Abstract:
A computer system equipped with certain hardware and software is provided for recording televised programs, and at the same time constructing tables of complementary video indices into the recorded televised programs, based on story lines, story characters and the like of the televised programs, thereby allowing the recorded televised programs to be defer viewed in a selective manner using the complementary video indices. The computer system, in addition to conventional hardware/software elements, further includes a video digitizer, a video embedded information decoder, a video user interface, a video index builder, a video viewer, a video index retriever, and a driver module.
Abstract:
A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed.
Abstract:
A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. Application programs can solicit gestural information through a standardized set of interface protocols (e.g., API functions). One function, for example, solicits a running set of gesture data, and a complementary function discontinues the first function. Other functions solicit device movement data in particular directions. In some arrangements gesture data is sent by the wireless device to a remote system, which may issue a response that is dependent on the received gesture data. This response may also depend on other data obtained by the wireless device (e.g., obtained from an electronic or physical object, or sensed from the environment) and sent to the remote system. The wireless device may have different modes of interacting with users, to accommodate users with greater or lesser proficiency in gestural techniques. A variety of other features and arrangements are also detailed.
Abstract:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. A variety of other embodiments and features are also detailed.
Abstract:
Content identifiers are associated with respective metadata. Through use of the metadata, a user's experience with the content can be enhanced. A variety of other arrangements are also detailed.
Abstract:
This disclosure describes, e.g., methods, sensors and apparatus that provide steganographic indicia or digital watermarking in image or video data. One implementation provides a method including: determining one or more operating characteristics of a device; based at least on the one or more operating characteristics, adjusting a steganographic embedding process associated with the device; steganographically embedding plural-bit auxiliary data in host content handled or processed by the device according to the adjusted steganographic embedding process. Another implementation provides an image sensor comprising: a controller; an image sensor array; at least one digital watermark detector co-located with the image senor array. The digital watermark detector operates to decode digital watermarks from imagery captured by the image sensor array. And the digital watermarks comprise an orientation component, with the digital watermark detector operating to provide orientation information, relative to an expected watermark orientation, to the controller. The controller operates at least to adjust imagery captured by the image sensor array according to the orientation information. Other implementations and embodiments are provided as well.
Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
A method for issuing a credential includes scanning in documents (e.g., breeder or ID documents) used to verify the applicant of the credential and creating data records including the image of the documents. As a means to reduce fraud, these data records are linked to the credential and to the issuer location, operator and time and place of issuance. If the document includes machine readable information, the method automatically reads the machine readable information from the document and uses at least part of the machine readable information from the document to pre-populate a form used to create a credential, such as an identification document. The method includes applying a transformation to the image of the document that enables protection against fraudulent use. The transformation secures the image of the document from tampering and/or enables tracking of the use of the document image to deter fraud. A method of verifying a credential comprises reading a physical security feature attribute on the credential, reading a logical attribute on the credential, and comparing information from the physical security feature with the logical storage element on the credential to verify the credential.
Abstract:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. In other implementations a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document.