Patent application number | Description | Published |
20080216149 | Digital Authentication with Analog Documents - Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph. | 09-04-2008 |
20080253740 | Apparatus and Methods to Process Video or Audio - The presently claimed invention relates generally to video or audio data. One claim recites an apparatus. The apparatus includes an input to receive data associated with video or audio; a decoder to analyze the data associated with video or audio for a steganographic signal hidden therein, the steganographic signal hidden in data representing video picture elements or in data representing audio elements; an extractor to extract an identifier from the data associated with video or audio; a generator to provide a signal based at least in part on a result produced by said decoder and said extractor; and an output to output the signal. Of course, other combinations are provided and claimed as well. | 10-16-2008 |
20080260201 | Digital Watermarking Apparatus and Methods - The present invention relates to various digital watermarking methods and systems. In one embodiment, monetary objects can be watermarked to signify currency denomination information. The information, once extracted, is used to provide feedback regarding the currency denomination. An audio signal or Braille output can be provided as feedback. In another embodiment, a document management system can be based on watermarks. Embedded watermarks can be used to track document history, determine document version information, and enhance overall security. Handheld computing devices can be advantageously employed with these embodiments. Of course, other embodiments are provided and claimed as well. | 10-23-2008 |
20080273747 | Controlling Use of Audio or Image Content - The present invention relates generally to controlling use of audio or image content (e.g., which may comprise video). In one claim, a method is provided including: receiving information, the information having been obtained from analyzing data representing audio elements or image picture elements to derive the information there from, accessing a database with the information to obtain permitted usage rights for audio or image content associated with the data; and providing the information to a remote device to allow control of the audio or image content in accordance with the permitted usage rights. Of course, other combinations are provided and claimed as well. | 11-06-2008 |
20080275906 | Content Indexing and Searching Using Content Identifiers and Associated Metadata - A method of indexing content for network searching comprises obtaining media content signals stored on a computer network; deriving content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals. | 11-06-2008 |
20080292134 | Wavelet Domain Watermarks - A wavelet domain watermark encoder and decoder embed and detect auxiliary signals in a media signal, such as a still image, video or audio signal. The watermark encoders and decoders employ techniques that take advantage of processing plural levels of resolution of the signal to embed and detect auxiliary information in the media signal. | 11-27-2008 |
20080292137 | Methods and Systems for Interacting with Physical Objects - A user detects data from a physical object (e.g., a poster) using a handheld appliance. The appliance then contacts a remote computer based on the data obtained from the object, and can perform any of a variety of functions, such as purchasing tickets to a concert or movie, or downloading music. The data can be obtained from the object in various ways, such as by optical sensing or by electromagnetic detection. | 11-27-2008 |
20080293381 | Wireless Methods Using Signature Codes - Data representing media content, such as audio data, is processed to produce a signature code therefrom. This code can be used by wireless and other devices for a variety of purposes. Some relate to cryptographic operations. Others relate to determining whether operations involving the media content are legitimate. | 11-27-2008 |
20080300011 | METHODS AND SYSTEMS RESPONSIVE TO FEATURES SENSED FROM IMAGERY OR OTHER DATA - A device, such as a cell phone, uses an image sensor to capture image data. The phone can respond to detection of particular imagery feature (e.g., watermarked imagery, barcodes, image fingerprints, etc.) by presenting distinctive graphics on a display screen. Such graphics may be positioned within the display, and affine-warped, in registered relationship with the position of the detected feature, and its affine distortion, as depicted in the image data. Related approaches can be implemented without use of an image sensor, e.g., relying on data sensed from an RFID device. Auditory output, rather than visual, can also be employed. A variety of other features and arrangements are also detailed. | 12-04-2008 |
20080319859 | Digital Media Methods - Many digital media methods are detailed. In one, consumers are provided incentives for viewing commercials. In another, charges for entertainment content are assessed based on the percentage actually rendered to a consumer. Signature data can be derived from the advertisements and entertainment content to implement such methods. A variety of other features and arrangements are also disclosed. | 12-25-2008 |
20090003648 | Color Image or Video Processing - The present invention relates generally to color image processing. One claim recites a method of color masking an image including: reading color values of an image sample and a corresponding change of an attribute of the image sample; and based on the color values of the image sample, mapping the change in the image sample attribute to a change in color components of the image sample that is equivalent to the change in the image sample attribute, yet reduces visibility of the change in the image sample attribute for the specific color values of the image sample. Another claim recites a method including: obtaining data representing digital imagery or video; analyzing at least a portion of the data to determine one or more color characteristics associated with the at least a portion of the data, said act of analyzing yielding a result; based at least in part on the result, generating a key; and embedding auxiliary data in the data representing digital imagery or video using the key. Still another claim recites a user interface method for use with a watermark encoder, including: presenting a user interface to enable a user to control strength of a watermark to be encoded in a specified color or color region; based on user input, controlling strength of a watermark encoded in the specified color or color region. Of course other claims and combinations are provided as well. | 01-01-2009 |
