Abstract:
Reference imagery of dermatological conditions is compiled in a crowd-sourced database (contributed by clinicians and/or the lay public), together with associated diagnosis information. A user later submits a query image to the system (e.g., captured with a smartphone). Image-based derivatives for the query image are determined (e.g., color histograms, FFT-based metrics, etc.), and are compared against similar derivatives computed from the reference imagery. This comparison identifies diseases that are not consistent with the query image, and such information is reported to the user. Depending on the size of the database, and the specificity of the data, 90% or more of candidate conditions may be effectively ruled-out, possibly sparing the user from expensive and painful biopsy procedures, and granting some peace of mind (e.g., knowledge that an emerging pattern of small lesions on a forearm is probably not caused by shingles, bedbugs, malaria or AIDS). A great number of other features and arrangements are also detailed.
Abstract:
The present invention relate generally to digital watermarking and data hiding. One claim recites a method including: obtaining first data and second color data, the first color data and the second color data represent data from a color image signal or color video signal; obtaining a digital watermark pattern, the pattern aiding detection of a watermark message; separating the digital watermark pattern into first frequency components and second frequency components; utilizing a programmed electronic processor or electronic processing circuitry, modifying the first color data by hiding the first frequency components therein; and utilizing a programmed electronic processor or electronic processing circuitry, modifying the second color data by hiding the second frequency components therein. Of course, other combinations and claims are provided too.
Abstract:
This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. One claim recites a method for identifying a content item from a host signal captured on a mobile telephone handset, comprising: from the handset, receiving filtered data from the host signal for use in identifying the content item; processing the filtered data to compute a content fingerprints; using the content fingerprints to determine an action associated with the content item, in which said determining utilizes information pertaining to an operating system associated with the mobile telephone handset; and communicating information associated with the action to the mobile telephone handset. Of course, other claims and combinations are provided as well.
Abstract:
The present disclosures relates generally to digital watermarking and data hiding. One claim recites a smartphone comprising: a camera to capture video of a display that is rendering video, in which the video comprises a first watermark signal embedded in a first portion of the data, a second watermark signal embedded in a second portion of the data, and a third watermark signal embedded in a third portion of the data, in which at least two of the first watermark signal, second watermark signal and third watermark signal are inversely related to one another; electronic memory for buffering data representing captured video; one or more electronic processors programmed for: applying a first perspective distortion to the data representing the captured video to yield first perspective distorted video; and analyzing the first perspective distorted video to detect digital watermarking, in which a second perspective distortion is applied to the data representing the captured video to yield second perspective distorted video when the analyzing does not detect digital watermarking, and then performing analyzing the second perspective distorted video to detect digital watermarking. Of course, other claims are provided too.
Abstract:
This patent document relates generally to steganography and digital watermarking. One claim recites a method comprising: receiving data representing image or video, in which the data comprises first data corresponding to first color data, second data corresponding to second color data and third data corresponding to third color data, the image or video to host auxiliary information; weighting the first data, the second data and the third data according to at least the following two factors: i) a color direction biased toward an expected embedding direction; and ii) expected image or video distortion introduced to the first data, second data or third data through image capture or signal processing; and determining from weighted first data, weighted second data and weighted third data, changes in an image or video attribute, in which the auxiliary information is conveyed through the changes to sample values representing the image or video. Of course, other claims are provided too.
Abstract:
Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples.
Abstract:
The parameters of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can determine spatial density, dot distance, dot size and signal component priority to optimize robustness. An optical code generator employs these parameters to produce an optical code at the desired spatial density and robustness. The optical code is merged into a host image, such as imagery, text and graphics of a package or label, or it may be printed by itself, e.g., on an otherwise blank label or carton. A great number of other features and arrangements are also detailed.
Abstract:
A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.
Abstract:
A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.
Abstract:
Images depicting items in a waste flow on a conveyor belt are provided to two analysis systems. The first system processes images to decode digital watermark payload data found on certain of the items (e.g., plastic containers). This payload data is used to look up corresponding attribute metadata for the items in a database, such as the type of plastic in each item, and whether the item was used as a food container or not. The second analysis system can be a spectroscopy system that determines the type of plastic in each item by its absorption characteristics. When the two systems conflict in identifying the plastic type, a sorting logic processor applies a rule set to arbitrate the conflict and determine which plastic type is most likely. The item is then sorted into one of several different bins depending on a combination of the final plastic identification, and whether the item was used as a food container or not. A variety of other features and arrangements are also detailed.