Augmented reality typography personalization system

ABSTRACT

Disclosed are augmented reality (AR) personalization systems to enable a user to edit and personalize presentations of real-world typography in real-time. The AR personalization system captures an image depicting a physical location via a camera coupled to a client device. For example, the client device may include a mobile device that includes a camera configured to record and display images (e.g., photos, videos) in real-time. The AR personalization system causes display of the image at the client device, and scans the image to detect occurrences of typography within the image (e.g., signs, billboards, posters, graffiti).

PRIORITY CLAIM

This application is a continuation of and claims the benefit of priorityof U.S. patent application Ser. No. 15/492,089, filed on Apr. 20, 2017,which is hereby incorporated by reference herein in its entirety.

TECHNICAL FIELD

Embodiments of the present disclosure relate generally to mobilecomputing technology and, more particularly, but not by way oflimitation, to the presentation of augmented and virtual realitydisplays.

BACKGROUND

Augmented reality (AR) is a live direct or indirect view of a physical,real-world environment whose elements are supplemented, or “augmented.”by a computer-generated sensory input such as sound, video, graphics, orthe like. As a result, the technology functions to enhance a user'sperception of reality.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

To easily identify the discussion of any particular element or act, themost significant digit or digits in a reference number refer to thefigure number in which that element is first introduced.

FIG. 1 is a block diagram showing an example messaging system forexchanging data (e.g., messages and associated content) over a networkin accordance with some embodiments, wherein the messaging systemincludes an augmented reality anamorphosis system.

FIG. 2 is block diagram illustrating further details regarding amessaging system, according to example embodiments.

FIG. 3 is a schematic diagram illustrating data that may be stored inthe database of the messaging server system, according to certainexample embodiments.

FIG. 4 is a schematic diagram illustrating a structure of a message,according to some embodiments, generated by a messaging clientapplication for communication.

FIG. 5 is a block diagram illustrating various modules of a typographypersonalization system, according to certain example embodiments.

FIG. 6 is a flowchart illustrating various operations of the typographypersonalization system in personalizing an occurrence of typographywithin a presentation of an image, according to certain exampleembodiments.

FIG. 7 is a flowchart illustrating various operations of the typographypersonalization system in performing a method of altering a presentationof an occurrence of typography at a client device based on apersonalization request, according to certain example embodiments.

FIGS. 8A/B are representations of images depicting an occurrence oftypography, with and without personalization, according to certainexample embodiments.

FIGS. 9A/B are representations of images depicting an occurrence oftypography, with and without personalization, according to certainexample embodiments.

FIG. 10 is a block diagram illustrating a representative softwarearchitecture, which may be used in conjunction with various hardwarearchitectures herein described and used to implement variousembodiments.

FIG. 11 is a block diagram illustrating components of a machine,according to some example embodiments, able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform any one or more of the methodologies discussed herein.

DETAILED DESCRIPTION

Reference will now be made in detail to specific example embodiments forcarrying out the inventive subject matter of the present disclosure. Inthe following description, specific details are set forth in order toprovide a thorough understanding of the subject matter. It shall beappreciated that embodiments may be practiced without some or all ofthese specific details.

Disclosed are augmented reality (AR) personalization systems to enable auser to edit and personalize presentations of real-world typography inreal-time. In other words, various embodiments allow text in a pictureor video captured by a phone to be automatically analyzed to allowsimple user editing of the text. The analysis and editing features allowthe edited picture or video to maintain the look and feel of theoriginal. In some embodiments, networked features allow one user to edittext on a sign at a particular location on first device and share thoseedits. A second user capturing an image of the sign using the ARpersonalized system will see the text edits from the first userdisplayed on the screen of the second device. Users viewing a sign atthe same time through AR displays can see real-time updates and textedits as they are made by other users.

The AR personalization system captures an image depicting a physicallocation via a camera coupled to a client device. For example, theclient device may be a mobile device that includes a camera configuredto record and display images (e.g., photos, videos) in real-time. The ARpersonalization system causes display of the image at the client device,and scans the image to detect occurrences of typography within the image(e.g., signs, billboards, posters, graffiti). For example, the image mayinclude a stop-sign. The AR personalization system may detect the textstring displayed on the stop-sign that reads “STOP.”

In some example embodiments, in response to detection of typographywithin an image, the AR personalization system identifies properties ofthe typography. The AR personalization system may employ Natural FeatureTracking (NFT) techniques to identify locations of the occurrences oftypography. The properties of the typography may for example include aset of characters, a height of the text, a length of the text, and anumber of characters in the text, as well as a location of the text inthe image, a color of the text, an opacity of the text, and in someembodiments a typeface, a font (e.g., a size, weight, and style of thetypeface), or that the typeface is serif or sans serif. Using thestop-sign example above, the AR personalization system may determinefeatures such as: a relative size of the typography in the image basedon properties of the image that the character-set of the text stringincludes the letters “S,” “T,” “O,” and “P,”; that the characters of thetext string are white; and that the characters of the text string aresans serif (or that they are “Ariel Narrow”).

In further embodiments, the AR typography personalization systemidentifies background patterns in which the typography may be overlaidor displayed upon. Background patterns may include solid colors (e.g.,red, blue, orange), textile patterns (e.g., check, tartan, gingham), aswell as features of an environment depicted in the image (e.g., brickson a brick wall, trees, bushes, concrete, asphalt, clouds, etc.).Continuing with the stop-sign example discussed above, the ARpersonalization system may determine that the background of thetypography is a solid red color.

The AR personalization system may receive a request to alter, modify, orpersonalize the occurrences of typography detected in the image. Therequest may include a user input selecting an occurrence of typographyin the image, received from a client device. For example, a user viewinga presentation of the image at the client device may select theoccurrence of typography in the image, and in response the ARpersonalization system may overlay a text field at a position on theoccurrence of typography to receive text inputs over the occurrence oftypography in the image. For example, the AR personalization systemidentifies tracking indicia that include features of an environment oractive light sources in proximity to annotated objects within theenvironment (e.g., the ground's plane, or the horizon). Based on thepositions of three or more known features in the environment, the ARpersonalization system generates and causes display of the text fieldover the occurrence of typography. Thus, as the user moves to differentperspectives, the text field (and ultimately the altered typography) mayremain in a consistent position.

The user may provide user inputs into the text field to delete orotherwise alter characters in the text string. Continuing with thestop-sign example discussed above, the AR personalization may receive auser input selecting the typography of the stop-sign. In response toreceiving the selection of the typography of the stop-sign, the ARpersonalization system causes display of a text field over thetypography of the stop-sign.

The user may provide a user input into the text field to delete, change.or add to the one or more characters of the text string. For example,the user may alter the text string in the presentation of the image bydeleting the “O” from the character-set and replacing it with an “A” andan “H.” The AR personalization system generates characters to display inthe presentation of the image based on the properties of the textstring, such as the size, color, and typeface. In response to receivingthe user inputs modifying the text string, the AR personalization systemupdates the presentation of the image such that the text string displaysas “STAHP” at the client device.

In some example embodiments, the AR personalization system providesfunctionality to tag the personalization requests to a particularoccurrence of typography at one or more locations based factorsincluding on geo-location coordinates, as well as properties of thetypography. For example a user may tag a personalization request toalter/personalize all occurrences of a text string that includes certainproperties (e.g., a character-set, a location, a background, etc.)detected by the AR personalization system, or alter/personalize apresentation of a specific occurrence of typography based on locationdata at multiple client devices.

For example, a user may create a personalization request for a specificword or phrase (e.g., “STAR WARS.” “STOP.” “CAUTION”), wherein thespecific word or phrase may appear at multiple different locations. Upondetecting an occurrence of the specific word or phrase, based onproperties of the specific word or phrase (e.g., characters, positionsof the characters), the AR personalization system may apply thepersonalization request to alter a presentation of the word or phrase,in real-time.

The personalization request may include geolocation coordinates, as wellas user identifiers of a set of users authorized to view thepersonalized typography. For example, a user may generate apersonalization request that includes personalized typography,geolocation coordinates, an indication of an occurrence of typography toalter in a presentation, and a set of user identifiers. Upon detectingusers identified by the user identifiers at the location specified bythe geolocation coordinates, the AR personalization system alters apresentation of the occurrence of typography displayed at theircorresponding user devices to include the personalization request. Forexample, a user may generate a personalization request to alter apresentation of an occurrence of typography (e.g., a movie poster). Thepersonalization request includes an indication of the occurrence oftypography, changes to be made to the occurrence of typography (e.g., acharacter or string of characters to add), geolocation coordinates, aswell as a list of user identifiers that includes user identifier X. Forexample, a user may select the occurrence of typography within thepresentation, and in response, the AR personalization system may applyNFT systems to identify features within the presentation to identify andmark the occurrence of typography. The user may provide the ARpersonalization system with a set of changes that include new charactersto add to the occurrence of typography, as well as an indication of aposition in which to place the changes in the presentation. The useridentified by user identifier X may display a presentation of theoccurrence of the text string at a corresponding client device. Inresponse, the AR personalization system identifies the user and altersthe presentation based on the personalization request.