20090051772 | ESTABLISHING AND MAINTAINING FOCUS IN SEGMENTED-OPTIC TELESCOPES - A multi-aperture interferometric optical system collects light propagating from a source of light and develops overlapping diffraction patterns on an optical detector that produces output signals for processing to automatically focus the optical system and form an image corresponding to the diffraction patterns. A preferred embodiment of the invention is a large aperture orbiting, earth-watching ring interferometric optical system configured such that there is no macro-structure pointing. Four mirror-ring structures direct incoming light to a multi-spectral primary optical detector that acquires light-pattern information to focus the optical system and derive an image. | 02-26-2009 |
20090052735 | Methods and Apparatus to Process Video and Audio Media - The presently claimed invention relates generally to digital watermarking, and processing video or audio media files. One claim recites a method including: analyzing a plurality of video or audio media files; determining whether there are duplicate media files in the plurality video or audio media files; and avoiding duplicate video or audio media files when searching the plurality of video or audio media files for digital watermarking. Of course, other claims and combinations are provided as well. | 02-26-2009 |
20090060264 | Variable Message Coding Protocols for Encoding Auxiliary Data in Media Signals - Variable message coding protocols enable greater flexibility in encoding auxiliary data in media signals. One such protocol employs a version identifier that indicates the type of coding used to process an auxiliary data message before it is embedded in a host media signal. This version identifier specifies the type of error robustness coding applied to a variable message. The error robustness coding may be varied to alter the message payload capacity for different versions of auxiliary data embedding and reading systems. Another protocol uses control symbols to specify the format and variable length of the variable message. | 03-05-2009 |
20090060265 | Processing Data Representing Video and Audio and Methods Related Thereto - The presently claimed invention relates generally to processing data representing video and audio. One claim recites a method including: obtaining video, the video comprising at least picture portions and audio portions associated with the video; performing a first act of analyzing data representing picture portions of the video or audio portions associated with the video to determine whether the data satisfies first predetermined criteria; and if the data satisfies the first predetermined criteria, performing a second act of analyzing data representing picture portions of the video or audio portions associated with the video to determine whether the data satisfies second predetermined criteria. The first act of analyzing or the second act of analyzing utilizes steganographic decoding. A related claim recites that the first act of analyzing or the second act of analyzing utilizes pattern matching. Another related claim recites that the first act of analyzing or the second act of analyzing derives information from the data representing picture portions of the video. Of course, other claims and combinations are provided as well. | 03-05-2009 |
20090060269 | Content Identification Through Deriving Identifiers from Video, Images and Audio - The present invention relates generally to obtaining information from a profile associated with a proprietor of a media object (e.g., video, images and/or audio), where the proprietor may change information within the profile from time to time. One claim recites a method including: receiving an identifier via the internet from a device including or communicating with a content processor that derives the identifier from sample values representing audio portions of a media object or from sample values representing picture portions of the media object; utilizing the identifier to interrogate a database; obtaining from the database at least some information from a profile associated with a proprietor of the media object, wherein the database is configured to allow a proprietor to change information within the profile; and providing the at least some information from the profile associated with the proprietor of the media object to a remote location. Other combinations are provided and claimed as well. | 03-05-2009 |
20090067672 | Embedding Hidden Auxiliary Code Signals in Media - Methods for embedding and reading identification codes from media signals use embedded code signals modulated with the auxiliary message. These embedded code signals convey hidden tracking codes in images, video, music and printed objects. The embedded code signals are embedded by varying characteristics of the signal. The identification code varies for different copies of a media signal and indexes distribution information such as point of sale information and ownership information. | 03-12-2009 |
