Systems and methods for image enhancement

ABSTRACT

A method for automatically enhancing an image from a device includes obtaining a first image using an imaging device. Recognition software is configured to recognize an object or individual in the first image. An initial image profile is configured based on the first image. Editing software is used to edit at least one attribute of the initial image profile. At least one subsequent image is taken or received. The recognition software is used to recognize the object or individual in the at least one subsequent image. The at least one attribute of the at least one subsequent image is automatically edited based on the initial image profile.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.16/488,839, filed on Aug. 26, 2019, now U.S. Pat. No. 11,514,558, whichis a National Stage Application of International Application No.PCT/US2018/016691, filed on Feb. 2, 2018, which claims priority to, andthe benefit of U.S. Provisional Patent Application No. 62/453,790, filedon Feb. 2, 2017. The entire contents of all of the foregoingapplications are hereby incorporated by reference herein.

BACKGROUND

Every day, millions of people worldwide capture, store, and sharedigital images with one another. Many of these images show at least aportion of a person, such as their face. For a variety of reasons, theperson may wish to have the image of their face enhanced. For instance,the person may wish to have the image of his/her face enhanced to removea blemish, beauty mark, tattoo or other non-desirable feature. In viewof the foregoing, the present disclosure relates to systems and methodsfor image enhancement, image alteration and/or otherwise imagemodification.

SUMMARY

In accordance with an aspect of the present disclosure, a method forautomatically enhancing an image from a device is described. The methodincludes obtaining a first image using an imaging device. Recognitionsoftware is utilized to recognize an object or individual in the firstimage. An initial image profile is configured based on the first image.Editing software is used to edit at least one attribute of the initialimage profile. At least one subsequent image is taken or received. Therecognition software is utilized to recognize the object or individualin the at least one subsequent image. The at least one attribute of theat least one subsequent image is automatically edited based on theinitial image profile.

In another aspect of the present disclosure, the at least one attributeis selected from the group consisting of facial jewelry, tattoos, scars,acne, wrinkles, hair, piercings, facial features, body features, andhairstyle.

In yet another aspect of the present disclosure, the at least oneattribute is eliminated from the at least one subsequent image.

In still another aspect herein, the at least one attribute is added orotherwise modified to the at least one subsequent image.

In another aspect, the recognition software recognizes an individual andthe editing software creates a personal user profile.

In still a further aspect, the personal user profile is saved on theimaging device.

In a further aspect of the present disclosure, the personal user profileis transferrable to another device selected from the group consisting ofimaging devices, computers, servers, smart phones, tablets, and gamingsystems.

In yet another aspect, the subsequent images are received from anotherimaging device.

In another aspect of the present disclosure, the subsequent images areautomatically edited and the edited images are transferred to adifferent imaging device.

In yet another aspect of the present disclosure, the subsequent imagesare received from another imaging device, automatically edited and theedited images are transferred to a different imaging device.

In still another aspect herein, the initial image profile is selectivelyeditable using the editing software to create a subsequent image profilethat is selectively transferrable to another imaging device.

In another aspect, the initial image profile or a subsequent imageprofile is transferrable to a different imaging device.

In still a further aspect, the different imaging device receives thesubsequent image profile and uses recognition software to recognize theobject or individual in at least one subsequent image and the differentimaging device automatically edits the at least one attribute of the atleast one subsequent image based on the received subsequent imageprofile.

In a further aspect of the present disclosure, the initial image profileor a subsequent image profile is transferrable to a server.

In yet another aspect, the server receives the subsequent image profileand uses recognition software to recognize the object or individual inat least one subsequent image and the server automatically edits the atleast one attribute of the at least one subsequent image based on thereceived subsequent image profile.

In another aspect of the present disclosure, the server transfers theedited at least one subsequent image to an imaging device.

In accordance with another aspect of the present disclosure, a methodfor automatically enhancing an image from a device is described. Themethod includes configuring recognition software to recognize an objector individual in an image. An image profile is configured based on theimage. Editing software is used to edit at least one attribute of theimage profile. At least one subsequent image is received. Therecognition software is used to recognize the object or individual inthe at least one subsequent image. The at least one attribute of the atleast one subsequent image is automatically edited based on the imageprofile.

In accordance with another aspect of the present disclosure, a methodfor automatically enhancing an image from a device is described. Themethod includes configuring recognition software to recognize an objectin an image. An image profile is configured to identify selectivelyconfigurable attributes of the image. Instructions relating to theselectively configurable attributes of the image are received from aserver. Editing software is used to edit the selectively configurableattributes of the image based on the received instructions to create adifferent image. The different image is transferred to an imagingdevice.

In another aspect of the present disclosure, the selectivelyconfigurable attributes are selected from a group consisting ofadvertising indicia, trademarks, logos, tattoos, piercings, clothing,facial features, and body features.

In accordance with another aspect of the present disclosure, a methodfor automatically enhancing an image from a device is described. Themethod includes configuring recognition software to recognize a personin an image. An image profile is configured to identify selectivelyconfigurable attributes of the person. Instructions relating to theselectively configurable attributes are received from a server. Editingsoftware is used to edit the selectively configurable attributes basedon the received instructions to create a different image. The differentimage is transferred to an imaging device.

