WO2020125481A1 - 生成标识图案的方法和终端设备 - Google Patents
生成标识图案的方法和终端设备 Download PDFInfo
- Publication number
- WO2020125481A1 WO2020125481A1 PCT/CN2019/124205 CN2019124205W WO2020125481A1 WO 2020125481 A1 WO2020125481 A1 WO 2020125481A1 CN 2019124205 W CN2019124205 W CN 2019124205W WO 2020125481 A1 WO2020125481 A1 WO 2020125481A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- software program
- pattern
- contact
- character
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 148
- 230000001131 transforming effect Effects 0.000 claims abstract description 23
- 239000011159 matrix material Substances 0.000 claims description 38
- 238000012545 processing Methods 0.000 claims description 27
- 239000007787 solid Substances 0.000 claims description 16
- 230000002093 peripheral effect Effects 0.000 claims description 4
- 230000005055 memory storage Effects 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 57
- 238000010586 diagram Methods 0.000 description 46
- 230000008569 process Effects 0.000 description 36
- 238000012549 training Methods 0.000 description 18
- 238000004590 computer program Methods 0.000 description 15
- 230000000875 corresponding effect Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 7
- 238000003062 neural network model Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000009466 transformation Effects 0.000 description 6
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000011426 transformation method Methods 0.000 description 4
- 238000013527 convolutional neural network Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000003708 edge detection Methods 0.000 description 3
- 230000003796 beauty Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003252 repetitive effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008602 contraction Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000916 dilatatory effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000001537 neural effect Effects 0.000 description 1
- 230000007115 recruitment Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/20—Drawing from basic elements, e.g. lines or circles
- G06T11/203—Drawing of straight lines or curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/454—Multi-language systems; Localisation; Internationalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/60—Editing figures and text; Combining figures or text
Definitions
- the present application relates to the technical field of terminal devices, and more specifically, to a method and terminal device for generating an identification pattern.
- Software programs in terminal devices often use corresponding identification patterns to represent software program icons or information displayed inside the software programs.
- contacts in the address book are often set with contact avatars.
- One main purpose of setting contact avatars is to improve the display effect of contact information, distinguish different contacts, and improve the user's experience when viewing contact information.
- the traditional solution is generally to extract a Chinese character image or a pinyin initial character image of a contact as the avatar of the contact.
- a contact with the surname Zhou can directly use the character image of the Chinese character " ⁇ " as the avatar of the contact, or the character image of the pinyin initials "Z" of the Chinese character Zhou as the avatar of the contact.
- the present application provides a method and terminal device for generating a logo pattern to improve the display effect of the logo pattern.
- a method for generating a logo pattern includes: obtaining a first image, where the first image is used to represent any one of Chinese characters, English characters, and Arabic numeric characters;
- the identification pattern is the second image.
- the identification pattern is part of the second image.
- the identification pattern includes the second image and other images, or the identification pattern is transformed from the second image, and so on.
- the above software program is any one of address book, memo, calendar, weather software, music player and photo album.
- the above acquiring the first image includes: acquiring the first image according to the display information of the software program.
- the first image can be obtained through the contact information in the address book.
- the method before transforming the first image according to the outline of the first image, the method further includes: obtaining the outline of the first image according to an edge detection algorithm.
- the outline of the first image may be either the outer outline of the first image or the inner outline of the first image.
- the outer contour line of the first image may be a contour line formed around the peripheral edges (or overall edges) of the first image.
- the inner contour of the first image may be a contour formed by multiple edges of the first image.
- the inner contour line of the first image may be a contour line formed by all edges of the first image.
- a second image including multiple contour lines can be obtained, and furthermore, a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar, and the software program can be improved to a certain extent
- the display effect of the logo pattern improves the user experience.
- the transforming the first image according to the outline of the first image to obtain a second image includes: converting the first image The outer contour line of is extended around the first image to obtain the second image, wherein the outer contour line of the first image is a contour line formed around the edges of the first image.
- the second image can be obtained by expanding the outer contour line around the first image.
- the first image is a hollow character image
- the first image is transformed according to the outline of the first image to obtain a second
- the image includes: expanding the inner contour line of the first image into the first image to obtain the second image, wherein the inner contour line of the first image is more than that of the first image Contours formed by the edges.
- the first image is a solid character image
- the inner contour of the first image is expanded inside the first image to obtain the first Two images, including: transforming the first image to obtain a transformed first image, the transformed first image is a hollow character image; the inner contour of the transformed first image is directed The transformed first image is internally expanded to obtain the second image.
- the outline of the first image is a right-angle outline
- the The method further includes: processing the outline of the first image to obtain a processed first image, wherein the outline of the processed first image is a rounded outline;
- the contour line of the first image transforms the first image to obtain a second image, including: transforming the processed first image according to the rounded contour line to obtain the second image.
- the identification pattern is a hot zone image of the second image, where the hot zone image of the second image is capable of being in the second image Identify the sub-image of the character represented by the second image.
- the generating the identification pattern of the software program according to the second image includes: determining an image of a partial area of the second image as the identification pattern of the software program.
- the above-mentioned partial area may be a central area of the second image, and the central area of the second image may be an area extending along the geometric center of the second image to a certain distance around the second image.
- the image of a partial area or the hot zone image in the second image as the logo pattern of the software program, a more concise logo pattern can be obtained, and the display effect of the logo pattern can be improved.
- the software program is an address book
- the identification pattern of the software program is a contact avatar in the address book.
- the identification pattern of the software program is the avatar of the contact in the address book
- the avatar of the contact may also be used as the caller ID screen.
- the density of the outline in the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- contacts with different contact frequencies or different intimacy levels can be identified by the density of the contour lines in the identification pattern, and the display effect is better.
- the color depth of the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- contacts with different contact frequencies or different intimacy levels can be identified by the color depth of the logo pattern, and the display effect is better.
- the software program is an album (which may refer to the album application displayed on the main interface or a single album within the album application), and the identifier of the software program
- the pattern is a pattern of an album cover; or, the software program is a memo, and the logo pattern of the software program is a logo pattern of memo information in the memo; or, the software program is a music application, and the logo of the software program
- the pattern is a cover sheet of a music application; or, the software program is a voice assistant, and the logo pattern of the software program is a display icon of the voice assistant; or, the software program is a recording application, and the logo pattern of the software program is The avatar of the person being recorded; or, the software program is a weather application, and the logo pattern of the software program is a display icon of the weather application.
- a method for generating an identification pattern includes: acquiring a first image, wherein the first image is used to represent any one of Chinese characters, English characters, and Arabic numeric characters, and The first image is a hollow character image; a dot matrix image or a line image is superimposed on the first image to obtain a superimposed image; and a part of pixel points in the dot matrix or a line in the superimposed image are moved Set the distance to obtain the second image; generate the logo pattern of the software program according to the second image.
- a second image with a more diverse display style can be obtained, and then a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar.
- the display effect of the logo pattern of the software program is improved, and the user experience is improved.
- moving a part of the pixels in the dot matrix or lines in the superimposed image by a preset distance includes: moving the pixels in the superimposed image that are located inside the outer contour of the first image by a preset distance.
- the identification pattern is a hot zone image of the second image, and the hot zone image of the second image is recognizable in the second image The sub-image of the character represented by the second image.
- the generating the identification pattern of the software program according to the second image includes: determining an image of a partial area of the second image as the identification pattern of the software program.
- the above partial area may be the central area of the second image.
- the central area of the second image may be an area that extends a certain distance along the geometric center of the second image to the periphery of the second image.
- the software program is an address book
- the identification pattern of the software program is a contact avatar in the address book.
- the density of dots or lines in the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern .
- contacts with different contact frequencies or different degrees of intimacy can be identified by identifying the density of dot matrix or lines in the pattern, and the display effect is better.
- the color depth of the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- contacts with different contact frequencies or different intimacy levels can be identified by the color depth of the logo pattern, and the display effect is better.
- the software program is an album, and the logo pattern of the software program is a pattern of the album cover; or, the software program is a memo, and the software program
- the logo pattern is the logo pattern of the memo information in the memo; or, the software program is a music application, and the logo pattern of the software program is a song list cover in the music application; or, the software program is a voice assistant.
- the logo pattern of the software program is the display icon of the voice assistant; or, the software program is a recording application, and the logo pattern of the software program is the avatar of the person being recorded; or, the software program is a weather application, and the logo pattern of the software program Display icons for weather applications.
- a method for generating a logo pattern includes: acquiring a first image, the first image is used to represent English characters or Arabic numeric characters; and the first image is determined from a picture library A matching target picture, wherein the target picture contains a reference image whose similarity to the first image is greater than or equal to a preset similarity; generating an identification pattern of the software program according to the reference image.
- the identification pattern is a hot zone image of the reference image, where the hot zone image of the reference image is an image that can be identified in the reference image The sub-image of the character represented by the reference image is described.
- the generating the identification pattern of the software program according to the reference image includes: determining an image of a partial area of the reference image as the identification pattern of the software program.
- the above-mentioned partial area may be a central area of the reference image, and the central area of the reference image may be an area that extends a certain distance along the geometric center of the reference image to the periphery of the reference image.
- the texture distribution of the pictures in the picture library satisfies the characteristics of the golden ratio or the Fibonacci sequence.
- the logo pattern of the software program finally obtained from the pictures in the picture library has a certain beauty, which can bring better User experience.
- the software program is a contact list, and the identification pattern of the software program is a contact picture in the contact list; or, the software program is an album ,
- the logo pattern of the software program is a pattern of the album cover; or, the software program is a memo, and the logo pattern of the software program is a logo pattern of memo information in the memo; or, the software program is a music application ,
- the logo pattern of the software program is a cover sheet of a music application; or, the software program is a voice assistant, and the logo pattern of the software program is a display icon of the voice assistant; or, the software program is a recording application ,
- the logo of the software program is the avatar of the person being recorded; or, the software program is the weather application, and the logo of the software program is the display icon of the weather application.
- a terminal device includes a module for performing the method in the first aspect and any one of the implementation manners of the first aspect.
- a terminal device in a fifth aspect, includes a module for performing the method in the second aspect and any one of the implementation manners in the second aspect.
- a terminal device includes a module for performing the method in the third aspect and any implementation manner of the third aspect.
- a terminal device including a memory and a processor, where the memory is used to store a program, and the processor is used to execute the program stored in the memory, when the program stored in the memory is executed by the processor
- the processor is configured to execute the method in the first aspect and any one of the implementation manners of the first aspect.
- a terminal device which includes a memory and a processor, where the memory is used to store a program, and the processor is used to execute the program stored in the memory, when the program stored in the memory is executed by the processor
- the processor is configured to execute the method in the second aspect and any implementation manner of the second aspect.
- a terminal device including a memory and a processor, where the memory is used to store a program, and the processor is used to execute the program stored in the memory, when the program stored in the memory is executed by the processor
- the processor is configured to execute the method in the third aspect and any implementation manner of the third aspect.
- the above memory is a non-volatile memory.
- the aforementioned memory and processor are coupled to each other.
- a computer-readable storage medium is provided.
- the computer-readable storage medium is used to store program code.
- the program code is executed by a computer, the computer is used to perform the first aspect and the first Any one of the methods in one aspect.
- a computer-readable storage medium is provided.
- the computer-readable storage medium is used to store program code.
- the program code is executed by a computer, the computer is used to perform the second aspect and The method in any implementation manner of the second aspect.
- a computer-readable storage medium is provided.
- the computer-readable medium storage medium is used to store program code.
- the program code is executed by a computer, the computer is used to perform the third aspect and The method in any implementation manner of the third aspect.
- the above computer-readable storage medium may be located inside the terminal device, and the program code stored in the computer-readable storage medium may be executed by the terminal device.
- the terminal device can execute the method in the implementation manner of any one of the first aspect, the second aspect, and the third aspect.
- a chip in a thirteenth aspect, there is provided a chip, the chip includes a processor, and the processor is configured to execute the method in the first aspect and any one of the implementation manners of the first aspect.
- a chip is provided.
- the chip includes a processor, and the processor is configured to execute the method in the second aspect and any one of the implementation manners of the second aspect.
- a chip is provided.
- the chip includes a processor, and the processor is configured to execute the method in any one of the third aspect and the third aspect.
- the above chip is installed inside the terminal device.
- a computer program for causing a computer or a terminal device to execute the method in the first aspect and any one of the implementation manners in the first aspect is provided.
- a computer program for causing a computer or a terminal device to execute the method in any of the second aspect and any implementation manner of the second aspect.
- a computer program for causing a computer or a terminal device to execute the method in any one of the third aspect and the third aspect.
- the above computer program may be stored in the terminal device, and the computer program may be executed by the terminal device.
- the terminal device executes the computer program
- the terminal device can execute the method in the implementation manner of any one of the first aspect, the second aspect, and the third aspect.
- FIG. 1 is a schematic flowchart of a method for generating an identification pattern according to an embodiment of the present application
- FIG. 2 is a schematic diagram of acquiring an outer contour line of a character image in an embodiment of the present application
- FIG. 3 is a schematic diagram of an inner contour line of a character image in an embodiment of the present application.
- FIG. 4 is a schematic diagram of obtaining a second image based on a solid character image
- FIG. 5 is a schematic diagram of obtaining the second image based on the hollow character image
- FIG. 6 is a schematic diagram of obtaining a second image based on a solid character image
- FIG. 7 is a schematic diagram of processing a right-angle contour line of a first image to obtain a round-corner contour line
- FIG. 8 is a schematic diagram of generating a logo pattern according to a second image
- FIG. 9 is a schematic diagram of using the identification pattern as a contact avatar
- 10 is a schematic diagram of using the contact avatar as the caller ID display screen
- FIG. 11 is a schematic diagram of contact avatars with different contour density and different color shades
- 13 is a schematic diagram of the sparse degree of the outline in the contact avatar changes with the call;
- FIG. 14 is a schematic flowchart of a method for generating an identification pattern according to an embodiment of the present application.
- 15 is a schematic diagram of a second image obtained by superimposing a first image and a dot matrix image
- 16 is a schematic diagram of a first image and a line image superimposed to obtain a second image
- 17 is a schematic diagram of obtaining a logo pattern according to the second image
- FIG. 18 is a schematic flowchart of a method for generating an identification pattern according to an embodiment of the present application.
- 19 is a schematic diagram of obtaining a logo pattern according to a target picture
- FIG. 20 is a schematic diagram of superimposing weather images on the logo pattern
- 21 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- 22 is a schematic diagram of a 5*5 convolution kernel
- FIG. 23 is a schematic diagram of a process of generating a contact avatar according to an embodiment of the present application.
- FIG. 24 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- 25 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- 26 is a schematic diagram of a process of generating a contact avatar according to an embodiment of the present application.
- FIG. 27 is a schematic diagram of a process of generating a temperature display icon according to an embodiment of the present application.
- FIG. 28 is a schematic diagram of the identification pattern in the embodiment of the present application as a lock screen pattern
- FIG. 29 is a schematic diagram of the identification pattern in the embodiment of the present application as a display icon of a calendar application
- FIG. 30 is a schematic diagram of the identification pattern in the embodiment of the present application as a memo title icon
- FIG. 31 is a schematic diagram of the identification pattern in the embodiment of the present application as the title of the reminding event
- 32 is a schematic diagram of the identification pattern in the embodiment of the present application as a music playlist icon
- FIG. 33 is a schematic diagram of the identification pattern in the embodiment of the present application as a voice assistant icon
- FIG. 34 is a schematic diagram of the identification pattern in the embodiment of the present application as a display icon of a person being recorded in a multi-person recording scene;
- 35 is a schematic diagram of an identification pattern in an embodiment of the present application as an icon of an album cover
- 36 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- FIG. 37 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- FIG. 38 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- 39 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- FIG. 40 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- the method for generating an identification pattern in this application may be performed by a terminal device, which may be a mobile terminal (for example, a smart phone), a computer, a personal digital assistant, a wearable device, a vehicle-mounted device, an Internet of Things device, and so on.
- the terminal device may also be another device capable of displaying a screen.
- the above terminal device may be a device running various operating systems.
- the above terminal device may be a device running an Android system, a device running an IOS system, or a device running a windows system.
- the software program in the terminal device often directly selects the character image (Chinese character, English character or) as the corresponding display icon.