FIG. 1 is a block diagram showing an example messaging system 100 forexchanging data (e.g., messages and associated content) over a network.The messaging system 100 includes multiple client devices 102, each ofwhich hosts a number of applications including a messaging clientapplication 104. Each messaging client application 104 iscommunicatively coupled to other instances of the messaging clientapplication 104 and a messaging server system 108 via a network 106(e.g., the Internet).

Accordingly, each messaging client application 104 is able tocommunicate and exchange data with another messaging client application104 and with the messaging server system 108 via the network 106. Thedata exchanged between messaging client applications 104, and between amessaging client application 104 and the messaging server system 108,includes functions (e.g., commands to invoke functions) as well aspayload data (e.g., text, audio, video or other multimedia data whichmay include or be used as anamorphic media).

The messaging server system 108 provides server-side functionality viathe network 106 to a particular messaging client application 104. Whilecertain functions of the messaging system 100 are described herein asbeing performed by either a messaging client application 104 or by themessaging server system 108, it will be appreciated that the location ofcertain functionality either within the messaging client application 104or the messaging server system 108 is a design choice. For example, itmay be technically preferable to initially deploy certain technology andfunctionality within the messaging server system 108, but to latermigrate this technology and functionality to the messaging clientapplication 104 where a client device 102 has a sufficient processingcapacity.

The messaging server system 108 supports various services and operationsthat are provided to the messaging client application 104. Suchoperations include transmitting data to, receiving data from, andprocessing data generated by the messaging client application 104. Insome embodiments, this data includes, message content, client deviceinformation, geolocation information, media annotation and overlays,message content persistence conditions, social network information, andlive event information, as examples. In other embodiments, other data isused. Any such data may be used as part of or to generate anamorphicmedia in accordance with different embodiments described herein. Dataexchanges within the messaging system 100 are invoked and controlledthrough functions available via user interfaces (UIs) of the messagingclient application 104.

Turning now specifically to the messaging server system 108, anApplication Program Interface (API) server 110 is coupled to, andprovides a programmatic interface to, an application server 112. Theapplication server 112 is communicatively coupled to a databaseserver(s) 118, which facilitates access to a database(s) 120 in which isstored data associated with messages processed by the application server112.

Dealing specifically with the Application Program Interface (API) server110, this server receives and transmits message data (e.g., commands andmessage payloads) between the client device 102 and the applicationserver 112. Specifically, the Application Program Interface (API) server110 provides a set of interfaces (e.g., routines and protocols) that canbe called or queried by the messaging client application 104 in order toinvoke functionality of the application server 112. The ApplicationProgram Interface (API) server 110 exposes various functions supportedby the application server 112, including account registration, loginfunctionality, the sending of messages, via the application server 112,from a particular messaging client application 104 to another messagingclient application 104, the sending of media files (e.g., images orvideo) from a messaging client application 104 to the messaging serverapplication 114, and for possible access by another messaging clientapplication 104, the setting of a collection of media data (e.g.,story), the retrieval of a list of friends of a user of a client device102, the retrieval of such collections, the retrieval of messages andcontent, the adding and deletion of friends to a social graph, thelocation of friends within a social graph, opening and application event(e.g., relating to the messaging client application 104).

The application server 112 hosts a number of applications andsubsystems, including a messaging server application 114, an imageprocessing system 116, a social network system 122, and an typographypersonalization system 124. The messaging server application 114implements a number of message processing technologies and functions,particularly related to the aggregation and other processing of content(e.g., textual and multimedia content) included in messages receivedfrom multiple instances of the messaging client application 104. As willbe described in further detail, the text and media content from multiplesources may be aggregated into collections of content (e.g., calledstories or galleries). These collections are then made available, by themessaging server application 114, to the messaging client application104. Other processor and memory intensive processing of data may also beperformed server-side by the messaging server application 114, in viewof the hardware requirements for such processing.

The application server 112 also includes an image processing system 116that is dedicated to performing various image processing operations,typically with respect to images or video received within the payload ofa message at the messaging server application 114.

The social network system 122 supports various social networkingfunctions services, and makes these functions and services available tothe messaging server application 114. To this end, the social networksystem 122 maintains and accesses an entity graph 304 within thedatabase(s) 120. Examples of functions and services supported by thesocial network system 122 include the identification of other users ofthe messaging system 100 with which a particular user has relationshipsor is “following,” and also the identification of other entities andinterests of a particular user. The typography personalization system124 provides functionality to identify and enable personalization ofoccurrences of typography identified in a presentation of an image at aclient device (e.g., client device 102).

The application server 112 is communicatively coupled to one or moredatabase server(s) 118, which facilitates access to a database(s) 120 inwhich is stored data associated with messages processed by the messagingserver application 114.

FIG. 2 is block diagram illustrating further details regarding themessaging system 100, according to example embodiments. Specifically,the messaging system 100 is shown to comprise the messaging clientapplication 104 and the application server 112, which in turn embody anumber of some subsystems, namely an ephemeral timer system 202, acollection management system 204 and an annotation system 206.

The ephemeral timer system 202 is responsible for enforcing thetemporary access to content permitted by the messaging clientapplication 104 and the messaging server application 114. To this end,the ephemeral timer system 202 incorporates a number of timers that,based on duration and display parameters associated with a message, orcollection of messages (e.g., a SNAPCHAT story), selectively display andenable access to messages and associated content such as anamorphicmedia via the messaging client application 104. Further detailsregarding the operation of the ephemeral timer system 202 are providedbelow.

The collection management system 204 is responsible for managingcollections of media (e.g., collections of text, image video and audiodata). In some examples, a collection of content (e.g., messages,including personalized typography, images, video, text and audio) may beorganized into an “event gallery” or an “event story.” Such a collectionmay be made available for a specified time period, such as the durationof an event to which the content relates. For example, content such aspersonalized augmented reality typography displayed at specificlocations based on geolocation coordinates and features of anenvironment may be made available as a “story” for the duration of atime period. The collection management system 204 may also beresponsible for publishing an icon that provides notification of theexistence of a particular collection to the user interface of themessaging client application 104.

The collection management system 204 furthermore includes a curationinterface 208 that allows a collection manager to manage and curate aparticular collection of content. For example, the curation interface208 enables an event organizer to curate a collection of contentrelating to a specific event (e.g., delete inappropriate content orredundant messages). Additionally, the collection management system 204employs machine vision (or image recognition technology) and contentrules to automatically curate a content collection. In certainembodiments, compensation may be paid to a user for inclusion of usergenerated content into a collection. In such cases, the curationinterface 208 operates to automatically make payments to such users forthe use of their content.

The annotation system 206 provides various functions that enable a userto annotate or otherwise modify or edit media content associated with amessage. For example, the annotation system 206 provides functionsrelated to the generation and publishing of media overlays for messagesprocessed by the messaging system 100. The annotation system 206operatively supplies a media overlay (e.g., a SNAPCHAT filter) to themessaging client application 104 based on a geolocation of the clientdevice 102. In another example, the annotation system 206 operativelysupplies a media overlay to the messaging client application 104 basedon other information, such as, social network information of the user ofthe client device 102. A media overlay may include audio and visualcontent and visual effects. Examples of audio and visual content includeanamorphic media, pictures, texts, logos, animations, and sound effects.An example of a visual effect includes color overlaying, or projectingan anamorphic media item over a presentation depicting a space. Theaudio and visual content or the visual effects can be applied to a mediacontent item (e.g., a photo) at the client device 102. For example, themedia overlay including text that can be overlaid on top of a photographor video stream generated taken by the client device 102. In anotherexample, the media overlay includes an identification of a locationoverlay (e.g., Venice beach), a name of a live event, or a name of amerchant overlay (e.g., Beach Coffee House). In another example, theannotation system 206 uses the geolocation of the client device 102 toidentify a media overlay that includes the name of a merchant at thegeolocation of the client device 102. The media overlay may includeother indicia associated with the merchant. The media overlays may bestored in the database(s) 120 and accessed through the databaseserver(s) 118.

