摘要:
A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed.
摘要:
The present invention relates generally to documents such as printed documents. One claim recites a printed document including a machine-readable signal. The document includes: a first set of print structures conveyed with first ink; and a second set of print structures convey with optical variable ink. The second set of print structure are provided to cooperate with the first set of print structures so that at a first observation angle the first set of print structures and the second set of print structures appear to provide a first visibly perceptible feature. At a second observation angle, the second set of print structures appear less observable so that the first set of print structures and the second set of print structures provide a second visibly perceptible feature. Of course, other claims and combinations are provided as well.
摘要:
A device, such as a cell phone, uses an image sensor to capture image data. The phone can respond to detection of particular imagery feature (e.g., watermarked imagery, barcodes, image fingerprints, etc.) by presenting distinctive graphics on a display screen. Such graphics may be positioned within the display, and affine-warped, in registered relationship with the position of the detected feature, and its affine distortion, as depicted in the image data. Related approaches can be implemented without use of an image sensor, e.g., relying on data sensed from an RFID device. Auditory output, rather than visual, can also be employed. A variety of other features and arrangements are also detailed.
摘要:
A security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which lines width or line spacing is adjusted to carry predefined data. The artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. Methods for detecting the security pattern include use of a frequency domain structure to detect the security pattern despite rotation and scaling of the document, use of signal tiling to improve signal detection, and use of statistical analyses to verify detection of the security pattern.
摘要:
Video programs are identified by watermark data subliminally conveyed within the picture data. By reference to such program identification data, video recording devices can automatically identify desired programs, and respond accordingly. For example, if a desired television program is originally scheduled to air at 5:00 p.m., but is delayed until 5:10 due to a sporting event that exceeded its broadcast slot, a video recorder equipped with the disclosed technology can sense the delayed start, commence recording at 5:10, and continue recording until the (delayed) end of the program. The program identification can also identify the program's subject matter, allowing automated recording of programs that match a viewer's profile.
摘要:
A method for decoding auxiliary data from media signals in multimedia content decodes watermarks from different media signals and uses the watermarks to control processing of the multimedia content. A copy control method decodes a watermark from one of the media signals in multimedia content, and uses the watermark to control processing of the multimedia content. Another method uses a watermark decoded from a first media signal to decode a second media signal. Yet another method uses a watermark decoded from a media signal to decode metadata associated with the media signal. Finally, another method forms a key for decoding data from at least first and second watermarks extracted from first and second media signals.
摘要:
This technology concerns, in one aspect, using a person's social network graph data as a virtual visual cortex—taking image input from a smartphone or the like, and processing it with the graph data to yield a personalized form of processing based on the imagery. The user's network graph data is typically updated by such processing—providing a form of virtual image memory that can influence future social network behavior. In another aspect, the technology concerns identifying content (e.g., audio) by both fingerprint-based and watermark-based techniques, and arrangements employing such identification data. A great number of other features and arrangements are also detailed.
摘要:
Novel arrangements are detailed involving delivery of entertainment content, and commercial sponsorship of such content. Some arrangements enable viewers to control presentation of advertising in video, e.g., selecting what commercials are to be presented—if any, and also their order and timing. Ad presentation can also be made dependent on context. Other arrangements ensure that advertising is actually rendered, and is not skipped-over. In still other aspects, entertainment content that is now offered on a paid basis is made available for free to certain viewers. For example, viewers may receive free content as a perk for earlier patronage of certain content sponsors. Fees charged to advertisers can be tied to measured consumer responses (e.g., to correlated increases in sales of advertised products), or to the demographics of the responding viewers (e.g., engagement of affluent consumers merits higher fees). A great number of other features and arrangements are also detailed.
摘要:
The present technology concerns cell phones and other portable devices, and more particularly concerns use of such devices in connection with media content (electronic and physical) and with other systems (e.g., televisions, digital video recorders, and electronic program directories). Some aspects of the technology allow users to easily transfer displayed content from cell phone screens onto a television screens for easier viewing, or vice versa for content portability. Others enable users to participate interactively in entertainment content, such as by submitting plot directions, audio input, character names, etc., yielding more engaging, immersive, user experiences. Still other aspects of the technology involve a program directory database, compiled automatically from information reported by network nodes that watch and identify content traffic passing into (and/or out of) networked computers. By identifying content resident at a number of different repositories (e.g., web sites, TV networks, P2P systems, etc.), such a directory allows cell phone users to identify the diversity of sources from which desired content can be obtained—some available on a scheduled basis, others available on demand. Depending on the application, the directory information may be transparent to the user—serving to identify sources for desired content, from which application software can pick for content downloading, based, e.g., on context and stored profile data. A great number of other features and arrangements are also detailed.
摘要:
Methods employ sensors in portable devices (e.g., smartphones) both to sense content information (e.g., audio and imagery) and context information. Device processing is desirably dependent on both. For example, some embodiments activate certain processor intensive operations (e.g., content recognition) based on classification of sensed content and context. The context can control the location where information produced from such operations is stored, or control an alert signal indicating, e.g., that sensed speech is being transcribed. Some arrangements post sensor data collected by one device to a cloud repository, for access and processing by other devices. Multiple devices can collaborate in collecting and processing data, to exploit advantages each may have (e.g., in location, processing ability, social network resources, etc.). A great many other features and arrangements are also detailed.