- the character image Choinese character, English character or
- a character image of a word in the name of the contact or a character image of the initials of the pinyin of the name are generally selected (these character images can also be subjected to some artistic treatment before being used as a logo pattern) , For example, random color background filling, etc.) as the contact's identification pattern (or become the contact's display avatar).
- logo patterns generated in this way are limited, and the display effect is general.
- the present application proposes a new method for generating a logo pattern, transforming the image by extracting the outline of the image, and then generating the logo of the software program according to the transformed image
- the pattern can generate more different logo patterns, which can improve the display effect and further enhance the user experience.
- FIG. 1 is a schematic flowchart of a method for generating a logo pattern according to an embodiment of the present application.
- the method shown in FIG. 1 may be performed by a terminal device.
- the method shown in FIG. 1 includes steps 110 to 130, and steps 110 to 130 will be described in detail below.
- the above first image may be used to represent any one of Chinese characters, English characters and Arabic numeral characters.
- the first image may be acquired according to the software program. Specifically, the first image may be acquired according to the display information of the software program.
- the first image may be an image representing the Chinese character.
- the first image may be stored in advance, or may be acquired in real time from the network.
- the above software program may be a software program in the terminal device.
- the above software program may be an address book, a memo, a calendar, a weather software, a music player, an album, and so on.
- the first image can be obtained according to the contact information in the address book. For example, if a contact has the last name of Zhou, then a character image of "Zhou" can be obtained as the first image.
- the first image may be acquired according to the temperature displayed in the weather software. For example, when the actual temperature of the weather software is 28 degrees, the character image of "28" may be selected as the first image.
- the first image can be acquired according to the memo information in the memo. For example, a character image of the first character in a piece of memo information in the memo can be extracted as the first image.
- the above-mentioned second image includes the first image and a plurality of contour lines.
- the outline of the first image may be either the outer outline of the first image or the inner outline of the first image.
- the outer contour line or the inner contour line of the first image may be obtained by an edge detection algorithm.
- the outer contour line of the first image may be a contour line formed around the peripheral edges (or overall edges) of the first image.
- the above figure 2 only shows the outer contour line when the character image of "week” is a solid character image, and the outer contour line when the character image of "week” is a hollow character image is similar to the case shown in FIG. 2 , The outer contour is still the contour formed around the edges of the character image.
- the inner contour of the first image may be a contour formed by multiple edges of the first image.
- the character image when the character image is a hollow character image, the character image has an inner contour line.
- the character image of "Zhou” is a hollow character image, and the inner contour lines of the character image of "Zhou” are all the edge lines forming the character image.
- transforming the first image according to the outline of the first image may refer to copying a plurality of outlines along the outline of the first image into or around the first image.
- Transformation 1 Expand the outer contour of the first image to the surroundings of the first image to obtain the second image.
- extending the outer contour line of the first image to the periphery of the first image may be to copy the outer contour line of the first image by pointing around the first image.
- the number of outer contour lines copied around the first image may be one or more (at least one).
- the first image is a character image of the Chinese character "Zhou”
- the second image shown on the right side of FIG. 4 can be obtained by transforming the first image through transformation method 1, as can be seen from FIG. 4,
- the second image is composed of the first image and multiple outer contour lines around the first image.
- the first conversion method can be used to transform the first image.
- Transformation 2 Expand the inner contour of the first image into the first image to obtain the second image.
- Expanding the inner contour of the first image into the first image may also be referred to as shrinking the inner contour of the first image, that is, copying the inner contour of the first image into the first image.
- the number of copied lines may be one or more.
- the first image is a character image of the Chinese character "Zhou”
- the second image shown on the right side of FIG. 5 can be obtained by transforming the first image through transformation method 2, as can be seen from FIG. 5,
- the second image is composed of the first image and multiple inner contour lines inside the first image.
- the first conversion method may be used to convert the first image.
- the first image may be transformed to obtain a transformed first image, where the transformed first image is a hollow character image.
- the transformation method 2 can be used to perform transformation processing on the transformed first image to obtain a second image.
- the first image is a solid character image.
- the transformed first image is obtained, and then the inner contour of the transformed first image An image is expanded internally to obtain a second image.
- the second image may be directly used as the logo pattern of the software program, or the image of the center area of the second image may be selected as the logo pattern of the software program, or the hot zone area of the second image may also be selected.
- the image serves as the logo pattern of the software program.
- a second image including multiple contour lines can be obtained, and furthermore, a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar, and the software program can be improved to a certain extent
- the display effect of the logo pattern improves the user experience.
- the contour of the first image when the contour of the first image is a right-angle contour, the contour of the first image may be processed first to obtain the processed first image, wherein the processed first image The outline is a rounded outline, and then the processed first image is transformed according to the rounded outline to obtain a second image.
- the outline of the first image is a right-angle outline
- the processed first outline can be obtained by processing the outline of the first image (specifically, the outline of the first image can be rounded).
- An image, the contour line of the processed first image is a rounded contour line.
- the logo pattern of the software program is generated from the second image
- the second image may be directly used as the logo pattern of the software program.
- a part of the images in the second image may also be selected as the logo pattern of the software program.
- the image of the center area in the second image may be selected as the identification image of the software program, where the center area of the second image may be an area extending along the geometric center of the second image to a certain distance around the second image.
- the identification pattern is a hot zone image of the second image.
- the hot zone image of the second image is a sub-image in the second image that can recognize the character represented by the second image.
- the part of the area where the image is taken from the second image may also be called a visual hot zone.
- the second image contains many contour lines. If the second image is directly used as the logo pattern of the software program, it is not very concise (and may not be beautiful enough). In order to improve the display effect, you can choose the second image.
- the image of a partial area in the image serves as an identification pattern, wherein the image in the identification pattern can identify that the second image represents the Chinese character "Zhou".
- a neural network model may be used to identify and intercept the hot zone image of the second image.
- a preset number of character images can be selected, and the hot zone images of these character images can be manually intercepted to form a character image training set, which is input into a neural model for training.
- the terminal device can have a preset number of characters The ability to recognize and intercept hot zone images in images, so that when the obtained second picture is an image of a preset number of character images, the terminal device can recognize and intercept the hot zone images of the second image.
- the training picture may also include an image generated by the terminal device during the process of generating the logo pattern.
- the software program is a contact list
- the identification pattern of the software program is a contact avatar in the contact list.
- the identification pattern can be used as the contact avatar. If the logo pattern is relatively large, you can also compress the logo pattern, and then use the compressed logo pattern as the contact picture.
- the identification pattern of the software program is an avatar of a contact in the address book
- the avatar of the contact may also be used as an incoming call display screen.
- the avatar of the contact may be used as the caller ID display.
- the density of the outline in the identification pattern and the contact frequency or intimacy of the contact may be positively correlated (specifically, it may be proportional relationship).
- the density of the outline in the avatar of the generated contact is greater.
- the density of outlines in the avatar of the generated contact is also greater.
- contacts with different contact frequencies or different intimacy levels can be identified by the density of the contour lines in the identification pattern, and the display effect is better.
- the color depth of the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- the greater the contact frequency of the contacts in the address book the darker the color of the contact's avatar is generated, and the greater the contact intimacy of the contacts in the address book, the color of the generated contact's avatar is also Deeper.
- contacts with different contact frequencies or different intimacy levels can be identified by the color depth of the logo pattern, and the display effect is better.
- the identification pattern is a contact avatar in the address book
- the contacts may be displayed in order of gradually decreasing density of the outline in the contact avatar, or, These contacts can also be displayed in the order in which the color of the contact's avatar gradually becomes lighter.
- a part of the image in the logo pattern may also be hidden.
- part of the lines in the identification pattern can be hidden, and part of the patterns in the identification pattern can also be hidden according to a certain geometric shape.
- some lines in the lower part of the logo pattern can be hidden, and images in some circular areas in the logo pattern can also be hidden.
- the density of the outline in the identification pattern may also dynamically change according to the length of the talk time.
- the density of the outline in the logo pattern can be proportional to the length of the talk time.
- the outline in the logo pattern is relatively sparse.
- the outline in the logo pattern Getting denser.
- the number of outline lines in the contact's avatar is only 2, and the outline is very sparse.
- the outline of the contact's avatar increases to 3 ,
- the density of the contour line has increased, when the call is 10 minutes, the contour line in the contact avatar becomes 4 and the density of the contour line is further increased, and by 30 minutes, the contour line in the contact avatar
- the number has increased a lot, and the contour lines have become very dense.
- the software program in the method shown in FIG. 1 may be various software programs in the terminal device, and the logo pattern of the software program may be the logo pattern of the software program icon, or the logo pattern of the software program may also be software The logo pattern of the display content in the program.
- the first image can also be superimposed on a dot matrix image or a line image to obtain a second image.
- the conversion method will be described in detail below with reference to FIG. 14.
- FIG. 14 is a schematic flowchart of a method for generating a logo pattern according to an embodiment of the present application.
- the method shown in FIG. 14 may be performed by a terminal device.
- the method shown in FIG. 14 includes steps 210 to 240, and steps 210 to 240 will be described in detail below.
- the first image in the above step 210 may be used to represent any one of Chinese characters, English characters, and Arabic numeral characters, and the first image is a hollow character image.
- the first image may be acquired according to the software program. Specifically, the first image may be acquired according to the display information of the software program.
- an image representing the character “Week” may be acquired as the first image, which may be pre-stored or from the network Obtained in real time.
- step 210 The specific process performed in step 210 above is similar to the specific process performed in step 110.
- step 110 The relevant definitions and explanations in step 110 above also apply to step 210. In order to avoid unnecessary repetition, step 210 will not be described in detail here .
- the dot matrix image may be an image with relatively sparse pixel distribution
- the line image may be an image formed by arranging multiple lines.
- moving a part of the pixels in the dot matrix or lines in the superimposed image by a preset distance includes: moving the pixels in the superimposed image that are located inside the outer contour of the first image by a preset distance.
- the pitch of pixels in the dot image is d (for example, d can be taken as 6)
- the image obtained by superimposing the dot image on the first image can be as shown in the middle of FIG. 15.
- you can move the pixels located inside the outline of the first image to the right of the image for example, you can move d/2 pixels
- move upwards for example, you can move d/2 pixels
- the resulting second image is shown at the far right of Figure 15.
- the line spacing in the line image is d (for example, d can be 2)
- the image obtained by superimposing the line image on the first image can be as shown in the middle of FIG. 16
- the pixels located inside the outline of the first image can be moved to the upper side of the image (for example, d/2 pixels can be moved), and the resulting second image is shown in the rightmost side of FIG. 16.
- a second image with a three-dimensional sense can be obtained, so that the logo pattern obtained from the second image also has a three-dimensional effect. Can improve the final display effect.
- the entire second image may be used as the logo pattern of the software program, or the center area of the second image may be selected as the logo pattern of the software program.
- step 240 is similar to the specific implementation process of step 130 above, and the relevant definitions and explanations in step 130 above also apply to step 240. In order to avoid unnecessary repetition, step 240 will not be described in detail here .
- a second image with a more diverse display style can be obtained, and then a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar.
- the display effect of the logo pattern of the software program is improved, and the user experience is improved.
- the identification pattern is a hot zone image of the second image.
- the hot zone image of the second image is a sub-image in the second image that can recognize the character represented by the second image.
- the part of the area where the image is taken from the second image may also be called a visual hot zone.
- the logo pattern of the software program is not very concise (and may not be beautiful enough).
- the hot zone image in the two images serves as the identification pattern, wherein the image in the identification pattern can identify that the second image represents the Chinese character "Zhou”.
- the software program in the method shown in FIG. 14 is a contact list
- the identification pattern of the software program is a contact avatar in the contact list.
- the identification pattern of the software program is a contact avatar in the address book
- the density of the dot matrix or line in the identification pattern and the contact frequency and/or frequency of the contact represented by the identification pattern and/or Or intimacy has a positive correlation.
- the density of dot matrix or line in the avatar of the generated contact is greater.
- the degree of intimacy of the contacts in the address book is greater, the density of dot matrix or line in the avatar of the generated contact is also greater.
- contacts with different contact frequencies or different degrees of intimacy can be identified by identifying the density of dot matrix or lines in the pattern, and the display effect is better.
- the color depth of the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern relationship.
- the greater the contact frequency of the contacts in the address book the darker the color of the contact's avatar is generated, and the greater the contact intimacy of the contacts in the address book, the color of the generated contact's avatar is also Deeper.
- contacts with different contact frequencies or different intimacy levels can be identified by the color depth of the logo pattern, and the display effect is better.
- the identification pattern is a contact avatar in the address book, it is possible to distinguish the same character image as the contact avatar according to the density of the dot matrix or line in the contact avatar or the color depth of the contact avatar Contact person.
- FIG. 18 is a schematic flowchart of a method for generating an identification pattern according to an embodiment of the present application.
- the method shown in FIG. 18 may be performed by a terminal device.
- the method shown in FIG. 18 includes steps 310 to 330, and steps 310 to 330 will be described in detail below.
- the first image in step 310 may be an image representing English characters or Arabic numeric characters.
- the first image may be acquired according to the software program. Specifically, the first image may be acquired according to the display information of the software program.
- an image representing the character “28” may be acquired as the first image, which may be pre-stored or may be from the network Obtained in real time.
- step 310 The specific process performed in the above step 310 is similar to the specific process performed in the step 110.
- the relevant definitions and explanations in the step 110 above are also applicable to the step 310. In order to avoid unnecessary repetition, repeated description is appropriately omitted here.
- the target picture in step 320 includes a reference image whose similarity to the first image is greater than or equal to a preset similarity.
- the above picture library contains multiple pictures, and the multiple pictures may contain images similar to some common English characters or Arabic numeral character patterns.
- the picture library may contain pictures composed of images similar to English characters A to Z (the images in these pictures are similar to the English characters AZ), and the picture library may also contain pictures composed of images similar to Arabic numerals 0-9 (The images in these pictures are similar to Arabic numerals 0-9).
- a target picture matching the first image may be obtained through a neural network model.
- step 330 The specific execution process of step 330 is similar to step 130, the only difference is that step 130 is to generate a logo pattern from the second image, and step 330 is to generate a logo pattern from the reference image.
- step 130 is to generate a logo pattern from the second image
- step 330 is to generate a logo pattern from the reference image.
- the above definitions and interpretations in step 130 are also applicable In step 330, in order to avoid unnecessary repetition, the repetitive description is appropriately omitted here.
- the method shown in FIG. 18 further includes: intercepting or extracting the reference image from the target picture.
- the identification pattern is a hot zone image of the reference image, wherein the hot zone image of the reference image is a character in the reference image that can identify the character represented by the reference image Sub-image.
- the first image is a character image of the letter "W"
- a target picture can be found from the picture library, and the reference image in the target picture is similar to the letter "W”.
- the reference image can be extracted from the target picture, and then the hot zone image of the reference image is intercepted as the identification pattern of the software program.
- the texture distribution of the pictures in the picture library satisfies the golden ratio or Fibonacci sequence characteristics.
- the logo pattern of the software program finally obtained from the pictures in the picture library has a certain beauty, which can bring better User experience.
- an image of the current weather condition may be superimposed on the logo pattern according to the weather information.
- an image representing rain can be superimposed on the logo pattern, thereby adding the raindrop effect to the final logo pattern.
- the identification pattern in the embodiment of the present application may be used as a contact avatar.
- the specific process of generating a contact avatar will be described in detail below with reference to FIGS. 21 to 26.
- FIG. 21 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- the process shown in FIG. 21 includes steps 410 to 460, and these steps are described in detail below.
- the above-mentioned character image 1001 may be a pre-stored character image, and when it is necessary to generate the avatar of the contact person with the surname of “Zhou”, the character image 1001 may be extracted from the pre-stored character image.
- the character image 1001 may be a hollow character image in addition to a solid character image.
- step 410 when a contact with the name " ⁇ XX" is obtained from the address book, then the word "week” can be selected (the surname or the first letter of the surname can be selected, or the name of the name can be selected Character image.
- the terminal device generally stores a character image of a family name, 26 letters, or Arabic numerals 0-9.
- the corresponding image can be obtained from the picture stored in the terminal device according to the name information of the contact Character image.
- step 420 an image 1002 with a white expansion area around the image can be obtained by performing an expansion process on the character image 1001.