In one example embodiment, the annotation system 206 provides auser-based publication platform that enables users to select ageolocation on a map, and upload content associated with the selectedgeolocation. The user may also specify circumstances under which aparticular media overlay should be offered to other users. Theannotation system 206 generates a media overlay that includes theuploaded content and associates the uploaded content with the selectedgeolocation.

In another example embodiment, the annotation system 206 provides amerchant-based publication platform that enables merchants to select aparticular media overlay associated with a geolocation via a biddingprocess. For example, the annotation system 206 associates the mediaoverlay of a highest bidding merchant with a corresponding geolocationfor a predefined amount of time

FIG. 3 is a schematic diagram 300 illustrating data which may be storedin the database(s) 120 of the messaging server system 108, according tocertain example embodiments. While the content of the database(s) 120 isshown to comprise a number of tables, it will be appreciated that thedata could be stored in other types of data structures (e.g., as anobject-oriented database).

The database(s) 120 includes message data stored within a message table314. The entity table 302 stores entity data, including an entity graph304. Entities for which records are maintained within the entity table302 may include individuals, corporate entities, organizations, objects,places, events etc. Regardless of type, any entity regarding which themessaging server system 108 stores data may be a recognized entity. Eachentity is provided with a unique identifier, as well as an entity typeidentifier (not shown).

The entity graph 304 furthermore stores information regardingrelationships and associations between entities. Such relationships maybe social, professional (e.g., work at a common corporation ororganization) interested-based or activity-based, merely for example.

The database(s) 120 also stores annotation data, in the example form offilters, in an annotation table 312. Filters for which data is storedwithin the annotation table 312 are associated with and applied tovideos (for which data is stored in a video table 310) and/or images(for which data is stored in an image table 308). Filters, in oneexample, are overlays (e.g., anamorphic media items) that are displayedas overlaid on an image or video during presentation to a recipientuser. For example, the overlay may include an anamorphic media itemdisplayed within a presentation of a space, such that the anamorphicmedia item appears to be projected over a set of three dimensionalsurfaces of a space, following the contours of the surfaces of thespace. Filters may be of varies types, including a user-selected filtersfrom a gallery of filters presented to a sending user by the messagingclient application 104 when the sending user is composing a message.Other types of filers include geolocation filters (also known asgeo-filters) which may be presented to a sending user based ongeographic location. For example, geolocation filters specific to aneighborhood or special location may be presented within a userinterface by the messaging client application 104, based on geolocationinformation determined by a GPS unit of the client device 102. Anothertype of filer is a data filer, which may be selectively presented to asending user by the messaging client application 104, based on otherinputs or information gathered by the client device 102 during themessage creation process. Example of data filters include currenttemperature at a specific location, a current speed at which a sendinguser is traveling, battery life for a client device 102 or the currenttime.

Other annotation data that may be stored within the image table 308 isso-called “lens” data. A “lens” may be a real-time special effect andsound that may be added to an image or a video.

As mentioned above, the video table 310 stores video data which, in oneembodiment, is associated with messages for which records are maintainedwithin the message table 314. Similarly, the image table 308 storesimage data associated with messages for which message data is stored inthe entity table 302. The entity table 302 may associate variousannotations from the annotation table 312 with various images and videosstored in the image table 308 and the video table 310.

A story table 306 stores data regarding collections of messages andassociated image, video or audio data, which are compiled into acollection (e.g., a SNAPCHAT story or a gallery). The creation of aparticular collection may be initiated by a particular user (e.g., eachuser for which a record is maintained in the entity table 302) A usermay create a “personal story” in the form of a collection of contentthat has been created and sent/broadcast by that user. To this end, theuser interface of the messaging client application 104 may include anicon that is user selectable to enable a sending user to add specificcontent to his or her personal story.

A collection may also constitute a “live story,” which is a collectionof content from multiple users that is created manually, automaticallyor using a combination of manual and automatic techniques. For example,a “live story” may constitute a curated stream of user-submitted contentfrom varies locations and events. Users, whose client devices havelocation services enabled and are at a common location event at aparticular time may, for example, be presented with an option, via auser interface of the messaging client application 104, to contributecontent to a particular live story. The live story may be identified tothe user by the messaging client application 104, based on his or herlocation. The end result is a “live story” told from a communityperspective.

A further type of content collection is known as a “location story,”which enables a user whose client device 102 is located within aspecific geographic location (e.g., on a college or university campus)to contribute to a particular collection. In some embodiments, acontribution to a location story may require a second degree ofauthentication to verify that the end user belongs to a specificorganization or other entity (e.g., is a student on the universitycampus).

FIG. 4 is a schematic diagram illustrating a structure of a message 400,according to some in some embodiments, generated by a messaging clientapplication 104 for communication to a further messaging clientapplication 104 or the messaging server application 114. The content ofa particular message 400 is used to populate the message table 314stored within the database(s) 120, accessible by the messaging serverapplication 114. Similarly, the content of a message 400 is stored inmemory as “in-transit” or “in-flight” data of the client device 102 orthe application server 112. The message 400 is shown to include thefollowing components:

-   -   A message identifier 402: a unique identifier that identifies        the message 400.    -   A message text payload 404: text, to be generated by a user via        a user interface of the client device 102 and that is included        in the message 400.    -   A message image payload 406: image data, captured by a camera        component of a client device 102 or retrieved from memory of a        client device 102, and that is included in the message 400.    -   A message video payload 408: video data, captured by a camera        component or retrieved from a memory component of the client        device 102 and that is included in the message 400.    -   A message audio payload 410: audio data, captured by a        microphone or retrieved from the memory component of the client        device 102, and that is included in the message 400.    -   A message annotations 412: annotation data (e.g., filters,        stickers or other enhancements) that represents annotations to        be applied to message image payload 406, message video payload        408, or message audio payload 410 of the message 400.    -   A message duration parameter 414: parameter value indicating, in        seconds, the amount of time for which content of the message        (e.g., the message image payload 406, message video payload 408,        message audio payload 410) is to be presented or made accessible        to a user via the messaging client application 104.    -   A message geolocation parameter 416: geolocation data (e.g.,        latitudinal and longitudinal coordinates) associated with the        content payload of the message. Multiple message geolocation        parameter 416 values may be included in the payload, each of        these parameter values being associated with respect to content        items included in the content (e.g., a specific image into        within the message image payload 406, or a specific video in the        message video payload 408).    -   A message story identifier 418: identifier values identifying        one or more content collections (e.g., “stories”) with which a        particular content item in the message image payload 406 of the        message 400 is associated. For example, multiple images within        the message image payload 406 may each be associated with        multiple content collections using identifier values.    -   A message tag 420: each message 400 may be tagged with multiple        tags, each of which is indicative of the subject matter of        content included in the message payload. For example, where a        particular image included in the message image payload 406        depicts an animal (e.g., a lion), a tag value may be included        within the message tag 420 that is indicative of the relevant        animal. Tag values may be generated manually, based on user        input, or may be automatically generated using, for example,        image recognition.    -   A message sender identifier 422: an identifier (e.g., a        messaging system identifier, email address or device identifier)        indicative of a user of the client device 102 on which the        message 400 was generated and from which the message 400 was        sent    -   A message receiver identifier 424: an identifier (e.g., a        messaging system identifier, email address or device identifier)        indicative of a user of the client device 102 to which the        message 400 is addressed.

The contents (e.g. values) of the various components of message 400 maybe pointers to locations in tables within which content data values arestored. For example, an image value in the message image payload 406 maybe a pointer to (or address of) a location within an image table 308.Similarly, values within the message video payload 408 may point to datastored within a video table 310, values stored within the messageannotations 412 may point to data stored in an annotation table 312,values stored within the message story identifier 418 may point to datastored in a story table 306, and values stored within the message senderidentifier 422 and the message receiver identifier 424 may point to userrecords stored within an entity table 302.

FIG. 5 is a block diagram 500 illustrating components of the typographypersonalization system 124, that configure the typographypersonalization system 124 to identify occurrences of typography in apresentation of an image, and enable personalization of the typography,according to various example embodiments. The typography personalizationsystem 124 is shown as including a presentation module 502, anidentification module 504, and a feature tracking module 506, all, orsome, configured to communicate with each other (e.g., via a bus, sharedmemory, or a switch). Any one or more of these modules may beimplemented using one or more processors 508 (e.g., by configuring suchone or more processors to perform functions described for that module)and hence may include one or more of the processors 508.

