Abstract:
A location of a mobile device within a network is determined. The network includes a plurality of fixed nodes. A method includes receiving, at the plurality of fixed nodes, receive messages transmitted from the mobile communication device. Each of the plurality of fixed nodes generates a receive count stamp for each receive message corresponding to a local counter value at the receipt of the receive message. At each of the plurality of fixed nodes, the method includes processing the receive count stamps to calculate a set of pseudo-ranges between the respective fixed node and the mobile device, and measuring multipath delay included within the set of pseudo-ranges. Based on the measurement, the multipath delay is removed from the set of pseudo-ranges to determine a range estimate between the mobile device and each of the fixed nodes. Based on the range estimates, a location of the mobile device is calculated.
Abstract:
A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed.
Abstract:
Mobile phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others concern user interface improvements. Other aspects relate to imaging architectures, in which a mobile phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Still other aspects relate to distribution of processing tasks between the mobile device and remote resources ("the cloud"). Elemental image processing (e.g., simple filtering and edge detection) can be performed on the mobile phone, while other operations can be referred out to remote service providers. The remote service providers can be selected using techniques such as reverse auctions, through which they compete for processing tasks. A great number of other features and arrangements are also detailed.
Abstract:
A multi-aperture interferometric optical system (10) collects light propagating from a source of light and develops overlapping diffraction patterns (119) on an optical detector (70) that produces output signals for processing to form an image corresponding to the diffraction patterns. A preferred embodiment of the invention is a large aperture orbiting, earth-watching ring interferometric optical system configured such that there is no macro-structure pointing. Four mirror-ring structures (28, 44, 52, 60) direct incoming light to a multi-spectral primary optical detector that acquires light-pattern information from which an image can be derived.
Abstract:
Digital watermarks are embedded in documents (44, 60) to create a communication channel between document handling devices such as copiers (24, 26), printers (64, 66), scanners (52, 54) and fax machines (24, 26). The digital watermarks are used to control document reproduction and transmission operations. The digital watermarks are also used to embed transaction information in documents (44, 60), to link the document (44, 60) to an original, electronic version stored on a network (48, 50), or to trace the document handling history of a document (44, 60).
Abstract:
Watermark encoders and decoders are integrated into operating systems, Internet browsers (300), media players, and other applications and devices. Such integration enables the watermark-enabled application (304) or device to provide additional functionality and information (302) available via the watermark. The watermark, for example, may link to metadata or actions related to a media object. To exploit this watermark enabled functionality, the integrated application uses a watermark decoder to access the related metadata and actions. The user interface of the integrated application is enhanced to present metadata and actions linked via the watermark. Similarly, watermark encoders may be integrated into applications to convert media objects into enhanced, watermarked objects.
Abstract:
Digital watermarking technology herein, is described in a four step process, of (figure 4, S1-S4), and is used in conjunction with map dat, such as is acquired by satellite and other sensors and may be generated from image and ground truth databases (extract watermark location information) (figure 4, element S1). The second step, S2, determines a physical location (e.g., GPS). The third step of (figure 4, element S3), compares the location information with the physical location. The fourth step of (figure 4, S4), provides feedback of the comparison.
Abstract:
Watermarks in video signals or the accompanying audio track are used to associate video objects in a video sequence with object specific actions or information. A video object refers to a spatial and temporal portion of a video signal that depicts a recognizable object, such as a character, prop, graphic, etc. Each frame of a video signal may have one or more video objects. The auxiliary information is embedded in video or audio signals using "steganographic" methods, such as digital watermarks. By encoding object specific information into video or an accompanying audio track, the watermarks transform video objects into "watermark enabled" video objects that provide information, actions or links to additional information or actions during playback of a video or audio-visual program. A similar concept may be applied to audio objects, i.e. portions of audio that are attributable to a particular speaker, character, instrument, artist, etc. A personal device (PD) for interactive video programming enables viewers to experience interactive content associated with the programming on a personal display while watching the programming rendered on a shared display. This device may be used with a variety of interactive video schemes, including for example, watermark enabled video.
Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmission, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.
Abstract:
Methods and arrangements involving portable devices, such as smartphones and tablet computers, are disclosed. One arrangement enables a creator of content to select software with for rendering that creator's content - assuring continuity between artistic intention and delivery. Another arrangement utilizes the smartphone camera to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some of the detailed technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices - some of which exploit GPU capabilities. Still other technologies concern computational photography.