用的图像,根据第三方应用的应用信息确定目标图像的标识。
在一些实施例中,第二确定子单元进一步被配置成:将第三方应用的图标、名称或类型确定为目标图像的标识。
在一些实施例中,配置数据库中包括第一类配置数据;以及第二获取子单元包括:第一获取模块,被配置成在第一类配置数据中,选取与目标图像的标识匹配的工具标识。
在一些实施例中,配置数据库中还包括第二类配置数据;以及第二获取子单元还包括:第二获取模块,被配置成若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则确定目标图像对应的第三方应用的类型;以及在第二类配置数据中,选取与第三方应用的类型匹配的工具标识。
在一些实施例中,确定单元进一步被配置成:对目标图像进行图像识别处理,确定目标图像是否为人脸图像;响应于确定目标图像为人脸图像,从预设标识中选取与人脸图像对应的标识,作为目标图像的标识。
在一些实施例中,呈现单元包括:第一呈现子单元,被配置成将选取的配 置参数所指示的编辑工具显示在编辑应用中,且隐藏其他编辑工具;或者第二呈现子单元,被配置成将选取的配置参数所指示的编辑工具突出显示在编辑应用中;或者第三呈现子单元,被配置成将选取的配置参数所指示的编辑工具显示在编辑应用中,且将其他编辑工具收缩显示。
在一些实施例中,该装置还包括:第二监测单元,被配置成响应于监测到截图操作,将截图得到的图像作为目标图像;或者响应于监测到拍照操作,将拍照得到的图像作为目标图像。
第三方面,本申请实施例提出了一种编辑工具的配置参数的生成方法,该方法用于服务端,包括:接收终端发送的包括目标图像的标识的获取请求,其中,目标图像的标识是终端在监测到对目标图像的编辑操作时,获取目标图像,并对目标图像进行图像识别处理而确定的;在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,其中,配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系;根据选取的工具标识生成配置参数,并将配置参数发送给终端,以使终端将配置参数所指示的编辑工具呈现在编辑应用中。
在一些实施例中,若目标图像为第三方应用的图像,且目标图像的标识是根据第三方应用的应用信息而确定的,则在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,包括:在配置数据库的第一类配置数据中,选取与目标图像的标识匹配的工具标识。
在一些实施例中,在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,还包括:若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则确定目标图像对应的第三方应用的类型;以及在配置数据库的第二类配置数据中,选取与第三方应用的类型匹配的工具标识。
在一些实施例中,该方法还包括:获取并分析用户在终端上的编辑操作行为,以更新配置数据库,其中,编辑操作行为包括编辑图像时使用的编辑工具和使用次数。
在一些实施例中,获取并分析用户在终端上的编辑操作行为,以更新配置数据库,包括:若配置数据库中未存储有目标图像的标识,则根据用户对目标图像的编辑操作行为,确定与目标图像的标识对应的工具标识,并将对应关系 存储至配置数据库中;或者若配置数据库中存储有目标图像的标识,则统计用户在编辑目标图像时使用各编辑工具的总次数;按照总次数由大到小的顺序,从大的一端选取预设数目个编辑工具;将选取的预设数目个编辑工具的工具标识,更新为配置数据库中与目标图像的标识对应的工具标识。
第四方面,本申请实施例提出了一种编辑工具的配置参数的生成装置,该装置设置于服务端,包括:接收单元,被配置成接收终端发送的包括目标图像的标识的获取请求,其中,目标图像的标识是终端在监测到对目标图像的编辑操作时,获取目标图像,并对目标图像进行图像识别处理而确定的;选取单元,被配置成在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,其中,配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系;生成单元,被配置成根据选取的工具标识生成配置参数,并将配置参数发送给终端,以使终端将配置参数所指示的编辑工具呈现在编辑应用中。
在一些实施例中,若目标图像为第三方应用的图像,且目标图像的标识是根据第三方应用的应用信息而确定的,则选取单元包括:第一选取子单元,被配置成在配置数据库的第一类配置数据中,选取与目标图像的标识匹配的工具标识。
在一些实施例中,选取单元还包括:第二选取子单元,被配置成若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则确定目标图像对应的第三方应用的类型;以及在配置数据库的第二类配置数据中,选取与第三方应用的类型匹配的工具标识。
在一些实施例中,该装置还包括:更新单元,被配置成获取并分析用户在终端上的编辑操作行为,以更新配置数据库,其中,编辑操作行为包括编辑图像时使用的编辑工具和使用次数。
在一些实施例中,更新单元包括:第一更新子单元,被配置成若配置数据库中未存储有目标图像的标识,则根据用户对目标图像的编辑操作行为,确定与目标图像的标识对应的工具标识,并将对应关系存储至配置数据库中;或者第二更新子单元,被配置成若配置数据库中存储有目标图像的标识,则统计用户在编辑目标图像时使用各编辑工具的总次数;按照总次数由大到小的顺序,从大的一端选取预设数目个编辑工具;将选取的预设数目个编辑工具的工具标 识,更新为配置数据库中与目标图像的标识对应的工具标识。
第五方面,本申请实施例提出了一种电子设备,包括:一个或多个处理器;存储装置,其上存储有一个或多个程序;当一个或多个程序被一个或多个处理器执行,使得一个或多个处理器实现如上述第一方面或第三方面中任一实施例所描述的方法。
第六方面,本申请实施例提出了一种计算机可读介质,其上存储有计算机程序,其中,该计算机程序被处理器执行时实现如上述第一方面或第三方面中任一实施例所描述的方法。
