Abstract: The disclosed technology generally relates to methods for identifying audio and video entertainment content. Certain shortcomings of fingerprint-based content identification can be redressed through use of crowdsourcing techniques.
Abstract: One aspect of the present invention is a method of playing multi-media content through a personal computer. The personal computer includes a processor and memory, with the memory having software instructions stored therein. The processor executes the instructions to carry-out the method. The method includes: receiving data representing multi-media content at the personal computer; receiving at the personal computer an initial set of data representing a base set of usage rights that is associated with the multi-media content, wherein the initial set of data defines a first set of rights that is permissible without upgrading or renewing the base set of usage rights; and upon receiving a request to perform an action involving the multi-media content, checking the initial set of data representing the base set of usage rights to determine whether the action is permissible, and providing an option to a user through the personal computer to contact a remote computer to negotiate for an upgraded set of usage rights.
Abstract: An image is processed to encode a digital watermark, with different regions thereof processed using different levels of watermark intensity. In an image comprised of elements of differing sizes (e.g., halftone shapes of different sizes, or lines of different width), the different regions can be defined by reference to the sizes of elements contained therein. Regions characterized by relatively small elements can be watermarked at a relatively low intensity. Regions characterized by relatively large elements can be watermarked at a relatively high intensity. A variety of other features are also discussed.
October 28, 2011
Date of Patent:
December 11, 2012
Marc D. Miller, Donald Haaga, Tony F. Rodriguez
Abstract: An image is encoded to define one or more spatial regions that can be sensed by a suitably-equipped mobile device (e.g., a smartphone), but are imperceptible to humans. When such a mobile device senses one of these regions, it takes an action in response (e.g., rendering an associated tone, playing linked video, etc.). The regions may overlap in layered fashion. One form of encoding employs modification of the color content of the image at higher spatial frequencies, where human vision is not acute. In a particular embodiment, the encoding comprises altering a transform domain representation of the image by adding signal energy in a first chrominance channel, where the added signal energy falls primarily within a segmented arc region in a transform domain space. In another arrangement, a smartphone display presents both image data captured from a scene, and a transform representation of the image data (e.g., in the Fourier domain). This latter information can aid a user in positioning the phone, e.g.
Abstract: We provide techniques for uniquely linking security elements in identification documents. In one implementation we provide a digital watermark embedded on, and a smartcard chip embedded in, an identification document. The smart card chip includes a hash or a reduced-bit representation of the digital watermark, while the digital watermark includes a hash of information stored on the smartcard chip. In another implementation we cross-correlate encryption keys carried by various machine-readable features on an identification document. In still another implementation, we embed biometric information, which is stored in smartcard electronic circuitry, with a digital watermark. In one case the watermark is reversible, so that it can be removed to yield unmarked biometric information. In another case the watermark is fragile, to reveal whether the biometric information has been subjected to a transformation. In yet another implementation, we provide a jurisdictional indicator on an identification document.
Abstract: A method of embedding data into an audio signal provides a data sequence for embedding in the audio signal and computes masking thresholds for the audio signal from a frequency domain transform of the audio signal. The masking thresholds correspond to subbands of the audio signal, which are obtained from a masking model used to compress the audio signal. The method applies the masking threshold to the data sequence to produce masked data sequence and inserts the masked data sequence in the audio signal to produce an embedded audio signal. A method of detecting data embedded in an audio signal analyzes the audio signal to estimate the masking threshold used in embedding the data and applies the estimated masking threshold to the audio signal to extract the embedded data.
Abstract: Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples.
Abstract: Methods and systems include, e.g.,: (1) steganographically embedding location information in images, where the location information is obtained from remote sources like a cell phone network or remote GPS receiver; (2) steganographically embedding participant IDs in content to ensure proper billing and royalty tracking; (3) providing fair-use content management based upon digital watermark-tracked usage; (4) providing micro-payments based upon watermarked ID cards for retailers; and/or (5) providing watermarked logon cards, such as watermarked hotel room keys, to better provide internet logon access control. Other systems and methods are provided as well.