- the dilated image 1002 may be obtained by morphologically dilating the character image 1001.
- a convolution kernel B (core can also be called a template or mask), the convolution kernel can be any shape and size, and has a separately defined reference point-anchor point (anchorpoint) .
- anchorpoint Normally, the convolution kernel is a square or disk with a reference point.
- the convolution kernel B may use a convolution kernel of size 3*3 shown in FIG. 22 (a convolution kernel of size 5*5 may also be used).
- the convolution kernel B can be convolved with the image A (original image) to calculate the preset pixel values of the area covered by the kernel B, thereby obtaining the convolved image.
- convolution is an operation in analytical mathematics.
- To perform a convolution operation on a digital image is to use a convolution kernel (convolution template) to slide on the image, multiply the pixel gray value on the image point with the corresponding value on the convolution kernel, and then multiply all The value of is added as the gray value of the pixel on the image corresponding to the middle pixel of the convolution kernel, and finally the process of sliding all the images is completed.
- a convolution kernel convolution template
- the transformation kernel B can be used to convolve the character image 1001, and finally an image 1002 in which the black area is expanded by 1 pixel is obtained, wherein the gray wire frame in the image 1002 does not actually exist, just For convenience, the range of the expanded white area is shown.
- step 430 the edge of the character can be detected by the character edge detection method, and finally an outer contour image 1003 containing a black contour line is obtained.
- the outer contour image can also be understood as a character image containing outer contour lines.
- the outer contour image 1003 is equidistantly extended to obtain a character extended image 1004.
- the outer contour image 1003 is equidistantly extended, and it can also be understood that the outer contour line of the image 1003 is extended equidistantly, and the distance between the multiple outer contour lines can be 5 pixels
- the number of outer contour lines expanded can be ten.
- the character expansion image 1004 is equivalent to the second image above. After the character expansion image 1004 is obtained, the contact avatar can be generated according to the character expansion image 1004.
- the number of expanded outer contour lines may be determined according to the intimacy or contact frequency of the contact. For example, when the intimacy of the contact is high or the contact frequency of the contact is high, the extended There are more outer contour lines. On the contrary, when the intimacy of the contact is low or the contact frequency of the contact is low, the number of outer contour lines expanded is less.
- the number of outer contour lines expanded can reflect the intimacy or contact frequency of the contact, so that the contact avatar finally obtained has a better display effect.
- step 450 the final contact avatar is shown as 1006 in FIG. 21.
- FIG. 23 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- the process shown in FIG. 23 includes steps 510 to 550, and these steps are described in detail below.
- the above-mentioned character image 2001 may be a pre-stored character image, and when it is necessary to generate the avatar of the contact person with the surname "Zhou", the character image 2001 may be extracted from the pre-stored character image.
- the hollow character image of the character "Zhou” can also be directly obtained, and then the hollow character image 2002 can be directly obtained.
- the character image 2001 is a solid character image
- step 510 may not be performed on the character image 2001, but step 520 may be directly performed.
- the outline of the character image 2002 is a right-angle outline, in order to further improve the display effect, the outline of the character image 2002 can be transformed from a right angle to a rounded corner to obtain a character image 2003.
- the resulting character image 2004 contains neatly arranged contour lines, which can improve the final display effect.
- the number of retracted inner contour lines may be determined according to the intimacy or contact frequency of the contact, for example, when the contact's intimacy is higher or the contact's contact frequency is higher, the contraction The number of inner contour lines is more. On the contrary, when the intimacy of the contact is lower or the contact frequency of the contact is lower, the number of inner contour lines that are retracted is less.
- the number of inner contour lines shrunk can reflect the intimacy or contact frequency of the contact, so that the contact avatar finally obtained has a better display effect.
- the method of capturing the hot zone image in step 540 is similar to the above method of capturing the image, and will not be described in detail here.
- FIG. 24 is a schematic diagram of a process of generating contact avatars according to an embodiment of the present application.
- the process shown in FIG. 24 includes steps 610 to 650, and these steps are described in detail below.
- the above-mentioned character image 3001 may be a pre-stored character image, and when it is necessary to generate the avatar of the contact person with the surname "Zhou", the character image 3001 may be extracted from the pre-stored character image.
- the hollow character image of the character “Zhou” can also be directly obtained, and then the hollow character image 3002 can be directly obtained.
- the superimposed image 3003 is composed of a character image 3002 and a dot matrix.
- the dot matrix image may be an image with an image area greater than or equal to the character image 3001.
- the dot matrix image may completely cover the character image 3001 when superimposed on the character image 3001.
- a dot matrix image with a denser dot matrix can be selected to be superimposed on the character image 3001
- the contact frequency or intimacy of the contact person with the last name "Zhou” is When the degree is low, a dot matrix image with a sparse dot matrix and a character image 3001 may be selected to be superimposed. In this way, the density of the dot matrix in the contact avatar finally obtained can reflect the contact frequency or intimacy of the contact, and can better distinguish different contacts.
- step 630 by performing pixel shift, the shifted image area can be rendered stereoscopic, and the display effect of the image can be improved (as shown in FIG. 24, the characters in the image 3003 present a stereoscopic effect).
- the method of capturing the hot zone image in step 640 is similar to the above method of capturing the image, and will not be described in detail here.
- FIG. 25 is a flowchart of a method of generating a logo pattern according to an embodiment of the present application.
- the method shown in FIG. 25 takes a Zhou surname contact as an example to illustrate the entire process of generating a contact avatar.
- the method shown in FIG. 25 includes steps 710 to 750, and steps 710 to 750 will be described in detail below.
- the above-mentioned character image 4001 may be a pre-stored character image, and when it is necessary to generate the avatar of the contact person with the surname of “Zhou”, the character image 4001 may be extracted from the pre-stored character image.
- the solid character image of the character "Zhou” can be obtained first, and then the solid character image is converted into a hollow character image, thereby obtaining the character image 4001.
- the line image may be an image with an image area greater than or equal to the character image 4001.
- the line image may completely cover the character image 4001 when superimposed on the character image 4001.
- step 720 the dot matrix image and the character image 4001 may also be superimposed.
- step 730 by performing pixel shift, the shifted image area can be rendered stereoscopic, and the display effect of the image can be improved (as shown in FIG. 25, the characters in the image 4003 present a stereoscopic effect).
- the method of capturing the hot zone image in step 740 is similar to the above method of capturing the image, and will not be described in detail here.
- step 750 the final contact avatar is shown in image 4005 in FIG. 25.
- FIG. 25 is a flowchart of a method of generating a logo pattern according to an embodiment of the present application.
- the process of generating a logo pattern shown in FIG. 26 includes steps 810 to 850, and these steps are described in detail below.
- the first character W of the contact's name can be extracted, then the character image 5001 of "W" can be obtained first.
- the above-mentioned character image 5001 may be a pre-stored character image.
- the character image 5001 may be extracted from the pre-stored character image.
- the picture 5002 may include a target image with a high similarity to the image 5001 (the similarity between the target image and the image 5001 is greater than a preset threshold).
- the letter area in the picture 5002 is the area where the target image in the picture 5002 is located, and the letter area in the picture 5002 is an image area similar to the letter W.
- training pictures will contain images that are similar to some commonly used English characters or numeric characters, such as The training picture can include images similar to 26 English characters (AZ) or 10 numeric characters (0-9).
- the letter area of the training picture and the corresponding letter of the training picture can be manually marked before starting the training (for example, for a picture, if the picture contains an image area similar to the letter A, then you can manually mark the The image area similar to the character A in the picture, and the corresponding letter of the picture is marked as A) to form a training set, and then use the training set to train the neural network model.
- the picture in the training set may be a texture image with characteristics of golden section or Fibonacci sequence, which makes the final logo pattern more beautiful.
- the target image contains images similar to the characteristics of the letter A
- mark the target image with image areas similar to the characteristics of the letter A and then input the image to the neural network model, and for each pixel Classification (for example, the area where the letter "A” is located, and the area outside the letter “A” is another category) to form a mask image of the same size as the target picture (for example, the "A" area Is black, and the non-"A" area is a white image), which is output as a result of neural network model training.
- the computer has the ability to recognize the area of the letter "A" in the preset picture through the above training.
- the aforementioned neural network model may be convolutional neural networks (CNN) or fully convolutional neural networks (FCN), etc.
- the image 5004 is more similar to the "W" character image 5001, and the display style of the image 5004 is more unique, generating the final contact avatar according to the image 5004 can make the resulting contact avatar display better.
- the method of capturing the hot zone image in step 850 is similar to the above method of capturing the image, and will not be described in detail here.
- the image 5004 may also be processed according to the method of generating the logo pattern in FIG. 1 or FIG. 14 in the embodiment of the present application, for example, according to the outline of the image 5004, the image 5004 Perform transformation, or superimpose a dot matrix image or a line image with the image 5004 to obtain the processed image, and then perform step 850, so that the finally obtained logo pattern achieves a better display effect.
- the identification pattern in the embodiment of the present application may also be a temperature number in a weather application, and the case where the identification pattern is a temperature number in a weather application will be described in detail below with reference to FIG. 27.
- FIG. 27 is a schematic diagram of a process of generating a temperature display icon according to an embodiment of the present application.
- the process of generating a logo pattern shown in FIG. 27 includes steps 910 to 960, and these steps are described in detail below.
- step 910 when the current temperature is 28°, the acquired 28° character image is shown as 6001.
- the character image 6001 may be a pre-stored character image.
- a 28° character image may be extracted from the pre-stored digital character image.
- step 930 may be directly performed without performing step 920.
- the image area of the dot image may be greater than or equal to the image area of the character image 4001, and the dot image may completely cover the character image 6002 when superimposed on the character image 6002.
- the dot matrix of the dot image superimposed on the character image 6002 is denser.
- Different density levels can represent different temperature levels, and the display effect is better.
- step 940 by shifting the pixels of the dot matrix in the character area, the offset image area can be rendered three-dimensional, and the display effect of the image can be improved (as shown in FIG. 27, the characters in image 6004 The area presents a three-dimensional sense).
- the method of capturing the hot zone image in step 950 is similar to the above method of capturing the image, and will not be described in detail here.
- step 960 the resulting temperature display icon is shown in image 6006 in FIG. 27.
- the identification pattern of the embodiment of the present application may also be a display icon related to various software programs.
- the application examples of the identification pattern of the software program and the software program of the embodiment of the present application may be as follows As shown:
- the software program is an album, and the logo pattern of the software program is the pattern of the album cover;
- the software program is a memo, and the logo pattern of the software program is the logo pattern of the memo information in the memo;
- the software program is a music application, and the logo of the software program is the cover of the song list in the music application;
- the software program is a voice assistant, and the logo pattern of the software program is the display icon of the voice assistant;
- the software program is a recording application, and the logo of the software program is the avatar of the person being recorded;
- the software program is a weather application, and the logo pattern of the software program is a display icon of the weather application.
- the identification pattern of the embodiment of the present application is a lock screen pattern.
- the method for generating a logo pattern in the embodiment of the present application can extract the character image of the character "ON" for processing, and the display effect of generating the final logo pattern is as follows: Figure 28 shows.
- the identification pattern in the embodiment of the present application is also a display icon of the calendar application.
- the character image of the number “9” can be extracted using the method of generating the identification pattern of the embodiment of the present application, and the character image of the number “9” After processing, the display effect of the generated logo pattern is shown in FIG. 29.
- the identification pattern of the embodiment of the present application is an icon of the title of a memo, document, or note.
- the character of the first character "on” is extracted from the title according to the method for generating a logo pattern according to an embodiment of the present application
- the image is processed, and the display effect of the generated title icon is shown in Figure 30.
- the identification pattern of the embodiment of the present application is an icon of an alarm clock or an event title reminding an event.
- the user sets a reminder event "driving to pick up a child" on the mobile phone, he can extract the character image of "ON” in the title of the reminder event, and then use the method of generating an identification pattern in the embodiment of the present application to turn “ON”
- the character image is processed, and the display effect of the icon of the title of the generated reminder event is shown in FIG. 31.
- the identification pattern in the embodiment of the present application is a music playlist icon.
- the character image of “Li” can be processed by using the method for generating a logo pattern in the embodiment of the present application, and the display effect of the generated song list icon is as shown in the figure 32 is shown.
- the identification pattern in the embodiment of the present application is a voice assistant icon.
- the icon of the voice assistant is a character image of “S”, and the character image of “S” is processed by the method of generating a logo pattern in the embodiment of the present application, and the generated voice assistant icon is shown in FIG. 33.
- the identification pattern in the embodiment of the present application is a display icon of the person being recorded in a multi-person recording scene.
- the embodiments of the present application can be applied in a scene where multiple people record.
- the mobile phone can determine the location of the sound source and display the icon of the recorded sound on the corresponding position on the recording interface.
- the recorded persons include Li Huaweing and Zhou Xiaoxun
- the character images of "Li” and "Zhou” can be extracted, and the method of generating a logo pattern according to the embodiment of the present application can be used for "Li” It is processed with the character image of "Week", and the generated icon is used to identify the icons of the two users at the corresponding positions on the recruitment interface.
- the specific display is shown in Figure 34.
- the identification pattern in the embodiment of the present application is an icon of an album cover.
- the method of generating an identification pattern may be used to generate an identification pattern related to album-related place names, festivals, person names and other information, and then the identification pattern is superimposed on the cover of the album in the gallery to form an icon for the album cover .
- FIGS. 36 to 40 Of the terminal devices of the present application can execute the terminal device of the embodiment of the present application to generate an identification pattern.
- the following description of the terminal device of the embodiment of the present application will appropriately omit repetitive description.
- the terminal device 7000 in FIG. 36 includes:
- the obtaining module 7010 is configured to obtain a first image, and the first image is used to represent any one of Chinese characters, English characters and Arabic numeral characters;
- a processing module 7020, the processing module 7020 is used to:
- the identification pattern of the software program is generated based on the second image.
- a second image including multiple contour lines can be obtained, and furthermore, a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar, and the software program can be improved to a certain extent
- the display effect of the logo pattern improves the user experience.
- processing module 7020 is used to:
- the first image is a hollow character image
- the processing module 7020 is configured to:
- the first image is a solid character image
- the processing module 7020 is configured to:
- the outline of the first image is a right-angle outline
- the processing module 7020 is configured to:
- processing module 7020 is used to:
- the hot zone image of the second image is a character that can identify the character represented by the second image in the second image Sub-image.
- the software program is a contact list
- the identification pattern of the software program is a contact avatar in the contact list.
- the density of the outline in the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- the color depth of the identification pattern has a positive correlation with the contact frequency and/or intimacy of the contact represented by the identification pattern.
- the software program is an album
- the logo pattern of the software program is a pattern of the album cover
- the software program is a memo, and the logo pattern of the software program is a logo pattern of memo information in the memo; or,
- the software program is a music application, and the logo pattern of the software program is a cover sheet of the music application; or,
- the software program is a voice assistant, and the logo pattern of the software program is a display icon of the voice assistant; or,
- the software program is a recording application, and the logo pattern of the software program is the avatar of the person being recorded; or,
- the software program is a weather application, and the logo pattern of the software program is a display icon of the weather application.
- the terminal device 8000 in FIG. 37 includes:
- the obtaining module 8010 is configured to obtain a first image, wherein the first image is used to represent any one of Chinese characters, English characters and Arabic numeric characters, and the first image is a hollow character image;
- a processing module 8020, the processing module 8020 is used for:
- the identification pattern of the software program is generated based on the second image.
- a second image with a more diverse display style can be obtained, and then a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar.
- the display effect of the logo pattern of the software program is improved, and the user experience is improved.
- the identification pattern is a hot zone image of the second image, wherein the hot zone image of the second image is the second image that can identify the second image The sub-image of the character represented.
- the software program is a contact list
- the identification pattern of the software program is a contact avatar in the contact list.
- the density of dots or lines in the identification pattern is positively related to the contact frequency and/or intimacy of the contact represented by the identification pattern.
- the color depth of the identification pattern has a positive correlation with the contact frequency and/or intimacy of the contact represented by the identification pattern.