本申请实施例提出的编辑工具的配置方法和配置参数的生成方法,在监测到对目标图像的编辑操作的情况下,可以获取目标图像。从而可以对目标图像进行图像识别处理,以确定目标图像的标识。进而可以获取与目标图像的标识匹配的配置参数。其中,配置参数可以用于表征编辑应用中所配置的编辑工具。这样就可以将获取的配置参数所指示的编辑工具呈现在编辑应用中。即可以根据不同的目标图像,在编辑应用中呈现不同的编辑工具。这样,不仅有助于提高图像的编辑效率,也有利于提升用户体验。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1是本申请的一个实施例可以应用于其中的示例性系统架构图;
图2是根据本申请的编辑工具的配置方法的一个实施例的流程图;
图3是根据本申请的编辑工具的配置方法的又一个实施例的流程图;
图4是根据本申请的编辑工具的配置参数的生成方法的一个实施例的流程图;
图5是图4所示的编辑工具的配置参数的生成方法的一个应用场景的示意图;
图6是适于用来实现本申请实施例的电子设备的计算机系统的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与有关发明相关的部分。
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。
图1示出了可以应用本申请实施例的编辑工具的配置方法或编辑工具的配置参数的生成方法的示例性系统架构100。
如图1所示,系统架构100可以包括终端101、102、103,网络104、105和服务端106。网络104可以用以在终端101、102、103之间提供通信链路的介质。网络105可以用以在终端101、102、103与服务端106之间提供通信链路的介质。网络104、105可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
用户之间可以使用终端101、102、103通过网络104进行交互,以接收或发送消息等。同时,用户还可以使用终端101、102、103通过网络105与服务端106进行交互,以获取信息等。终端101、102、103上可以安装有各种客户端应用,例如图像编辑类应用、聊天类应用、购物类应用和即时通讯工具等。
用户可以使用终端101、102、103上安装的聊天类应用发送消息或发表状态等。并且用户也可以使用终端101、102、103上自带的或安装的图像编辑类应用来编辑处理图像。终端101、102、103在监测到用户对图像的编辑操作时,可以获取该图像,以对该图像进行分析处理。并且可以根据分析处理结果(例如与图像的标识匹配的配置参数),在图像编辑类应用中呈现对应的编辑工具,以供用户使用。
这里的终端101、102、103可以是硬件,也可以是软件。当终端101、102、103为硬件时,可以是具有显示屏的各种电子设备,包括但不限于智能手机、平板电脑、可穿戴设备、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、膝上型便携计算机和台式计算机等等。当终端101、102、103为软件时,可以安装在上述所列举的电子设备中。其可以实现成多个软件或软件模块(例如用来提供分布式服务),也可以实现成单个软件或软件模块。在此不做具体限定。
服务端106可以是提供各种服务的服务端,例如可以是对终端101、102、103上安装的各种应用提供支持的后台服务器。后台服务器可以接收终端101、102、103发送的包含图像的标识的获取请求,从而可以对该获取请求进行分析处理。并可以将分析处理结果(例如根据选取的工具标识生成的配置参数)发送给终端。这样,终端可以将配置参数所指示的编辑工具呈现在图像编辑类应用中,以供用户使用。
这里的服务端106同样可以是硬件,也可以是软件。当服务端106为硬件时,可以实现成多个服务端组成的分布式服务端集群,也可以实现成单个服务端。当服务端106为软件时,可以实现成多个软件或软件模块(例如用来提供分布式服务),也可以实现成单个软件或软件模块。在此不做具体限定。
需要说明的是,本申请实施例所提供的编辑工具的配置方法一般由终端101、102、103执行。而本申请实施例所提供的编辑工具的配置参数的生成方法一般由服务端106执行。
应该理解,图1中的终端、网络和服务端的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端、网络和服务端。
继续参见图2,其示出了根据本申请的编辑工具的配置方法的一个实施例的流程200。该配置方法可以包括以下步骤:
步骤201,监测到对目标图像的编辑操作,获取目标图像。
在本实施例中,编辑工具的配置方法的执行主体(例如图1所示的终端101、102、103)在监测到用户对目标图像的编辑操作时,可以获取目标图像。其中,目标图像可以是执行主体能够识别显示的任意图像,如照片、截图或网络上下载的图像等。
例如,对于屏幕上当前所显示目标图像,若用户触发了编辑按键(可以是虚拟按键或物理按键),则执行主体可以确定监测到了对目标图像的编辑操作。再例如,若用户打开了执行主体上所安装的用于编辑图像的编辑应用,并在编辑应用中导入了目标图像,则执行主体可以确定监测到了对目标图像的编辑操作。此时,执行主体可以从本地直接获取目标图像。或者也可以通过截屏或根据导入路径来获取目标图像。
步骤202,对目标图像进行图像识别处理,确定目标图像的标识。
在本实施例中,执行主体可以对步骤201中获取的目标图像进行图像识别处理,从而可以确定目标图像的标识。其中,目标图像的标识可以包括(但不限于)以下至少一种:字符(如文字、数字、字母、符号等)、图像或商标等。
在本实施例的一些可选地实现方式中,执行主体可以对目标图像进行图像识别处理,确定目标图像是否为人脸图像。若确定目标图像为人脸图像,则可以从预设标识中选取与人脸图像对应的标识,作为目标图像的标识。其中,预设标识的存储位置在本申请中并不限制。如可以存储在执行主体的本地,也可以存储在服务端(例如图1所示的服务端106)。