In accordance with another aspect of the present disclosure, a methodfor automatically enhancing an image from a device is described. Themethod includes recognizing, using recognition software, anadvertisement in an image. An enhancement profile associated with theimage is retrieved. The enhancement profile indicates at least onemodification to be made to the image. The advertisement in the image ismodified based on the enhancement profile.

In another aspect of the present disclosure, modifications to theenhancement profile can be updated continually, daily, or weekly suchthat the advertisement in the image can be modified based uponadvertiser, advertisee or server provider preference.

In yet another aspect of the present disclosure, the advertisement ispresented on a billboard or marquee included in the image.

In still another aspect herein, the modifying the advertisement in theimage is performed repeatedly based on at least one of an elapsed amountof time since a prior modification of the image or an instance of theimage being accessed via a computing device.

In another aspect, the advertisement includes a logo and the modifyingthe advertisement in the image includes enhancing the logo.

In still a further aspect, the recognizing, retrieving, and modifyingare performed automatically as the image is communicated via a server.

In accordance with another aspect of the present disclosure, a methodfor automatically enhancing an image from a device is described. Themethod includes recognizing, using recognition software, a person in animage. An enhancement profile associated with the image is retrieved.The enhancement profile indicates at least one modification to be madeto the image. The image is modified to make the at least onemodification indicated in the enhancement profile. The person is aspokesperson for a brand and the at least one modification includesadding to the image an advertisement or logo for the brand.

In a further aspect of the present disclosure, the method furthercomprises storing a table that associates sponsors with brands,respectively, and matching the recognized person with one or moreassociated brands based on the table.

In yet another aspect, the recognizing, retrieving, and modifying areperformed automatically as the image is communicated via a server.

BRIEF DESCRIPTION OF THE DRAWINGS

Various aspects and features of the present systems and methods forimage enhancement are described herein below with references to thedrawings, wherein:

FIG. 1 is a schematic diagram of an illustrative system for imageenhancement, in accordance with an embodiment of the present disclosure;

FIG. 2 is a schematic block diagram of an illustrative embodiment of acomputing device that may be employed in various embodiments of thepresent information system, for instance, as part of the system orcomponents of FIG. 1 , in accordance with an embodiment of the presentdisclosure; and

FIG. 3 is a flowchart showing an illustrative method for imageenhancement, in accordance with an embodiment of the present disclosure.

DETAILED DESCRIPTION

The present disclosure is directed to systems and methods for imageenhancement and/or image modification. In one aspect, the systems andmethods of the present disclosure enable a user to generate a personalenhancement profile (sometimes referred to herein as a Phanity™profile), store the personal enhancement profile on his/her own device(such as a smartphone), a friend's device, a cloud storage platform, asocial media platform (such as Instagram®, Facebook®, Twitter®,Snapchat®, or the like), and enable the personal enhancement profile toautomatically enhance or modify one or more photographs taken from theuser's device, friend's device or any other device sending or receivingphotographs directly or through a server.

FIG. 1 is a schematic diagram of an illustrative system 100 for imageenhancement or modification, in accordance with an embodiment of thepresent disclosure. When used here herein the term “enhancement”includes modification, deletion, augmentation of a photograph. Thesystem 100 includes one or more user devices 102, servers 104, secondaryuser devices 106, and cloud storages 108, and a communication network110 that communicatively couples the user devices 102 to the servers104, secondary user devices 106, and/or cloud storages 108. The userdevice 102 may be a smartphone, tablet, personal computer, or any othertype of personal computing device. In some embodiments, the user deviceincludes an image capturing device, such as a digital camera (not shownin FIG. 1 ), configured to capture images, such as images of the user.

The user device 102 includes an enhancement module 112, which in oneembodiment, is an application that, when executed on the user device102, generates a user interface via which a user may configure apersonal enhancement profile and utilize the personal enhancementprofile to enhance one or more images of the user, store the enhancedimage(s) on the user device 102, and/or communicate the enhanced imagesto the server(s) 104, secondary user device(s) 106, cloud storage(s)108, and/or another destination (not shown in FIG. 1 ). Detailsregarding an example method 300 that for enhancing images by utilizingthe system 100 are provided below in connection with FIG. 3 . AlthoughFIG. 1 depicts the enhancement module 112 as being included in the userdevice 102, in various embodiments, the enhancement module 112 may beadditionally or alternatively be included in one or more of the servers104, secondary user devices 106, and/or cloud storages 108, and/or maybe part of a standalone server (not separately shown in FIG. 1 ) coupledto the network 110 to enhance images streaming through the network 110.Additionally, in various embodiments, certain aspects of the enhancementmodule 112 may be enabled or disabled depending upon the amount ofavailable computing power of each user device 102, server 104 (e.g., aserver that handles the moving traffic of pictures from Instagram®,Facebook®, Twitter®, Snapchat®, and/or the like).