- the software program is an album
- the logo pattern of the software program is the pattern of the album cover
- the software program is a memo, and the logo pattern of the software program is a logo pattern of memo information in the memo; or,
- the software program is a music application, the logo pattern of the software program is a cover sheet of the music application; or, the software program is a voice assistant, and the logo pattern of the software program is a display icon of the voice assistant; or,
- the software program is a recording application, and the logo pattern of the software program is the avatar of the person being recorded; or,
- the software program is a weather application, and the logo pattern of the software program is a display icon of the weather application.
- the terminal device 9000 in FIG. 38 includes:
- the obtaining module 9010 is configured to obtain a first image, where the first image is used to represent English characters or Arabic numeric characters;
- a processing module 9020, the processing module 9020 is used to:
- the target picture contains a reference image whose similarity to the first image is greater than or equal to a preset similarity; according to the reference image Generate the logo pattern of the software program.
- a second image with a more diverse display style can be obtained, and then a logo pattern of a software program with a more diverse display style can be obtained according to the second avatar.
- the display effect of the logo pattern of the software program is improved, and the user experience is improved.
- the identification pattern is a hot zone image of the reference image, wherein the hot zone image of the reference image is a character in the reference image that can identify the character represented by the reference image Sub-image.
- the texture distribution of the pictures in the picture library satisfies the characteristics of the golden ratio or the Fibonacci sequence.
- the software program is an album
- the logo pattern of the software program is a pattern of the album cover
- the software program is a memo, and the logo pattern of the software program is a logo pattern of memo information in the memo; or,
- the software program is a music application, the logo pattern of the software program is a cover sheet of the music application; or, the software program is a voice assistant, and the logo pattern of the software program is a display icon of the voice assistant; or,
- the software program is a recording application, and the logo pattern of the software program is the avatar of the person being recorded; or,
- the software program is a weather application, and the logo pattern of the software program is a display icon of the weather application.
- the terminal device 10000 shown in FIG. 39 includes:
- the memory 10010 is used to store programs
- the processor 10020 is used to execute the program stored in the memory 10010. When the program stored in the memory 10010 is executed, the processor 10020 is used to execute each step of the method for generating an identification pattern in the embodiment of the present application.
- the acquisition module 7010 and the processing module 7020 in the terminal device 7000 are equivalent to the processor 10020
- the acquisition module 8010 and the processing module 8020 in the terminal device 8000 are equivalent to the processor 10020
- the acquisition module 9010 and the processing module in the device 9000 9020 is equivalent to processor 10020.
- FIG. 40 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- terminal device 7000 the terminal device 8000, the terminal device 9000, and the terminal device 1000 shown in FIGS. 36 to 39 may be as shown in FIG. 40.
- the terminal device in FIG. 40 includes a communication module 3010, a sensor 3020, a user input module 3030, an output module 3040, a processor 3050, an audio and video input module 3060, a memory 3070, and a power supply 3080.
- the terminal device shown in FIG. 40 can execute various steps of the method for generating an identification pattern of the embodiment of the present application.
- the processor 3050 in the terminal device shown in FIG. 40 can execute the method of generating an identification pattern of the embodiment of the present application The various steps.
- the communication module 3010 may include at least one module that enables communication between the terminal device and other terminal devices.
- the communication module 3010 may include one or more of a wired network interface, a broadcast receiving module, a mobile communication module, a wireless Internet module, a local area communication module, and a location (or positioning) information module.
- the sensor 3020 can sense some operations of the user, and the sensor 3020 can include a distance sensor, a touch sensor, and the like.
- the sensor 3020 can sense the user's operation such as touching the screen or approaching the screen.
- the user input module 3030 is used to receive input digital information, character information, or contact touch operation/contactless gestures, and receive signal input related to user settings and function control of the system.
- the user input module 3030 includes a touch panel and/or other input devices.
- the output module 3040 includes a display panel for displaying information input by the user, information provided to the user, various menu interfaces of the system, and the like.
- the display panel may be configured in the form of a liquid crystal display (liquid crystal) (LCD) or an organic light-emitting diode (OLED).
- the touch panel may cover the display panel to form a touch display screen.
- the output module 3040 may also include an audio output module, an alarm, and a haptic module.
- the audio and video input module 3060 is used to input audio signals or video signals.
- the audio and video input module 3060 may include a camera and a microphone.
- the power supply 3080 can receive external power and internal power under the control of the processor 3050, and provide power required for operation of each module of the entire terminal device.
- the processor 3050 may indicate one or more processors, for example, the processor 3050 may include one or more central processors, or include a central processor and a graphics processor, or include an application processor and a coprocessor (Eg micro control unit or neural network processor). When the processor 3050 includes multiple processors, the multiple processors may be integrated on the same chip, or may be independent chips.
- a processor may include one or more physical cores, where the physical core is the smallest processing module.
- the memory 3070 stores a computer program including an operating system program 3071, an application program 3072, and the like.
- Typical operating systems such as Microsoft’s Windows, Apple’s MacOS, etc. are used for desktop or notebook systems, and are based on Google’s Android Systems such as systems for mobile terminals.
- the resource scheduling terminal device of the embodiment of the present application is implemented by software, it may be considered to be specifically implemented by the application program 3071.
- the memory 3070 may be one or more of the following types: flash memory, hard disk type memory, micro multimedia card type memory, card memory (such as SD or XD memory), random access memory (random access memory) , RAM), static random access memory (static RAM, SRAM), read-only memory (read only memory, ROM), electrically erasable programmable read-only memory (electrically erasable programmable-read-only memory (EEPROM), programmable Read only memory (programmable ROM, PROM), magnetic memory, magnetic disk or optical disk.
- the memory 3070 may also be a network storage device on the Internet, and the system may perform operations such as updating or reading the memory 3070 on the Internet.
- the processor 3050 is used to read the computer program in the memory 3070 and then execute the terminal device defined by the computer program. For example, the processor 3050 reads the operating system program 3072 to run the operating system on the system and implement various functions of the operating system, or One or more application programs 3071 are read to run applications on the system.
- the above-mentioned memory 3070 may store a computer program (the computer program is a program corresponding to the resource scheduling terminal device of the embodiment of the present application).
- the processor 3050 executes the terminal and the program, the processor 3050 can execute the embodiment of the present application Resource scheduling terminal equipment.
- the memory 3070 also stores other data 3073 in addition to the computer program.
- the memory 3070 may store the load characteristics of the frame drawing thread involved in the resource scheduling terminal device of the present application, the load prediction value of the frame drawing thread, and so on.
- connection relationship of each module in FIG. 40 is only an example, and the terminal device provided in any embodiment of the present application may also be applied to terminal devices of other connection methods, for example, all modules are connected through a bus.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical, or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