例如,执行主体可以对目标图像进行人脸检测。若检测到人脸,则可以确定目标图像是人脸图像。这样,执行主体可以将预设标识中与人脸图像对应的标识(如“人脸”二字、人头图像或数字“0”),确定为目标图像的标识。再例如,若执行主体检测到人脸,则可以进一步地识别人脸。并可以根据人脸的识别结果,确定目标图像的标识。作为示例,可以将人脸对应的用户的个人信息(如姓名)确定为目标图像的标识。也可以将预设标识中与该用户对应的标识确定为目标图像的标识。
可选地,执行主体也可以对目标图像进行图像识别处理,从而在预存的图像集合中选取与目标图像匹配(如相似度不小于80%)的图像。其中,图像集合中的图像可以预先设置有图像标识(如图像名称、编号或类型等)。这样,可以将选取的图像的图像标识作为目标图像的标识。
进一步地,执行主体也可以对目标图像进行图像识别处理,以确定目标图像是否为第三方应用的图像。若确定目标图像为第三方应用的图像,则可以根据第三方应用的应用信息来确定目标图像的标识。具体可以参见图3实施例的相关描述,此处不再赘述。在这里,第三方应用可以是执行主体上所安装的应用,也可以是已发布、但执行主体上未安装的应用。
步骤203,获取与目标图像的标识匹配的配置参数。
在本实施例中,执行主体可以获取与目标图像的标识匹配的配置参数。其中,配置参数可以用于表征编辑应用中所配置的编辑工具。这里的编辑应用可以是各种用于编辑处理图像的应用,如PS(photoshop)软件。而编辑工具可以是编辑应用的功能菜单中的各种工具,如剪切、涂鸦等。此外,工具标识可以 用于唯一确定编辑应用中的各编辑工具。工具标识可以包括(但不限于)数字、字母、文字等字符中的至少一种。
可以理解的是,在编辑处理不同的图像时,所需要的编辑工具可能会存在差异。例如对于人像图像,一般需要降噪美白、拉伸、装饰等相关功能的编辑工具。例如对于涉及隐私的图像(如聊天记录),一般需要擦除或遮挡功能的编辑工具。因此,根据目标图像的标识来获取匹配的配置参数,从而可以确定编辑应用中所需配置的编辑工具。即可以根据不同的目标图像,调整编辑应用中的编辑工具。这样可以简化编辑应用的界面,有助于提高图像的编辑效率。
在本实施例的一些可选地实现方式中,执行主体在确定目标图像的标识的情况下,可以生成包括目标图像的标识的获取请求。其中,获取请求可以用于请求配置参数。此时,执行主体可以向服务端发送获取请求。并可以接收服务端发送与获取请求对应的配置参数,即与目标图像的标识匹配的配置参数。
可选地,执行主体也可以在本地预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识。其中,配置数据库中可以存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系。并且执行主体可以根据选取的工具标识生成配置参数。例如可以直接将选取的工具标识作为配置参数。再例如可以按照用户的使用习惯或字母(数字)的先后顺序,对选取的工具标识进行排序。从而将排序后的工具标识作为配置参数。
步骤204,将获取的配置参数所指示的编辑工具呈现在编辑应用中。
在本实施例中,执行主体可以将获取的配置参数所指示的编辑工具呈现在编辑应用中。这样,用户可以根据编辑应用中所呈现的编辑工具来进行目标图像的编辑。需要说明的是,呈现方式和呈现位置可以根据实际情况进行设置。
例如,执行主体可以将选取的配置参数所指示的编辑工具显示在编辑应用中,且隐藏其他编辑工具。或者又例如,执行主体可以将选取的配置参数所指示的编辑工具突出显示在编辑应用中。其中,突出显示可以包括(但不限于)以下至少一种:增大图标、加底纹或底色、变色、加粗或在显示在指定区域(如编辑应用的右侧)。此时,其他编辑工具可以正常显示或隐藏。或者再例如,执行主体可以将选取的配置参数所指示的编辑工具显示在编辑应用中,且将其他编辑工具收缩显示。这里的收缩显示可以是将其他编辑工具的图标减小。也 可以是将其他编辑工具的图标放置在一个菜单或工具栏中。这样可以使用户快速找到所需的编辑工具,从而提高图像的编辑处理效率。
可以理解的是,上述呈现方式可以是固定的,也可以是可调的。例如用户可以根据个人需求进行呈现方式的切换调整。这样可以便于用户操作,提高图像编辑效率,也有助于提升用户体验。
本实施例提供的编辑工具的配置方法,在监测到对目标图像的编辑操作的情况下,可以获取目标图像。从而可以对目标图像进行图像识别处理,以确定目标图像的标识。进而可以获取与目标图像的标识匹配的配置参数。其中,配置参数可以用于表征编辑应用中所配置的编辑工具。这样就可以将获取的配置参数所指示的编辑工具呈现在编辑应用中。即可以根据不同的目标图像,在编辑应用中呈现不同的编辑工具。这样,不仅有助于提高图像的编辑效率,也有利于提升用户体验。
进一步参见图3,其示出了根据本申请的编辑工具的配置方法的又一个实施例的流程300。该配置方法可以包括以下步骤:
步骤301a,响应于监测到截图操作,将截图得到的图像作为目标图像。
在本实施例中,编辑工具的配置方法的执行主体(例如图1所示的终端101、102、103)在监测到截图操作的情况下,例如监测到截图按键被触发,可以将截图得到的图像作为目标图像。这里的截图操作可以是截屏操作,也可以是局部截图操作。此时可选地,执行主体可以将截图得到的图像存储在用于存放目标图像的文件夹中。和/或可以给截图得到的图像添加用于表征目标图像的标签。
步骤301b,响应于监测到拍照操作,将拍照得到的图像作为目标图像。
在本实施例中,执行主体在监测到拍照操作的情况下,可以将拍照得到的图像作为目标图像。作为示例,执行主体可以将拍照得到的图像存储在用于存放目标图像的文件夹中。和/或可以给拍照得到的图像添加用于表征目标图像的标签。
步骤302,监测到对目标图像的编辑操作,获取目标图像。
在本实施例中,执行主体在监测到对目标图像的编辑操作时,可以获取目标图像。例如,执行主体监测到用户对用于存放目标图像的文件夹中的图像进行编辑,则可以确定监测到对目标图像的编辑操作。再例如,执行主体监测到 用户编辑的图像具有用于表征目标图像的标签,则可以确定监测到对目标图像的编辑操作。
步骤303,对目标图像进行图像识别处理,确定目标图像是否为第三方应用的图像。
