Abstract:
According to one embodiment of the invention, a method of masking comprises an operation of selecting a masking tool based on operations performed on a digital camera by a user. The masking tool is positioned over a masked portion of an image and an effect is applied. The effect is applied on the image outside the masked portion.
Abstract:
In one embodiment, the methods and apparatuses detect a device within a predetermined area; detect an image captured by the device; determine a subject of the image based on the predetermined area; and broadcast a signal to the device wherein the signal describes the subject of the image.
Abstract:
An online digital photography game system allows multiple participants in the game by submitting digital photography game entries, where the digital photography game system determines a game winner based on equivalency with a game solution. The digital photography game system allows a user to choose a particular game and to save incomplete game entries. Digital photography games may require an entry fee for participation. Additionally, one or more participants can be rewarded for their participation in the game.
Abstract:
An automatic video editing system identifies problems within frames in an input video, categorizes the frames by problem type, and edits the frames based on editing parameters for the category. A user can input values that override default values for the editing parameters and can choose to have certain frames remain unedited.
Abstract:
A security apparatus receives a biometric input from a user, which then is compared to a template to determine a correlation factor. The correlation factor, a fixed code and either a time-varying code or a challenge code then are combined to generate a token. The token is displayed to the user, who then enters the token at an access device. The access device is coupled to a secure host system. The access device forwards the token to the host, which processes the token to determine whether access is permitted. In one embodiment, the host is an electronic banking system. If access to such system is permitted the user is allowed to perform an electronic funds transfer. The security apparatus in one embodiment is an integrated circuit card. Each apparatus includes a sensor for detecting the holder's biometric information (i.e., voice, signature, fingerprint), along with a processor and display. The processor generates the token which then is displayed to the holder.
Abstract:
A system for controlling effects performed on an image includes a digital camera having a display that displays the image. Masking tools position graphical representations on the display to define a portion of the image that is altered when the effects are subsequently applied to the image. The several masking tools may be combined to form a single masking tool.
Abstract:
A system for controlling effects performed on an image includes a digital camera having a display that displays the image. A masking tool positions a graphical representation on the display, the graphical representation defining a portion of the image that is altered when the effects are applied to the image. The masking tool is positioned over a masked portion of an image and an effect is applied. The effect is applied on the image inside the masked portion.
Abstract:
According to one embodiment of the invention, a method of masking comprises an operation of selecting a masking tool based on operations performed on a digital camera by a user. The masking tool is positioned over a masked portion of an image and an effect is applied. The effect is applied on the image outside the masked portion.
Abstract:
An apparatus includes a label configured to be coupled to a medicament delivery device. The label includes a first surface and a second surface. The first surface is configured to be coupled to an outer surface of the medicament delivery device. The second surface includes a textual indicia. The label further includes an electronic circuit system configured to output an electronic signal.
Abstract:
The disclosed subject matter can determine the information to be communicated to the third party from the client. The third parties are instructed to contact the service provider to collect their contact information. The contact information collected is sued as a basis for follow up calls to insure compliance and adherence to the product.