Any one or more of the modules described may be implemented usinghardware alone (e.g., one or more of the processors 508 of a machine) ora combination of hardware and software. For example, any moduledescribed of the typography personalization system 124 may physicallyinclude an arrangement of one or more of the processors 508 (e.g., asubset of or among the one or more processors of the machine) configuredto perform the operations described herein for that module. As anotherexample, any module of the typography personalization 124 may includesoftware, hardware, or both, that configure an arrangement of one ormore processors 508 (e.g., among the one or more processors of themachine) to perform the operations described herein for that module.Accordingly, different modules of the typography personalization system124 may include and configure different arrangements of such processors508 or a single arrangement of such processors 508 at different pointsin time. Moreover, any two or more modules of the typographypersonalization system 124 may be combined into a single module, and thefunctions described herein for a single module may be subdivided amongmultiple modules. Furthermore, according to various example embodiments,modules described herein as being implemented within a single machine,database, or device may be distributed across multiple machines,databases, or devices.

FIG. 6 is a flowchart illustrating various operations of the typographypersonalization system 124 in performing a method 600 for personalizingan occurrence of typography within a presentation of an image, accordingto certain example embodiments. Operations of the method 600 may beperformed by the modules described above with respect to FIG. 5. Asshown in FIG. 6, the method 600 includes one or more operations 602,604, 606, 608, and 610.

Operations 602 and 604 may be performed by the presentation module 502.At operation 602, the presentation module 502 captures an imagedepicting a physical location. For example, the client device 102 mayinclude a camera element configured to record images of a physicallocation. The presentation module 502 may access the camera element ofthe client device 102 and generate an image based on the recordedimages. For example, the image captured by the presentation module 502may include video or still images.

At operation 604, the presentation module 502 analyzes the image toidentify one or more occurrences of typography within the image. Asdiscussed above, the image may depict a physical location, wherein thephysical location includes one or more occurrences of typography. Forexample, the image may depict a street intersection that includes streetsigns, stop signs, billboards, as well as cars with license plates, thatall include occurrences of typography. The occurrences of typographytherefore could include text strings such as the word “STOP” on a stopsign, the letters and numbers of a license plate, as well as a word orphrase presented on a billboard. The occurrences of typography may alsoinclude corresponding background patterns. For example, in the case of astop sign, the typography of the stop sign “STOP” is presented over ared background, while a logo painted on a brick wall would have a brickbackground.

Operation 606 may be performed by the identification module 504. Atoperation 606, the identification module 504 identifies properties ofthe occurrences of typography within the presentation of the images. Theproperties of the typography may for example include size (e.g., height,length, number of characters), location (i.e., where it is in theimage), color, opacity, a character-set (i.e., the letters and numbersthat make up the typography) and in some embodiments a typeface (or thatthe typeface is serif or sans serif).

In some example embodiments, the identification module 504 identifiespositions of the occurrences of typography in the presentation of theimage based on NFT techniques. For example, the identification module504 may identify one or more features within the presentation anddetermines a relative position of the occurrences of typography relativeto one another and in relation to the features.

In some example embodiments, the identification module 504 identifies atypeface and a font of the typeface, of an occurrence of typography.Having determined the front and the typeface of the occurrence oftypography, the identification module 504 compares the font and thetypeface against a catalogue of fronto-parallel views of fonts andtypefaces to determine deformities of the occurrence of typography.Based on the deformities of the occurrence of typography, theidentification module 504 may identify a position and geometry of asurface in which the occurrence of typography appears, in order toidentify a shape of the surface.

For example, the identification module 504 identifies a typeface of theoccurrence of typography based on properties of the text string. Inresponse to identifying the typeface, the identification module 504compares the text string against a set of characters from a catalogue ofcharacters, based on the typeface (e.g., Times New Roman, Ariel,Wingdings, etc.), to identify evidence of distortion and deformities inthe text string. Based on the distortion and deformities, theidentifications module 504 determines a shape of a surface in which thetext string appears.

Operations 608 and 610 may be performed by the presentation module 502.At operation 608, the presentation module 502 receives a personalizationrequest to alter or edit one or more of the occurrences of typographyidentified in the presentation of the image. For example, thepersonalization request may include a request to remove one or morecharacters from a text string (e.g., the typography). In some exampleembodiments, the feature tracking module 506 generates and causesdisplay of a text field to receive changes (e.g., deletions andadditions) to the typography at positions overlaid upon the occurrencesof typography. For example, the feature tracking module 506 may identifyone or more features within the presentation, and generate and causedisplay of the text fields at positions within the presentation suchthat as the user moves, the text fields remain in their relativepositions. The user may select one or more of the occurrences oftypography and provide changes (e.g., additions, deletions) directlyinto the text field.

In some example embodiments, the personalization request may include arequest to alter or change other feature of the occurrence oftypography, beyond the typography itself. For example, a user mayprovide inputs specifying that a background color or pattern within thepresentation be changed (e.g., change a red sign to a green sign). Infurther embodiments, the personalization request may include a requestto add an image retrieved from a database to the presentation. Forexample, a user may access a database or repository of images thatincludes an image of a face, and specify a location within thepresentation in which to add the image of the face. In this way, a usermay alter or otherwise change elements within the presentation beyondsimply the typography itself. For example, the personalization requestmay specify that all occurrences of the word “apple” identified withinan image be replaced with a picture selected by the user (e.g., an imageof an apple).

At operation 610, the presentation module 502 generates a presentationof the image, wherein the presentation of the image includes an updatedtext string based on the personalization request. In some exampleembodiments, the updated txt string may be presented based on the formof the surface identified by the identification module 504, based ondeformities of the typeface. For example, one or more characters of thetext string may be changed or removed from the image, and replaced withnew characters, or simply filled in with the background pattern.

As an illustrative example, the occurrence of typography identified bythe identification module 504 may include a billboard that includes anadvertisement with a text string that reads “WINCHESTER MYSTERY HOUSE.”The identification module 504 identifies the text string, and a positionof the text string in the presentation, and generates and causes displayof a text field at the location of the text string (overlaid on top ofthe text string in the presentation of the image).

A user selects the text string and provides inputs directly into thetext field to personalize the typography. The inputs may for exampleinclude: adding or deleting characters, changing colors of thetypography, changing a typeface of the typography, translating thetypography into a different language (e.g., English to Chinese), andchanging a size of the typography. For example, the user may change ordelete one or more characters of the text string (“WINCHESTER MYSTERYHOUSE”) such that the presentation displays the text string as“WINCHESTER MYSTERY MOUSE.” or anything else.

In some example embodiments, the typography personalization system 124may identify and alter a presentation that includes the occurrence oftypography, in response to the identification module 504 detecting theoccurrence of typography based on attributes of the typography (e.g., aset of characters, a typeface, a color, an image among the characters, alogo, etc.). For example, a user may generate a personalization requestthat alters all occurrences of the word “EXIT” detected by theidentification module 504, in real-time.

In further embodiments, the user may attach the personalization requestto a message, wherein the message is deliverable to one or more clientdevices (e.g., a recipient), and the recipients of the message maysimilarly alter presentations of images that include the occurrence oftypography of the personalization request. For example, thepersonalization request may be tagged to a specific word or phrase, suchthat when the identification module 504 detects the word or phrase, thepresentation module 502 alters the presentation based on thepersonalization request.

In further embodiments, the personalization may be tied to a specificoccurrence of typograph (e.g., a word or phrase), and a creator of thepersonalization request may alter the personalization request, such thatpresentations of the occurrence of typography displayed at recipientdevices are altered in real time. For example, a creating user maycreate a personalization request for occurrences of the word “STOP,” andtransmit the personalization request to a recipient. As the creatinguser alter the personalization request, displays of the word “STOP” atthe recipient device may be altered by the presentation module 502, inreal-time.

FIG. 7 is a diagram illustrating various operations of the typographypersonalization system 124 in performing a method 700 for altering apresentation of an occurrence of typography at a client device based ona personalization request, according to certain example embodiments.Operations of the method 700 may be performed by the modules describedabove with respect to FIG. 5. As shown in FIG. 7, the method 700includes one or more operations 702, 704, 706, and 708 that may beperformed as part (e.g., a precursor task, a subroutine, or a portion)of the method 600, according to some example embodiments.

Operation 702 may be performed by the identification module 504. Atoperation 702, the identification module 504 retrieves location data ofthe physical location depicted by the image. For example, theidentification module 504 may retrieve geolocation coordinates from theclient device 102 in response to causing display of the image within thepresentation at the client device 102. In some example embodiments, theidentification module 504 may parse image data of the image to retrieveimage metadata indicating a location in which the image was captured.