在本实施例中,执行主体可以对目标图像进行图像识别处理,以确定目标图像是否为第三方应用的图像。这里的第三方应用可以是执行主体上已安装的应用,也可以是已发布而执行主体未安装的应用。而第三方应用的图像可以是用户利用执行主体进行截图操作得到的,也可以是用户利用执行主体上的摄像头拍照得到的。
在本实施例的一些可选地实现方式中,执行主体可以识别目标图像中是否包含第三方应用的应用信息(如名称、图标等)。若在目标图像中识别到第三方应用的应用信息,则可以确定目标图像为第三方应用的图像。
可选地,执行主体可以识别目标图像的整体布局结构(如内容的显示位置、排列方式等)。并可以确定是否存在与该布局结构相同的第三方应用的页面。若存在与该布局结构相同的第三方应用的页面,则可以确定目标图像为第三方应用的图像。
进一步地,执行主体也可以将目标图像输入预先训练的图像识别模型中。其中,图像识别模型可以用于识别输入的图像是否为第三方应用的图像。这样,执行主体可以根据图像识别模型的输出结果,来确定目标图像是否为第三方应用的图像。作为示例,图像识别模型可以通过以下步骤训练得到:首先,可以收集样本集。其中,样本集中的样本可以包括第三方应用中的各种页面的图像以及各图像对应的图像标签。在这里,图像标签可以用于表征图像为第三方应用的图像和/或图像所属的第三方应用。接着,可以将样本中的各种页面的图像作为输入,将与输入的图像对应的图像标签作为输出,对初始模型进行训练,从而得到图像识别模型。其中,初始模型可以是基于机器学习技术而创建的现有的各种学习模型。
步骤304,响应于确定目标图像为第三方应用的图像,根据第三方应用的应用信息确定目标图像的标识。
在本实施例中,执行主体在确定目标图像为第三方应用的图像的情况下, 可以根据第三方应用的应用信息来确定目标图像的标识。
例如,执行主体可以将第三方应用的名称或图标作为目标图像的标识。又例如,执行主体可以确定第三方应用的类型,如购物类、新闻资讯类、聊天类等,从而可以将第三方应用的类型作为目标图像的标识。再例如,可以预先设置有常用应用列表。列表中可以存储有常用的第三方应用的名称和编号。此时,执行主体可以确定常用应用列表中,是否存在目标图像对应的第三方应用。若存在,可以将该第三方应用的编号确定为目标图像的标识。若不存在,可以按序将该第三方应用存储至常用应用列表中。此时,可以将该第三方应用的编号确定为目标图像的标识。
步骤305a,在第一类配置数据中,选取与目标图像的标识匹配的工具标识。
在本实施例中,执行主体本地预先存储的配置数据库中可以包括第一类配置数据。其中,第一类配置数据可以用于描述预设的第三方应用所对应的工具标识。此时,执行主体可以在第一类配置数据中,选取与目标图像的标识匹配的工具标识。这里预设的第三方应用可以是已发布的各种应用,如用户常用的应用。也就是说,可以在配置数据库中预设几个第三方应用所对应的工具标识,如表1所示。
表1
Figure PCTCN2019097036-appb-000001
需要说明的是,在配置数据库中存储第一类配置数据时,可以将第三方应用的名称、图标或上述编号与工具标识建立对应关系。而目标图像的标识是根据第三方应用的应用信息确定的。因此,如果预设的第三方应用中包括目标图像对应的第三方应用,那么可以在第一类配置数据中选取出与目标图像的标识匹配的工具标识。进而可以继续执行步骤306。如果预设的第三方应用中不包括目标图像对应的第三方应用,那么可以说明第一类配置数据中不存在与目标图像的标识匹配的工具标识。此时可以继续执行步骤305b。
可选地,第一类配置数据也可以用于描述预设类型的第三方应用所对应的工具标识。这里的预设类型可以是已发布的各种第三方应用所属的类型,如购物类、视频类、游戏类等。其中,第三方应用的类型可以是用户自定义的,也可以是第三方应用的发布者定义的。也就是说,可以在配置数据库中预设几个类型的第三方应用通用的工具标识,如表2所示。
表2
Figure PCTCN2019097036-appb-000002
此时,如果目标图像的标识为第三方应用的类型,那么可以在第一类配置数据中,选取出与目标图像的标识匹配的工具标识。即与目标图像的标识所指示的第三方应用的类型对应的工具标识。或者执行主体可以确定目标图像(或目标图像的标识)对应的第三方应用的类型。进而可以在第一类配置数据中,选取出与该第三方应用的类型对应的工具标识。即为与目标图像的标识匹配的工具标识。
步骤305b,若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则确定目标图像对应的第三方应用的类型。
在本实施例中,若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,说明上述预设的第三方应用中不包括目标图像对应的第三方应用。此时,执行主体可以进一步确定目标图像对应的第三方应用的类型。作为示例,执行主体可以根据第三方应用在发布时所定义的类型,或者可以根据大数据的统计分析,来确定第三方应用的类型。
步骤305c,在第二类配置数据中,选取与第三方应用的类型匹配的工具标识。
在本实施例中,上述配置数据库中还可以包括第二类配置数据。其中,第二类配置数据可以用于描述预设类型的第三方应用所对应的工具标识。此时,执行主体可以在第二类配置数据中,选取与步骤305b中确定的第三方应用的 类型匹配的工具标识。
步骤306,根据选取的工具标识生成配置参数,将配置参数所指示的编辑工具呈现在编辑应用中。
在本实施例中,执行主体可以根据选取的工具标识生成配置参数。其中,配置参数可以用于表征编辑应用中所配置的编辑工具。可以参见图2实施例的步骤203中的相关描述,此处不再赘述。并且可以将生成的配置参数所指示的编辑工具呈现在编辑应用中,以供用户使用。可以参见图2实施例的步骤204中的相关描述,此处不再赘述。
可以理解的是,在配置数据库中设置不同的第三方应用所对应的工具标识。这样可以生成富于针对性的配置参数,从而可以在编辑应用中呈现所需的编辑工具。不仅有利于提高图像的处理效率,也有助于提升用户体验。而在配置数据库中设置不同类型的第三方应用所对应的工具标识,即同类型的第三方应用对应的工具标识是通用的。这样可以减少或避免匹配失败的情况发生,提高方法的适用范围。需要说明的是,如果未获取到与目标图像的标识匹配的配置参数,那么执行主体可以不对编辑应用中的编辑工具做任何处理,即正常显示编辑应用。
