Abstract:
Colored images are divided into color planes and watermarks are inserted into the individual color planes. One or more watermarks can be inserted into one or more of the color planes. In order to print a color image the image is divided into color planes corresponding to the colors of ink used for printing. A separate plate is used to print each color. The different plates must be precisely aligned. Any misalignment will cause blurring in the image and may make it difficult or impossible to read a watermark in the image. Misalignment of the plates can cause the watermark data in one color plane to, in effect, cancel out the watermark data in a different color plane. With the present invention a watermark is inserted into a selected color plane only, thus there is no cancellation due to misalignment of color plates. The watermark detection and reading can be done after the image is divided into color planes.
Abstract:
The invention relates to a process to manufacture an object using at least one granular material (16) having a large particle size, for example greater than or equal to 0.1 mm, such process being characterised by the following stages: the granular material or materials are placed in a mould (2) at the same dimensions as the object to be made and incorporating at least one evacuation opening (6), said opening being of a size that is less than the particle size of the material, a liquid-phase binder (21) is poured into the mould, the binder is mixed between the grains of material and the excess binder is drained off through the evacuation opening using suction means (11). Application in the manufacture of igniting tubes or propellant charges for artillery ammunition.
Abstract:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. A variety of other embodiments and features are also detailed.
Abstract:
A method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers. It provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source. Another novel method addresses content objects with two or more content identifiers, potentially referencing different metadata sources. This method registers different globally unique identifiers for a content object. These globally unique identifiers each comprise a content identifier provided with the content object and a bounding identifier identifying a set of content identifiers of which the content identifier is a member. For each of the globally unique identifiers, information is maintained about a metadata source. The method receives a first content identifier for the content object, and uses a bounding identifier associated with the set of the first content identifier to determine the globally unique identifier for the first content identifier. The user is routed to the metadata source associated with globally unique identifier. This document describes a novel system that enables multiple identity providers (ID Providers) to register and use the system. The ID Provider registers with a metadata directory system, receives a unique bounding identifier, and uses this bounding ID (e.g., an ID provider ID) with subsequent interactions with the metadata directory system. Separately, metadata source providers register metadata sources with the metadata directory system. This enables many different participants to associate content objects with metadata sources using one or more identify providers. Examples of metadata source providers include content providers, like content owners or retailers that have the flexibility of working with different ID providers to associate content objects with metadata. Both content providers and ID providers can register and use the system. The metadata source is the system or device that provides the metadata, like a web site. The directory system uses an identifier for the metadata source, which enables it to maintain an association between a content object and its corresponding metadata source. For example, in some embodiments, a URL serves to identify the location of the source. The Content Metadata Directory Services (CMDS) is a global trusted directory service that connects consumers of identified content to content-provider authorized and managed metadata databases and other digital resources. It includes mostly links to metadata, forms globally unique IDs based upon overlapping content identifiers and unique bounding identifiers, enables multiple content identifiers within a content object, and enables multiple content identity technology providers, even when they are using different technology.
Abstract:
The present invention relates generally to digital watermarking and steganography. In one implementation, a method includes receiving permuted or encrypted data generated at a remote computing device, wherein the received data is encrypted or permuted according to a key carried by a digital watermark embedded in a security document; determining whether the received data matches or corresponds to data stored in a data repository, where the data repository indexes data stored therein without associating indexed data to a particular person or to an issued security document; and communicating an authentication indication to the remote computing device in accordance with a result of the act of determining.
Abstract:
Content identifiers are associated with respective metadata. Through use of the metadata, a user's experience with the content can be enhanced. A variety of other arrangements are also detailed.
Abstract:
A method of embedding auxiliary data in coefficients generated for a compressed data stream applies embedding rules to selected coefficients in different blocks to embed the data. The method receives coefficients in a data stream in which the coefficients are divided into blocks. It changes the value of selected coefficients to embed multi-bit message data in the coefficients. The process of changing the coefficients includes controlling changes to the selected coefficients from different blocks so that the relationship of the selected coefficients from the different blocks satisfy an embedding rule. One embedding rule causes the embedded data to form a pattern across the blocks. Another rule causes coefficients of blocks to have a desired phase relationship. Another rule enforces entropy and/or bit rate constraints onto the data stream. These embedding rules facilitate data hiding within bit rate and perceptibility constraints, while increasing robustness.
Abstract:
A wireless phone is equipped with a 2D optical sensor, enabling a variety of applications. For example, such a phone may also be provided with a digital watermark decoder, permitting decoding of steganographic data on imaged objects. Movement of a phone may be inferred by sensing movement of an imaged pattern across the optical sensor's field of view, allowing use of the phone as a gestural input device through which a user can signal instructions to a computer-based process. A variety of other arrangements by which electronic devices can interact with the physical world are also detailed, e.g., involving sensing and responding to digital watermarks, bar codes, RFIDs, etc.
Abstract:
Stationery, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization).
Abstract:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection. In one implementation we embed an auxiliary signal with a first color that is out of gamut with process color inks or with a particular range of printers. A process color approximation of the first color yields a relatively different contrast when, e.g., viewed with an interference filter. A copy is determined based on the relative presence or absence of the auxiliary signal. In another implementation, we provide a first auxiliary signal with a first color and a second auxiliary signal with a second color. A filter is matched according to the spectral response of the first color. The second color preferably includes a spectral response that is inversely related to the matched filter. The first signal is then detectable in a process color copy, but less so in the original. However, the second signal is detectable in the original, but less so in the copy. In still other implementations we compare relative contrast of a signal to determine an original from a copy.