Abstract: Piracy of digital content is currently a large problem. Copyright notification and sales of metadata can help counteract the problem. The novel solution shows different methods to provide copyright notification and sell metadata, such as including identification of the content (via digital watermarks, fingerprints, or header data) and a personal domain. Metadata is ideal to sell since it is dynamic, and, thus, is accessed from a master server.
Abstract: Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract: Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article through use of a variety of different card constructions (e.g., involving quantum dots, phase change materials, MEMS structures, etc.). A variety of other arrangements and features are also detailed.
Abstract: The present invention relate generally to digital watermarking. One claim recites an apparatus comprising: electronic memory for buffering a color video signal comprising a first frame and a second frame; and one or more electronic processors programmed for: transforming a first color channel and a second color channel of the first frame by hiding a digital watermark in the first color channel such that the first digital watermark includes a first signal polarity, and hiding the digital watermark in the second color channel such that the digital watermark includes a second signal polarity that is inversely related to the first signal polarity; transforming a first color channel and a second color channel of the second frame by hiding a digital watermark in the first color channel such that the first digital watermark includes the second signal polarity, and hiding the digital watermark in the second color channel such that the digital watermark includes the first signal polarity.
Abstract: Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed.
Abstract: The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
December 16, 2010
Date of Patent:
June 5, 2012
Tony F. Rodriguez, Geoffrey B. Rhoads, Ravi K. Sharma
Abstract: The present application relates generally to content management (e.g., managing audio and video items in portable devices). One claim recites a method comprising: utilizing electronic memory housed in a portable device, maintaining a listing of up to N identifiers associated with previously accessed audio or video items, where N is an integer, and where each previously accessed audio or video item has an identifier associated therewith; utilizing a programmed electronic processor housed in the portable device, i) restricting access to a new audio or video item if an identifier associated with the new audio or video item is one of the N identifiers associated with the previously accessed audio or video items, or ii) limiting a number of content items each with a different user identifier associated therewith that can be accessed in a certain amount of time. Of course, other claims and combinations are provided as well.
Abstract: A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed.
Abstract: The present invention relates to message encoding. In a first implementation, a message is provided. The message is transformed by a secret key. The secret key is generated by providing a plural-bit seed. The seed is randomized and then error correction encoded. We prefer tail-biting convolutional encoding for our error correction encoding. The encoded seed forms a secure key, which is used to transform the message prior to embedding.
Abstract: A method of identifying content in a distributed computing system. The method receives an image or audio signal in a first device in the distributed computing system, such as a cell phone or other wireless device. In this device, the method performs an analysis of characteristics of the signal to identify portions of the signal from which to derive a content identifier. The method then sends the portions to a second, remote device in the distributed computing system, such as a server. The server further processes the portions to derive a content identifier, which in turn, is used to look up data corresponding to the content, such as a Uniform Resource Locator. In the case of a wireless telephone network, for example, the method distributes the task of identifying content signals captured through the microphone or camera on the phones in the network.
June 5, 2007
Date of Patent:
March 9, 2010
Trent J. Brundage, Brett T. Hannigan, Ravi K. Sharma
Abstract: This patent application is generally related to watermarking and steganography. In one implementation, a method of embedding auxiliary information within original data is provided. The original data is divided into a series of groups, with each group in the series of groups associated with a value. The method includes: investigating a first group to determine a presence of a local masking opportunity; and if there exists a presence of a local masking opportunity with the first group, embedding data by setting a value of one or more groups in a neighborhood of the first group, including the first group, in accordance with a value associated with at least a portion of the auxiliary data. Other implementations and embodiments are provided as well.
Abstract: The present invention relates generally to embedding and/or encoding auxiliary information within original data. For example, in one embodiment, a method of embedding auxiliary information in data is provided. The auxiliary information is not lost with compression of the embedded data. The embedded data initially includes a non-compressed form including the auxiliary information embedded therein. The method includes: (a) retrieving the auxiliary information from the non-compressed form of the embedded data; (b) compressing the non-compressed form of the embedded data; and (c) embedding the retrieved auxiliary information in the compressed embedded data, whereby the compressed embedded data comprises the auxiliary information embedded therein. Other embodiments are provided and claimed as well.