Although additional aspects of the enhancement module 112 are describedbelow in connection with FIG. 3 , the following is a brief summary ofvarious aspects of the enhancement module 112. The enhancement module112 is a mobile application (sometimes referred to as an app) or acomputer application that is downloadable and performs one or more ofthe following features: (1) sets up a user's personal enhancementprofile; (2) queues the user to take a picture or series of pictures andperforms a facial recognition algorithm based on various attributes,points of references of a person's face, facial geometries, spatial facerelationships (e.g., distances from nose to ear, mouth to ear, and/orthe like), which may be implemented by way of a commercially availablefacial recognition program or algorithm (or as they become available ordeveloped); (3) once the facial algorithm and recognition is completed,the enhancement module 112 assigns a UIN to the person and stores theUIN on the person's user device 102 or sends the UIN to one or moreservers 104 (e.g., an Instagram® server, a Facebook® server, and/or thelike); (4) the facial recognition software is utilized to identify theperson and the enhancement module 112 (either in a standalone manner orcombined as part of the facial software) enables the user to makeenhancements or deemphasize certain body portions.

In some aspects, each time a picture is taken with the person's userdevice 102, the UIN is sent along with the picture — either before orafter the person or persons in the picture are identified and thevarious attributes are enhanced, deemphasized, or otherwise modified.Again, the enhancement module 112 may perform the enhancements locally(on a person's device 102 or may perform the enhancements on a friend'sdevice 106, i.e., the friend that took the picture) or remotely (as thepicture is sent and moves through one or more of the servers 104 (e.g.,an Instagram® server, a Facebook® server), and/or the like).

In another example, the enhancement module 112 may provide a selfie modeof capturing images, in which case the captured image may be flagged asvery likely including an image of the person who owns the user device102. This may reduce computing burden placed on the user device 102. TheUIN may be flagged to alert the user's device 102 or the server 104 orthe friend's device 106 that a “selfie” image was captured to indicate ahigh likelihood that the user's image is captured in picture, therebyreducing the respective computing burdens placed on those devices aswell. Additionally, location services may be enabled on a user's devicesuch that if a photograph is being processed through a server or serverfarm, location services may be able to reduce the computing power neededhelp with the facial recognition of a user in a picture. This can beparticularly useful with picture of large groups and a large number ofpeople are utilizing a service according to the present disclosure.

In some aspects, raw images (images prior to being enhanced/modified)may also be stored on the user device 102, the friend's device 106, oron the server 104. For instance, the server 104 or local device 102 maystore original picture information for retrieval of the original pictureprior to any enhancements. In this manner, the user device 102, friend'sdevice 106, and/or server 104 may be configured to reverse enhancementsof images of any person or any group of people in any picture.

FIG. 2 is a schematic block diagram of a computing device 200 that maybe employed in accordance with various embodiments herein. Although notexplicitly shown in FIG. 1 , in some embodiments, the computing device200, or one or more of the components thereof, may further represent oneor more components of the system 100.

The computing device 200 may, in various embodiments, include one ormore memories 202, processors 204, display devices 206, networkinterfaces 208, input devices 210, and/or output modules 212. The memory202 includes non-transitory computer-readable storage media for storingdata and/or software that is executable by the processor 204 and whichcontrols the operation of the computing device 200. In embodiments, thememory 202 may include one or more solid-state storage devices such asflash memory chips. Alternatively, or in addition to the one or moresolid-state storage devices, the memory 202 may include one or more massstorage devices connected to the processor 404 through a mass storagecontroller (not shown in FIG. 2 ) and a communications bus (not shown inFIG. 2 ). Although the description of computer readable media containedherein refers to a solid-state storage, it should be appreciated bythose skilled in the art that computer-readable storage media can be anyavailable media that can be accessed by the processor 204. That is,computer readable storage media includes non-transitory, volatile andnon-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Examples of computer-readable storage media include RAM,ROM, EPROM, EEPROM, flash memory or other solid state memory technology,CD-ROM, DVD, Blu-Ray or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by computing device 200.

In some embodiments, the memory 202 stores data 214 and/or anapplication 216. In some aspects the application 216 includes a userinterface component 218 that, when executed by the processor 204, causesthe display device 206 to present a graphical user interface (GUI) (notshown in FIG. 2 ), such as a GUI of the enhancement module 112 (FIG. 1). The network interface 208, in some embodiments, is configured tocouple the computing device 200 and/or individual components thereof toa network, such as a wired network, a wireless network, a local areanetwork (LAN), a wide area network (WAN), a wireless mobile network, aBluetooth network, the Internet, and/or another type of network. Theinput device 210 may be any device by means of which a user may interactwith the computing device 200. Examples of the input device 210 includewithout limitation a mouse, a keyboard, a touch screen, a voiceinterface, and/or the like. The output module 212 may, in variousembodiments, include any connectivity port or bus, such as, for example,a parallel port, a serial port, a universal serial bus (USB), or anyother similar connectivity port known to those skilled in the art.

FIG. 3 is a flowchart showing an illustrative method 300 forenhancing/modifying one or more images by way of the image enhancementsystem 100 of FIG. 1 , in accordance with an embodiment of the presentdisclosure. At block 302, a personal enhancement profile is generated byway of a GUI provided by the enhancement module 112 via the user device102. The personal enhancement profile generally includes informationregarding certain types of visual adjustments the user wishes to be madeto digital images in which the user appears. Some example types offeatures that the enhancement module 112 may provide by way of thepersonal enhancement profile include, without limitation, (1)manipulation features (e.g., zoom, rotate, morph, edit, color, remove,add) to enable the user to make fine adjustments for wrinkles, pimples,scars, baggy eyes, hair color, weight (slenderizing software), de-aging,and/or the like; (2) an automatic feature that makes suggestedenhancements or deemphasizes certain areas; (3) removal from everypicture of certain types of items, such as piercings, tattoos, earrings,unwanted hair, hair length, and/or the like; (4) addition to everypicture of certain types of items, such as hair (bald spots), tattoos,earrings, teeth, wedding ring, and/or the like; (5) ability to customizebased on which group of people to which the photograph is being sent(e.g., when sending to parents, removing evidence of tattoos, earrings,piercings, and/or the like, or when posting to social sites, removing oradding features such as tattoos, piercings, hair loss, hair length,wedding rings, scars, pimples, weight, smoking articles, and/or thelike. As can be appreciated, some of the modifications relate tofeatures that are individual specific, pimple, scar, etc. while othermodifications can relate to features that are time specific, personsmoking cigarette or hair length, color or the day. The editing programmay differentiate these features between those that are automaticallyediting for each picture and those that may prompt the user if desired.

Once all enhancement/modifications are made, the enhancements are storedin a user's enhancement profile either locally (own device or user'sother devices), friend's device, or on the control server and associatedwith the user's UIN. Multiple enhancement profiles may be utilized andcustomized based on where the picture might be going, e.g., parents,work, posting on social media, etc. A person's UIN may includeadditional criteria or coding to facilitate this purpose. For example,the user may set up his/her UIN to modify all pictures going to parentsor work as to be highly modified or “whitewashed” whereas friend X canbe identified as only partially modified “whitewashed”. As can beappreciated, this enables a user to set up various levels ofmodification in advance of pictures being sent across the web or betweenfriends and once the user is facially identified the app automaticallymodifies the image based upon a user's present parameters.

At block 304, the personal enhancement profile is stored in a memory(not separately shown in FIG. 1 ) of the user device 102, or in anotherlocation, such as on the server(s) 104, secondary user device(s) 106,cloud storage(s) 108, and/or the like. In one example, each user'sdevice 102 may store that user's personal enhancement profile. In otherexamples, a personal enhancement profile of the user and/or acorresponding user identification number (UIN) may be communicated toone or more user devices 106 of the user's friends to enable theenhancement modules 112 of the friend's user device 106 to store thepersonal enhancement profiles of the user and use it to automaticallyenhance any images in which the user is identified. In this manner, whenthe friend takes a picture via his user device 106, the user device 106has the other user's personal enhancement profile in queue and, throughthe enhancement module 112 of the user device 106 software (or andfacial recognition software working with the enhancement module 112),the user device 106 will recognize the user in any picture taken fromthe friend's user device 106 and automatically adjust the image of theuser based on the user's own personal settings before the image is sentacross social networks or to another device to Instagram®, Facebook®,Instagram®, Twitter®, and/or another destination. In some examples, thisfunctionality is limited based upon computing power of each user device106, such as by limiting the number of friend personal enhancementprofiles based on the amount of memory available in the user device 106.Alternatively, the friend may simply store the user's personalenhancement profile with the unique identification number correspondingto the user, and, once the user is recognized by the friend's userdevice 106, or as the image moves through a control server such asserver 104, the user identification number is detected in the image andthe server 104 (e.g., Instagram® server, Facebook® server, and/or thelike) will make adjustments to the image when the image moves throughthe server 104 based on uploaded personal settings that were previouslystored or uploaded to the server. As can be appreciated, these settingscan be modified at any time. Alternatively, the friend's device maysimply store the user's UIN and every image sent will have the UINs ofall of the user's friends and as the image moves through server (e.g.,Instagram® server, Facebook® server, and/or the like), the server 104identifies the tagged UINs, performs facial recognition of the image andfor each user detected in the image, makes theenhancements/modifications based on the corresponding personalenhancement profiles of the various users as the image moves through theserver 104.

In yet another embodiment where the personal enhancement profile isstored on a server 104 (e.g., an Instagram® server, a Facebook® server,and/or the like), the server 104 stores the user's UIN and every picturesent via the server 104 will have the UIN as metadata and the server 104will perform facial recognition and, if the user is detected in thepicture, make the enhancements according to the personal enhancementprofile as the picture moves through the server 104. In this instance asin above, the various personal enhancement profiles may be modified atany time by the user(s) uploading his/her settings on the server. Groupsof UINs may be identified by the server 104 or uploaded from one or moreuser devices 104 along with all of the UINs from various friends of thegroup and, as the picture moves through control server (e.g., anInstagram® server, a Facebook® server, and/or the like), the server 104identifies the tagged UINs, performs facial recognition on the picture,and automatically adjusts the pictures in accordance with theappropriate personal enhancement profiles as the picture moves throughthe server 104. Again, this functionality may be limited based onavailable computing power of the server 104, but grouping will reducecomputer load. As mentioned elsewhere herein, a friend may have severalUINs stored on their user device 102 that are transmitted with everypicture, thereby facilitating the facial recognition by the server 104.Other known methods of reducing computer load are also envisioned, e.g.,as detailed bellow, location services may be utilized to limit thenumber of user's being searched at any one time.

In one embodiment, all UINs are stored on the server 104 (e.g., allInstagram® accounts may have respective UINs associated with eachaccount) and so that everyone is facially recognized and the picturesare automatically adjusted as all pictures move through the server 104.Such functionality may require a large amount of computing power,however various algorithms may be employed to reduce computer burden,e.g., grouping (as mentioned above) or geo-location algorithms. Forinstance, everyone having a “locatable” device (e.g., via a GPS system)that is within a predetermined range of miles (or feet or another unitof distance) of the picture taker's location is mapped and identified asa first query, and these people are identified as an initial group forfacial recognition programs, thereby reducing computer burden. As eachperson is identified, less computing power is needed. “Locatable”device, in this context, refers to a device having a feature that allowsthe device's location to be used by various programs.

In another aspect, a person taking a picture via the user device 102 mayhave the ability to tag people for the server 104 (analogous to afeature available in Facebook®) for assisting personal enhancementprofiling. As mentioned above, a person's own user device 102 taking apicture can perform facial recognition or have list of friends UINs toassist servers 104 in facial recognition of everyone in the picture. Theserver 104 may also have the ability to timeout if facial recognition isnot working or taking too long. As can be appreciated, variousalgorithms (such as those mentioned above) may be utilized to reducethis burden.

At block 306, an image (which may also be referred to as a photograph)is captured by way of a digital camera of the user device 102 or anotherimage capturing device, and a digital image file is generated based onthe captured image. Alternatively, and/or in addition, the image mayhave previously been captured and stored and may be obtained at block306 by retrieval from a memory of the user device 102, the server(s)104, secondary user device(s) 106, cloud storage(s) 108, and/or thelike.

At block 308, the enhancement module 112 identifies the user in theimage by any one of a variety of methods. For instance, the enhancementmodule 112 may identify a face of the user in the image by executing animage recognition algorithm using one or more reference images of theface of the user or one or more reference files includingcharacteristics that may be utilized to identify the face of the user inthe image. Alternatively, or in addition, the image may be previouslytagged with a user identifier, and at block 308 the enhancement module112 may identify the user in the image by comparing the user identifierwith which the image is tagged to user identifiers included in a storedtable of user identifiers. Additionally, although block 308 is describedas recognizing a single user, in various embodiments enhancement module112 may identify multiple users in the image at block 308. For instance,the enhancement module 112 may be configured to facially recognize theuser or owner of the user device 102 and/or friends of the user inpictures captured and/or stored on the user device 102 and may queue theuser's personal enhancement profile to automatically adjust the pictureaccording to the user's personal enhancement profile before sending thepicture to a destination from the user device 102. Additionally, theidentification at block 308 may be performed using facial recognitionsoftware, which may be local to the user device 102, located on afriend's device (e.g., secondary user device 106), and/or on one or morecontrol servers (e.g., servers 104). The facial recognition software maybe third party software working with the enhancement module 112 or aspart of the enhancement module 112 itself.

At block 310, for each of the users identified in the image at block308, the enhancement module 112 retrieves from a storage (e.g., a memory(not separately shown in FIG. 1 ) of the user device 102) the respectivepersonal enhancement profile(s) stored at block 304.

At block 312, the enhancement module 112 enhances the image based on thepersonal enhancement profiles retrieved at block 310. In this manner,once a person is recognized in the image, the enhancement module 112uses that person's personal enhancement profile to enhance the face (orother portion) of that person in the image according to that user'spreferences. As explained elsewhere herein, a unique UIN may be assignedto each user and utilized to facilitate this purpose. Example types ofenhancements that may be made at block 312 are described above. Once theenhancement module 112 recognizes the user (block 308), the image may beautomatically adjusted locally (on the user device 102 before it issent), on another user device 106 (e.g., a friend's device) before thefriend sends the image, or on one or more of the servers 104 as theimage moves through the server 104. At this point the image may be sentto another device or through a social media platform if desired or ifthe user opts for this level of automation. If the use desires morecontrol over the images, the user may opt for one or more furtheralgorithm features as explained below.

At block 314, a determination is made as to whether any additionalenhancements to the image are to be made. In some examples, theenhancement module 112 makes this determination by presenting an inquiryto the user via a GUI of via the user device 102 and receiving userinput via the GUI. In this manner, the determination at block 314 mayafford the user the opportunity to further enhance the image beforestoring or sending the image. Alternatively, and/or in addition, thedetermination at block 314 may be made to confirm or adjust the imageagain if too many enhancements or not enough enhancements have beenmade, prior to sending the image to a destination.

If it is determined at block 314 that additional enhancement to theimage is to be made (“YES” at block 314, then control passes to block316. At block 316, the enhancement module 112 enhances the image basedon the user input provided via the GUI of the user device 102. Controlthen passes back to block 314 to determine whether any additionalenhancements to the image are to be made. In this manner, theenhancement module 112 may enable the user to manually enhance aphotograph on the user device 102 prior to sending the photograph to adestination.

If it is determined at block 314 that no additional enhancement to theimage is to be made (“NO” at block 314, then control passes to block318. At block 318, the enhancement module 112 stores the enhanced image(the image enhanced at block 312 and/or block 316) in a storage (e.g., amemory of the user device 102 or in another storage) and/or communicatesthe enhanced image to one or more of the servers 104, secondary devices106 and/or cloud storages 108 via the network 110. In this manner, thesystem 100 enables the user to custom tailor an enhancement profile thatautomatically adjusts a photograph before it is sent, adjusts aphotograph on its way to a recipient (as it moves through a controlserver 104, for instance), or when it is received by a recipientutilizing the user's own user-created personal enhancement profile toreduce/add or otherwise modify, for example, noticeable hair loss,pimples, wrinkles, weight, teeth, hair color, teeth color, tattoos,scars, earrings, piercings, and/or the like.

At block 320, a determination is made as to whether any additionalimages are to be enhanced. In some examples, the enhancement module 112makes this determination by presenting an inquiry to the user via a GUIof via the user device 102 and receiving user input via the GUI. In thismanner, the determination at block 320 may afford the user theopportunity to enhance further images. If it is determined at block 320that an additional image is to be enhanced (“YES” at block 320, thencontrol passes to block 306 to capture or obtain an image in the mannerdescribed above. If it is determined at block 320 that no additionalimages are to be enhanced (“NO” at block 320, then control passes toblock 322.

At block 322, a determination is made as to whether any personalenhancement profiles are to be updated. In some examples, theenhancement module 112 makes this determination by presenting an inquiryto the user via a GUI of via the user device 102 and receiving userinput via the GUI. In this manner, the determination at block 322 mayafford the user the opportunity to update their personal enhancementprofile, for instance, based on any additional enhancements that weremade at block 316. If it is determined at block 322 that a personalenhancement profile is to be updated (“YES” at block 322, then controlpasses to block 302 to update the personal enhancement profile that waspreviously generated during a prior iteration of block 302 in the mannerdescribed above. Thus, the user can sample pictures and tweak theirenhancement profile as needed, and can easily adjust any enhancements asnecessary or as often as the user likes. If it is determined at block322 that no personal enhancement profile is to be updated (“NO” at block322, then the method 300 terminates.

Having described an example method for image enhancements in the contextof enhancing facial images of users, some additional example aspects ofthe system 100 are now described. In general, alternative embodimentsmay involve automatically detecting certain aspects of an image andautomatically modifying the image based on one or more rules orsettings, which may be configured by a user via the enhancement module112 of the user device 102. In one embodiment, the system 100 isconfigured to implement one or more advertising-related features. Forexample, the system 100 may enable an advertiser to change billboard adsor ads on buildings shown in the background of a captured image from anyimage being processed through a server or across a social media sitee.g., Instagram® server, Facebook® server, and/or the like. For example,as a personal image is taken and being processed across a social medialserver or across a social media site, various elements in the imagebackground may be identified, e.g., the famous billboard at NewYork—Times Square. These elements may be automatically identified (akinto facial recognition) and these images may be flagged for modification.For example, the owner of the billboard at Times Square may choose todisplay a newer or different image on the billboard each time the samepicture passes through the social media server, or the owner may opt torotate advertisements as the same or any image passes through thevarious servers. In this instance, the server farms may be able tocreate revenue by tracking these type of features (billboards, marquees,etc.) and the owners of the billboards, marquees and they like cangenerate additional review from each billboard long past the initialimage being taken and the advertisee can upload new images of newproducts or display a marquee or new ad at any time for future displayof future products long past the image being taken. As each image passacross the social network server, the new background image, marquee,trademark, ghost image is displayed.

In this manner, a person who owns a billboard can keep selling ad spaceeach time a picture comes across. In another aspect, the system 100 canenable an advertiser to control and change a particular ad based on thetime (or season, and/or the like) the image is displayed, such asdisplaying income tax-related ads during the season in which incometaxes are due.

There may also be a counter linked to the picture (e.g., by way ofmetadata) that limits the number of changes for a single picture, orpermits the picture to be enhanced an unlimited number of times.

Celebrities may also find the present disclosure useful in thwartingpaparazzi or creating additional revenue for his/her services. Forexample, a celebrity like Ryan Reynolds, may find it useful to beidentified in any picture streaming across social medial and being ableto control the content or dissemination of any photos. In other words,if he and his family are on vacation and someone takes a lewd picture ofhim or his family he may be able to subscribe to t service thatautomatically identifies him (and/or his family) and he is eithernotified or is able to create an automatic response to the image such asblocking out his face, the face of his kids, or simply placing a blackmarquee across the image with some sort of nice privacy statement.

On the other hand, other celebrities might want the publicity andencourage picture being taken of them. In this instance, thesecelebrities may want to capitalize on his/her image. For example, eachtime Beyonce's picture is taken, she is facially recognized andidentified. In this instance, if she is representing Coach® bags, everytime she is recognized in an image passing through the server, a coachlogo is automatically added to the image in some fashion. A marquee orghost image may also be utilized for this purpose. In this instance, thecelebrity, the advertiser and the server provider (social networkprovider) all reap revenue for every image. Moreover, celebrities mayopt to have a tattoo or piecing automatically added to each image inaccordance with the other aspects of this disclosure described above.Fake tattoos that are automatically added to each image are anothersource of celebrity revenue.

Obviously, the server site may have to revise its end user agreements toreflect this change with users but in theory the owner of any famousbackground image may utilize the concepts described herein for thispurpose.

Additionally, a forwarded picture can have a counter associatedtherewith (again using metadata, for instance) to keep track of how manytimes an image is shared, and optionally notify an originator of theimage when the image goes viral. This notification that the image isgoing viral may enable the owner or advertiser to afford them anopportunity to update or change the image as needed. A counter can alsobe used to automatically track the number of times an ad is changed orforwarded to obtain metrics for future sales on advertising medium(e.g., billboard).

In a further embodiment, the system 100 may be configured toautomatically identify in an image, and enhance, an advertising logo ina manner similar to that described above for identifying and enhancing afacial image. For instance, the system 100 may be configured such that,if there is a logo or trademark in a picture, the trademark isautomatically identified and it is enhanced or made clearer on a shirt,hat, and/or the like. As mentioned above, the system 100 may also enablea person to authorize the embedment of advertisements in their pictures.For example, a celebrity sponsor can automatically have certain logosembedded into images of them that are communicated via the network 110.A storeowner can have one of their store signs automatically embedded asa background in his pictures.

The system 100 may also be configured to automatically identify in animage, a billboard or storefront and load a new ad on the billboard orstorefront. In this manner, the system 100 may enable an advertiser tochange billboard ads or ads on buildings shown in the background of animage automatically and whenever they wish as the image passes through afarm of the servers 104. The system 100 may further automaticallyidentify in an image a person who is a celebrity or spokesperson for aproduct or service and then add to the image a banner or otheradvertisement for that product or service. An advertiser may also haveone of its billboards identified in picture or by a specific location(e.g., like the billboard located in times square in New York City) andthe owner can provide a different ad (or an ad can be placed oruploaded) each time the picture passes across a server 104 (e.g., aGoogle® server). Thus, for each photo from anyone that passes across theserver 104, the billboard is identified, and the owner of the billboardcan embed a different ad within each instance of the person's picture.Further, when a picture is presented, for instance, on Facebook®,Google®, a quick link may be automatically added to the bottom of thepicture for a fee. In other words, a clothing storeowner may beautomatically recognized in a photo, and an authorization can beprovided (automatically or manually) for a quick link (or banner) to beadded to the bottom of such photos. Additionally, trademarks or logos orclothing items may be automatically recognized in a picture and may beselectable (e.g., via a tap on a touchscreen of the user device 102) toenable someone to navigate to the website of that store.

In some embodiments as mentioned above, the system 100 is configured toadd to an image certain features, such as facial features, bodyfeatures, features of clothing, and/or arm tattoos. For instance, thesystem 100 may add logos to clothing items shown in an image in a casewhere the clothing item is recognized and the person wearing theclothing item is a celebrity sponsor. For example, a celebrity sponsormay be recognized and a clothing item recognized as well and thecelebrity sponsor and/or the brand of the clothing item may configurethe system 100 to automatically change the outfit, enhance the logo orplace a banner or an additional ad in the image as needed. Thisfunctionality may be configured to be fully automatic and may includethe ability to upload and change the image repeatedly and periodicallybased on time through server (e.g., on a minute, hourly, daily or yearlybasis). The system 100 may further have the ability to add features,such as mustache, make fatter, tattoos, facial hair, and/or the like,for anonymity, a celebrity who may have been caught in an image. Thesystem 100 may also be configured to eliminate facial hair, tattoos,earrings, pimples, scars, and/or the like, based on user device 102,friend's user device 106, and/or server 104 having that user's personalenhancement profile stored.

The embodiments disclosed herein are examples of the present systems,methods, and computer-readable media and may be embodied in variousforms. For instance, although certain embodiments herein are describedas separate embodiments, each of the embodiments herein may be combinedwith one or more of the other embodiments herein. Specific structuraland functional details disclosed herein are not to be interpreted aslimiting, but as a basis for the claims and as a representative basisfor teaching one skilled in the art to variously employ the presentinformation systems in virtually any appropriately detailed structure.Like reference numerals may refer to similar or identical elementsthroughout the description of the figures.

The phrases “in an embodiment,” “in embodiments,” “in some embodiments,”or “in other embodiments” may each refer to one or more of the same ordifferent embodiments in accordance with the present disclosure. Aphrase in the form “A or B” means “(A), (B), or (A and B).” A phrase inthe form “at least one of A, B, or C” means “(A); (B); (C); (A and B);(A and C); (B and C); or (A, B, and C).”

The systems and/or methods described herein may utilize one or morecontrollers to receive various information and transform the receivedinformation to generate an output. The controller may include any typeof computing device, computational circuit, or any type of processor orprocessing circuit capable of executing a series of instructions thatare stored in a memory. The controller may include multiple processorsand/or multicore central processing units (CPUs) and may include anytype of processor, such as a microprocessor, digital signal processor,microcontroller, programmable logic device (PLD), field programmablegate array (FPGA), or the like. The controller may also include a memoryto store data and/or instructions that, when executed by the one or moreprocessors, causes the one or more processors to perform one or moremethods and/or algorithms. In example embodiments that employ acombination of multiple controllers and/or multiple memories, eachfunction of the systems and/or methods described herein can be allocatedto and executed by any combination of the controllers and memories.

Any of the herein described methods, programs, algorithms or codes maybe converted to, or expressed in, a programming language or computerprogram. The terms “programming language” and “computer program,” asused herein, each include any language used to specify instructions to acomputer, and include (but is not limited to) the following languagesand their derivatives: Assembler, Basic, Batch files, BCPL, C, C+, C++,Delphi, Fortran, Java, JavaScript, machine code, operating systemcommand languages, Pascal, Perl, PL1, scripting languages, Visual Basic,metalanguages which themselves specify programs, and all first, second,third, fourth, fifth, or further generation computer languages. Alsoincluded are database and other data schemas, and any othermeta-languages. No distinction is made between languages which areinterpreted, compiled, or use both compiled and interpreted approaches.No distinction is made between compiled and source versions of aprogram. Thus, reference to a program, where the programming languagecould exist in more than one state (such as source, compiled, object, orlinked) is a reference to any and all such states. Reference to aprogram may encompass the actual instructions and/or the intent of thoseinstructions.

Any of the herein described methods, programs, algorithms or codes maybe contained on one or more non-transitory computer-readable ormachine-readable media or memory. The term “memory” may include amechanism that provides (in an example, stores and/or transmits)information in a form readable by a machine such a processor, computer,or a digital processing device. For example, a memory may include a readonly memory (ROM), random access memory (RAM), magnetic disk storagemedia, optical storage media, flash memory devices, or any othervolatile or non-volatile memory storage device. Code or instructionscontained thereon can be represented by carrier wave signals, infraredsignals, digital signals, and by other like signals.

The foregoing description is only illustrative of the presentinformation systems. Various alternatives and modifications can bedevised by those skilled in the art without departing from thedisclosure. Accordingly, the present disclosure is intended to embraceall such alternatives, modifications and variances. The embodimentsdescribed with reference to the attached drawing figures are presentedonly to demonstrate certain examples of the disclosure. Other elements,steps, methods, and techniques that are insubstantially different fromthose described above and/or in the appended claims are also intended tobe within the scope of the disclosure.

What is claimed is:
 1. A method for automatically enhancing an imagefrom a device, comprising: recognizing an object or individual in afirst image; configuring an initial image profile based on the firstimage, wherein the initial image profile includes a plurality of levelsof modification; associating an identification number with the object orthe individual in the first image; editing at least one attribute of theinitial image profile; recognizing the object or individual in a secondimage; determine a level of modification of a plurality of levels ofmodification based on the identification number; automatically editingthe at least one attribute of the second image based on the edited atleast one attribute of the initial image profile and the determinedlevel of modification; and updating the initial image profile based onthe editing of the at least one attribute of the second image.
 2. Themethod according to claim 1, wherein the at least one attribute isselected from the group consisting of facial jewelry, tattoos, scars,acne, wrinkles, hair, piercings, facial features, body features, andhairstyle.
 3. The method according to claim 1, wherein the at least oneattribute is eliminated from the second image.
 4. The method accordingto claim 1, wherein the at least one attribute is added to the secondimage.
 5. The method according to claim 1, further comprising generatinga personal user profile.
 6. The method according to claim 5, wherein thepersonal user profile is saved on the imaging device.
 7. The methodaccording to claim 5, wherein the personal user profile is transferrableto another device selected from the group consisting of imaging devices,computers, servers, smart phones, tablets, and gaming systems.
 8. Themethod according to claim 1, wherein the second images are received fromanother imaging device.
 9. The method according to claim 1, wherein thesecond images are automatically edited and the edited images aretransferred to a different imaging device.
 10. The method according toclaim 1, wherein the second images are received from another imagingdevice, automatically edited and the edited images are transferred to adifferent imaging device.
 11. The method according to claim 1, whereinthe initial image profile is selectively editable to create a secondimage profile that is selectively transferrable to an imaging device.12. The method according to claim 11, wherein the initial image profileor a second image profile is transferrable to a different imagingdevice.
 13. The method according to claim 12, wherein the differentimaging device receives the second image profile and uses recognitionsoftware to recognize the object or individual in second image and thedifferent imaging device automatically edits the at least one attributeof the second image based on the received second image profile.
 14. Themethod according to claim 11, wherein the initial image profile or asecond image profile is transferrable to a server.
 15. The methodaccording to claim 14, wherein the server receives the second imageprofile and uses recognition software to recognize the object orindividual in second image and the server automatically edits the atleast one attribute of the second image based on the received secondimage profile.
 16. The method according to claim 15, wherein the servertransfers the edited second image to an imaging device.