摘要:
This invention provides multi-key content processing systems and methods, for processing content with at least one distribution target position. Each of the distribution target positions corresponds to an authorization key. An example method includes the steps of: encrypting said content with a content key; forming a key link based on said content key and the authorization key of said at least one distribution target position; and attaching said key link to the encrypted content.
摘要:
A method of image analysis, includes: obtaining a sequence (37;51) of images, each represented by pixel data; performing a vision-based analysis on at least one of the sequence (37;51) of images to obtain data for classifying a state of a subject represented in the images;—determining at least one value of a physiological parameter of a living being represented in at least some of the sequence (37;51) of images; and classifying a state of the subject using the data obtained with the vision-based analysis and the at least one value of the physiological parameter. The at least one value of the physiological parameter is determined through analysis of image data from the same sequence (37;51) of images from which the at least one image on which the vision-based analysis is performed is taken. A method of enabling remote photoplethysmographic analysis includes: obtaining a sequence (37;51) of images from at least one camera (3), each represented by pixel data representative of reflected ambient light in at least a limited range of wavelengths; and, for at least one measurement zone (41), providing a signal representative of at least variations in a time-varying value of a combination of pixel values at least a number of image points in the measurement zone (41) for use in determining at least one value of a physiological parameter. At least part of a selected subject represented in the sequence (37;51) of images is tracked, and a directable light source (4) illuminating at least part of the selected subject is controlled.
摘要:
The present invention provides a method of distributing content to a plurality of clients. The method on a server begins with accessing content to be distributed to a plurality of clients and identifying a first type of content to be distributed as crucial content and identifying a second type of content to be distributed as non-crucial content. The crucial content is any content required to properly render, after a decryption process, the content. The non-crucial content is all the other content to be distributed. The crucial content is encrypted with a first encrypting key which is unique to each of the plurality of clients. The crucial content which has been encrypted is transmitted. The non-crucial content is transmitted to the plurality of clients.
摘要:
A method of extracting a key frame from a sequence of frames constituting a shot, each frame being constituted by a matrix of pixels, comprises: for each frame of the sequence of frames: computing (3) the optical flow of the frame compared to the following frame as a matrix of displacement of each pixel from the frame to the following frame; computing (5) a motion entropy measure based on the optical flow of the frame; selecting (7) as key frame the frame of the sequence of frames having the maximum motion entropy measure.
摘要:
A method of processing an image signal comprising image and depth information is provided. The method is configured to perform segmentation on an image based on depth/disparity information present in the image signal comprising said image, and subsequently inpaint background for correction of the errors in the image around the foreground objects into a region that extends beyond the segment boundary of the foreground object and/or inpaint foreground for correction of errors in the image into a region that extends inside the segment boundary of the foreground object. In this way compression and other artifacts may be reduced.
摘要:
Methods, apparatus and systems for generating a trusted digital time stamp as well as a public time source. It includes, an apparatus for receiving and recording public time information and a method for verifying a digital time stamp. A method for generating a trusted digital time stamp includes: obtaining a first time information and a corresponding random code from a public time source; and generating a digital time stamp using a first time information and random code. A method for verifying a digital time stamp includes: recording time information and corresponding random codes transmitted by a public time source; retrieving time information and a random code contained in the time stamp; and comparing a retrieved random code from the time stamp with one of the recorded random codes that corresponds to a time information in the time stamp, if they are consistent, the time stamp is determined to be trusted, otherwise the time stamp is determined to be not trusted.
摘要:
This invention provides multi-key content processing systems and methods, for processing content with at least one distribution target position. Each of the distribution target positions corresponds to an authorization key. An example method includes the steps of: encrypting said content with a content key; forming a key link based on said content key and the authorization key of said at least one distribution target position; and attaching said key link to the encrypted content.
摘要:
Methods, apparatus and systems for generating a trusted digital time stamp as well as a public time source. It includes, an apparatus for receiving and recording public time information and a method for verifying a digital time stamp. A method for generating a trusted digital time stamp includes: obtaining a first time information and a corresponding random code from a public time source; and generating a digital time stamp using a first time information and random code. A method for verifying a digital time stamp includes: recording time information and corresponding random codes transmitted by a public time source; retrieving time information and a random code contained in the time stamp; and comparing a retrieved random code from the time stamp with one of the recorded random codes that corresponds to a time information in the time stamp, if they are consistent, the time stamp is determined to be trusted, otherwise the time stamp is determined to be not trusted.
摘要:
A method for preventing an illegal user from logging in an online application with an authentic user's user log-in information is provided in the present invention. The system associates user log-in information with personal communication device information specified by the authentic user. In response to receiving the user log-in information inputted by a user, the system retrieves the personal communication device information associated with the user log-in information, and sends a short message to the personal communication device to notify the authentic user of the logging operation. If no confirming message is received from the authentic user, log in is rejected.
摘要:
Provides methods for tracing and identifying a piracy in a wireless rights management system, wherein the content provider allow the protected digital content to be super-distributed, when unauthorized holding a pirated copy of the protected digital content is detected, based on the gateway controlling ability of the wireless operator within the wireless digital rights management system, a specific fingerprint is embedded in or removed from the protected digital content so as to trace the suspected persons and further identify the pirate. The fingerprint is related to information of a suspected person holding the protected digital content without authorization. A process of screening singles out highly suspected persons. Therefore the operator can determine whether the suspected person is a real pirate by comparing the similarity of the pirated version of content and the version held by the suspected person, and the exact tracing and identifying is achieved.