- the foregoing storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
- Image Analysis (AREA)
- Processing Or Creating Images (AREA)
Abstract
一种生成标识图案的方法和终端设备等。该方法包括:获取第一图像(110),所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种;根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像(120),其中,所述第二图像包括所述第一图像和多条轮廓线;根据所述第二图像生成软件程序的标识图案(130)。所述方法能够提高标识图案的显示效果。
Description
本申请要求于2018年12月19日提交中国专利局、申请号为201811555766.0、申请名称为“生成标识图案的方法和终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及终端设备技术领域,并且更具体地,涉及一种生成标识图案的方法和终端设备。
终端设备中的软件程序往往会采用相应的标识图案来表示软件程序图标或者软件程序内部显示的信息。例如,通信录中的联系人往往设置有联系人头像,设置联系人头像的一个主要的目的是提高联系人信息的显示效果,区分不同的联系人,提高用户查看时联系人信息时体验。
传统方案一般是提取联系人的姓名中的一个汉字字符图像或者联系人拼音首字母的字符图像作为该联系人的头像。例如,一个姓周的联系人,可以直接将汉字“周”的字符图像作为该联系人的头像,或者,也可以将汉字周的拼音首字母“Z”的字符图像作为该联系人的头像。
传统方案直接提取字符图像作为联系人头像的显示方式比较单一,显示效果不佳,相应的用户体验也有待提高。
发明内容
本申请提供一种生成标识图案的方法和终端设备,以提高标识图案的显示效果。
第一方面,提供了一种生成标识图案的方法,该方法包括:获取第一图像,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种;
根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,其中,所述第二图像包括所述第一图像和多条轮廓线;根据所述第二图像生成所述软件程序的标识图案。
在一些实现方式中,所述标识图案就是所述第二图像。
在另一些实现方式中,所述标识图案为所述第二图像的部分。
可选地,所述标识图案包含所述第二图像以及其它图像,或者,所述标识图案由所述第二图像变换得到等。
可选地,上述软件程序为通信录,备忘录,日历,天气软件,音乐播放器以及相册中的任意一种。
可选地,上述获取第一图像,包括:根据软件程序的显示信息获取第一图像。
具体地,当上述软件程序为通讯录时,可以通过通讯录中的联系人信息获取第一图像。
可选地,在根据所述第一图像的轮廓线对所述第一图像进行变换之前,所述方法还包括:根据边缘检测算法获取所述第一图像的轮廓线。
上述第一图像的轮廓线既可以是第一图像的外轮廓线也可以是第一图像的内轮廓线。
第一图像的外轮廓线可以是围绕第一图像的四周边缘(或者是整体边缘)形成的轮廓线。
第一图像的内轮廓线可以是第一图像的多个边缘形成的轮廓线。
进一步的,第一图像的内轮廓线可以是第一图像的所有边缘共同形成的轮廓线。
本申请中,通过对第一图像进行变换,能够得到包括多条轮廓线的第二图像,进而能够根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
结合第一方面,在第一方面的某些实现方式中,所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:将所述第一图像的外轮廓线向所述第一图像的四周扩展,以得到所述第二图像,其中,所述第一图像的外轮廓线是围绕所述第一图像的四周边缘形成的轮廓线。
通过将外轮廓线向第一图像的四周扩展,能够得到由第一图像以及第一图像四周的多条外轮廓线组成的第二图像。
应理解,当第一图像为实心字符图像或者空心字符图像时,均可以通过将外轮廓线向第一图像的四周扩展的方式来得到第二图像。
通过将第一图像的外轮廓线向第一图像的四周扩展,能够得到图像面积更大的第二图像,使得后续更灵活地根据第二图像生成软件程序的标识图案。
结合第一方面,在第一方面的某些实现方式中,所述第一图像为空心字符图像,所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:将所述第一图像的内轮廓线向所述第一图像内部扩展,以得到所述第二图像,其中,所述第一图像的内轮廓线是所述第一图像的多个边缘形成的轮廓线。
结合第一方面,在第一方面的某些实现方式中,所述第一图像为实心字符图像,将所述第一图像的内轮廓线向所述第一图像内部扩展,以得到所述第二图像,包括:对所述第一图像进行变换,得到变换后的第一图像,所述变换后的第一图像为空心字符图像;将所述变换后的第一图像的内轮廓线向所述变换后的第一图像内部扩展,以得到所述第二图像。
结合第一方面,在第一方面的某些实现方式中,所述第一图像的轮廓线为直角轮廓线,在根据所述第一图像的轮廓线对所述第一图像进行变换之前,所述方法还包括:对所述第一图像的轮廓线进行处理,以得到处理后的第一图像,其中,所述处理后的第一图像的轮廓线为圆角轮廓线;所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:根据所述圆角轮廓线对所述处理后的第一图像进行变换,以得到所述第二图像。
本申请中,通过将第一图像的直角轮廓线变换成圆角轮廓线,能够得到具有圆角轮廓线的第二图像,可以提高根据第二图像生成的软件程序的标识图案的显示效果。
结合第一方面,在第一方面的某些实现方式中,所述标识图案为所述第二图像的热区 图像,其中,所述第二图像的热区图像是所述第二图像中能够识别所述第二图像所表示的字符的子图像。
可选地,所述根据所述第二图像生成所述软件程序的标识图案,包括:将所述第二图像的部分区域的图像确定为所述软件程序的标识图案。
上述部分区域可以是第二图像的中心区域,第二图像的中心区域可以是沿着第二图像的几何中心向第二图像的四周扩展一定距离的区域。
通过将第二图像中的部分区域的图像或者热区图像作为软件程序的标识图案,能够得到更加简洁的标识图案,可以提高标识图案的显示效果。
结合第一方面,在第一方面的某些实现方式中,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
应理解,当软件程序的标识图案为通信录中联系人头像时,还可以将联系人的头像作为来电显示画面。
结合第一方面,在第一方面的某些实现方式中,所述标识图案中的轮廓线的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
本申请中,通过标识图案中轮廓线的密集程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
结合第一方面,在第一方面的某些实现方式中,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
本申请中,通过标识图案的颜色深浅程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
结合第一方面,在第一方面的某些实现方式中,所述软件程序为相册(可以指主界面上显示的相册应用,也可以指相册应用内的单个相册),所述软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
第二方面,提供了一种生成标识图案的方法,该方法包括:获取第一图像,其中,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种,且所述第一图像为空心字符图像;将点阵图像或者线条图像与所述第一图像叠加,得到叠加后的图像;将所述叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,得到第二图像;根据所述第二图像生成所述软件程序的标识图案。
本申请中,通过在第一图像上叠加点阵图像或者线条图像,能够得到显示样式更加多样的第二图像,进而可以根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
可选地,将叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,包括:将叠加后的图像中位于第一图像的外轮廓线内部的像素点移动预设距离。
在移动叠加后的图像中的部分像素点时,可以先将位于第一图像的外轮廓线内部的图像先向一个方向(例如,可以是水平方向)移动一些距离,然后向另一个方向(例如,可 以是垂直方向)移动一些距离。
结合第二方面,在第二方面的某些实现方式中,所述标识图案为所述第二图像的热区图像,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。
可选地,所述根据所述第二图像生成所述软件程序的标识图案,包括:将所述第二图像的部分区域的图像确定为所述软件程序的标识图案。
上述部分区域可以是第二图像的中心区域。第二图像的中心区域可以是沿着第二图像的几何中心向第二图像的四周扩展一定距离的区域。
通过将第二图像中的部分区域的图像或者热区图像作为软件程序的标识图案,能够得到更加简洁的标识图案,能够提高显示效果。
结合第二方面,在第二方面的某些实现方式中,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
结合第二方面,在第二方面的某些实现方式中,所述标识图案中的点阵或者线条的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
本申请中,通过标识图案中点阵或者线条的密集程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
结合第二方面,在第二方面的某些实现方式中,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
本申请中,通过标识图案的颜色深浅程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
结合第二方面,在第二方面的某些实现方式中,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
第三方面,提供了一种生成标识图案的方法,该方法包括:获取第一图像,所述第一图像用于表示英文字符或者阿拉伯数字字符;从图片库中确定出与所述第一图像匹配的目标图片,其中,所述目标图片中包含与所述第一图像的相似度大于或者等于预设相似度的参考图像;根据所述参考图像生成所述软件程序的标识图案。
本申请中,通过从图片库中选择与第一图像匹配的图片,由于图片中包含的图案更加丰富,因此能够根据目标图片中的参考图像得到显示样式更加丰富的标识图案,可以提高标识图案的显示效果。
结合第三方面,在第三方面的某些实现方式中,所述标识图案为所述参考图像的热区图像,其中,所述参考图像的热区图像是所述参考图像中能够识别出所述参考图像表示的字符的子图像。
可选地,所述根据所述参考图像生成所述软件程序的标识图案,包括:将所述参考图像的部分区域的图像确定为所述软件程序的标识图案。
上述部分区域可以是参考图像的中心区域,参考图像的中心区域可以是沿着参考图像的几何中心向参考图像的四周扩展一定距离的区域。
通过将参考图像中的部分区域的图像或者热区图像作为软件程序的标识图案,能够得到更加简洁的软件程序的标识图案,能够提高显示效果。
结合第三方面,在第三方面的某些实现方式中,所述图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性。
本申请中,由于图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性,因此,最终根据图片库中的图片得到软件程序的标识图案具有一定的美感,能够带来更好的用户体验。
结合第三方面,在第三方面的某些实现方式中,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像;或者,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
第四方面,提供了一种终端设备,所述终端设备包括用于执行上述第一方面及第一方面中的任意一种实现方式中的方法的模块。
第五方面,提供了一种终端设备,所述终端设备包括用于执行上述第二方面及第二方面中的任意一种实现方式中的方法的模块。
第六方面,提供了一种终端设备,所述终端设备包括用于执行上述第三方面及第三方面中的任意一种实现方式中的方法的模块。
第七方面,提供了一种终端设备,包括存储器和处理器,所述存储器用于存储程序,所述处理器用于执行所述存储器存储的程序,当所述存储器存储的程序被处理器执行时,所述处理器用于执行上述第一方面及第一方面中的任意一种实现方式中的方法。
第八方面,提供了一种终端设备,包括存储器和处理器,所述存储器用于存储程序,所述处理器用于执行所述存储器存储的程序,当所述存储器存储的程序被处理器执行时,所述处理器用于执行上述第二方面及第二方面中的任意一种实现方式中的方法。
第九方面,提供了一种终端设备,包括存储器和处理器,所述存储器用于存储程序,所述处理器用于执行所述存储器存储的程序,当所述存储器存储的程序被处理器执行时,所述处理器用于执行上述第三方面及第三方面中的任意一种实现方式中的方法。
可选地,上述存储器为非易失性存储器。
可选地,上述存储器与处理器互相耦合在一起。
第十方面,提供了一种计算机可读存储介质,所述计算机可读介质存储介质用于存储程序代码,当所述程序代码被计算机执行时,所述计算机用于执行上述第一方面及第一方面中的任意一种实现方式中的方法。
第十一方面,提供了一种计算机可读存储介质,所述计算机可读介质存储介质用于存储程序代码,当所述程序代码被计算机执行时,所述计算机用于执行上述第二方面及第二 方面中的任意一种实现方式中的方法。
第十二方面,提供了一种计算机可读存储介质,所述计算机可读介质存储介质用于存储程序代码,当所述程序代码被计算机执行时,所述计算机用于执行上述第三方面及第三方面中的任意一种实现方式中的方法。
可选地,上述计算机可读存储介质可以位于终端设备内部,该计算机可读存储介质存储的程序代码可以被终端设备执行。
当该计算机可读存储介质存储的程序代码被终端设备执行时,终端设备能够执行上述第一方面、第二方面以及第三方面中任意一种方面的实现方式中的方法。
第十三方面,提供了一种芯片,所述芯片包括处理器,所述处理器用于执行上述第一方面及第一方面中的任意一种实现方式中的方法。
第十四方面,提供了一种芯片,所述芯片包括处理器,所述处理器用于执行上述第二方面及第二方面中的任意一种实现方式中的方法。
第十五方面,提供了一种芯片,所述芯片包括处理器,所述处理器用于执行上述第三方面及第三方面中的任意一种实现方式中的方法。
可选地,上述芯片安装在终端设备内部。
第十六方面,提供了一种用于使得计算机或者终端设备执行上述第一方面及第一方面中的任意一种实现方式中的方法的计算机程序(或称计算机程序产品)。
第十七方面,提供了一种用于使得计算机或者终端设备执行上述第二方面及第二方面中的任意一种实现方式中的方法的计算机程序(或称计算机程序产品)。
第十八方面,提供了一种用于使得计算机或者终端设备执行上述第三方面及第三方面中的任意一种实现方式中的方法的计算机程序(或称计算机程序产品)。
可选地,上述计算机程序可以存储在终端设备内,该计算机程序可以被终端设备执行。
当终端设备执行该计算机程序时,终端设备能够执行上述第一方面、第二方面以及第三方面中任意一种方面的实现方式中的方法。
图1是本申请实施例的生成标识图案的方法的示意性流程图;
图2是本申请实施例中获取字符图像的外轮廓线的示意图;
图3是本申请实施例中的字符图像的内轮廓线的示意图;
图4是根据实心字符图像得到第二图像的示意图;
图5是根据空心字符图像得到第二图像的示意图;
图6是根据实心字符图像得到第二图像的示意图;
图7是对第一图像的直角轮廓线进行处理得到圆角轮廓线的示意图;
图8是根据第二图像生成标识图案的示意图;
图9是将标识图案作为联系人头像的示意图;
图10是将联系人头像作为来电显示画面的示意图;
图11是轮廓线密集程度不同以及颜色深浅不同的联系人头像的示意图;
图12是隐藏标识图案中的部分图像的示意图;
图13是联系人头像中轮廓线的稀疏程度随着通话变化的示意图;
图14是本申请实施例的生成标识图案的方法的示意性流程图;
图15是第一图像与点阵图像叠加得到第二图像的示意图;
图16是第一图像与线条图像叠加得到第二图像的示意图;
图17是根据第二图像得到标识图案的示意图;
图18是本申请实施例的生成标识图案的方法的示意性流程图;
图19是根据目标图片得到标识图案的示意图;
图20是在标识图案上叠加天气图像的示意图;
图21是本申请实施例的生成联系人头像的过程的示意图;
图22是5*5的卷积核的示意图;
图23是本申请实施例的生成联系人头像的过程的示意图;
图24是本申请实施例的生成联系人头像的过程的示意图;
图25是本申请实施例的生成联系人头像的过程的示意图;
图26是本申请实施例的生成联系人头像的过程的示意图;
图27是本申请实施例的生成温度显示图标的过程的示意图;
图28是本申请实施例中的标识图案作为锁屏图案的示意图;
图29是本申请实施例中的标识图案作为日历应用的显示图标的示意图;
图30是本申请实施例中的标识图案作为备忘录标题图标的示意图;
图31是本申请实施例中的标识图案作为提醒事件的标题的示意图;
图32是本申请实施例中的标识图案作为音乐歌单图标的示意图;
图33是本申请实施例中的标识图案作为语音助手图标的示意图;
图34是本申请实施例中的标识图案作为多人录音场景下被录音者的显示图标的示意图;
图35是本申请实施例中的标识图案作为相册封面的图标的示意图;
图36是本申请实施例的终端设备的示意性框图;
图37是本申请实施例的终端设备的示意性框图;
图38是本申请实施例的终端设备的示意性框图;
图39是本申请实施例的终端设备的示意性框图;
图40是本申请实施例的终端设备的结构示意图。
下面将结合附图,对本申请中的技术方案进行描述。
本申请中的生成标识图案的方法可以由终端设备来执行,该终端设备可以是移动终端(例如,智能手机),电脑,个人数字助理,可穿戴设备,车载设备,物联网设备等等。另外,该终端设备还可以是其它能够显示画面的设备。
上述终端设备可以是运行各种操作系统的设备。例如,上述终端设备可以是运行安卓系统的设备,也可以是运行IOS系统的设备,也可以是运行windows系统的设备。
在传统方案中,终端设备中的软件程序往往会直接选择字符图像(中文字符,英文字符或者)作为相应的显示图标。例如,在终端设备的通信录中一般会选择联系人的姓名中的一个字的字符图像或者姓名拼音的首字母的字符图像(在作为标识图案之前也可以对这 些字符图像进行一些艺术化的处理,例如,随机颜色背景填充等)作为该联系人的标识图案(或者成为该联系人的显示头像)。这种方式生成的标识图案的种类有限,显示效果一般。
因此,为了生成显示效果更好的标识图案,本申请提出一种新的生成标识图案的方法,通过提取到的图像的轮廓线对图像进行变换,然后再根据变换得到的图像生成软件程序的标识图案,可以生成更多不同的标识图案,能够提高显示效果,进而提升用户体验。
下面结合图1对本申请实施例的生成标识图案的方法进行详细的介绍。
图1是本申请实施例的生成标识图案的方法的示意性流程图。图1所示的方法可以由终端设备执行,图1所示的方法包括步骤110至步骤130,下面对步骤110至步骤130进行详细的介绍。
110、获取第一图像。
上述第一图像可以用于表示中文字符,英文字符和阿拉伯数字字符中的任意一种。
在步骤110中,可以根据软件程序获取第一图像。具体地,可以根据软件程序的显示信息获取第一图像。
例如,软件程序当前显示了一个中文字符,那么,该第一图像就可以是一幅用于表示该中文字符的图像。其中,该第一图像可以是预先存储的,也可以是从网络实时获取的。
应理解,上述软件程序可以是终端设备中的软件程序。
具体地,上述软件程序可以是通信录,备忘录,日历,天气软件,音乐播放器,相册等等。
当上述软件程序为通信录时,可以根据通信录中的联系人信息获取第一图像。例如,某个联系人姓周,那么,可以获取一个“周”的字符图像作为第一图像。
当上述软件程序为天气软件时,可以根据天气软件中显示温度来获取第一图像。例如,当天气软件现实的温度是28度时,可以选择“28”的字符图像作为第一图像。
当上述软件程序为备忘录时,可以根据备忘录中的备忘信息来获取第一图像。例如,可以提取备忘录中的某一条备忘信息中的第一个字符的字符图像作为第一图像。
120、根据第一图像的轮廓线对第一图像进行变换,以得到第二图像。
其中,上述第二图像包括第一图像和多条轮廓线。
上述第一图像的轮廓线既可以是第一图像的外轮廓线也可以是第一图像的内轮廓线。可以通过边缘检测算法来获取第一图像的外轮廓线或者内轮廓线。
第一图像的外轮廓线可以是围绕第一图像的四周边缘(或者是整体边缘)形成的轮廓线。
例如,如图2所示,当“周”的字符图像为实心字符图像时,“周”的字符图像以及其外轮廓线分别如图2左侧和右侧所示。
上图2仅示出了“周”的字符图像为实心字符图像时的外轮廓线的情况,当“周”的字符图像为空心字符图像时的外轮廓线与图2中所示的情况类似,外轮廓线仍然是字符图像四周边缘形成的轮廓线。
第一图像的内轮廓线可以是第一图像的多个边缘形成的轮廓线。
一般来说,当字符图像是空心字符图像时,该字符图像存在内轮廓线。例如,如图3所示,“周”的字符图像为空心字符图像,“周”的字符图像的内轮廓线就是形成该字符 图像的所有的边缘线。
在上述步骤120中,根据第一图像的轮廓线对第一图像进行变换可以是指沿着第一图像的轮廓线向该第一图像的内部或者四周复制多条轮廓线。
