摘要:
Processing of banknote- or other security document-images in a computer system is sensed, and serves to launch (or direct) a web browser to a web site that educates the user about limitations on use of such imagery, and/or provides substitute imagery that may be utilized for legitimate purposes. Such images may be recognized by a digital watermark encoded therein or by other known techniques. The technology is applicable to a wide class of documents that should not be duplicated, including passports, visas, postal stamps, stock certificates, travelers checks, concert/event tickets, lottery tickets, etc. The technology may also be used for non-security applications, e.g., recognizing images, video, or audio being processed on a user's computer as belonging to a certain class, and presenting the user with a web page relating to that class of object. Commerce opportunities may thereby be made available to the user.
摘要:
A computer (10) is provided with software that looks for certain activities that may be illicit (e.g. processing of a graphic file corresponding to a banknote). If such an activity is detected, tracer data detailing the activity is generated and secretly stored in the computer (10). If the computer (10) is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use, e.g. in counterfeiting. To detect whether graphic image data corresponds to a banknote, two analysis techniques may be used. One is based on detection of a visible pattern characteristic of a security document. The other is based on detection of a steganographic digital watermark characteristic of a security document. If either characteristic is found, the image is flagged, and appropriate anti-counterfeiting steps may be taken. Detection of the visible pattern can be performed using a series of successively more rigorous tests. If the image fails the first test, successive tests can be skipped, speeding the process. Hough transform-based pattern recognition techniques are used in some embodiments. Provision of both a visible pattern detector and a watermark detector in a single apparatus enhances reliability, while permetting various implementation efficiencies.
摘要:
The present technology concerns improvements to smart phones and related sensor-equipped systems. Some embodiments relate to smart phone-assisted commuting, e.g., by bicycle. Some involve novel human-computer interactions, e.g., using tactile grammars—some of which may be customized by users. Others involve spoken clues, e.g., by which a user can assist a smart phone in identifying what portion of imagery captured by a smart phone camera should be processed, or identifying what type of image processing should be conducted. Some arrangements include the degradation of captured content information in accordance with privacy rules, which may be location-dependent, or based on the unusualness of the captured content, or responsive to later consultation of the stored content information by the user. A great variety of other features and arrangements are also detailed.
摘要:
The present technology concerns cell phones and other portable devices, and more particularly concerns use of such devices in connection with media content (electronic and physical) and with other systems (e.g., televisions, digital video recorders, and electronic program directories). Some aspects of the technology allow users to easily transfer displayed content from cell phone screens onto a television screens for easier viewing, or vice versa for content portability. Others enable users to participate interactively in entertainment content, such as by submitting plot directions, audio input, character names, etc., yielding more engaging, immersive, user experiences. Still other aspects of the technology involve a program directory database, compiled automatically from information reported by network nodes that watch and identify content traffic passing into (and/or out of) networked computers. By identifying content resident at a number of different repositories (e.g., web sites, TV networks, P2P systems, etc.), such a directory allows cell phone users to identify the diversity of sources from which desired content can be obtained—some available on a scheduled basis, others available on demand. Depending on the application, the directory information may be transparent to the user—serving to identify sources for desired content, from which application software can pick for content downloading, based, e.g., on context and stored profile data. A great number of other features and arrangements are also detailed.
摘要:
The disclosure details a variety of steganographic encoding and decoding of auxiliary information in physical and media objects (16) in traditional distribution (14) to music media outlets (20). In particular, digital watermarks embeded in media content are used to initiate automated transactions associated with the content and to link creative content with information or transactions.
摘要:
The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites a portable device comprising: a touch screen display; a microphone for capturing ambient audio; memory for storing an image; and one or more processors. The one or more processors are configured for: generating copies of the stored image; obtaining a payload corresponding to financial information; providing the payload to an erasure code generator, in which the erasure code generator produces a plurality of outputs; embedding one of the plurality of outputs in a copy of the stored image and proceeding with embedding until each of the plurality of outputs is so embedded in a copy of the stored image, in which the embedding utilizes digital watermarking; causing the touch screen display to display embedded image copies so as to cause a static image display effect, the displayed embedded image copies being displayed by the portable device in response to a user input to enable a financial transaction. A great variety of other features, arrangements, combinations and claims are also detailed.
摘要:
A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed.
摘要:
Physical items can be digitally watermarked, permitting their recognition by webcams or the like to trigger corresponding actions. Coffee cups and coffee cup jackets are exemplary of items that may be so watermarked. The action triggered by recognition of the item can vary, depending on the context in which the recognition occurred (e.g., store or office). The action likewise vary with time (e.g., triggering a first response when presented a first time, and triggering a second, different, response when presented a second time). Some such items may have multiple faces (e.g., tow side to a credit card ; six faces to a product carton) - each encoded with a different watermark and triggering a different response.
摘要:
Physical or electronic objects are encoded with identifiers, which serve to trigger object-appropriate responses from computer systems that encounter such objects. The encoding may be steganographic (e.g., by digital watermarks), so the presence of such identifiers is not evident to persons encountering the objects. An exemplary application is a computer system that looks at a printed magazine advertisement (20) and initiates a link to a corresponding internet page. In one such implementation, the computer system senses an identifer encoded in the advertisement, forwards the identifier to a remote database, receives from the database (17) a corresponding internet address (18a, 18b, 18c), and directs a browser to that address (18a, 18b, 18c). The same arrangement can be used for on-line ordering from printed merchandise catalogs. Another application is a computer system that looks at a printed spreadsheet (20), and retrieves from disk storage an electonic version of the same document for editing.