Operations 704 may be performed by the presentation module 502. Atoperation 704, the presentation module 502 geo-tags the personalizationrequest received at operation 608 of FIG. 6 with the geolocationcoordinates of the location depicted in the image. For example, bygeo-tagging the personalization request, the typography personalizationsystem 124 may apply the personalization request received from theclient device 102 (e.g., a first client device) to presentations ofimages that include the occurrence of typography and location dataindicating the location at other client devices (e.g., a second clientdevice).

At operation 706, the identification module 504 detects a second clientdevice at the physical location. For example, the typographypersonalization system 124 may generate and maintain a geofence thatencompasses the location identified by the location data of the image,in response to geotagging the image with the personalization request. Ageofence is a virtual geographic boundary, defined by Global PositioningSystems (GPS), WiFi, Radio-Frequency Identification (RFID), or Cellularsystems, that enables systems to trigger a response when a device isdetecting in proximity with, or transgressing a boundary of thegeofence. A second client device may transgress a boundary of a geofencethat encompasses the location and in response the identification module504 may identify the second client device. In further embodiments, thepresentation module 502 may receive an indication that the second clientdevice has captured an image depicting the location to generate andcause display of a presentation of the image at the second clientdevice.

In some example embodiments, the identification module 504 accesses auser profile associated with a user of the second client device toretrieve user profile data, in response to detecting the second clientdevice at the physical location. For example, the user profile of theuser may include user profile information including a name and username,as well as demographics details and other associated user profileinformation (e.g., “likes,” purchase behavior, a friend list, etc.).

Operation 708 may be performed by the presentation module 502. Atoperation 708, the presentation module 502 personalizes the presentationof the image captured by the second client device in response todetecting the second client device at the location. For example, theimage may include the occurrence of typography referenced by thepersonalization request. In response to detecting the second clientdevice at the location, and causing display of the presentation of theimage, the presentation module 502 may personalize the occurrence oftypography within the presentation based on the personalization request.

In some example embodiments, the presentation module 502 may personalizethe presentation of the image based on the user profile data of the userassociated with the client device. For example, the presentation module502 may replace a text string in the image with a new text string basedon user profile data of the user, such as a name of the user.

In some example embodiments, the personalization request may includeaccess or viewing credentials that include user authorization criteria.For example, the personalization request may include a set of useridentifiers, such that the typography personalization system 124 onlypersonalizes presentation of an occurrence of typography based on thepersonalization request of users identified by the user identifiers inthe personalization request.

FIG. 8A is a representation 800A of an image 802 that includes adepiction of an occurrence of typography 804A, according to certainexample embodiments. As discussed in FIG. 6, a user of a client device102 may capture the image 802, and the identification module 504identifies the occurrence of typography 804A. The image 802 may includemetadata such as geolocation coordinates, temporal components (e.g., atimestamp), as well as an identifier of a source of the image (e.g.,client device 102).

As discussed in operation 604 of FIG. 6, the presentation module 502causes display of a presentation of the image 802. The presentation ofthe image 802 may be displayed within a graphical user interfacepresented at the client device 102. The image 802 may depict a physicallocation (e.g., a road with a sign), wherein the physical locationincludes one or more occurrences of typography (e.g., the occurrence oftypography 804A).

FIG. 8B is a representation 800B of the image 802, that includes apersonalized occurrence of typography 804B, according to certain exampleembodiments. Operations 608 and 610 may be performed by the presentationmodule 502. As discussed in FIG. 6, the presentation module 502 receivesa personalization request to alter or edit elements within the image 802including the occurrence of typograph 804A. For example, thepersonalization request may include a request to alter one or morecharacters in the occurrence of typography 804A (e.g., change the “O” instop to an “AH”). In response to receiving the request, the featuretracking module 506 generates and causes display of a text field toreceive changes (e.g., deletions and additions) to the occurrence oftypography 804A, and the presentation module 502 updates thepresentation of the occurrence of typography 804A to display thepersonalized occurrence of typography 804B, based on the personalizationrequest. As the user of the client device 102 changes perspectives, thefeature tracking module 506 maintains the relative position of thepersonalized occurrence of typography 804B based on one or more featurestracked by the feature tracking module 506.

In some example embodiments, the personalization request from the usermay include a request to change a color or pattern of the stop signdepicted in the image 802. For example, the user may select the stopsign in the image 802, and in response, the identification module 504may identify boundaries of the stop sign based on features of the image802 in response to receiving the selection of the stop sign. Forexample, the identification module 504 may apply feature identificationtechniques to determine boundaries of the stop sign based on contrastingcolors, or changes in pattern or texture. Upon detecting the boundariesof the stop sign, the typography personalization system 124 may promptthe user to specify a color or pattern in which to add to the stop sign.The user may thereby specify a new color (e.g., green), or in someembodiments, may select an image or pattern from a data repository,which the presentation module 502 may thereby apply to the background ofthe stop sign of the image 802.

FIG. 9A is a representation 900A of an image 902 that includes featuressuch as an occurrence of typography 912, a background 910, and an imageof a face 906A, according to certain example embodiments. As discussedin FIG. 6, a user of a client device 102 may capture the image 902, andthe identification module 504 identifies the one or more features of theimage 902 based on image recognition techniques. The image 902 mayadditionally include metadata such as geolocation coordinates, temporalcomponents (e.g., a timestamp), as well as an identifier of a source ofthe image (e.g., client device 102).

As discussed in operation 604 of FIG. 6, the presentation module 502causes display of a presentation of the image 902 at a client device102. The presentation of the image 902 may be displayed within agraphical user interface presented at the client device 102. The image902 may depict a physical location (e.g., a billboard).

FIG. 9B is a representation 900B of the image 902, personalized based ona personalization request received from a user of the client device 102.As discussed in FIG. 6, the presentation module 502 receives apersonalization request to alter or edit elements within the image 902including features such as the background 910. For example, thepersonalization request may include a request to change the background910 from a first color to a second color (e.g., from red to green), orto replace the background 910 with a pattern retrieved from a repositoryassociated with the client device 102. For example, in response toselecting the background 910 of the image 902, the personalizationsystem 124 may prompt the user to select a color or pattern to replacethe background 910. The user may thereby select a color or pattern fromamong a selection of colors and patterns, retrieved from a database(e.g., database 120).

In some example embodiments, the personalization request may include arequest to “face-swap” the face 906A of FIG. 9A to a face 906B, asdepicted in FIG. 9B. For example, in response to receiving a selectionof the face 906A of FIG. 9A, the identification module 504 may determinethat 906A is a depiction of a face, and in response prompt the user toselect another face from among a selection of faces to face-swap. Theselection of faces may be retrieved from a database 120, wherein thedatabase 120 may be populated with images captured by the user on theclient device 102, or in some example embodiments may include facesretrieved from a third party network. The user may select a face e.g.,906B), and in response, the presentation module 502 may cause display ofthe face 906B in the location of the face 906A.

Software Architecture

FIG. 10 is a block diagram illustrating an example software architecture1006, which may be used in conjunction with various hardwarearchitectures herein described. FIG. 10 is a non-limiting example of asoftware architecture and it will be appreciated that many otherarchitectures may be implemented to facilitate the functionalitydescribed herein. The software architecture 1006 may execute on hardwaresuch as machine 1000 of FIG. 10 that includes, among other things,processors 1004, memory 1014, and I/O components 1018. A representativehardware layer 1052 is illustrated and can represent, for example, themachine 1000 of FIG. 10. The representative hardware layer 1052 includesa processing unit 1054 having associated executable instructions 1004.Executable instructions 1004 represent the executable instructions ofthe software architecture 1006, including implementation of the methods,components and so forth described herein. The hardware layer 1052 alsoincludes memory and/or storage modules memory/storage 1056, which alsohave executable instructions 1004. The hardware layer 1052 may alsocomprise other hardware 1058.

In the example architecture of FIG. 10, the software architecture 1006may be conceptualized as a stack of layers where each layer providesparticular functionality. For example, the software architecture 1006may include layers such as an operating system 1002, libraries 1020,applications 1016 and a presentation layer 1014. Operationally, theapplications 1016 and/or other components within the layers may invokeapplication programming interface (API) API calls 1008 through thesoftware stack and receive a response as in response to the API calls1008. The layers illustrated are representative in nature and not allsoftware architectures have all layers. For example, some mobile orspecial purpose operating systems may not provide aframeworks/middleware 1018, while others may provide such a layer. Othersoftware architectures may include additional or different layers.