本实施例提供的编辑工具的配置方法,对于属于第三方应用的图像的目标图像,详细描述了确定这种目标图像的标识,以及生成对应的配置参数的过程。这样,丰富和完善了配置方法的过程,有助于使配置结果(即配置参数所指示的编辑工具)更加符合用户需求。
请参见图4,其示出了根据本申请的编辑工具的配置参数的生成方法的一个实施例的流程400。该生成方法可以包括以下步骤:
步骤401,接收终端发送的包括目标图像的标识的获取请求。
在本实施例中,编辑工具的配置参数的生成方法的执行主体(例如图1所示的服务端106)可以通过有线连接方式或无线连接方式,接收终端(例如图1所示的终端101、102、103)发送的包括目标图像的标识的获取请求。在这里,目标图像可以是终端能够识别显示的任意图像,如照片、截图或网络上下载的图像等。其中,目标图像的标识可以是终端在监测到对目标图像的编辑操作时,获取目标图像,并对目标图像进行图像识别处理而确定的。可以参见图2和图 3实施例中的相关描述,此处不再赘述。
步骤402,在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识。
在本实施例中,执行主体可以在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识。其中,配置数据库中可以存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系。例如目标图像为人脸图像。此时,执行主体可以在配置数据库中,选取与人脸标识匹配的工具标识。
在这里,编辑应用可以是各种用于编辑处理图像的应用。而编辑工具可以是编辑应用的功能菜单中的各种工具,如剪切、涂鸦等。此外,工具标识可以用于唯一确定编辑应用中的各编辑工具。工具标识可以包括(但不限于)数字、字母、文字等字符中的至少一种。
在本实施例的一些可选地实现方式中,目标图像可以为第三方应用的图像。且目标图像的标识可以是根据第三方应用的应用信息而确定的。此时,配置数据库中可以包括第一类配置数据。其中,第一类配置数据可以用于描述预设的第三方应用所对应的工具标识。这样,执行主体可以在第一类配置数据中,选取与目标图像的标识匹配的工具标识。
可选地,第一类配置数据也可以用于描述预设类型的第三方应用所对应的工具标识。此时,执行主体可以确定目标图像对应的第三方应用的类型。从而可以在第一类配置数据中,选取与该类型对应的工具标识,即与目标图像的标识匹配的工具标识。可以参见图3实施例的步骤305a中的相关描述,此处不再赘述。
在一些实施例中,配置数据库中还可以包括第二类配置数据。其中,第二类配置数据可以用于描述预设类型的第三方应用所对应的工具标识。此时,若在第一类配置数据中,不存在与目标图像的标识匹配的工具标识,则执行主体可以确定目标图像对应的第三方应用的类型。以及可以在第二类配置数据中,选取与该第三方应用的类型匹配的工具标识。可以参见图3实施例的步骤305b至步骤305c中的相关描述,此处不再赘述。
步骤403,根据选取的工具标识生成配置参数,并将配置参数发送给终端。
在本实施例中,执行主体可以根据选取的工具标识生成配置参数。并可以 通过有线连接方式或无线连接方式,将配置参数发送给终端。这样,可以使终端将配置参数所指示的编辑工具呈现在编辑应用中。从而可以有助于编辑应用界面的清晰化和简洁化。可以参见图2和图3实施例中的相关描述,此处不再赘述。
可以理解的是,利用服务端来代替终端完成部分处理过程,可以减少终端所需处理的数据量,降低终端负荷。从而也有助于提高终端的处理效率,减少用户的等待时长。
在一些实施例中,执行主体还可以获取并分析用户在终端上的编辑操作行为,以更新上述配置数据库。其中,编辑操作行为可以包括编辑图像时使用的编辑工具和使用次数。
作为示例,若配置数据库中未存储有目标图像的标识,则执行主体可以根据用户对目标图像的编辑操作行为,确定与目标图像的标识对应的工具标识。例如可以将用户编辑目标图像时使用过的所有编辑工具的工具标识,均确定为与目标图像的标识对应的工具标识。再例如可以统计用户编辑目标图像时使用过的各编辑工具的总次数(即每个编辑工具的使用总次数)。并按照总次数由大到小的顺序,从大的一端选取一定数目(如5个或者总数的一半等)的编辑工具。从而将选取的编辑工具的工具标识,确定为与目标图像的标识对应的工具标识。这里的选取方式在本申请中并不限制。如可以按序选取、抽选或间隔选等。这样,执行主体可以将对应关系(即与目标图像的标识对应的工具标识)存储至配置数据库中。也就是说,可以在配置数据中增加新的数据。这样有利于提高生成结果的准确度。
再例如,若配置数据库中存储有目标图像的标识,则执行主体可以统计用户在编辑目标图像时使用各编辑工具的总次数。并可以按照总次数由大到小的顺序,从大的一端选取预设数目个编辑工具。这样,可以将选取的预设数目个编辑工具的工具标识,更新为配置数据库中与目标图像的标识对应的工具标识。也就是说,可以更新配置数据中已有的数据。这样可以使生成结果更加符合用户需求。
可以理解的是,对于终端本地存储的配置数据库,终端可以周期性地(如每3天)从执行主体上获取数据,以更新本地的配置数据库。或者执行主体可 以向终端发送更新通知。其中,更新通知可以用于表征配置数据库有更新。这样一来,终端在接收到更新通知的情况下,可以从执行主体上获取数据,以更新本地的配置数据库。这样有助于提高终端上的配置结果的准确度,也可以使配置结果更加符合用户需求。这里获取的数据可以是更新后的配置数据库的全部数据。而为了提高数据的传输效率,获取的数据也可以仅仅是配置数据库中所更新的数据。
进一步参见图5,图5是根据图4实施例的编辑工具的配置参数的生成方法的一个应用场景的示意图。在图5的应用场景中,用户可以在其使用的终端101上安装聊天应用。并可以通过聊天应用与其他用户交流。例如可以将与用户A的聊天记录发送给用户B。
首先,用户可以在终端101上打开与用户A的对话页面。然后,进行截屏操作,从而得到与用户A的聊天记录的截屏图像。但在将截屏图像发送给用户B之前,用户想对该截屏图像中的某些信息进行处理。此时,用户可以使用终端101自带的编辑应用进行编辑操作。
