摘要:
The present invention relates generally to information encoding, data hiding, steganography and digital watermarking. One claim recites: using a programmed electronic processor, encoding content with a plural-bit digital watermark in accordance with initial encoding parameters; determining an assessment of the encoded plural-bit digital watermark in each of two or more portions of the content; for each of the two or more portions of the content, adjusting at least one of the initial encoding parameters according to a determined assessment for a respective portion of the content; and using a programmed electronic processor, encoding the content with said plural-bit watermark in accordance with adjusted encoding parameters. Other claims are provided as well.
摘要:
A portable wireless device (e.g., a mobile phone) is moved or positioned by a user to signal user input. The device takes an action based on such gesture, where the action involves imagery captured by the device. A great variety of other features and arrangements are also detailed.
摘要:
A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed.
摘要:
Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie.
摘要:
In one arrangement, a first user sends information from a portable device and receives a response that depends, at least in part, on the location of a second user's portable device. The information sent from the first portable device may be based on data captured by a sensor in that device. In another arrangement, a user of a portable device sends two types of data, sensor-related data and location-related data, and receives a response that is based on both of these of data. In one particular such embodiment, the user scans a barcode or watermark from a coupon or other printed object, and sends decoded payload data—together with location data (e.g., GPS data)—to a remote server. The remote server routes the information to a vendor near the user who can, e.g., fulfill an order for food delivery to the user.
摘要:
A portable device for use with audio or visual content (e.g., an MP3 player-like device, or a camera-enabled device) is equipped with one or more features/capabilities, including: a user interface through which a consumer can instruct that content be delivered to a different consumer's device, the ability to derive identifiers from content and take action(s) based thereon, the ability to count playbacks of content; and/or the ability to interact with remote web services. A variety of other features and arrangements are also detailed.
摘要:
A form of error processing is used to decode steganographic messages embedded in image and audio signals in the presence of distortion, which tends to introduce errors in steganographic data communication. Content signals with auxiliary embedded data are analyzed to detect embedded message signals. Confidence values are assigned to the message signals and used to ascertain whether a message has been accurately detected. Error processing enables accurate message extraction in the presence of “soft errors” in the embedded message signal. This error processing enables more effective recovery of the steganographic message from content signals that undergo distortion and/or loss transformations after being embedded with steganographic data.
摘要:
The detailed technology relates to optical sensors, and more particularly relates to characterizing local behaviors of a sensor, and using such characterization information in a sensor-based system. In a particular arrangement, output signals produced from each of plural sensing elements in a 2D optical sensor are checked to determine whether they tend to differ from output signals produced by one or more neighboring sensing elements—when combined across plural captured image frames. The results are stored in an associated memory, and can be consulted in determining how image data captured from the sensor should be used. The technology is particularly illustrated in the context of a watermark decoder for a cell phone camera. A variety of other features and arrangements are also detailed.
摘要:
The present invention relates generally to security documents (e.g., banknotes, ID documents, certificates, packaging, etc.). One claim recites a security document including a security pattern provided thereon. The security pattern includes a line structure in which lines width or line spacing is adjusted to convey a predefined, machine-readable pattern in a frequency transform domain. Another claim recites a security document including a security pattern provided thereon. The security pattern is provided in the security document through modifications to a color provided on the security document. The security pattern conveys a predefined, machine-readable pattern in a frequency transform domain. Of course, additional combinations and claims are provided as well.
摘要:
Watermark detection in an image or the like can be optimized by exploiting the innate biases in the image to emphasize the watermark signal. The watermark signal can be trial-located with different origins in the image to find one that yields improved results. Similarly, the image can be processed (e.g., by changing resolution, rotation, or compression) so as to change the innate biases to better reinforce the watermark signal. Compression of an image can be done in accordance with a desired identifier, with the compressor deciding which image components to retain and which to discard based, in part, on the identifier that is to be associated with the image. The techniques are also applicable to other forms of content, such as audio. A variety of other arrangements are also detailed.