下面对根据第一图像的轮廓线对第一图像进行变换的方式进行详细的介绍。
变换方式1:将第一图像的外轮廓线向第一图像的四周扩展,以得到第二图像。
在变换方式1中,将第一图像的外轮廓线向第一图像的四周扩展可以是指向第一图像的四周复制第一图像的外轮廓线。其中,向第一图像四周复制的外轮廓线的数量可以是一条也可以是多条(至少一条)。
例如,如图4所示,第一图像为中文字符“周”的字符图像,通过变换方式1对第一图像进行变换可以得到图4右侧所示的第二图像,由图4可知,第二图像由第一图像和第一图像四周的多条外轮廓线组成。
当第一图像为实心字符图像或者空心字符图像时,均可以采用上述变换方式1对第一图像进行变换。
变换方式2:将第一图像的内轮廓线向第一图像内部扩展,以得到第二图像。
将第一图像的内轮廓线向第一图像内部扩展也可以称为将第一图像的内轮廓线内缩,也就是向第一图像内部复制第一图像的内轮廓线。在向第一图像复制第一图像的内轮廓线时,复制的线条的数量可以是一条也可以是多条。
例如,如图5所示,第一图像为中文字符“周”的字符图像,通过变换方式2对第一图像进行变换可以得到图5右侧所示的第二图像,由图5可知,第二图像由第一图像和第一图像内部的多条内轮廓线组成。
当第一图像为空心字符图像时,可以采用上述变换方式2对第一图像进行变换。而当第一图像为实心字符图像时,可以先对第一图像进行变换处理,得到变换后的第一图像,其中,该变换后的第一图像为空心字符图像。接下来,就可以采用上述变换方式2对变换后的第一图像进行变换处理以得到第二图像了。
具体地,如图6所示,第一图像为实心字符图像,通过对第一图像进行变换处理后,得到变换后的第一图像,然后再将变换后的第一图像的内轮廓线向第一图像内部扩展,以得到第二图像。
130、根据第二图像生成软件程序的标识图案。
在步骤130中,既可以直接将第二图像作为软件程序的标识图案,也可以选择第二图像的中心区域的图像作为软件程序的标识图案,或者,也可以选择第二图像的热区区域的图像作为软件程序的标识图案。
本申请中,通过对第一图像进行变换,能够得到包括多条轮廓线的第二图像,进而能够根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
为了进一步的提高显示效果,当第一图像的轮廓线为直角轮廓线时,可以先对第一图像的轮廓线进行处理,得到处理后的第一图像,其中,该处理后的第一图像的轮廓线为圆角轮廓线,然后再根据该圆角轮廓线对处理后的第一图像进行变换,以得到第二图像。
如图7所示,第一图像的轮廓线为直角轮廓线,通过对第一图像的轮廓线进行处理(具体可以是对第一图像的轮廓线进行倒圆角处理)可以得到处理后的第一图像,该处理后的 第一图像的轮廓线为圆角轮廓线。
本申请中,通过将第一图像的直角轮廓线变换成圆角轮廓线,能够得到具有圆角轮廓线的第二图像,可以提高根据第二图像生成的软件程序的标识图案的显示效果。
应理解,在根据第二图像生成软件程序的标识图案时,可以直接将第二图像作为软件程序的标识图案。
为了得到更简洁的标识图案,也可以选择第二图像中的部分图像作为软件程序的标识图案。例如,可以选择第二图像中的中心区域的图像作为软件程序的标识图像,其中,第二图像的中心区域可以是沿着第二图像的几何中心向第二图像的四周扩展一定距离的区域。
可选地,作为一个实施例,所述标识图案为所述第二图像的热区图像。
其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。从第二图像中截取图像的那部分区域也可以称为视觉热区。
例如,如图8所示,第二图像包含的轮廓线很多,直接采用第二图像作为软件程序的标识图案的话显得不太够简洁(也可能不够美观),为了提高显示效果,可以选择第二图像中的部分区域的图像作为标识图案,其中,根据标识图案中的图像能够识别出第二图像表示的是中文字符“周”。
可选地,可以采用神经网络模型来识别和截取第二图像的热区图像。
具体地,可以选择预设数量的字符图像,并人工截取这些字符图像的热区图像,形成字符图像训练集,输入到神经模型中进行训练,经过训练后终端设备可以具备在预设数量的字符图像中识别和截取热区图像能力,这样当得到的第二图片为预设数量的字符图像中的图像时,终端设备就可以识别和截取第二图像的热区图像。
另外,在进行训练的过程中,上述训练图片也可以包括终端设备在生成标识图案过程中产生的图像。
可选地,作为一个实施例,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
例如,如图9所示,在得到标识图案后,可以将标识图案作为联系人头像。如果标识图案比较大的话,还可以对标识图案进行压缩,然后将压缩后的标识图案作为联系人头像。
另外,当软件程序的标识图案为通信录中的联系人头像时,如果接收到该联系人的来电,那么,也可以将该联系人的头像作为来电显示画面。
例如,如图10所示,联系人的头像可以作为来电显示画面。
可选地,当软件程序的标识图案为所述通信录中的联系人头像时,标识图案中的轮廓线的密集程度与联系人的联系频率或者亲密程度可以是正相关的关系(具体可以是正比关系)。
具体地,当通信录中的联系人的联系频率越大时,生成联系人的头像中的轮廓线的密集程度越大。当通信录中的联系人的联系亲密程度越大时,生成联系人的头像中的轮廓线的密集程度也越大。
本申请中,通过标识图案中轮廓线的密集程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
可选地,当软件程序的标识图案为所述通信录中的联系人头像时,标识图案的颜色深 浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
具体地,当通信录中的联系人的联系频率越大时,生成联系人的头像的颜色越深,当通信录中的联系人的联系亲密程度越大时,生成联系人的头像的颜色也越深。
本申请中,通过标识图案的颜色深浅程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
本申请中,当标识图案为通信录中的联系人头像时,能够根据联系人头像中的轮廓线的密集程度或者联系人头像的颜色深浅程度来区分采用同一字符图像作为联系人头像的联系人。
例如,如图11所示,通信录中的有多个姓周的联系人,在显示这些联系人时,可以按照联系人头像中轮廓线的密集程度逐渐降低的顺序显示这些联系人,或者,也可以按照联系人头像的颜色逐渐变浅的顺序来显示这些联系人。
可选地,在显示标识图案时,为了增强显示效果,还可以隐藏标识图案中的部分图像。
具体地,可以隐藏标识图案中的部分线条,还可以按照一定的几何形状隐藏标识图案中的部分图案。
例如,如图12所示,可以隐藏标识图案下方中的部分线条,还可以隐藏标识图案中的某些圆形区域中的图像。
可选地,当述标识图案为通信录中的联系人头像时,标识图案中的轮廓线的疏密程度还可以根据通话时间的长度而动态变化。
具体地,标识图案中的轮廓线的疏密程度可以与通话时间的长短成正比,通话刚接通时,标识图案中的轮廓线比较稀疏,随着通话时间的增加,标识图案中的轮廓线越来越密集。
例如,如图13所示,通话刚开始时,联系人头像中的轮廓线的线条数仅为2条,轮廓线非常稀疏,到通话5分钟时,联系人头像中的轮廓线增加至3条,轮廓线的密集程度有所增加,到通话10分钟时,联系人头像中的轮廓线变为4条,轮廓线的密集程度进一步增加,而到通话30分时,联系人头像中的轮廓线的数目已经增加了很多,轮廓线变的非常密集。
应理解,图1所示的方法中的软件程序可以为终端设备中的各种软件程序,软件程序的标识图案可以是该软件程序图标的标识图案,或者,软件程序的标识图案也可以是软件程序中的显示内容的标识图案。
除了根据第一图像的轮廓线对第一图像进行变换之外,还可以将第一图像与点阵图像或者线条图像叠加,以得到第二图像。下面结合图14对这种变换方式进行详细的描述。
图14是本申请实施例的生成标识图案的方法的示意性流程图。图14所示的方法可以由终端设备来执行,图14所示的方法包括步骤210至步骤240,下面对步骤210至步骤240分别进行详细的描述。
210、获取第一图像。
其中,上述步骤210中的第一图像可以用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种,并且第一图像是空心字符图像。
在步骤210中,可以根据软件程序获取第一图像。具体地,可以根据软件程序的显示信息获取第一图像。
例如,当软件程序当前显示的字符为“周”时,那么,可以获取一幅用于表示字符“周”的图像作为第一图像,该第一图像可以是预先存储的,也可以是从网络实时获取的。
上述步骤210执行的具体过程与步骤110中执行的具体过程相似,上文中对步骤110中的相关限定和解释同样适用于步骤210,为了避免不必要的重复,这里不再对步骤210进行详细介绍。
220、将点阵图像或者线条图像与第一图像叠加,得到叠加后的图像。
上述点阵图像可以是像素点分布比较稀疏的一幅图像,上述线条图像可以是由多个线条排列形成的图像。
230、将叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,得到第二图像。
可选地,将叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,包括:将叠加后的图像中位于第一图像的外轮廓线内部的像素点移动预设距离。
具体地,在移动叠加后的图像中的部分像素点时,可以先将位于第一图像的外轮廓线内部的图像先向一个方向(例如,可以是水平方向)移动一些距离,然后向另一个方向(例如,可以是垂直方向)移动一些距离。
例如,如图15所示,假设点阵图像中像素点的间距为d(例如,d可以取6),那么,在第一图像上叠加了点阵图像后得到的图像可以如图15中间所示,接下来,可以将位于第一图像外轮廓线内部的像素点向图像右侧移动(例如,可以移动d/2个像素),然后再向上移动(例如,可以移动d/2个像素),得到的最终的第二图像如图15最右侧所示。
例如,如图16所示,假设线条图像中的线间距为d(例如,d可以取2),那么,在第一图像上叠加了线条图像后得到的图像可以如图16中间所示,接下来,可以将位于第一图像外轮廓线内部的像素点向图像上侧移动(例如,可以移动d/2个像素),得到的最终的第二图像如图16最右侧所示。
本申请中,通过与点阵图像或者线条图像叠加,并且移动外轮廓线内部的一些像素点,能够得到具有立体感的第二图像,从而使得根据第二图像得到的标识图案也具有立体效果,能够提高最终的显示效果。
240、根据第二图像生成软件程序的标识图案。
在步骤240中,既可以将第二图像整体作为软件程序的标识图案,也可以选择第二图像的中心区域作为软件程序的标识图案。
应理解,步骤240与上文中的步骤130的具体执行过程相似,上文中对步骤130中的相关限定和解释同样适用于步骤240,为了避免不必要的重复,这里不再对步骤240进行详细介绍。
本申请中,通过在第一图像上叠加点阵图像或者线条图像,能够得到显示样式更加多样的第二图像,进而可以根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
可选地,作为一个实施例,所述标识图案为所述第二图像的热区图像。
其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。从第二图像中截取图像的那部分区域也可以称为视觉热区。
例如,如图17所示,由于第二图像的图像面积较大,直接采用第二图像作为软件程 序的标识图案的话显得不太够简洁(也可能不够美观),为了提高显示效果,可以选择第二图像中的热区图像作为标识图案,其中,根据标识图案中的图像能够识别出第二图像表示的是中文字符“周”。
可选地,作为一个实施例,图14所示的方法中的软件程序为通信录,软件程序的标识图案为所述通信录中的联系人头像。
可选地,当软件程序的标识图案为所述通信录中的联系人头像时,所述标识图案中的点阵或者线条的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
具体地,当通信录中的联系人的联系频率越大时,生成联系人的头像中的点阵或者线条的密集程度越大。当通信录中的联系人的联系亲密程度越大时,生成联系人的头像中的点阵或者线条的密集程度也越大。
本申请中,通过标识图案中点阵或者线条的密集程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
可选地,当软件程序的标识图案为所述通信录中的联系人头像时,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
具体地,当通信录中的联系人的联系频率越大时,生成联系人的头像的颜色越深,当通信录中的联系人的联系亲密程度越大时,生成联系人的头像的颜色也越深。
本申请中,通过标识图案的颜色深浅程度可以识别不同联系频率或者不同亲密程度的联系人,显示效果更好。
本申请中,当标识图案为通信录中的联系人头像时,能够根据联系人头像中的点阵或者线条的密集程度或者联系人头像的颜色深浅程度来区分采用同一字符图像作为联系人头像的联系人。
在本申请中,除了对第一图像进行一些变换处理得到第二图像之外,为了得到更丰富显示效果,还可以从图片库中寻找与第一图像匹配的参考图片,然后根据参考图片中与第一图像相似的参考图像来生成软件程序的标识图案。下面结合图18对这种变换方式进行详细的介绍。
图18是本申请实施例的生成标识图案的方法的示意性流程图。图18所示的方法可以由终端设备来执行,图18所示的方法包括步骤310至步骤330,下面对步骤310至步骤330分别进行详细的描述。
310、获取第一图像。
步骤310中的第一图像可以是用于表示英文字符或者阿拉伯数字字符的图像。
在步骤310中,可以根据软件程序获取第一图像。具体地,可以根据软件程序的显示信息获取第一图像。
例如,当软件程序当前显示的字符为“28”时,那么,可以获取一幅用于表示字符“28”的图像作为第一图像,该第一图像可以是预先存储的,也可以是从网络实时获取的。
上述步骤310执行的具体过程与步骤110中执行的具体过程相似,上文中对步骤110中的相关限定和解释同样适用于步骤310,为了避免不必要的重复,这里适当省略重复的描述。
320、从图片库中确定出与所述第一图像匹配的目标图片。
其中,步骤320中的目标图片中包含与第一图像的相似度大于或者等于预设相似度的参考图像。
上述图片库包含多个图片,该多个图片中可以包含与一些常见的英文字符或者阿拉伯数字字符图案相似的图像。
例如,图片库中可以包含与英文字符A至Z相似的图像构成的图片(这些图片中的图像与英文字符A-Z相似),图片库中还可以包含与阿拉伯数字0-9相似的图像构成的图片(这些图片中的图像与阿拉伯数字0-9相似)。
在步骤320中,可以通过神经网络模型来获取与第一图像匹配的目标图片。
330、根据所述参考图像生成所述软件程序的标识图案。
步骤330的具体执行过程与步骤130相似,区别仅仅在于,步骤130是根据第二图像生成标识图案,而步骤330是根据参考图像生成标识图案,上文中对步骤130中的相关限定和解释同样适用于步骤330,为了避免不必要的重复,这里适当省略重复的描述。
本申请中,通过从图片库中选择与第一图像匹配的图片,由于图片中包含的图案更加丰富,因此能够根据目标图片中的参考图像得到显示样式更加丰富的标识图案,可以提高标识图案的显示效果。
可选地,在步骤330之前,图18所示的方法还包括:从目标图片中截取或者提取参考图像。
可选地,作为一个实施例,所述标识图案为所述参考图像的热区图像,其中,所述参考图像的热区图像是所述参考图像中能够识别出所述参考图像表示的字符的子图像。
例如,如图19所示,假设第一图像为字母“W”的字符图像,那么,可以从图片库中寻找出目标图片,该目标图片中的参考图像与字母“W”相似。接下来,可以从该目标图片中提取出参考图像,然后截取参考图像的热区图像作为软件程序的标识图案。
可选地,作为一个实施例,图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性。
本申请中,由于图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性,因此,最终根据图片库中的图片得到软件程序的标识图案具有一定的美感,能够带来更好的用户体验。
另外,在本申请中,为了进一步提高显示效果,还可以根据天气信息在标识图案上叠加当前天气情况的图像。
例如,如图20所示,可以在标识图案上叠加表示下雨的图像,从而为最终得到的标识图案添加了雨珠的效果。
本申请实施例中的标识图案可以作为联系人头像,下面结合图21至26对生成联系人头像的具体过程进行详细的描述。
图21是本申请实施例的生成联系人头像的过程的示意图。图21所示的过程包括步骤410至460,下面对这些步骤进行详细的介绍。
410、获取字符图像1001。
上述字符图像1001可以是预先存储的字符图像,当需要生成“周”姓联系人的头像时,可以从预先存储的字符图像中提取出字符图像1001。
可选地,上述字符图像1001除了可以是实心字符图像之外,还可以是空心字符图像。
具体地,在步骤410中,当从通信录中获取到了姓名为“周XX”的联系人时,那么可以选择获取“周”字(可以选取姓或者姓的首字母,也可以选取名中的字)的字符图像。
通常情况下,终端设备一般会存储百家姓、26个字母或者阿拉伯数字0-9的字符图像,在步骤410获取字符图像时可以根据联系人的姓名信息从终端设备存储的图片中获取相应的字符图像。
420、对字符图像1001进行膨胀处理,得到膨胀后的图像1002。
在步骤420中,通过对字符图像1001进行膨胀处理可以得到图像周围为白色膨胀区域的图像1002。
具体地,在步骤420中,可以通过对字符图像1001进行形态学膨胀,来得到膨胀后的图像1002。下面对图像的膨胀原理进行简单的介绍。
在膨胀处理时可以先定义一个卷积核B(核也可以称为模板或掩膜),卷积核可以是任何的形状和大小,并且拥有一个单独定义出来的参考点-锚点(anchorpoint)。通常情况下,卷积核为带参考点的正方形或者圆盘。在本申请实施例中卷积核B可以采用图22所示的大小为3*3的卷积核(也可以采用大小为5*5的卷积核)。
在得到卷积核B之后,可以将卷积核B与图像A(原图像)进行卷积,计算核B覆盖区域的像素点预设值,从而得到卷积处理后的图像。
其中,卷积是分析数学中一种的运算。对数字图像做卷积操作其实就是利用卷积核(卷积模板)在图像上滑动,将图像点上的像素灰度值与对应的卷积核上的数值相乘,然后将所有相乘后的值相加作为卷积核中间像素对应的图像上像素的灰度值,并最终滑动完所有图像的过程。
在上述步骤420中,可以采用变换核B对字符图像1001进行卷积处理,最终得到黑色区域膨胀了1个像素的范围的图像1002,其中,图像1002中的灰色线框实际并不存在,仅仅为了方便表示膨胀的白色的区域的范围。
430、提取图像1002的外轮廓图像。
在步骤430中,可以通过字符边缘检测方法检测到字符的边缘,最终得到包含黑色轮廓线的外轮廓图像1003。
其中,外轮廓图像还可以理解为包含外轮廓线的字符图像。
440、将外轮廓图像1003等距离外扩,得到字符外扩图像1004。
在步骤440中,将外轮廓图像1003等距离外扩,也可以理解为将图像1003的外轮廓线等距离的向外扩展,外扩的多个外轮廓线之间的间距可以是5个像素,外扩的外轮廓线的条数可以是10个。
另外,上述字符扩展图像1004相当于上文中的第二图像,得到字符外扩图像1004之后就可以根据该字符外扩图像1004生成联系人头像了。
在步骤440中,可以根据联系人的亲密程度或者联系频率等来确定扩展的外轮廓线的条数,例如,当联系人的亲密程度较高或者联系人的联系频率较高时,外扩的外轮廓线的条数较多,反之,当联系人的亲密程度较低或者联系人的联系频率较低时,外扩的外轮廓线的条数较少。
通过外扩的外轮廓线的条数的多少能够反映出联系人的亲密程度或者联系频率,使得 最终得到的联系人头像有更好的显示效果。
450、截取字符外扩图像1004的热区图像,并将该热区图像作为联系人头像。
在步骤450中,最终得到的联系人头像如图21中的1006所示。
图23是本申请实施例的生成联系人头像的过程的示意图。图23所示的过程包括步骤510至步骤550,下面对这些步骤分别进行详细的介绍。
510、对字符图像2001进行处理,得到空心字符图像2002。
上述字符图像2001可以是预先存储的字符图像,当需要生成“周”姓联系人的头像时,可以从预先存储的字符图像中提取出字符图像2001。
或者,当需要生成“周”姓联系人的头像时,也可以直接获取字符“周”的空心字符图像,进而直接得到空心字符图像2002。
由于字符图像2001为实心字符图像,为了实现对内轮廓线的内缩处理,需要先将字符图像2001由实心字符图像变换为空心字符图像。
如果字符图像2001为空心字符图像的话,也可以不对字符图像2001执行步骤510中的处理,而是直接执行步骤520。
520、对字符图像2002进行倒圆角处理,得到具有圆角轮廓的字符图像2003。
由于字符图像2002的轮廓为直角轮廓,为了进一步提高显示的效果,可以将字符图像2002的轮廓由直角变换成圆角,得到字符图像2003。
530、将字符图像的内轮廓线等距离内缩,得到内缩后的字符图像2004。
通过等距离内缩内轮廓线,使得得到的字符图像2004包含整齐排列的轮廓线,能够提高最终的显示效果。
在步骤530中,可以根据联系人的亲密程度或者联系频率等来确定内缩的内轮廓线的条数,例如,当联系人的亲密程度较高或者联系人的联系频率较高时,内缩的内轮廓线的条数较多,反之,当联系人的亲密程度较低或者联系人的联系频率较低时,内缩的内轮廓线的条数较少。
通过内缩的内轮廓线的条数的多少能够反映出联系人的亲密程度或者联系频率,使得最终得到的联系人头像有更好的显示效果。
540、截取字符图像2004的热区图像,得到字符图像2005。
步骤540中截取热区图像的方式与上文中截取图像的方式类似,这里不再详细描述。
550、将截取后的字符图像2005作为联系人头像。
最终得到的联系人头像的显示效果如图2006所示。
图24是本申请实施例的生成联系人头像的过程的示意图。图24所示的过程包括步骤610至步骤650,下面对这些步骤进行详细的介绍。
