Abstract:
According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.
Abstract:
An inkjet printer is provided which has a coded tag generator configured to generate first coded tags using first identity data of a first interface received from a computer system so that each tag contains first data on an identity of a region and a position of that tag on the first interface, an inkjet printhead configured to substantially simultaneously print the first coded tags and graphic information onto a surface to generate the first interface, and an ink channel dedicated for printing the first coded tags.
Abstract:
A portable device uses a microphone to listen to ambient audio, derives data from captured audio signals, and uses the derived data to request delivery of the audio or related information to the user's home or other location. The device is desirably pocket-sized, or suitable for carrying on a key-ring. The device may also detect a watermark signal that is present in the user's environment (e.g., played through a public address speaker system) to aid the user in recalling the context from which the audio was requested.
Abstract:
The present invention relates to steganographically hiding messages in media signals such as video and audio signals. In one implementation, a method of decoding an encoded media signal to extract a plural-bit auxiliary signal therefrom is provided. The media signal includes a plurality of intervals, with the plural-bit auxiliary signal being steganographically encoded in at least some of the intervals. Once encoded in the media signal the plural-bit auxiliary signal is generally imperceptible to a human observer of the encoded media signal. The encoding includes subtle changes to at least some portions of the media signal to thereby represent the plural-bit auxiliary signal. The method includes receiving the encoded media signal; and decoding the received encoded media signal to extract the plural-bit auxiliary signal therefrom. The decoding analyzes a plurality of intervals of the media signal with greater or lesser confidence in the extracted multi-bit auxiliary data signal being obtained by processing more or less intervals of the encoded media signal, respectively
Abstract:
An automated monitoring service downloads image files (including, e.g, graphic and video files) and audio files from various Internet sites, and checks these files for the presence of embedded digital watermark data. When found, such data is decoded and used to identify the proprietor of each watermarked file. The proprietors are alerted to the results of the monitoring operation, often apprising such proprietors of unknown distribution of their image/video/audio properties. Digital watermarks carry control flags used to control viewing or playback depending on content classification.
Abstract:
A system and method for verifying that a document is included in a document management system is disclosed. This system and method includes radio frequency scanning at least a portion of the document, generating document data dependently upon the radio frequency scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior radio frequency scanning of at least a portion of the document, and outputting an indication of the document being included in the document management system as determined by the comparing.
Abstract:
Various signal processing methods and apparatus are provided. One claim recites a method of linking media to a network resource. The method includes: computing, with an electronic processor on a handheld device, attributes of media used to identify the media; providing, from the handheld device, computed attributes of the media to a network resource, wherein the network resource uses the computed attributes of the media to identify the media or metadata associated with the media; receiving, at the handheld device, metadata associated with the identified media in the network resource. Of course, other combinations and claims are provided as well.
Abstract:
The implementations of digital watermarks can be optimally suited to particular transmission, distribution and storage mediums given the nature of digitally-sampled audio, video and other multimedia works. Watermark application parameters can be adapted to the individual characteristics of a given digital sample stream. Watermark information can be either carried in individual samples or in relationships between multiple samples, such as in a waveform shape. More optimal models may be obtained to design watermark systems that are tamper-resistant given the number and breadth of existent digitized sample options with different frequency and time components. The highest quality of a given content signal may be maintained as it is mastered, with the watermark suitably hidden, taking into account usage of digital filters and error correction. The quality of the underlying content signals can be used to identify and highlight advantageous locations for the insertion of digital watermarks. The watermark is integrated as closely as possible to the content signal, at a maximum level to force degradation of the content signal when attempts are made to remove the watermarks.
Abstract:
A method for decoding auxiliary data from media signals in multimedia content decodes auxiliary data, including digital watermarks, from different media signals and uses the watermarks to control processing of the multimedia content. A copy control method decodes a watermark from one of the media signals in multimedia content, and uses the watermark to control processing of the multimedia content. Another method uses a watermark decoded from a first media signal to decode a second media signal. Yet another method uses a watermark decoded from a media signal to decode metadata associated with the media signal. Finally, another method forms a key for decoding data from at least first and second watermarks extracted from first and second media signals.
Abstract:
Determining a chrominance portion to be watermarked employs a perception-based table that indicates for various pixel values which of the chrominance portions, if any, should be selected for watermarking. Only the Y, U, and V values of a pixel are needed to access the table and determine which chrominance portion should be selected. However, the table may be represented such that it may be accessed using only R, G, and B values. The table may be modified so that it may indicate which of U or V should be selected, or that neither should be selected, indicating that this pixel should not be watermarked at all. Advantageously, the table may be simplified by employing some processing, because a large section of the table may be replaced by a simple test on the pixel values, e.g., U