终端101在监测到用户对截屏图像的编辑操作时,可以对该截屏图像进行图像识别处理。在确定其为聊天应用“**”的图像的情况下,可以将该聊天应用的名称**作为截屏图像的标识。进而可以生成包括标识**的获取请求,并将该获取请求发送给服务端106。
服务端106在接收到包括标识**的获取请求后,可以在预先存储的配置数据库中,选取与标识**匹配的工具标识,如工具标识1、2。接着,可以根据工具标识1、2生成配置参数。并可以将该配置参数反馈给终端101。
终端101在接收到服务端106发送的配置参数后,可以将配置参数(即工具标识1、2)所指示的编辑工具(如擦除、涂鸦)呈现在编辑应用中。此时,用户可以使用这些编辑工具快速处理截屏图像。例如将截屏图像中需要隐藏信息的擦除,同时将想突出的信息用红线圈出等。这样,用户可以使用终端101将处理后的截屏图像发送给用户B所使用的终端102。
本实施例提出的编辑工具的配置参数的生成方法,可以根据接收的获取请求中的目标图像的标识,在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识。其中,目标图像的标识是终端在监测到对目标图像的编辑操 作时,获取目标图像,并对该目标图像进行图像识别处理而确定的。从而可以根据选取的工具标识生成配置参数。进而可以将配置参数作为获取请求的响应信息反馈给终端。这样,可以使终端将配置参数所指示的编辑工具呈现在编辑应用中,以供用户使用。从而可以实现根据目标图像的不同,在编辑应用中呈现不同的编辑工具。这样有助于提高图像的编辑效率,也有利于提升用户体验。
下面参见图6,其示出了适于用来实现本申请实施例的电子设备(例如图1所示的终端101、102、103或服务端106)的计算机系统600的结构示意图。图6示出的电子设备仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图6所示,计算机系统600包括中央处理单元(CPU)601,其可以根据存储在只读存储器(ROM)602中的程序或者从存储部分608加载到随机访问存储器(RAM)603中的程序而执行各种适当的动作和处理。在RAM 603中,还存储有系统600操作所需的各种程序和数据。CPU 601、ROM 602以及RAM 603通过总线604彼此相连。输入/输出(I/O)接口605也连接至总线604。
以下部件连接至I/O接口605:包括触摸屏、按键、鼠标、麦克风、摄像头等的输入部分606;包括诸如阴极射线管(CRT)和/或液晶显示器(LCD)等以及扬声器等的输出部分607;包括硬盘等的存储部分608;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分609。通信部分609经由诸如因特网的网络执行通信处理。驱动器610也根据需要连接至I/O接口605。可拆卸介质611,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器610上,以便于从其上读出的计算机程序根据需要被安装入存储部分608。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分609从网络上被下载和安装,和/或从可拆卸介质611被安装。在该计算机程序被中央处理单元(CPU)601执行时,执行本申请的方法中限定的上述功能。需要说明的是,本申请的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但 不限于—一电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本申请中,计算机可读介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本申请中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、RF等等,或者上述的任意合适的组合。
附图中的流程图和框图,图示了按照本申请各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本申请实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元也可以设置在处理器中,例如,可以描述为:一种处理器包括第一监测单元、确定单元、获取单元和呈现单元。再例如,还可以描述为:一种处理器包括接收单元、选取单元和生成单元。其中, 这些单元的名称在某种情况下并不构成对该单元本身的限定,例如,第一监测单元还可以被描述为“监测到对目标图像的编辑操作,获取目标图像的单元”。
作为另一方面,本申请还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。例如,上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:监测到对目标图像的编辑操作,获取目标图像;对目标图像进行图像识别处理,确定目标图像的标识;获取与目标图像的标识匹配的配置参数,其中,配置参数用于表征编辑应用中所配置的编辑工具;将获取的配置参数所指示的编辑工具呈现在编辑应用中。
再例如,当上述一个或者多个程序被该电子设备执行时,还可以使得该电子设备:接收终端发送的包括目标图像的标识的获取请求,其中,目标图像的标识是终端在监测到对目标图像的编辑操作时,获取目标图像,并对目标图像进行图像识别处理而确定的;在预先存储的配置数据库中,选取与目标图像的标识匹配的工具标识,其中,配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系;根据选取的工具标识生成配置参数,并将配置参数发送给终端,以使终端将配置参数所指示的编辑工具呈现在编辑应用中。
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述发明构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。