The operating system 1002 may manage hardware resources and providecommon services. The operating system 1002 may include, for example, akernel 1022, services 1024 and drivers 1026. The kernel 1022 may act asan abstraction layer between the hardware and the other software layers.For example, the kernel 1022 may be responsible for memory management,processor management (e.g., scheduling), component management,networking, security settings, and so on. The services 1024 may provideother common services for the other software layers. The drivers 1026are responsible for controlling or interfacing with the underlyinghardware. For instance, the drivers 1026 include display drivers, cameradrivers, Bluetooth® drivers, flash memory drivers, serial communicationdrivers (e.g., Universal Serial Bus (USB) drivers). Wi-Fi® drivers,audio drivers, power management drivers, and so forth depending on thehardware configuration.

The libraries 1020 provide a common infrastructure that is used by theapplications 1016 and/or other components and/or layers. The libraries1020 provide functionality that allows other software components toperform tasks in an easier fashion than to interface directly with theunderlying operating system 1002 functionality (e.g., kernel 1022,services 1024 and/or drivers 1026). The libraries 1020 may includesystem libraries 1044 (e.g., C standard library) that may providefunctions such as memory allocation functions, string manipulationfunctions, mathematical functions, and the like. In addition, thelibraries 1020 may include API libraries 1046 such as media libraries(e.g., libraries to support presentation and manipulation of variousmedia format such as MPREG4, H.264, MP3, AAC, AMR, JPG, PNG), graphicslibraries (e.g., an OpenGL framework that may be used to render 2D and3D in a graphic content on a display), database libraries (e.g., SQLitethat may provide various relational database functions), web libraries(e.g., WebKit that may provide web browsing functionality), and thelike. The libraries 1020 may also include a wide variety of otherlibraries 1048 to provide many other APIs to the applications 1016 andother software components/modules.

The frameworks/middleware 1018 (also sometimes referred to asmiddleware) provide a higher-level common infrastructure that may beused by the applications 1016 and/or other software components/modules.For example, the frameworks/middleware 1018 may provide various graphicuser interface (GUI) functions, high-level resource management,high-level location services, and so forth. The frameworks/middleware1018 may provide a broad spectrum of other APIs that may be utilized bythe applications 1016 and/or other software components/modules, some ofwhich may be specific to a particular operating system 1002 or platform.

The applications 1016 include built-in applications 1038 and/orthird-party applications 1040. Examples of representative built-inapplications 1038 may include, but are not limited to, a contactsapplication, a browser application, a book reader application, alocation application, a media application, a messaging application,and/or a game application. Third-party applications 1040 may include anapplication developed using the ANDROID™ or IOS™ software developmentkit (SDK) by an entity other than the vendor of the particular platform,and may be mobile software running on a mobile operating system such asIOS™, ANDROID™, WINDOWS™ Phone, or other mobile operating systems. Thethird-party applications 1040 may invoke the API calls 1008 provided bythe mobile operating system (such as operating system 1002) tofacilitate functionality described herein.

The applications 1016 may use built in operating system functions (e.g.,kernel 1022, services 1024 and/or drivers 1026), libraries 1020, andframeworks/middleware 1018 to create user interfaces to interact withusers of the system. Alternatively, or additionally, in some systemsinteractions with a user may occur through a presentation layer, such aspresentation layer 1014. In these systems, the application/component“logic” can be separated from the aspects of the application/componentthat interact with a user.

FIG. 11 is a block diagram illustrating components of a machine 1100,according to some example embodiments, able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform any one or more of the methodologies discussed herein.Specifically, FIG. 11 shows a diagrammatic representation of the machine1100 in the example form of a computer system, within which instructions1110 (e.g., software, a program, an application, an applet, an app, orother executable code) for causing the machine 1100 to perform any oneor more of the methodologies discussed herein may be executed. As such,the instructions 1110 may be used to implement modules or componentsdescribed herein. The instructions 1110 transform the general,non-programmed machine 1100 into a particular machine 1100 programmed tocarry out the described and illustrated functions in the mannerdescribed. In alternative embodiments, the machine 1100 operates as astandalone device or may be coupled (e.g., networked) to other machines.In a networked deployment, the machine 1100 may operate in the capacityof a server machine or a client machine in a server-client networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment. The machine 1100 may comprise, but not be limitedto, a server computer, a client computer, a personal computer (PC), atablet computer, a laptop computer, a netbook, a set-top box (STB), apersonal digital assistant (PDA), an entertainment media system, acellular telephone, a smart phone, a mobile device, a wearable device(e.g., a smart watch), a smart home device (e.g., a smart appliance),other smart devices, a web appliance, a network router, a networkswitch, a network bridge, or any machine capable of executing theinstructions 1110, sequentially or otherwise, that specify actions to betaken by machine 1100. Further, while only a single machine 1100 isillustrated, the term “machine” shall also be taken to include acollection of machines that individually or jointly execute theinstructions 1110 to perform any one or more of the methodologiesdiscussed herein.

The machine 1100 may include processors 1104, memory memory/storage1106, and I/O components 1118, which may be configured to communicatewith each other such as via a bus 1102. The memory/storage 1106 mayinclude a memory 1114, such as a main memory, or other memory storage,and a storage unit 1116, both accessible to the processors 1104 such asvia the bus 1102. The storage unit 1116 and memory 1114 store theinstructions 1110 embodying any one or more of the methodologies orfunctions described herein. The instructions 1110 may also reside,completely or partially, within the memory 1114, within the storage unit1116, within at least one of the processors 1104 (e.g., within theprocessor's cache memory), or any suitable combination thereof, duringexecution thereof by the machine 1100. Accordingly, the memory 1114, thestorage unit 1116, and the memory of processors 1104 are examples ofmachine-readable media.

The I/O components 1118 may include a wide variety of components toreceive input, provide output, produce output, transmit information,exchange information, capture measurements, and so on. The specific I/Ocomponents 1118 that are included in a particular machine 1100 willdepend on the type of machine. For example, portable machines such asmobile phones will likely include a touch input device or other suchinput mechanisms, while a headless server machine will likely notinclude such a touch input device. It will be appreciated that the I/Ocomponents 1118 may include many other components that are not shown inFIG. 11. The I/O components 1118 are grouped according to functionalitymerely for simplifying the following discussion and the grouping is inno way limiting. In various example embodiments, the I/O components 1118may include output components 1126 and input components 1128. The outputcomponents 1126 may include visual components (e.g., a display such as aplasma display panel (PDP), a light emitting diode (LED) display, aliquid crystal display (LCD), a projector, or a cathode ray tube (CRT)),acoustic components (e.g., speakers), haptic components (e.g., avibratory motor, resistance mechanisms), other signal generators, and soforth. The input components 1128 may include alphanumeric inputcomponents (e.g., a keyboard, a touch screen configured to receivealphanumeric input, a photo-optical keyboard, or other alphanumericinput components), point based input components (e.g., a mouse, atouchpad, a trackball, a joystick, a motion sensor, or other pointinginstrument), tactile input components (e.g., a physical button, a touchscreen that provides location and/or force of touches or touch gestures,or other tactile input components), audio input components (e.g., amicrophone), and the like.

In further example embodiments, the I/O components 1118 may includebiometric components 1130, motion components 1134, environmentalenvironment components 1136, or position components 1138 among a widearray of other components. For example, the biometric components 1130may include components to detect expressions (e.g., hand expressions,facial expressions, vocal expressions, body gestures, or eye tracking),measure biosignals (e.g., blood pressure, heart rate, body temperature,perspiration, or brain waves), identify a person (e.g., voiceidentification, retinal identification, facial identification,fingerprint identification, or electroencephalogram basedidentification), and the like. The motion components 1134 may includeacceleration sensor components (e.g., accelerometer), gravitation sensorcomponents, rotation sensor components (e.g., gyroscope), and so forth.The environment components 1136 may include, for example, illuminationsensor components (e.g., photometer), temperature sensor components(e.g., one or more thermometer that detect ambient temperature),humidity sensor components, pressure sensor components (e.g.,barometer), acoustic sensor components (e.g., one or more microphonesthat detect background noise), proximity sensor components (e.g.,infrared sensors that detect nearby objects), gas sensors (e.g., gasdetection sensors to detection concentrations of hazardous gases forsafety or to measure pollutants in the atmosphere), or other componentsthat may provide indications, measurements, or signals corresponding toa surrounding physical environment. The position components 1138 mayinclude location sensor components (e.g., a Global Position system (GPS)receiver component), altitude sensor components (e.g., altimeters orbarometers that detect air pressure from which altitude may be derived),orientation sensor components (e.g., magnetometers), and the like.

