摘要:
This technology concerns, in one aspect, using a person's social network graph data as a virtual visual cortex—taking image input from a smartphone or the like, and processing it with the graph data to yield a personalized form of processing based on the imagery. The user's network graph data is typically updated by such processing—providing a form of virtual image memory that can influence future social network behavior. In another aspect, the technology concerns identifying content (e.g., audio) by both fingerprint-based and watermark-based techniques, and arrangements employing such identification data. A great number of other features and arrangements are also detailed.
摘要:
A portable device, such as a cell phone, is used to “forage” media content from a user's environment. For example, it may listen to a television viewed by a traveler in an airport lounge. By reference to digital watermark or fingerprint data extracted from the content, the device can identify the television program, and enable a variety of actions. The device may also identify content that preceded (or follows) the foraged content. Thus, a traveler who views just the end of an exciting sporting event can capture one of the following commercials, identify the preceding program, and download same for later viewing. Relatedly, audio foraging can be used as a source of still imagery. A great variety of other functions and arrangements, e.g., addressing social media, are also detailed.
摘要:
Technologies involving portable devices, such as smartphones and tablet computers, are disclosed. One arrangement enables a creator of content to select software with which that creator's content should be rendered—assuring continuity between artistic intention and delivery. Another uses the camera of a smartphone to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed.
摘要:
An audio watermark signal is associated audio host signal, but is provided separately. When the audio host signal is rendered, a user can control whether—and how strongly—the watermark signal is also rendered. The specification details a great variety of other technologies—most relating to audio and image content, and/or portable devices (e.g., smartphones).
摘要:
The present disclosure relates to authenticating identification and security documents, and methods and systems for authenticating such. One claim recites a method of authenticating a security or identification document with a cell phone. The cell phone comprising an optical sensor and a graphical display, the document comprising micro-printing, in which the micro-printing is imperceptible by an unassisted human observer. The method comprises: receiving from the optical sensor optical scan data corresponding to the document; analyzing the optical scan data to recognize the micro-printing; scaling or magnifying the micro-printing; and rendering at least some of the scaled or magnified micro-printing via the graphical display, in which rendered, scaled or magnified micro-printing is perceptible by a human observer of the graphical display. Other claims, implementations and embodiments are provided as well.
摘要:
A digital watermark in video includes a plural-bit payload that sets different permissions governing usage of the video. One bit, for example, may flag whether fast-forwarding of the video is permitted. Another may flag whether storage in non-encrypted form is permitted. A compliant video appliance governs its actions in accordance with such flag data provided by a video watermark detector.
摘要:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. Preference data for the consumer, by which video of interest is identified, can be shared with third parties, e.g., in exchange for a fee. A variety of other embodiments and features are also detailed.
摘要:
The present claims recite various steganographic and digital watermarking methods and apparatus. One claim recites a method of watermarking a representation of a physical object. The method includes: projecting a watermark orientation component onto a physical object; and using a camera or image sensor, capturing an image or video of the physical object including the watermark orientation component as projected thereon. Another claim recites an apparatus including: a light source for projecting a registration component onto a physical object; a camera or sensor for capturing an image or video of the physical object including the registration component as projected thereon; and an electronic processor programmed for encoding a message in the image or video captured by said camera or sensor. Of course, other claims and combinations are provided as well.
摘要:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. A variety of other embodiments and features are also detailed.
摘要:
The present invention relates generally to signal processing and cell phones. One claim recites a method comprising: receiving a signal from a cell phone; determining, based at least in part on the signal, whether the cell phone is physically located in a predetermined home area; and if not in the predetermined home area, communicating a machine-readable code detector to the cell phone for use as its primary machine-readable code detector to detect machine-readable code while outside of its predetermined home area. Of course, other claims are provided too.