Claims (17)

  1. 一种编辑工具的配置方法,所述方法用于终端,包括:
    监测到对目标图像的编辑操作,获取所述目标图像;
    对所述目标图像进行图像识别处理,确定所述目标图像的标识;
    获取与所述目标图像的标识匹配的配置参数,其中,所述配置参数用于表征编辑应用中所配置的编辑工具;
    将获取的配置参数所指示的编辑工具呈现在编辑应用中。
  2. 根据权利要求1所述的方法,其中,所述获取与所述目标图像的标识匹配的配置参数,包括:
    向服务端发送包括所述目标图像的标识的获取请求;以及
    接收所述服务端发送的与所述获取请求对应的配置参数。
  3. 根据权利要求1所述的方法,其中,所述获取与所述目标图像的标识匹配的配置参数,包括:
    在本地预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,并根据选取的工具标识生成配置参数,其中,所述配置数据库中存储有图像的标识与所述编辑应用中的各编辑工具的工具标识的对应关系。
  4. 根据权利要求3所述的方法,其中,所述对所述目标图像进行图像识别处理,确定所述目标图像的标识,包括:
    对所述目标图像进行图像识别处理,确定所述目标图像是否为第三方应用的图像;
    响应于确定所述目标图像为第三方应用的图像,根据所述第三方应用的应用信息确定所述目标图像的标识。
  5. 根据权利要求4所述的方法,其中,所述根据所述第三方应用的应用信息确定所述目标图像的标识,包括:
    将所述第三方应用的图标、名称或类型确定为所述目标图像的标识。
  6. 根据权利要求4所述的方法,其中,所述配置数据库中包括第一类配置数据;以及
    所述在本地预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,包括:
    在所述第一类配置数据中,选取与目标图像的标识匹配的工具标识。
  7. 根据权利要求6所述的方法,其中,所述配置数据库中还包括第二类配置数据;以及
    所述在本地预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,还包括:
    若在所述第一类配置数据中,不存在与所述目标图像的标识匹配的工具标识,则确定所述目标图像对应的第三方应用的类型;以及在所述第二类配置数据中,选取与所述第三方应用的类型匹配的工具标识。
  8. 根据权利要求1所述的方法,其中,所述对所述目标图像进行图像识别处理,确定所述目标图像的标识,包括:
    对所述目标图像进行图像识别处理,确定所述目标图像是否为人脸图像;
    响应于确定所述目标图像为人脸图像,从预设标识中选取与所述人脸图像对应的标识,作为所述目标图像的标识。
  9. 根据权利要求1所述的方法,其中,所述将选取的配置参数所指示的编辑工具呈现在编辑应用中,包括:
    将选取的配置参数所指示的编辑工具显示在编辑应用中,且隐藏其他编辑工具;或者
    将选取的配置参数所指示的编辑工具突出显示在编辑应用中;或者
    将选取的配置参数所指示的编辑工具显示在编辑应用中,且将其他编辑工具收缩显示。
  10. 根据权利要求1-9中任一所述的方法,其中,所述监测到对目标图像的编辑操作之前,所述方法还包括:
    响应于监测到截图操作,将截图得到的图像作为目标图像;或者
    响应于监测到拍照操作,将拍照得到的图像作为目标图像。
  11. 一种编辑工具的配置参数的生成方法,所述方法用于服务端,包括:
    接收终端发送的包括目标图像的标识的获取请求,其中,所述目标图像的标识是所述终端在监测到对所述目标图像的编辑操作时,获取所述目标图像,并对所述目标图像进行图像识别处理而确定的;
    在预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,其中,所述配置数据库中存储有图像的标识与编辑应用中的各编辑工具的工具标识的对应关系;
    根据选取的工具标识生成配置参数,并将所述配置参数发送给所述终端,以使所述终端将所述配置参数所指示的编辑工具呈现在编辑应用中。
  12. 根据权利要求11所述的方法,其中,若所述目标图像为第三方应用的图像,且所述目标图像的标识是根据所述第三方应用的应用信息而确定的,则所述在预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,包括:
    在配置数据库的第一类配置数据中,选取与目标图像的标识匹配的工具标识。
  13. 根据权利要求12所述的方法,其中,所述在本地预先存储的配置数据库中,选取与所述目标图像的标识匹配的工具标识,还包括:
    若在所述第一类配置数据中,不存在与所述目标图像的标识匹配的工具标识,则确定所述目标图像对应的第三方应用的类型;以及在所述配置数据库的第二类配置数据中,选取与所述第三方应用的类型匹配的工具标识。
  14. 根据权利要求11-13中任一所述的方法,其中,所述方法还包括:
    获取并分析用户在所述终端上的编辑操作行为,以更新所述配置数据库,其 中,所述编辑操作行为包括编辑图像时使用的编辑工具和使用次数。
  15. 根据权利要求14所述的方法,其中,所述获取并分析用户在所述终端上的编辑操作行为,以更新所述配置数据库,包括:
    若所述配置数据库中未存储有所述目标图像的标识,则根据用户对所述目标图像的编辑操作行为,确定与所述目标图像的标识对应的工具标识,并将对应关系存储至所述配置数据库中;或者
    若所述配置数据库中存储有所述目标图像的标识,则统计用户在编辑所述目标图像时使用各编辑工具的总次数;按照总次数由大到小的顺序,从大的一端选取预设数目个编辑工具;将选取的预设数目个编辑工具的工具标识,更新为所述配置数据库中与所述目标图像的标识对应的工具标识。
  16. 一种电子设备,包括:
    一个或多个处理器;
    存储装置,其上存储有一个或多个程序;
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-15中任一所述的方法。
  17. 一种计算机可读介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1-15中任一所述的方法。
PCT/CN2019/097036 2018-07-23 2019-07-22 编辑工具的配置方法和配置参数的生成方法 WO2020020095A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810812941.3 2018-07-23
CN201810812941.3A CN109102556A (zh) 2018-07-23 2018-07-23 编辑工具的配置方法和配置参数的生成方法