Communication may be implemented using a wide variety of technologies.The I/O components 1118 may include communication components 1140operable to couple the machine 1100 to a network 1132 or devices 1120via coupling 1122 and coupling 1124 respectively. For example, thecommunication components 1140 may include a network interface componentor other suitable device to interface with the network 1132. In furtherexamples, communication components 1140 may include wired communicationcomponents, wireless communication components, cellular communicationcomponents, Near Field Communication (NFC) components. Bluetooth®components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and othercommunication components to provide communication via other modalities.The devices 1120 may be another machine or any of a wide variety ofperipheral devices (e.g., a peripheral device coupled via a UniversalSerial Bus (USB)).

Moreover, the communication components 1140 may detect identifiers orinclude components operable to detect identifiers. For example, thecommunication components 1140 may include Radio Frequency Identification(RFID) tag reader components, NFC smart tag detection components,optical reader components (e.g., an optical sensor to detectone-dimensional bar codes such as Universal Product Code (UPC) bar code,multi-dimensional bar codes such as Quick Response (QR) code. Azteccode, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code. UCC RSS-2Dbar code, and other optical codes), or acoustic detection components(e.g., microphones to identify tagged audio signals). In addition, avariety of information may be derived via the communication components1140, such as, location via Internet Protocol (IP) geo-location,location via Wi-Fi® signal triangulation, location via detecting a NFCbeacon signal that may indicate a particular location, and so forth.

GLOSSARY

“ANAMORPHOSIS” in this context refers to distortions and transformationsapplied to a media items such as images and videos, such that the mediaitems appear normal when viewed from a particular point or through asuitable viewing device, mirror, or lens.

“PERSPECTIVE” in this context refers to a viewing angle of a user at aparticular location.

“CARRIER SIGNAL” in this context refers to any intangible medium that iscapable of storing, encoding, or carrying instructions for execution bythe machine, and includes digital or analog communications signals orother intangible medium to facilitate communication of suchinstructions. Instructions may be transmitted or received over thenetwork using a transmission medium via a network interface device andusing any one of a number of well-known transfer protocols.

“CLIENT DEVICE” in this context refers to any machine that interfaces toa communications network to obtain resources from one or more serversystems or other client devices. A client device may be, but is notlimited to, a mobile phone, desktop computer, laptop, portable digitalassistants (PDAs), smart phones, tablets, ultra books, netbooks,laptops, multi-processor systems, microprocessor-based or programmableconsumer electronics, game consoles, set-top boxes, or any othercommunication device that a user may use to access a network.

“COMMUNICATIONS NETWORK” in this context refers to one or more portionsof a network that may be an ad hoc network, an intranet, an extranet, avirtual private network (VPN), a local area network (LAN), a wirelessLAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), ametropolitan area network (MAN), the Internet, a portion of theInternet, a portion of the Public Switched Telephone Network (PSTN), aplain old telephone service (POTS) network, a cellular telephonenetwork, a wireless network, a Wi-Fi® network, another type of network,or a combination of two or more such networks. For example, a network ora portion of a network may include a wireless or cellular network andthe coupling may be a Code Division Multiple Access (CDMA) connection, aGlobal System for Mobile communications (GSM) connection, or other typeof cellular or wireless coupling. In this example, the coupling mayimplement any of a variety of types of data transfer technology, such asSingle Carrier Radio Transmission Technology (1×RTT), Evolution-DataOptimized (EVDO) technology. General Packet Radio Service (GPRS)technology. Enhanced Data rates for GSM Evolution (EDGE) technology,third Generation Partnership Project (3GPP) including 3G, fourthgeneration wireless (4G) networks. Universal Mobile TelecommunicationsSystem (UMTS). High Speed Packet Access (HSPA). WorldwideInteroperability for Microwave Access (WiMAX). Long Term Evolution (LTE)standard, others defined by various standard setting organizations,other long range protocols, or other data transfer technology.

“EMPHEMERAL MESSAGE” in this context refers to a message that isaccessible for a time-limited duration. An ephemeral message may be atext, an image, a video and the like. The access time for the ephemeralmessage may be set by the message sender. Alternatively, the access timemay be a default setting or a setting specified by the recipient.Regardless of the setting technique, the message is transitory.

“MACHINE-READABLE MEDIUM” in this context refers to a component, deviceor other tangible media able to store instructions and data temporarilyor permanently and may include, but is not be limited to, random-accessmemory (RAM), read-only memory (ROM), buffer memory, flash memory,optical media, magnetic media, cache memory, other types of storage(e.g., Erasable Programmable Read-Only Memory (EEPROM)) and/or anysuitable combination thereof. The term “machine-readable medium” shouldbe taken to include a single medium or multiple media (e.g., acentralized or distributed database, or associated caches and servers)able to store instructions. The term “machine-readable medium” shallalso be taken to include any medium, or combination of multiple media,that is capable of storing instructions (e.g., code) for execution by amachine, such that the instructions, when executed by one or moreprocessors of the machine, cause the machine to perform any one or moreof the methodologies described herein. Accordingly, a “machine-readablemedium” refers to a single storage apparatus or device, as well as“cloud-based” storage systems or storage networks that include multiplestorage apparatus or devices. The term “machine-readable medium”excludes signals per se.

“COMPONENT” in this context refers to a device, physical entity or logichaving boundaries defined by function or subroutine calls, branchpoints, application program interfaces (APIs), or other technologiesthat provide for the partitioning or modularization of particularprocessing or control functions. Components may be combined via theirinterfaces with other components to carry out a machine process. Acomponent may be a packaged functional hardware unit designed for usewith other components and a part of a program that usually performs aparticular function of related functions. Components may constituteeither software components (e.g., code embodied on a machine-readablemedium) or hardware components. A “hardware component” is a tangibleunit capable of performing certain operations and may be configured orarranged in a certain physical manner. In various example embodiments,one or more computer systems (e.g., a standalone computer system, aclient computer system, or a server computer system) or one or morehardware components of a computer system (e.g., a processor or a groupof processors) may be configured by software (e.g., an application orapplication portion) as a hardware component that operates to performcertain operations as described herein. A hardware component may also beimplemented mechanically, electronically, or any suitable combinationthereof. For example, a hardware component may include dedicatedcircuitry or logic that is permanently configured to perform certainoperations. A hardware component may be a special-purpose processor,such as a Field-Programmable Gate Array (FPGA) or an ApplicationSpecific Integrated Circuit (ASIC). A hardware component may alsoinclude programmable logic or circuitry that is temporarily configuredby software to perform certain operations. For example, a hardwarecomponent may include software executed by a general-purpose processoror other programmable processor. Once configured by such software,hardware components become specific machines (or specific components ofa machine) uniquely tailored to perform the configured functions and areno longer general-purpose processors. It will be appreciated that thedecision to implement a hardware component mechanically, in dedicatedand permanently configured circuitry, or in temporarily configuredcircuitry (e.g., configured by software) may be driven by cost and timeconsiderations. Accordingly, the phrase “hardware component” (or“hardware-implemented component”) should be understood to encompass atangible entity, be that an entity that is physically constructed,permanently configured (e.g., hardwired), or temporarily configured(e.g., programmed) to operate in a certain manner or to perform certainoperations described herein. Considering embodiments in which hardwarecomponents are temporarily configured (e.g., programmed), each of thehardware components need not be configured or instantiated at any oneinstance in time. For example, where a hardware component comprises ageneral-purpose processor configured by software to become aspecial-purpose processor, the general-purpose processor may beconfigured as respectively different special-purpose processors (e.g.,comprising different hardware components) at different times. Softwareaccordingly configures a particular processor or processors, forexample, to constitute a particular hardware component at one instanceof time and to constitute a different hardware component at a differentinstance of time. Hardware components can provide information to, andreceive information from, other hardware components. Accordingly, thedescribed hardware components may be regarded as being communicativelycoupled. Where multiple hardware components exist contemporaneously,communications may be achieved through signal transmission (e.g., overappropriate circuits and buses) between or among two or more of thehardware components. In embodiments in which multiple hardwarecomponents are configured or instantiated at different times,communications between such hardware components may be achieved, forexample, through the storage and retrieval of information in memorystructures to which the multiple hardware components have access. Forexample, one hardware component may perform an operation and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware component may then, at alater time, access the memory device to retrieve and process the storedoutput. Hardware components may also initiate communications with inputor output devices, and can operate on a resource (e.g., a collection ofinformation). The various operations of example methods described hereinmay be performed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implementedcomponents that operate to perform one or more operations or functionsdescribed herein. As used herein, “processor-implemented component”refers to a hardware component implemented using one or more processors.Similarly, the methods described herein may be at least partiallyprocessor-implemented, with a particular processor or processors beingan example of hardware. For example, at least some of the operations ofa method may be performed by one or more processors orprocessor-implemented components. Moreover, the one or more processorsmay also operate to support performance of the relevant operations in a“cloud computing” environment or as a “software as a service” (SaaS).For example, at least some of the operations may be performed by a groupof computers (as examples of machines including processors), with theseoperations being accessible via a network (e.g., the Internet) and viaone or more appropriate interfaces (e.g., an Application ProgramInterface (API)). The performance of certain of the operations may bedistributed among the processors, not only residing within a singlemachine, but deployed across a number of machines. In some exampleembodiments, the processors or processor-implemented components may belocated in a single geographic location (e.g., within a homeenvironment, an office environment, or a server farm). In other exampleembodiments, the processors or processor-implemented components may bedistributed across a number of geographic locations.

