Abstract:
Arrangements are detailed to aid a user in positioning a camera-equipped device (e.g., a smartphone) at a particular viewing position relative to an object being imaged. Other embodiments discern the device's viewing position, and then undertake image or other processing that is dependent on such viewpoint. A great number of other features and arrangements are also detailed.
Abstract:
Content signal recognition is based on a multi-axis filtering of the content signal. The signatures are calculated, formed into data structures and organized in a database for quick searching and matching operations used in content recognition. For content recognition, signals are sampled and transformed into signatures using the multi axis filter. The database is searched to recognize the signals as part of a content item in the database. Using the content identification, content metadata is retrieved and provided for a variety of applications. In one application, the metadata is provided in response to a content identification request.
Abstract:
Methods for generating unique copies of content are disclosed In one embodiment the method generates a unique copy by varying the manner in which the master copy watermark is embedded in unique copies of a content item The master copy watermark is repeated within the content item and its location is varied in a unique pattern that comprises the unique copy watermark The unique copy is generated by producing a copy in which master copy watermarks are embedded in a unique pattern The variation in location of the instances of the master copy watermark can be in different domains such as a spatial domain, a time domain, a time-space domain, a transform domain, a compressed domain etc
Abstract:
The present invention relates to toys and game applications that are enhanced with digital watermarks. In one embodiment, a character card includes a unique identifier in the form of a digital watermark. The identifier is used to link to a database record, which can be updated to reflect changes in game attributes. Some such game attributes include life, character type and name, health, strength, and power levels. The data record can be updated or modified to reflect changes in attributes due to activity or events during a computer software game. The database record can be used by the computer software game to alter or enhance the game. In another embodiment, a toy interacts with toy components or cards via digital watermarks. Digital watermarks enhance games, toys and books in still other embodiments.
Abstract:
The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio and video). In one implementation, a message includes a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first portion is combined with the second portion. The second portion includes a second message and as second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted with a common or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction. In another implementation, a method appends information to a watermark message received from a remote device. In yet another implementation, a method provides standardized watermark payloads from various input data, regardless of the size of the input data. In another implementation, we encrypt one of two different cooperating watermark payloads, but the encryption and payload data structure help to authenticate both payloads. Another implementation provides a three encryption key pair system for managing messages and watermark embedding. Still another aspect of the invention is a watermark embedding process that uses encryption to whiten, randomize or spread message, instead of convention spread-spectrum modulation.
Abstract:
Certain forms of distortion make it difficult to recover hidden data embedded in an audio or image signal by quanitzation techniques. To compensate for this distortion, an embedded data reader analyzes a statistical distribution (e.g., a histogram) of feature samples (124) in an audio or image signal suspected of having hidden auxiliary data to derive an estimate of quantizers used to encode a reference signal (126). The estimated quantizers then recover the reference signal (126), and the reader uses the reference signal(126) to determine and compensate for geometric or temporal distortion, like spatial scaling and rotation of image data, and time scale and speed changes of audio data. After compensating for such distortion, the reader can then more accurately recover hidden message data using quantization techniques to extract the message. The reference signal (126) is preferably repeated in blocks of the image or audio data to enable synchronization at many points in an image or audio data stream. An adaptive embedding and reading technique is used to adaptively define the quantization bins for regions of a host media signal based on signal statistics for each of the regions.
Abstract:
Signal processing devices and methods estimate transforms between signals using a least squares technique. A direct least squares method applies a seed transform candidate to a reference signal and then measures correlation between the transformed reference signal and a suspect signal. For each candidate, update coordinates of reference signal features are identified in the suspect signal and provided as input to a least squares method to compute an update to the transform candidate. At the end of the process, the method identifies a transform or set of top transforms based on a further analysis of correlation. A phase estimation method estimates the phase of reference signal components in a suspect signal using a point spread function. A phase deviation method determines translation between a reference and suspect signal by analyzing a phase deviation surface created by computing a deviation metric for phase shift estimates.
Abstract:
A multidimensional histogram is used to characterize an image (or object), and is used to identify candidate matches with one or more reference images (or objects). An exemplary implementation employs hue information for two of the dimensions, and a second derivative function based on luminance for a third dimension. The simplicity and speed of the detailed arrangements make them well suited for use with cell phones and other mobile devices, which can use the technology for image/object recognition, e.g., in visual search applications.
Abstract:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second sent of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. In other implementations a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document.
Abstract:
The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio, and video). In one implementation, a message inclues a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first protion is combined with the second portion. The second portion includes a second message and a second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted wth a common key or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction.