[原创]逆向调用qq截图nt与wechatocr | 宜武汇-ag真人国际厅网站

message ocrresponse {

    int32 type = 1;                                 //第一次运行ocr会有push一次type1, 正常ocr结束type0

    int32 task_id = 2;

    int32 err_code = 3;

 

    message ocrresult {

        message resultpos {                         //四个角的坐标 左上 右上 右下 左下

            message posxy {

                float x = 1;

                float y = 2;

            }

 

            repeated posxy pos = 1;

        }

 

        message singleresult {                      //singleresult是一行结果 oneresult是单字的

            resultpos single_pos = 1;

            bytes single_str_utf8 = 2;              //utf8格式的字符串

            float single_rate = 3;                  //单行的识别率

 

            message oneresult {

                resultpos one_pos = 1;

                bytes one_str_utf8 = 2;

            }

 

            repeated oneresult one_result = 4;

            float lx = 5;                           //识别矩形的左上和右下的坐标? 可能是

            float ly = 6;

            float rx = 7;

            float ry = 8;

            int32 unknown_0 = 9;                    //未知

            resultpos unknown_pos = 10;             //未知

        }

 

        repeated singleresult single_result = 1;    //repeated 每行的结果

        int32 unknown_1 = 2;

        int32 unknown_2 = 3;

    }

 

    ocrresult ocr_result = 4;

原文链接:https://bbs.kanxue.com/thread-278161.htm

网络摘文,本文作者:15h,如若转载,请注明出处:https://www.15cov.cn/2023/08/27/原创逆向调用qq截图nt与wechatocr/

发表评论

邮箱地址不会被公开。 必填项已用*标注

网站地图