摘要:
A media object sensed at one location is delivered at a second remote location, or an application associated with the object is made available at the second location. In some embodiments, the delivered object is of a higher quality than the sensed object. In other embodiments, larger objects requiring higher bandwidth for effective transmission are delivered notwithstanding low bandwidth bottlenecks between the first and second locations. Such advantages are achieved by employing watermark data as proxies for media objects and associated applications. These techniques are advantageously applied to cell phones.
摘要:
An image is digitally watermarked to convey position data about the subject of the image, such as latitude, longitude and elevation of a point depicted therein. Additional information, e.g., about camera attributes, camera angle, and 3D warp-characterizing polynomial coefficients, can also be included. In another implementation, a method includes receiving data representing an image or video, and embedding the data with a digital watermark. The digital watermark includes a plural-bit payload having information to: i) identify a spatial position or area depicted in the image and designated as an origin, and ii) identify a position or direction relative to the origin.
摘要:
One aspect of the invention is a method of decoding an auxiliary code embedded in an audio signal. The method performs a statistical decoding of a multibit auxiliary code embedded in an audio signal. The auxiliary code has been repetitively embedded in the audio signal. The method decodes code values of the auxiliary code from two or more different portions of the audio signal, each having the multibit auxiliary code. It then uses the code values decoded from two or more different portions to determine statistically the code values of the auxiliary code. Another aspect of the invention is another method of decoding an auxiliary code embedded in an audio signal. The method receives an audio signal suspected of being embedded with an auxiliary code. It evaluates a statistical feature of a portion of the audio signal to decode code values of the auxiliary code from the audio signal. It then determines a code value in the auxiliary code based on the statistical feature. The statistical feature may comprise, for example, the power of the audio signal. The statistical feature may be analyzed over different portions of the audio signal to decode two or more values of the auxiliary code.
摘要:
This disclosure details systems and methods for embedding and reading auxiliary code signals in documents, and for using the code signals to enable a variety of forensic tracking, monitoring and usage control functions.
摘要:
A tangible object (such as a microprocessor, wristwatch, pharmaceutical, compact disc, vehicle part, etc) is surface-textured to encode a plural-bit code thereon. In one arrangement, this encoding conveys date information. In use, the object can be imaged by a scanner apparatus, and the resulting scan data analyzed to discern the plural-bit code. The decoded date information can be used in a determination relating to the object. For example, at a port of entry, date information encoded on a Rolex wristwatch can be used to determine whether importation of the wristwatch should be permitted. The texture-encoded data can also convey other information, such as a vehicle identifier for an automotive part, a place of fabrication, a specification with which the part complies, etc.
摘要:
Media objects are transformed into active, connected objects via identifiers embedded into them or their containers. In the context of a user's playback experience, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server. The server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc. The server may return a higher fidelity version of content from which the identifier was extracted. In some applications, the higher fidelity version may be substituted for the original media object and rendered to provide higher quality output. The linking process applies to broadcast objects as well as objects transmitted over networks in streaming and compressed file formats.
摘要:
Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie.
摘要:
Security documents (e.g. passports, currency, event tickets, and the like) are encoded to convey machine-readable multi-bit binary information (e.g., a digital watermark), usually in a manner not alerting human viewers that such information is present. The documents can be provided with overt or subliminal calibration patterns. When a document incorporating such a pattern is scanned (e.g. by a photocopier), the pattern facilitates detection of the encoded information notwithstanding possible scaling or rotation of the scan data. The calibration pattern can serve as a carrier for the watermark information, or the watermark can be encoded independently. In one embodiment, the watermark and the calibration pattern are formed on the document by an intaglio process, with or without ink. A photocopier responsive to such markings can take predetermined action if reproduction of a security document is attempted. A passport processing station responsive to such markings can use the decoded binary data to access a database having information concerning the passport holder. Some such apparatuses detect both the watermark data and the presence of a visible structure characteristic of a security document (e.g., a printed seal of the document's issuer).
摘要:
To prevent playback of pirated, non-encrypted video, a DVD-based system examines data read from a DVD disk for MPEG-like characteristics. If such attributes are detected, the data is examined for the presence of a video usage-control watermark. The presence of such watermark indicates that the video should be distributed only in encrypted form, so playback of video from the disk is prevented.