摘要:
A method and device for visual code transaction verification enables more secure electronic transactions. The method includes generating a window having a first pattern of elongated segments. A second pattern of elongated segments is then generated, wherein a dynamic visual code is produced when the window and the first pattern of elongated segments are superimposed with the second pattern of elongated segments. A transaction with a user is then verified by matching the dynamic visual code with a code string entered by the user.
摘要:
Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie.
摘要:
Data representing media content, such as audio data, is processed to produce a signature code therefrom. This code can be used by wireless and other devices for a variety of purposes. Some relate to cryptographic operations. Others relate to determining whether operations involving the media content are legitimate.
摘要:
The present disclosure relates generally to identification documents and related methods and apparatus. One claim recites a method to determine whether to authenticate an identification document through digital watermarking or through an alternative process. The method includes: receiving data carried by the identification document corresponding to a detection trigger; if the received data indicates an expected presence of digital watermarks, attempting to authenticate the identification document by analyzing digital watermarking carried by the identification document; and if the received data indicates an expected absence of digital watermarks, attempting to authenticate the identification document through an alternative process. Other claims and combinations are provided too.
摘要:
A method includes receiving graphic data and steganographically encoding machine-readable data in the graphic data. The machine-readable data identifies a computer implemented process that is to be invoked when the steganographic encoding is decoded and acted upon by a computing device.
摘要:
A method of indexing content for network searching comprises obtaining media content signals stored on a computer network; deriving content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals.
摘要:
The present disclosure relates generally to encoding and decoding signals from media signals. One claim recites an apparatus comprising: electronic memory for storing blocks of a media signal; an electronic processor programmed for: determining a detection metric for the blocks, the detection metric comprising a measure of coincidence of detection parameters of different blocks; and performing detection operations based on the measure of coincidence of the detection parameters. Of course, other claims and combinations are provided as well.
摘要:
The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too.
摘要:
The presently claimed invention relates generally to digital watermarking and steganographic data hiding for video and images. One claim recites a method of connecting a user computing device to one of a plurality of remote computers available for communication over a network. The method includes: a) obtaining streaming data representing a two dimensional color image or video, the two dimensional color image or video including an index steganographically hidden therein through alterations to the two dimensional color image or video; b) analyzing the streaming data to obtain the index; c) accessing a database with the index, the database comprising a plurality of records that associate an index to a pointer, the pointer identifying a remote computer on the network, in which the pointer is determined as a function of the index; and d) using the pointer to establish communication with the remote computer identified thereby. Of course, additional claims and combinations are provided as well.
摘要:
The present claims relate generally to steganographically encoding and decoding of audio signals. One claim recites a method of embedding auxiliary information in data representing audio. The method includes acts of: using at least a programmed electronic processor, altering data representing audio to include a sequence of bits of auxiliary information, said altering based on a carrier signal and corresponding to the sequence of bits, and said altering based on a local gain that varies within the data representing audio, the sequence of bits of auxiliary information including at least one fixed registration sequence for registration of the auxiliary information within the data representing audio and at least one message sequence, and in which the fixed registration sequence and the at least one message sequence are interleaved in at least some portions of the data, and in which the fixed registration sequence is provided in the data representing audio so as to allow determination of threshold levels associated with the auxiliary information; and repeating the altering of the data representing audio to include redundant instances of at least some of the auxiliary information including at least the fixed registration sequence. Of course, other combinations and claims are provided as well.