610、对字符图像3001进行处理,得到空心字符图像3002。
上述字符图像3001可以是预先存储的字符图像,当需要生成“周”姓联系人的头像时,可以从预先存储的字符图像中提取出字符图像3001。
或者,当需要生成“周”姓联系人的头像时,也可以直接获取字符“周”的空心字符图像,进而直接得到空心字符图像3002。
620、将点阵图像与字符图像3002叠加,得到叠加后的图像3003。
叠加后的图像3003由字符图像3002和点阵组成。
上述点阵图像可以是图像面积大于或者等于字符图像3001的图像,该点阵图像在与字符图像3001叠加时可以完全覆盖字符图像3001。
另外,当上述“周”姓联系人的联系频率或者亲密程度较高时,可以选择点阵较为密集的点阵图像与字符图像3001叠加,而当上述“周”姓联系人的联系频率或者亲密程度较低时,可以选择点阵较为稀疏的点阵图像与字符图像3001叠加。这样就使得最终得到的联系人头像中点阵的密集程度能够反映联系人的联系频率或者亲密程度,能够更好地区分不同的联系人。
630、将叠加后的图像中位于字符图像3002中的点阵的像素移动预设距离,得到像素偏移后的字符图像3004。
在步骤630中,通过进行像素偏移,能够使得偏移后的图像区域呈现出立体感,能够提高图像的显示效果(如图24所示,图像3003中的字符呈现出一种立体感)。
640、截取字符图像3004的热区图像,得到字符图像3005。
步骤640中截取热区图像的方式与上文中截取图像的方式类似,这里不再详细描述。
650、将截取后的字符图像3005作为联系人头像。
步骤650最终得到的联系人头像的显示效果如图3006所示。
图25是本申请实施例的生成标识图案的方法的流程图。图25所示的方法以某位周姓联系人为例,示出了生成联系人头像的整个过程。图25所示的方法包括步骤710至步骤750,下面对步骤710至步骤750进行详细的介绍。
710、根据联系人信息获取字符图像4001。
上述字符图像4001可以是预先存储的字符图像,当需要生成“周”姓联系人的头像时,可以从预先存储的字符图像中提取出字符图像4001。
或者,当需要生成“周”姓联系人的头像时,也可以先获取字符“周”的实心字符图像,然后将该实心字符图像转换成空心字符图像,进而得到字符图像4001。
720、将线条图像与字符图像4001叠加,得到叠加后的图像4002。
上述线条图像可以是图像面积大于或者等于字符图像4001的图像,该线条图像在与字符图像4001叠加时可以完全覆盖字符图像4001。
另外,当上述“周”姓联系人的联系频率或者亲密程度较高时,可以选择线条较为密集的线条图像与字符图像4001叠加,而当上述“周”姓联系人的联系频率或者亲密程度较低时,可以选择线条较为稀疏的线条图像与字符图像4001叠加。这样就使得最终得到的联系人头像中线条的密集程度能够反映联系人的联系频率或者亲密程度,能够更好地区分不同的联系人。
可选地,在步骤720中,也可以将点阵图像与字符图像4001叠加。
730、将图像4002中位于字符图像4002中的线条的像素移动预设距离,得到像素偏移后的图像4003。
在步骤730中,通过进行像素偏移,能够使得偏移后的图像区域呈现出立体感,能够提高图像的显示效果(如图25所示,图像4003中的字符呈现出一种立体感)。
740、截取图像4003中的热区图像,得到图像4004。
步骤740中截取热区图像的方式与上文中截取图像的方式类似,这里不再详细描述。
750、将截取后的图像4004作为联系人头像。
经过步骤750之后,最终得到的联系人头像如图25中的图像4005所示。
图25是本申请实施例的生成标识图案的方法的流程图。图26所示的生成标识图案的过程包括步骤810至步骤850,下面对这些步骤分别进行详细的介绍。
810、获取“W”的字符图像5001。
例如,对于某个姓名为“Waddel”的联系人,可以提取该联系人姓名的首个字符W,那么,就可以先获取“W”的字符图像5001。
上述字符图像5001可以是预先存储的字符图像,当需要生成首字符为“W”的联系人的头像时,可以从预先存储的字符图像中提取出字符图像5001。
820、从图片库中确定出与字符图像5001像匹配的图片5002。
应理解,图片5002可以包含与图像5001相似度较高的目标图像(目标图像与图像5001的相似度大于预设阈值)。
830、识别出图片5002中的字母区域。
图片5002中的字母区域也就是图片5002中的目标图像所在的区域,图片5002中的字母区域是与字母W相似的图像区域。
为了能够在图片库中寻找到与相应的字符图像匹配的图片,可以预先采用一些训练图片对神经网络模型进行训练,这些训练图片中会包含与一些常用的英文字符或者数字字符相近的图像,例如,训练图片中可以包括与26个英文字符(A-Z)或者10个数字字符(0-9)相似的图像。
具体地,在开始训练之前可以人工标注训练图片的字母区域以及训练图片对应的字母(例如,对于一个图片来说,如果该图片中包含于字母A相似的图像区域,那么就可以人工标注出该图片中与字符A相似的图像区域,并标注出该图片对应的字母为A),形成训练集,然后利用该训练集对神经网络模型进行训练。
另外,上述训练集中的图片可以是带有黄金分割或者斐波那契数列特性的纹理图像,这样使得最终得到的标识图案更加美观。
下面以字母A的训练过程为例进行详细说明。
寻找包含目标图片(该目标图片中包含与字母A特征相似的图像),并在目标图片中标注出与字母A特征相似的图像区域,然后将该图片输入给神经网络模型,并对每个像素分类(如,字母“A”所在区域一类,字母“A”区域之外的区域为另一类),形成一种与目标图片相同尺寸的掩膜(mask)图像(例如,“A”区域为黑色,非“A”区域为白色的图像),其作为神经网络模型训练的一项结果输出。
类似的,换其它的图片(该图片包含与字母A相似的图像)重复上述操作至预设数量(如1000次),完成预设数量的字母“A”的训练。此时,计算机通过上述训练已具备在预设图片中识别出字母“A”区域的能力。
上述神经网络模型可以是卷积神经网络(convolutional neural networks,CNN)或者全卷积神经网络(fully convolutional networks,FCN)等等。
840、截取字母区域图像,得到图像5004。
由于图像5004与“W”的字符图像5001较为相似,并且图像5004的显示风格更加独特,因此,依据图像5004生成最终的联系人头像,能够使得最终生成的联系人头像的显示效果更好。
850、截取图像5004中的热区图像,得到图像5005。
步骤850中截取热区图像的方式与上文中截取图像的方式类似,这里不再详细描述。
另外,为了取得更好的显示效果,还可以在步骤850之前按照本申请实施例中图1或者图14中生成标识图案的方法对图像5004进行处理,例如,根据图像5004的轮廓线对图像5004进行变换,或者,将点阵图像或者线条图像与图像5004叠加,得到处理后的图像,然后再执行步骤850,以使得最终得到的标识图案达到更好的显示效果。
860、将图像5005作为联系人头像。
经过步骤860之后,最终得到的联系人头像的效果如图5006所示。
本申请中实施例中的标识图案还可以是天气应用中的温度数字,下面结合图27对标识图案为天气应用中的温度数字时的情况进行详细说明。
图27是本申请实施例的生成温度显示图标的过程的示意图。图27所示的生成标识图案的过程包括步骤910至步骤960,下面对这些步骤分别进行详细的介绍。
910、获取当前温度的字符图像。
在步骤910中,当前温度为28°时,获取到的28°的字符图像如6001所示。
上述字符图像6001可以是预先存储的字符图像,在当前温度为28°时可以从预先存储的数字字符图像中提取28°的字符图像。
920、对字符图像6001进行处理,得到空心字符图像6002。
应理解,如果步骤910中获取的28°的字符图像是空心字符图像,那么,就可以不执行步骤920而直接执行步骤930。
930、将点阵图像与字符图像6002叠加,得到叠加后的图像6003。
上述点阵图像的图像面积可以大于或者等于字符图像4001的图像面积,并且该点阵图像在与字符图像6002叠加时可以完全覆盖字符图像6002。
可选地,当字符图像6002表示的温度越高时,与字符图像6002叠加的点阵图像的点阵越密集。
通过不同密集程度的点阵能够表示不同的温度等级,显示效果更好。
940、将图像6003中位于字符区域中的点阵的像素移动预设距离,得到像素偏移后的图像6004。
在步骤940中,通过对字符区域中的点阵的像素进行偏移,能够使得偏移后的图像区域呈现出立体感,能够提高图像的显示效果(如图27所示,图像6004中的字符区域呈现出一种立体感)。
950、截取图像6004中的热区图像,得到图像6005。
步骤950中截取热区图像的方式与上文中截取图像的方式类似,这里不再详细描述。
960、将截取后的图像6005作为温度显示图标。
经过步骤960之后,最终得到的温度显示图标如图27中的图像6006所示。
应理解,本申请实施例的标识图案除了可以是联系人头像之外,还可以是多种软件程序相关的显示图标,本申请实施例的软件程序以及软件程序的标识图案的应用实例可以如以下所示:
(1)软件程序为相册,软件程序的标识图案为相册封面的图案;
(2)软件程序为备忘录,软件程序的标识图案为备忘录中的备忘信息的标识图案;
(3)软件程序为音乐应用,软件程序的标识图案为音乐应用中的歌单封面;
(4)软件程序为语音助手,软件程序的标识图案为语音助手的显示图标;
(4)软件程序为录音应用,软件程序的标识图案为被录音者的头像;
(5)软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
下面结合附图28至35对这些应用场景进行详细的介绍。
可选地,本申请实施例的标识图案是锁屏图案。
例如,用户在锁屏上设置了一段文字“开心每一天”,则采用本申请实施例的生成标识图案的方法可以提取字符“开”的字符图像进行处理,生成最终的标识图案的显示效果如图28所示。
可选地,本申请实施例的标识图案还是日历应用的显示图标。
例如,假设今天是9号,日历应用上会显示数字“9”,那么,可以采用本申请实施例的生成标识图案的方法提取数字“9”的字符图像,并对数字“9”的字符图像进行处理,生成的标识图案的显示效果如图29所示。
可选地,本申请实施例的标识图案是备忘录、文档或者笔记的标题的图标。
例如,用户在备忘录中记录了一条备忘信息,该备忘信息的标题为“开车去接小孩”,则根据本申请实施例的生成标识图案的方法对标题提取首个字符“开”的字符图像进行处理,生成的标题的图标的显示效果如图30所示。
可选地,本申请实施例的标识图案是闹钟或者提醒事件的事件标题的图标。
例如,用户在手机了设置了提醒事件“开车去接小孩”,则可以提取该提醒事件的标题中的“开”的字符图像,然后利用本申请实施例的生成标识图案的方法对“开”的字符图像进行处理,生成的提醒事件的标题的图标的显示效果如图31所示。
可选地,本申请实施例的标识图案为音乐歌单图标。
例如,音乐应用中有一个歌单是李荣浩的歌曲精选,那么,可以采用本申请实施例的生成标识图案的方法对“李”的字符图像进行处理,生成的歌单图标的显示效果如图32所示。
可选地,本申请实施例的标识图案为语音助手图标。
具体地,语音助手的图标为“S”的字符图像,通过本申请实施例的生成标识图案的方法对“S”的字符图像进行处理,生成的语音助手图标如图33所示。
可选地,本申请实施例的标识图案为多人录音场景下的被录音者的显示图标。
具体地,本申请实施例可以应用在多人录音的场景中。在利用手机对周围的多个手机进行录音的场景下,手机能判断出声源来源位置,并在录音界面上相应位置显示出被录音这的图标。例如,用当前手机进行多人录音,被录音人包括李小明和周小迅,那么,可以提取出“李”和“周”的字符图像,并采用本申请实施例的生成标识图案的方法对“李”和“周”的字符图像进行处理,生成的图标用来在录用界面的相应位置标识两个用户的图标,具体的显示如图34所示。
可选地,本申请实施例的标识图案为相册封面的图标。
具体地,可以采用本申请实施例的生成标识图案的方法生成与相册相关的地名、节日、人名等信息的标识图案,然后将该标识图案叠加在图库中相册的封面上,形成相册封面的图标。
例如,用户假期去佛山游玩,图片应用中生成了一个名称为“佛山”的相册,则可以提取相册名称首字“佛”的字符图像,然后再利用本申请实施例的生成标识图案的方法对“佛”的字符图像进行处理,生成的相册封面的图标如图35左侧所示。类似地,对于图片应用中的一个名称为“暑假”的相册,则可以提取相册名称首字“暑”的字符图像,然后再利用本申请实施例的生成标识图案的方法对“暑”的字符图像进行处理,生成的相册封面的图标如图35右侧所示。
上文结合附图1至35对本申请实施例的生成标识图案的终端设备进行了详细的介绍,下面结合附图36至40对本申请实施例的终端设备进行描述,应理解,图36至40中的终端设备能够执行本申请实施例的生成标识图案的终端设备,下面在介绍本申请实施例的终端设备时,适当省略重复的描述。
图36是本申请实施例的终端设备的示意性框图。图36中的终端设备7000包括:
获取模块7010,用于获取第一图像,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种;
处理模块7020,所述处理模块7020用于:
根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,其中,所述第二图像包括所述第一图像和多条轮廓线;
根据所述第二图像生成所述软件程序的标识图案。
本申请中,通过对第一图像进行变换,能够得到包括多条轮廓线的第二图像,进而能够根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
可选地,作为一个实施例,所述处理模块7020用于:
将所述第一图像的外轮廓线向所述第一图像的四周扩展,以得到所述第二图像,其中,所述第一图像的外轮廓线是围绕所述第一图像的四周边缘形成的轮廓线。
可选地,作为一个实施例,所述第一图像为空心字符图像,所述处理模块7020用于:
将所述第一图像的内轮廓线向所述第一图像内部扩展,以得到所述第二图像,其中,所述第一图像的内轮廓线是所述第一图像的多个边缘形成的轮廓线。
可选地,作为一个实施例,所述第一图像为实心字符图像,所述处理模块7020用于:
对所述第一图像进行变换,得到变换后的第一图像,所述变换后的第一图像为空心字符图像;
将所述变换后的第一图像的内轮廓线向所述变换后的第一图像内部扩展,以得到所述第二图像。
可选地,作为一个实施例,所述第一图像的轮廓线为直角轮廓线,所述处理模块7020用于:
对所述第一图像的轮廓线进行处理,以得到处理后的第一图像,其中,所述处理后的第一图像的轮廓线为圆角轮廓线;
根据所述圆角轮廓线对所述处理后的第一图像进行变换,以得到所述第二图像。
可选地,作为一个实施例,所述处理模块7020用于:
将所述第二图像的热区图像确定为所述软件程序的标识图案,其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。
可选地,作为一个实施例,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
可选地,作为一个实施例,所述标识图案中的轮廓线的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
可选地,作为一个实施例,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
可选地,作为一个实施例,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,
所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,
所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,
所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,
所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,
所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
图37是本申请实施例的终端设备的示意性框图。图37中的终端设备8000包括:
获取模块8010,用于获取第一图像,其中,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种,且所述第一图像为空心字符图像;
将点阵图像或者线条图像与所述第一图像叠加,得到叠加后的图像;
处理模块8020,所述处理模块8020用于:
将所述叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,得到第二图像;
根据所述第二图像生成所述软件程序的标识图案。
本申请中,通过在第一图像上叠加点阵图像或者线条图像,能够得到显示样式更加多样的第二图像,进而可以根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
可选地,作为一个实施例,所述标识图案为所述第二图像的热区图像,其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。
可选地,作为一个实施例,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
可选地,作为一个实施例,所述标识图案中的点阵或者线条的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
可选地,作为一个实施例,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
可选地,作为一个实施例,其特征在于,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,
所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,
所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,
所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,
所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
图38是本申请实施例的终端设备的示意性框图。图38中的终端设备9000包括:
获取模块9010,用于获取第一图像,所述第一图像用于表示英文字符或者阿拉伯数字字符;
处理模块9020,所述处理模块9020用于:
从图片库中确定出与所述第一图像匹配的目标图片,其中,所述目标图片中包含与所述第一图像的相似度大于或者等于预设相似度的参考图像;根据所述参考图像生成所述软件程序的标识图案。
本申请中,通过在第一图像上叠加点阵图像或者线条图像,能够得到显示样式更加多样的第二图像,进而可以根据第二头像得到显示样式更加多样的软件程序的标识图案,能够在一定程度上提高软件程序的标识图案的显示效果,提高用户体验。
可选地,作为一个实施例,所述标识图案为所述参考图像的热区图像,其中,所述参考图像的热区图像是所述参考图像中能够识别出所述参考图像表示的字符的子图像。
可选地,作为一个实施例,所述图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性。
可选地,作为一个实施例,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,
所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,
所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,
所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,
所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
图39是本申请实施例的终端设备的示意性框图。图39所示的终端设备10000包括:
存储器10010,用于存储程序;
处理器10020,用于执行存储器10010中存储的程序,当存储器10010中存储的程序被执行时,处理器10020用于执行本申请实施例的生成标识图案的方法的各个步骤。
应理解,上述终端设备7000中的获取模块7010和处理模块7020相当于处理器10020,终端设备8000中的获取模块8010和处理模块8020相当于处理器10020,设备9000中的获取模块9010和处理模块9020相当于处理器10020。
图40是本申请实施例的终端设备的结构示意图。
应理解,图36至图39所示的终端设备7000、终端设备8000、终端设备9000和终端设备1000的具体结构可以如图40所示。
图40中的终端设备包括通信模块3010、传感器3020、用户输入模块3030、输出模块3040、处理器3050、音视频输入模块3060、存储器3070以及电源3080。图40所示的终端设备可以执行本申请实施例的生成标识图案的方法的各个步骤,具体地,图40所示的终端设备中的处理器3050可以执行本申请实施例的生成标识图案的方法的各个步骤。
下面对图40中的终端设备的各个模块进行详细的介绍。
通信模块3010可以包括至少一个能使该终端设备与其他终端设备之间进行通信的模块。例如,通信模块3010可以包括有线网络接口、广播接收模块、移动通信模块、无线因特网模块、局域通信模块和位置(或定位)信息模块等其中的一个或多个。
传感器3020可以感知用户的一些操作,传感器3020可以包括距离传感器,触摸传感器等等。传感器3020可以感知用户触摸屏幕或者靠近屏幕等操作。