“PROCESSOR” in this context refers to any circuit or virtual circuit (aphysical circuit emulated by logic executing on an actual processor)that manipulates data values according to control signals (e.g.,“commands”. “op codes”, “machine code”, etc.) and which producescorresponding output signals that are applied to operate a machine. Aprocessor may, for example, be a Central Processing Unit (CPU), aReduced Instruction Set Computing (RISC) processor, a ComplexInstruction Set Computing (CISC) processor, a Graphics Processing Unit(GPU), a Digital Signal Processor (DSP), an Application SpecificIntegrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC)or any combination thereof. A processor may further be a multi-coreprocessor having two or more independent processors (sometimes referredto as “cores”) that may execute instructions contemporaneously.

“TIMESTAMP” in this context refers to a sequence of characters orencoded information identifying when a certain event occurred, forexample giving date and time of day, sometimes accurate to a smallfraction of a second.

What is claimed is:
 1. A method comprising: capturing an image at aclient device; detecting typography at a position of the image, thetypography comprising typography properties and a first text string thatcomprises a first string of characters; determining a location of theclient device; receiving a request to replace the first string ofcharacters of the first text string with the second string of charactersbased on the location of the client device; accessing a user profileassociated with a user of the client device in response to the request;retrieving a second string of characters from the user profile;detecting a shape of a surface based on at least the typographyproperties of the typography; generating a second text string based onthe second string of characters and the typography properties of thetypography; and causing display of a presentation of the image at theclient device based on at least the shape of the surface, thepresentation of the image including a display of the second text stringat the position of the typography in the image.
 2. The method of claim1, wherein the typography properties include a typeface, and the methodfurther comprises: generating the second text string based on at leastthe typeface of the first text string.
 3. The method of claim 2, whereinthe method further comprises: performing a comparison of the first textstring against a catalogue of characters based on the typeface of thefirst text string; identifying a distortion of the typography based onthe comparison; determining the shape of the surface of the typographybased on the distortion; and wherein the display of the second textstring at the position of the typography is based on the shape of thesurface.
 4. The method of claim 1, wherein the client device is a firstclient device, and the method further comprises: retrieving locationdata of the physical location depicted by the image; geo-tagging therequest to replace the first string of characters of the first textstring with the second string of characters; detecting a second clientdevice at the physical location; causing display of the presentation ofthe image at the second client device in response to the detecting thesecond client device at the physical location, wherein the presentationof the image includes the display of the second text string at theposition of the typography in the image.
 5. The method of claim 1,wherein the method further comprises: overlaying a text field over thetypography within the image at the client device, the text field havingdimensions based on at least the typography properties of thetypography; and wherein the receiving the request to replace the firststring of characters of the first text string with the second string ofcharacters includes receiving a user input that includes the secondstring of characters into the text field.
 6. The method of claim 1,wherein the client device is a first client device associated with afirst user account, and the causing display of the display of the secondtext string at the position of the typography in the image at the firstclient device includes: receiving the second string of characters from asecond client device, the second client device associated with a seconduser account; assigning the second string of characters a set oflocation coordinates that identify the position of the typography withina database; detecting the first client device at the location;determining the first user account is a social network connection of thesecond user account; and retrieving the second string of characters fromthe database in response to the detecting the first client device at thelocation and the determining that the first user account is the socialnetwork connection of the second user account.
 7. A system comprising; amemory; and at least one hardware processor coupled to the memory andcomprising instructions that cause the system to perform operationscomprising: capturing an image at a client device; detecting typographyat a position of the image, the typography comprising typographyproperties and a first text string that comprises a first string ofcharacters; determining a location of the client device; receiving arequest to replace the first string of characters of the first textstring with the second string of characters based on the location of theclient device; accessing a user profile associated with a user of theclient device in response to the request; retrieving a second string ofcharacters from the user profile; detecting a shape of a surface basedon at least the typography properties of the typography; generating asecond text string based on the second string of characters and thetypography properties of the typography; and causing display of apresentation of the image at the client device based on at least theshape of the surface, the presentation of the image including a displayof the second text string at the position of the typography in theimage.
 8. The system of claim 7, wherein the typography propertiesinclude a typeface, and the operations further comprise: generating thesecond text string based on at least the typeface of the first textstring.
 9. The system of claim 8, wherein the operations furthercomprise: performing a comparison of the first text string against acatalogue of characters based on the typeface of the first text string;identifying a distortion of the typography based on the comparison;determining the shape of the surface of the typography based on thedistortion; and wherein the display of the second text string at theposition of the typography is based on the shape of the surface.
 10. Thesystem of claim 7, wherein the client device is a first client device,and the operations further comprise: retrieving location data of thephysical location depicted by the image; geo-tagging the request toreplace the first string of characters of the first text string with thesecond string of characters; detecting a second client device at thephysical location; causing display of the presentation of the image atthe second client device in response to the detecting the second clientdevice at the physical location, wherein the presentation of the imageincludes the display of the second text string at the position of thetypography in the image.
 11. The system of claim 7, wherein theoperations further comprise: overlaying a text field over the typographywithin the image at the client device, the text field having dimensionsbased on at least the typography properties of the typography; andwherein the receiving the request to replace the first string ofcharacters of the first text string with the second string of charactersincludes receiving a user input that includes the second string ofcharacters into the text field.
 12. The system of claim 7, wherein theclient device is a first client device associated with a first useraccount, and the causing display of the display of the second textstring at the position of the typography in the image at the firstclient device includes: receiving the second string of characters from asecond client device, the second client device associated with a seconduser account; assigning the second string of characters a set oflocation coordinates that identity the position of the typography withina database; detecting the first client device at the location;determining the first user account is a social network connection of thesecond user account; and retrieving the second string of characters fromthe database in response to the detecting the first client device at thelocation and the determining that the first user account is the socialnetwork connection of the second user account.
 13. A non-transitorymachine-readable storage medium comprising instructions that, whenexecuted by one or more processors of a machine, cause the machine toperform operations including: capturing an image at a client device;detecting typography at a position of the image, the typographycomprising typography properties and a first text string that comprisesa first string of characters; determining a location of the clientdevice; receiving a request to replace the first string of characters ofthe first text string with the second string of characters based on thelocation of the client device; accessing a user profile associated witha user of the client device in response to the request; retrieving asecond string of characters from the user profile; detecting a shape ofa surface based on at least the typography properties of the typography;generating a second text string based on the second string of charactersand the typography properties of the typography; and causing display ofa presentation of the image at the client device based on at least theshape of the surface, the presentation of the image including a displayof the second text string at the position of the typography in theimage.
 14. The non-transitory machine-readable storage medium of claim13, wherein the typography properties include a typeface, and theoperations further comprise: generating the second text string based onat least the typeface of the first text string.
 15. The non-transitorymachine-readable storage medium of claim 14, wherein the operationsfurther comprise: performing a comparison of the first text stringagainst a catalogue of characters based on the typeface of the firsttext string; identifying a distortion of the typography based on thecomparison; determining the shape of the surface of the typography basedon the distortion; and wherein the display of the second text string atthe position of the typography is based on the shape of the surface. 16.The non-transitory machine-readable storage medium of claim 15, whereinthe client device is a first client device, and the operations furthercomprise: retrieving location data of the physical location depicted bythe image; geo-tagging the request to replace the first string ofcharacters of the first text string with the second string ofcharacters; detecting a second client device at the physical location;causing display of the presentation of the image at the second clientdevice in response to the detecting the second client device at thephysical location, wherein the presentation of the image includes thedisplay of the second text string at the position of the typography inthe image.
 17. The non-transitory machine-readable storage medium ofclaim 13, wherein the operations further comprise: overlaying a textfield over the typography within the image at the client device, thetext field having dimensions based on at least the typography propertiesof the typography; and wherein the receiving the request to replace thefirst string of characters of the first text string with the secondstring of characters includes receiving a user input that includes thesecond string of characters into the text field.