Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. A variety of other embodiments and features are also detailed.
Abstract:
Content identifiers are associated with respective metadata. Through use of the metadata, a user's experience with the content can be enhanced. A variety of other arrangements are also detailed.
Abstract:
Auxiliary data encoded in multimedia content signals synchronizes rendering of different media content types in multimedia content. This auxiliary data includes one or more digital watermarks that are used to synchronize playback of the different media content signals. The digital watermarks identify different media signals, identify rendering locations, such as temporal or spatial areas in a first signal where the media signal is to be rendered, or provide rendering control scripts for controlling playback.
Abstract:
The present invention relates generally to signal processing and cell phones. One claim recites a method comprising: receiving a signal from a cell phone; determining, based at least in part on the signal, whether the cell phone is physically located in a predetermined home area; and if not in the predetermined home area, communicating a machine-readable code detector to the cell phone for use as its primary machine-readable code detector to detect machine-readable code while outside of its predetermined home area. Of course, other claims are provided too.
Abstract:
Various techniques for uniquely marking software, such as by reference to hidden information or other telltale features, are detailed. Some marks are evident in static code. Others are observable when the code is executed. Some do not manifest themselves until the code is exercised with specific stimulus. Different of the techniques are applicable to source code, object code, and firmware. A great number of other features and arrangements are also disclosed.
Abstract:
The picture information of video can be used in various ways to identify the video or its topical subject matter. This enables numerous novel arrangements in which particular video of interest to a particular consumer can be discerned. A variety of other embodiments and features are also detailed.
Abstract:
Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to data driven imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed.
Abstract:
This disclosure describes, e.g., methods, systems, sensors and apparatus for steganographically encoding information in image or video data. One claim recites a method of introducing a message to a watermark embedder located on-chip with an image array. The method includes the acts of: color converting image data provided from the image array, in which the color converting provides a multi-color approximation per pixel; receiving color converted image data at the watermark embedder; receiving the message from at least one of a random access memory (RAM) or a chip interface; communicating the message to the watermark embedder; and steganographically embedding the message in the color converted image data. Of course, other claims are provided too.
Abstract:
A security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which lines width or line spacing is adjusted to carry predefined data. The artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. Methods for detecting the security pattern include use of a frequency domain structure to detect the security pattern despite rotation and scaling of the document, use of signal tiling to improve signal detection, and use of statistical analyses to verify detection of the security pattern.