Publications (1)

Publication Number Publication Date
WO2020020095A1 true WO2020020095A1 (zh) 2020-01-30

Family

ID=64847240

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/097036 WO2020020095A1 (zh) 2018-07-23 2019-07-22 编辑工具的配置方法和配置参数的生成方法

Country Status (2)

Country Link
CN (1) CN109102556A (zh)
WO (1) WO2020020095A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102556A (zh) * 2018-07-23 2018-12-28 上海掌门科技有限公司 编辑工具的配置方法和配置参数的生成方法
CN113656095B (zh) * 2021-08-06 2023-08-04 北京数码大方科技股份有限公司 配置数据的处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021350A (zh) * 2014-05-13 2014-09-03 小米科技有限责任公司 隐私信息隐藏方法及装置
CN104282031A (zh) * 2014-09-19 2015-01-14 广州三星通信技术研究有限公司 处理待输出图片的方法、装置和终端
WO2016029142A1 (en) * 2014-08-21 2016-02-25 Glu Mobile, Inc. Methods and systems for images with interactive filters
CN107123152A (zh) * 2017-04-06 2017-09-01 腾讯科技(深圳)有限公司 一种编辑处理方法及装置
CN109102556A (zh) * 2018-07-23 2018-12-28 上海掌门科技有限公司 编辑工具的配置方法和配置参数的生成方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294378B (zh) * 2012-02-29 2017-10-31 鸿富锦精密工业(深圳)有限公司 电子设备编辑工具变更方法及系统
CN104461474A (zh) * 2013-09-12 2015-03-25 北京三星通信技术研究有限公司 用于移动终端的截屏方法和截屏装置以及移动终端
US9202299B2 (en) * 2013-12-20 2015-12-01 Adobe Systems Incorporated Hint based spot healing techniques
CN104636445B (zh) * 2015-01-16 2019-05-24 白天 截屏图像的处理和分组操作方法及其装置
CN107885556A (zh) * 2016-09-28 2018-04-06 珠海金山办公软件有限公司 一种移动终端上工具栏的显示方法及装置
CN108037960A (zh) * 2017-12-06 2018-05-15 苏州精濑光电有限公司 一种将图像处理需求整合到对应软件的方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021350A (zh) * 2014-05-13 2014-09-03 小米科技有限责任公司 隐私信息隐藏方法及装置
WO2016029142A1 (en) * 2014-08-21 2016-02-25 Glu Mobile, Inc. Methods and systems for images with interactive filters
CN104282031A (zh) * 2014-09-19 2015-01-14 广州三星通信技术研究有限公司 处理待输出图片的方法、装置和终端
CN107123152A (zh) * 2017-04-06 2017-09-01 腾讯科技(深圳)有限公司 一种编辑处理方法及装置
CN109102556A (zh) * 2018-07-23 2018-12-28 上海掌门科技有限公司 编辑工具的配置方法和配置参数的生成方法

Also Published As

Publication number Publication date
CN109102556A (zh) 2018-12-28

Similar Documents

Publication Publication Date Title
US12003585B2 (en) Session-based information exchange
US10623522B2 (en) Uploading a form attachment
WO2017084541A1 (zh) 会话中实现表情图像发送的方法和装置
CN108924381B (zh) 图像处理方法、图像处理装置及计算机可读介质
US11870741B2 (en) Systems and methods for a metadata driven integration of chatbot systems into back-end application services
WO2020019591A1 (zh) 用于生成信息的方法和装置
WO2020029466A1 (zh) 图像处理方法和装置
WO2019242542A1 (zh) 截图处理方法及装置
US11080348B2 (en) System and method for user-oriented topic selection and browsing
JP2021034003A (ja) 人物識別方法、装置、電子デバイス、記憶媒体、及びプログラム
WO2019011295A1 (zh) 负一屏内容推送及请求方法、装置、服务器及终端
CN112836072B (zh) 信息展示方法及装置、电子设备和介质
WO2020030072A1 (zh) 用于分配资源、领取资源、发布资源的方法和设备
US10579645B2 (en) Arranging and displaying content from a social media feed based on relational metadata
CN110022399B (zh) 消息展示方法、装置、用户终端及可读存储介质
WO2020020095A1 (zh) 编辑工具的配置方法和配置参数的生成方法
US20190227634A1 (en) Contextual gesture-based image searching
WO2022242439A1 (zh) 信息的处理方法、装置、终端和存储介质
CN113360738A (zh) 内容评价方法、系统以及计算机可读记录介质
CN113869063A (zh) 数据推荐方法、装置、电子设备及存储介质
US10341272B2 (en) Personality reply for digital content
WO2023140642A1 (ko) 라이브 커머스 플랫폼에서의 실시간 인스펙터를 위한 방법, 컴퓨터 장치, 및 컴퓨터 프로그램
US20210058677A1 (en) Personal media content retrieval
WO2022199494A1 (zh) 一种基于用户兴趣的内容推荐方法与终端设备
WO2020221114A1 (zh) 用于显示信息的方法和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19840587

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19840587

Country of ref document: EP

Kind code of ref document: A1