Abstract:
This technology concerns, in one aspect, using a person's social network graph data as a virtual visual cortex - taking image input from a smartphone or the like, and processing it with the graph data to yield a personalized form of processing based on the imagery. The user's network graph data is typically updated by such processing - providing a form of virtual image memory that can influence future social network behavior. In another aspect, the technology concerns identifying content (e.g., audio) by both fingerprint-based and watermark-based techniques, and arrangements employing such identification data. A great number of other features and arrangements are also detailed.
Abstract:
Digital watermark encoding - and associated registry transactions - are made transparent to consumers - performed as built-in features of common image processing operations, such as taking a picture, or printing a picture. In one arrangement, a user particularly defines network experiences that a hardcopy image is to invoke. The user may interact with buttons and other controls of a graphical user interface on the touchscreen of a printer to author specific experiences that should be triggered by a hardcopy image - such as launching a related video, playing a recorded audio clip, displaying other images in a story narrative to which the hardcopy image relates, etc. These choices can be made at the time of printing, or the printer can be used as an interface to establish or adjust such network experiences after printing.
Abstract:
Methods and arrangements involving portable devices, such as smartphones and tablet computers, are disclosed. One arrangement enables a creator of content to select software with for rendering that creator's content - assuring continuity between artistic intention and delivery. Another arrangement utilizes the smartphone camera to identify nearby subjects, and take actions based thereon. Othe rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some of the detailed technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use linked data in portable devices - some of which exploit GPU capabilities. Still other technologies concern computational photography.
Abstract:
Cell phones and other devices are used to complement enjoyment of television or other video media, through use of corresponding software applications ("widgets"). A great variety of related features and arrangements are particularly detailed.
Abstract:
The present invention relates generally to digital watermarking and steganography. In one implementation, a method includes determining a current geographic area of the cell phone; selecting a first digital watermark detector that is associated with the current geographic area, a selected first digital watermark detector being selected from a plurality of different digital watermark detectors; and controlling the cell phone to employ the selected first digital watermark detector to analyze a signal to obtain a digital watermark message there from, wherein the selected first digital watermark detector corresponds to a particular digital watermark embedder that is uniquely assigned to the geographic area.
Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second sent of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. In other implementations a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document.
Abstract:
Various arrangements for use of biometric data are detailed. For example, a police officer may capture image data from a driver license (e.g., by using a camera cell phone). Facial recognition vectors are derived from the captured image data corresponding to photo on the license, and compared against a watch list. In another arrangement, a watch list of facial image data is compiled from a number of government and private sources. This consolidated database is then made available as a resource against which facial information from various sources can be checked. In still another arrangement, entities that issue photo ID credentials check each newly-captured facial portrait against a consolidated watch list database, to identify persons of interest. In yet another arrangement, existing catalogs of facial images that are maintained by such entities are checked for possible matches between cataloged faces, and faces in the consolidated watch list database.
Abstract:
The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio, and video). In one implementation, a message inclues a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first protion is combined with the second portion. The second portion includes a second message and a second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted wth a common key or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction.
Abstract:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In an application, the auxiliary signal is formed as an array of elements selected from a set of print structures (106) with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Robust and fragile watermarks are used in Image Replacement Documents for a variety of applications. Digital watermarks act as on-board mediators in authentication of a variety of printed documents. Finally, digital watermarks are used to help manage quality of the scanners used in imaging systems.