摘要:
A method of detecting an embedded signal in a media signal. The method comprises receiving blocks of the media signal and computing a detection metric for the blocks. The detection metric comprises a measure of coincidence of detection parameters of different blocks. The method performs subsequent detection operations based on the measure of coincidence of the detection parameters.
摘要:
Two or more digital watermarks are embedded in a document. In one implementation the digital watermarks include characteristics that are chosen so that the watermarks will be affected in different manners if the document is subsequently copied or reproduced. A detection method or mechanism reads two or more of the watermarks and compares their characteristics. In another claim, two or more digital watermarks correspond to characteristics that are evaluated for authentication. Of course, other claims are provided as well.
摘要:
The presently claimed invention relates generally to processing data representing video and audio. One claim recites a method including: obtaining video, the video comprising at least picture portions and audio portions associated with the video; performing a first act of analyzing data representing picture portions of the video or audio portions associated with the video to determine whether the data satisfies first predetermined criteria; and if the data satisfies the first predetermined criteria, performing a second act of analyzing data representing picture portions of the video or audio portions associated with the video to determine whether the data satisfies second predetermined criteria. The first act of analyzing or the second act of analyzing utilizes steganographic decoding. A related claim recites that the first act of analyzing or the second act of analyzing utilizes pattern matching. Another related claim recites that the first act of analyzing or the second act of analyzing derives information from the data representing picture portions of the video. Of course, other claims and combinations are provided as well.
摘要:
Methods for decoding auxiliary control information from audio, and using same to control an audio appliance. Various arrangements are disclosed. One method correlates a filtered version of the audio with predetermined noise data to discern plural bits of hidden data. The data thereby extracted is used to trigger some response in the appliance, such as enabling or disabling certain operations.
摘要:
Methods and apparatus are described which provide secure interactive communication of text and image information between a central server computer and one or more client computers located at remote sites for the purpose of storing and retrieving files describing and identifying unique products, services, or individuals. Textual information and image data from one or more of the remote sites are stored separately at the location of the central server computer, with the image data being in compressed form, and with the textual information being included in a relational database with identifiers associated with any related image data. Means are provided at the central computer for management of all textural information and image data received to ensure that all information may be independently retrieved. Requests are entered from remote terminals specifying particular subject matter, and the system is capable of responding to multiple simultaneous requests. Textural information is recalled and downloaded for review, along with any subsequently requested image data, to be displayed at a remote site. Various modes of data and image formatting are also disclosed, including encryption techniques to fortify data integrity. The server computers may be interfaced with other computers to effect financial transactions, and images representing the subjects of transactions may be uploaded to the server computer to create temporary or permanent records of financial or legal transactions. A further feature of the system is the ability to associate an identification image with a plurality of accounts, transactions, or records.
摘要:
A method of indexing content for network searching comprises obtaining media content signals stored on a computer network; deriving content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals.
摘要:
The presently claimed invention relates generally to video or audio data. One claim recites an apparatus. The apparatus includes an input to receive data associated with video or audio; a decoder to analyze the data associated with video or audio for a steganographic signal hidden therein, the steganographic signal hidden in data representing video picture elements or in data representing audio elements; an extractor to extract an identifier from the data associated with video or audio; a generator to provide a signal based at least in part on a result produced by said decoder and said extractor; and an output to output the signal. Of course, other combinations are provided and claimed as well.
摘要:
Digital watermark methods for encoding auxiliary data into a host signal are used to authenticate physical and electronic objects. One such method computes a content specific message dependent on the host signal, encodes the content specific message into a watermark signal, and embeds the watermark in the host signal such that the watermark signal is substantially imperceptible in the host signal. One specific implementation embeds data representing salient features of the host signal into the watermark. For example, for photo IDs, the method embeds the spatial location of salient features of the photo into the watermark. Another implementation computes a semi-sensitive hash of the host signal, such as a low pass filtering of the signal, and embeds the hash into the watermark. The watermark signal may be content dependent by making the watermark key dependent on some attribute of the signal in which the watermark is embedded. Another approach is to make the watermark key dependent on a user or an attribute of the user. Yet another approach is to use multiple watermark components and multiple watermark detection stages that help identify and screen out invalid watermark signals. Another digital watermarking method for authenticating a media object transforms a media signal to a frequency domain comprising an array of frequency coefficients. It selects a first set of frequency coefficients, and alters the selected first set of frequency coefficients so that values of the coefficients in the set correspond to a pattern. The pattern of the media signal is authenticated by comparing a pattern of the values of the frequency coefficients in the set with an expected pattern.
摘要:
The present invention relates generally to steganographic encoding and/or digital watermarking. In one embodiment, a method is provided including: obtaining an image or video; encoding a first steganographic component in the image or video, wherein the first steganographic component comprises a first set of properties that are designed to be affected in a first manner when transformed from a first color gamut to a second color gamut; and encoding a second steganographic component in the image or video, wherein the first steganographic component comprises a second set of properties that are designed to be affect in a second manner when transformed from the first color gamut to the second color gamut. Other implementations and embodiments are provided and claimed as well.
摘要:
A system for managing token image replacement is provided. The system includes a remote server, a personal computer (PC) connected to the remote server, a smartcard that can be read by the PC, and a card image server. Using application logic and rules, the remote server is able to read the card image on the smartcard and determine if the card image on the smartcard needs to be updated. If an indicator on the smartcard is set to “update”, the remote server then retrieves a backup card image that corresponds to the card from the card image server. The remote server forwards the backup card image to the PC which, in turn, writes the backup card image including transaction information to the smartcard. Once the backup card image is written onto the smartcard, the indicator in the smartcard is then reset to ensure that subsequent interactions with the system would not initiate an update.