According to your needs, you can choose among various image processing features provided by CI, including scaling, cropping, transcoding, and watermarking, as well as value-added services such as blind watermarking and QR code recognition.
CI can process images in JPG, BMP, GIF, PNG, and WEBP formats, and decode and process HEIF images.
The maximum image size is limited to 20 MB, with both the height and width less than 9,999 pixels.
CI uses Tencent Cloud Object Storage (COS) to store data. You can process images during uploading and persist the results in COS, or process images during downloading.
You can use COS Migration Tool or Migration Service Platform (MSP) for this purpose.
You need to provide source bucket names and the corresponding List permissions for migration.
You can use the image origin-pull feature of COS to bind COS buckets to your origin server, then replace the image processing domain name with the CI domain name (CI pulls original images from the origin server and then processes them, while COS pulls images asynchronously.) In this method, only resources that you request will be migrated.
CI supports image processing through CDN domain names. To this end, you can enable CDN acceleration in CI Console, or, in CDN Console, set the origin server of the acceleration domain to the CI domain (by selecting Own origin and entering the CI domain).
Yes, you can achieve this by using style separators. For example, with url?imageMorg2/cut/400x400|watermark/1/xxx, you can crop an image and add a watermark at the same time.
CI charges for services including basic image processing, blind watermarking, QR code recognition, and CDN origin-pull traffic and public network outbound traffic generated by requests. For more information, see the Purchase Guide.
Processed images will be stored through APIs. Images processed during downloading will not be stored in customers’ storage.
Yes, you can. You can also process images already stored in COS buckets.
Yes. You can encrypt URLs based on our encoding and decoding rules. Encrypted access is a customized feature, if you want to use it, submit a ticket to apply.
Take cropping + watermarking as an example, use the pipeline operator l to connect respective processing parameters, and then both operations will be performed in sequence.
One possible cause is that the EXIF information of the original image accounts for the majority of the image size. If the image size shows little change after you adjust the image resolution, use the strip parameter to remove the EXIF information. For instructions, see Removing Meta Information.
This issue may result from the following common reasons:
Each hotlink protection configuration is bound to a specific domain name. CI and COS have different domain names, and therefore their hotlink protection configurations are independent of each other.