用户输入模块3030,用于接收输入的数字信息、字符信息或接触式触摸操作/非接触式手势,以及接收与系统的用户设置以及功能控制有关的信号输入等。用户输入模块3030包括触控面板和/或其他输入设备。
输出模块3040包括显示面板,用于显示由用户输入的信息、提供给用户的信息或系统的各种菜单界面等。可选的,可以采用液晶显示器(liquid crystal display,LCD)或有机发光二极管(organic light-emitting diode,OLED)等形式来配置显示面板。在其他一些实施例中,触控面板可覆盖显示面板上,形成触摸显示屏。另外,输出模块3040还可以包括音频输出模块、告警器以及触觉模块等。
音视频输入模块3060,用于输入音频信号或视频信号。音视频输入模块3060可以包括摄像头和麦克风。
电源3080可以在处理器3050的控制下接收外部电力和内部电力,并且提供整个终端设备各个模块运行时需要的电力。
处理器3050可以指示一个或多个处理器,例如,处理器3050可以包括一个或多个中央处理器,或者包括一个中央处理器和一个图形处理器,或者包括一个应用处理器和一个协处理器(例如微控制单元或神经网络处理器)。当处理器3050包括多个处理器时,这多个处理器可以集成在同一块芯片上,也可以各自为独立的芯片。一个处理器可以包括一个或多个物理核,其中物理核为最小的处理模块。
存储器3070存储计算机程序,该计算机程序包括操作系统程序3071和应用程序3072等。典型的操作系统如微软公司的Windows,苹果公司的MacOS等用于台式机或笔记本的系统,又如谷歌公司开发的基于
的安卓
系统等用于移动终端的系统。当本申请实施例的资源调度终端设备通过软件的方式实现时,可以认为是通过应用程序3071来具体实现的。
存储器3070可以是以下类型中的一种或多种:闪速(flash)存储器、硬盘类型存储器、微型多媒体卡型存储器、卡式存储器(例如SD或XD存储器)、随机存取存储器(random access memory,RAM)、静态随机存取存储器(static RAM,SRAM)、只读存储器(read only memory,ROM)、电可擦除可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、可编程只读存储器(programmable ROM,PROM)、磁存储器、磁盘或光盘。在其他一些实施例中,存储器3070也可以是因特网上的网络存储设备,系统可以对在因特网上的存储器3070执行更新或读取等操作。
处理器3050用于读取存储器3070中的计算机程序,然后执行计算机程序定义的终端设备,例如处理器3050读取操作系统程序3072从而在该系统运行操作系统以及实现操作系统的各种功能,或读取一种或多种应用程序3071,从而在该系统上运行应用。
例如,上述存储器3070可以存储一种计算机程序(该计算机程序是本申请实施例的资源调度终端设备对应的程序),当处理器3050执行该极端及程序时,处理器3050能够 执行本申请实施例的资源调度终端设备。
存储器3070还存储有除计算机程序之外的其他数据3073,例如,存储器3070可以存储本申请的资源调度终端设备中涉及的绘帧线程的负载特征,绘帧线程的负载预测值等等。
图40中各个模块的连接关系仅为一种示例,本申请任意实施例提供的终端设备也可以应用在其它连接方式的终端设备中,例如所有模块通过总线连接。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (21)
- 一种生成标识图案的方法,其特征在于,包括:获取第一图像,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种;根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,其中,所述第二图像包括所述第一图像和多条轮廓线;根据所述第二图像生成软件程序的标识图案。
- 如权利要求1所述的方法,其特征在于,所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:将所述第一图像的外轮廓线向所述第一图像的四周扩展,以得到所述第二图像,其中,所述第一图像的外轮廓线是围绕所述第一图像的四周边缘形成的轮廓线。
- 如权利要求1所述的方法,其特征在于,所述第一图像为空心字符图像,所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:将所述第一图像的内轮廓线向所述第一图像内部扩展,以得到所述第二图像,其中,所述第一图像的内轮廓线是所述第一图像的多个边缘形成的轮廓线。
- 如权利要求1所述的方法,其特征在于,所述第一图像为实心字符图像,所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到所述第二图像,包括:对所述第一图像进行变换,得到变换后的第一图像,所述变换后的第一图像为空心字符图像;将所述变换后的第一图像的内轮廓线向所述变换后的第一图像内部扩展,以得到所述第二图像。
- 如权利要求1-4中任一项所述的方法,其特征在于,所述第一图像的轮廓线为直角轮廓线,在根据所述第一图像的轮廓线对所述第一图像进行变换之前,所述方法还包括:对所述第一图像的轮廓线进行处理,以得到处理后的第一图像,所述处理后的第一图像的轮廓线为圆角轮廓线;所述根据所述第一图像的轮廓线对所述第一图像进行变换,以得到第二图像,包括:根据所述圆角轮廓线对所述处理后的第一图像进行变换,以得到所述第二图像。
- 如权利要求1-5中任一项所述的方法,其特征在于,所述标识图案为所述第二图像的热区图像,其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。
- 如权利要求1-6中任一项所述的方法,其特征在于,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
- 如权利要求7所述的方法,其特征在于,所述标识图案中的轮廓线的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
- 如权利要求7或8所述的方法,其特征在于,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
- 如权利要求1-6中任一项所述的方法,其特征在于,所述软件程序为相册,所述 软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
- 一种生成标识图案的方法,其特征在于,包括:获取第一图像,其中,所述第一图像用于表示中文字符、英文字符以及阿拉伯数字字符中的任意一种,且所述第一图像为空心字符图像;将点阵图像或者线条图像与所述第一图像叠加,得到叠加后的图像;将所述叠加后的图像中的点阵或者线条中的部分像素点移动预设距离,得到第二图像;根据所述第二图像生成软件程序的标识图案。
- 如权利要求11所述的方法,其特征在于,所述标识图案为所述第二图像的热区图像,其中,所述第二图像的热区图像是所述第二图像中能够识别出所述第二图像表示的字符的子图像。
- 如权利要求11或12所述的方法,其特征在于,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像。
- 如权利要求13所述的方法,其特征在于,所述标识图案中的点阵或者线条的密集程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
- 如权利要求13或14所述的方法,其特征在于,所述标识图案的颜色深浅程度与所述标识图案所表示的联系人的联系频率和/或亲密程度呈正相关关系。
- 如权利要求11或12所述的方法,其特征在于,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
- 一种生成标识图案的方法,其特征在于,包括:获取第一图像,所述第一图像用于表示英文字符或者阿拉伯数字字符;从图片库中确定出与所述第一图像匹配的目标图片,其中,所述目标图片中包含与所述第一图像的相似度大于或者等于预设相似度的参考图像;根据所述参考图像生成软件程序的标识图案。
- 如权利要求17所述的方法,其特征在于,所述标识图案为所述参考图像的热区图像,其中,所述参考图像的热区图像是所述参考图像中能够识别出所述参考图像表示的字符的子图像。
- 如权利要求17或18所述的方法,其特征在于,所述图片库中的图片的纹理分布满足黄金分割比例或者斐波那契数列特性。
- 如权利要求17-19中任一项所述的方法,其特征在于,所述软件程序为通信录,所述软件程序的标识图案为所述通信录中的联系人头像;或者,所述软件程序为相册,所述软件程序的标识图案为相册封面的图案;或者,所述软件程序为备忘录,所述软件程序的标识图案为备忘录中的备忘信息的标识图案;或者,所述软件程序为音乐应用,所述软件程序的标识图案为音乐应用中的歌单封面;或者,所述软件程序为语音助手,所述软件程序的标识图案为语音助手的显示图标;或者,所述软件程序为录音应用,软件程序的标识图案为被录音者的头像;或者,所述软件程序为天气应用,软件程序的标识图案为天气应用的显示图标。
- 一种终端设备,其特征在于,所述终端设备包括存储器和处理器,所述存储器用于存储程序,所述处理器用于执行所述存储器存储的程序,当所述处理器执行所述存储器存储的程序时,所述处理器用于执行如权利要求1-20中任一项权利要求所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/350,625 US11995747B2 (en) | 2018-12-19 | 2021-06-17 | Method for generating identification pattern and terminal device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811555766.0 | 2018-12-19 | ||
CN201811555766.0A CN109816743A (zh) | 2018-12-19 | 2018-12-19 | 生成标识图案的方法和终端设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/350,625 Continuation US11995747B2 (en) | 2018-12-19 | 2021-06-17 | Method for generating identification pattern and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020125481A1 true WO2020125481A1 (zh) | 2020-06-25 |
Family
ID=66602159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/124205 WO2020125481A1 (zh) | 2018-12-19 | 2019-12-10 | 生成标识图案的方法和终端设备 |
Country Status (3)
Country | Link |
---|---|
US (1) | US11995747B2 (zh) |
CN (1) | CN109816743A (zh) |
WO (1) | WO2020125481A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110865856B (zh) * | 2018-08-27 | 2022-04-22 | 华为技术有限公司 | 一种界面元素颜色显示方法及装置 |
CN109816743A (zh) | 2018-12-19 | 2019-05-28 | 华为技术有限公司 | 生成标识图案的方法和终端设备 |
US11195172B2 (en) * | 2019-07-24 | 2021-12-07 | Capital One Services, Llc | Training a neural network model for recognizing handwritten signatures based on different cursive fonts and transformations |
CN110456517B (zh) * | 2019-08-20 | 2021-11-02 | 杭州海藻科技服务有限公司 | 3d显示屏及其3d显示方法 |
CN113986407A (zh) * | 2020-07-27 | 2022-01-28 | 华为技术有限公司 | 封面生成方法、装置及计算机存储介质 |
CN114356980A (zh) * | 2021-12-10 | 2022-04-15 | 北京金山云网络技术有限公司 | 头像生成方法、装置、设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096933A (zh) * | 2009-12-14 | 2011-06-15 | 方正国际软件(北京)有限公司 | 一种文字样式修饰方法及装置 |
US8332413B1 (en) * | 2011-10-26 | 2012-12-11 | Huawei Technologies Co., Ltd. | Method and device for presenting relationship closeness |
CN104503742A (zh) * | 2014-12-01 | 2015-04-08 | 北京金和软件股份有限公司 | 一种自动生成app的方法 |
CN105468574A (zh) * | 2015-11-19 | 2016-04-06 | 厦门大学 | 装饰字体的合成方法 |
CN106534518A (zh) * | 2016-10-28 | 2017-03-22 | 珠海市魅族科技有限公司 | 一种联系人通信界面的展示方法及装置 |
CN109816743A (zh) * | 2018-12-19 | 2019-05-28 | 华为技术有限公司 | 生成标识图案的方法和终端设备 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5034398B2 (ja) * | 2006-09-14 | 2012-09-26 | 富士通株式会社 | 文字認識プログラム、文字認識方法および文字認識装置 |
KR102054772B1 (ko) * | 2014-04-22 | 2019-12-13 | 한국전자통신연구원 | 문장 은닉 및 표시 시스템 및 방법 |
US10282416B2 (en) * | 2017-05-05 | 2019-05-07 | Apple Inc. | Unified framework for text conversion and prediction |
CN107818323B (zh) * | 2017-11-21 | 2021-12-07 | 北京百度网讯科技有限公司 | 用于处理图像的方法和装置 |
CN108830275B (zh) * | 2018-05-07 | 2021-06-29 | 广东省电信规划设计院有限公司 | 点阵字符、点阵数字的识别方法及装置 |
-
2018
- 2018-12-19 CN CN201811555766.0A patent/CN109816743A/zh active Pending
-
2019
- 2019-12-10 WO PCT/CN2019/124205 patent/WO2020125481A1/zh active Application Filing
-
2021
- 2021-06-17 US US17/350,625 patent/US11995747B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096933A (zh) * | 2009-12-14 | 2011-06-15 | 方正国际软件(北京)有限公司 | 一种文字样式修饰方法及装置 |
US8332413B1 (en) * | 2011-10-26 | 2012-12-11 | Huawei Technologies Co., Ltd. | Method and device for presenting relationship closeness |
CN104503742A (zh) * | 2014-12-01 | 2015-04-08 | 北京金和软件股份有限公司 | 一种自动生成app的方法 |
CN105468574A (zh) * | 2015-11-19 | 2016-04-06 | 厦门大学 | 装饰字体的合成方法 |
CN106534518A (zh) * | 2016-10-28 | 2017-03-22 | 珠海市魅族科技有限公司 | 一种联系人通信界面的展示方法及装置 |
CN109816743A (zh) * | 2018-12-19 | 2019-05-28 | 华为技术有限公司 | 生成标识图案的方法和终端设备 |
Non-Patent Citations (1)
Title |
---|
TZYZXXDJZX: "如何利用ps制作网格字壁纸 (Non-official translation: How to Make Gridded Wallpaper with PS)", 百度经验 (NON-OFFICIAL TRANSLATION: BAIDU JINGYAN), 12 February 2018 (2018-02-12), DOI: 20200301144308 * |
Also Published As
Publication number | Publication date |
---|---|
US11995747B2 (en) | 2024-05-28 |
US20210312679A1 (en) | 2021-10-07 |
CN109816743A (zh) | 2019-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020125481A1 (zh) | 生成标识图案的方法和终端设备 | |
CN109618222B (zh) | 一种拼接视频生成方法、装置、终端设备及存储介质 | |
US11158057B2 (en) | Device, method, and graphical user interface for processing document | |
WO2016101717A1 (zh) | 基于触摸交互的搜索方法及装置 | |
WO2020248346A1 (zh) | 文字的检测 | |
CN104778194A (zh) | 基于触摸操作的搜索方法和装置 | |
WO2015045676A1 (ja) | 情報処理装置、および制御プログラム | |
KR102791628B1 (ko) | 멀티-영역 이미지 스캐닝 | |
CN111127469A (zh) | 缩略图显示方法、装置、存储介质以及终端 | |
JP2016200860A (ja) | 情報処理装置、情報処理装置の制御方法、およびプログラム | |
US20160104052A1 (en) | Text-based thumbnail generation | |
US10304232B2 (en) | Image animation in a presentation document | |
EP3803797B1 (en) | Methods and systems for performing editing operations on media | |
CN113986407A (zh) | 封面生成方法、装置及计算机存储介质 | |
CN110533020A (zh) | 一种文字信息的识别方法、装置及存储介质 | |
CN111199136B (zh) | 文档内容的展示方法、装置及设备 | |
US10915778B2 (en) | User interface framework for multi-selection and operation of non-consecutive segmented information | |
US20150055869A1 (en) | Method and apparatus for providing layout based on handwriting input | |
CN111027533A (zh) | 一种点读坐标的变换方法、系统、终端设备及存储介质 | |
US12141430B2 (en) | Systems and methods for managing digital notes | |
WO2016101768A1 (zh) | 终端以及基于触摸操作的搜索方法和装置 | |
CN119127032B (zh) | 元素层级位置的调整方法、设备及存储介质 | |
US20230144394A1 (en) | Systems and methods for managing digital notes | |
CN119229101A (zh) | 图像处理方法及相关设备 | |
CN119254881A (zh) | 日程创建方法、装置、设备及介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19897862 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19897862 Country of ref document: EP Kind code of ref document: A1 |