20090074241 | Steganographic Systems and Methods - The present invention relates to steganographic systems and methods. Once claim recites a method including: obtaining video content, wherein the video content comprises a steganographic signal embedded in picture elements of the video content, with multiple instances of the steganographic signal embedded in the picture elements of the video content, the steganographic signal comprising a plural-bit identifier that is uniquely associated with an intended recipient of the video content; encrypting—utilizing a processor or electronic processing circuitry—the video content with an encryption key that comprises mathematical relationship to the plural-bit identifier that is uniquely associated with the intended recipient of the video content; obtaining a decryption key that comprises a cryptographic relationship to the encryption key; communicating the encrypted video content and the decryption key to the intended user of the video content; and maintaining an association of the plural-bit identifier with the intended recipient. Other claims and combinations are provided as well. | 03-19-2009 |
20090077604 | Connected Video and Audio - The presently claimed invention relates to connecting video and audio signals to audio-video content. One claim recites a method including: receiving data at a server, the data representing picture elements of a video signal or audible portions of an audio signal, the data having been communicated from a remotely located handheld device; at the server, using a processor to derive an identifier from the data; obtaining a link or an address pointer from a database or registry using at least the identifier, the link or address pointer linking or pointing to audio-visual content which is stored at a location remotely located from the server, the audio-visual content being associated with the video signal or with the audio signal; communicating the link or the address pointer to the remotely located handheld device, whereby the remotely located handheld device is provided access the audio-video content with the link or the address pointer. Of course, other combinations and claims are provided as well. | 03-19-2009 |
20090080694 | Deriving Multiple Identifiers from Multimedia Content - The presently claimed invention relates generally to content identification, such as deriving identifiers from content itself. One claim recites a method including: using a processor, deriving first information from audio elements of an audio signal; using a processor, deriving second information from data representing picture elements of a video signal that is associated with the audio signal; and utilizing the first information or the second information in a content filtering process, said process utilizes a recognition unit or device to sample content being distributed on a network, and controls further distribution of the content in the network based at least in part on the first information or the second information. Of course, other combinations and claims are provided as well. | 03-26-2009 |
20090097695 | Personal document authentication system using watermarking - An identification document includes a unique identifier, and a picture of a person. Steganographically embedded in the picture is information corresponding to the identifier, by which the document can be authenticated. A verification apparatus reads the identifier from the document (e.g., by OCR or a machine-readable feature), and collects scan data corresponding to the picture. The scan data is processed to extract the embedded information. The embedded information is then compared for expected correspondence with the identifier. A remote database can store information related to the card, and can be queried in connection with the authentication. | 04-16-2009 |
20090097702 | Error Processing of Steganographic Message Signals - A form of error processing is used to decode steganographic messages embedded in image and audio signals in the presence of distortion, which tends to introduce errors in steganographic data communication. Content signals with auxiliary embedded data are analyzed to detect embedded message signals. Confidence values are assigned to the message signals and used to ascertain whether a message has been accurately detected. Error processing enables accurate message extraction in the presence of “soft errors” in the embedded message signal. This error processing enables more effective recovery of the steganographic message from content signals that undergo distortion and/or loss transformations after being embedded with steganographic data. | 04-16-2009 |
20090116683 | Methods and Systems Responsive to Features Sensed From Imagery or Other Data - A device, such as a cell phone, uses an image sensor to capture image data. The phone can respond to detection of particular imagery feature (e.g., watermarked imagery, barcodes, image fingerprints, etc.) by presenting distinctive graphics on a display screen. Such graphics may be positioned within the display, and affine-warped, in registered relationship with the position of the detected feature, and its affine distortion, as depicted in the image data. Related approaches can be implemented without use of an image sensor, e.g., relying on data sensed from an RFID device. A variety of other features and arrangements are also detailed. | 05-07-2009 |
20090116687 | Image Sensors Worn or Attached on Humans for Imagery Identification - The presently claimed invention relates to image sensors to be worn or attached on a human. One claim recites an apparatus including: an image sensor to capture image data, said apparatus to be worn or attached on a human so that said image sensor captures image data while said apparatus is worn or attached on the human; and an analyzer to analyze captured image data and to determine plural-bit identifiers for one or more objects represented in the captured image data. Of course, additional combinations are provided as claimed as well. | 05-07-2009 |
20090123026 | Method and Apparatus for Associating Identifiers with Content - Watermark detection in an image or the like can be optimized by exploiting the innate biases in the image to emphasize the watermark signal. The watermark signal can be trial-located with different origins in the image to find one that yields improved results. Similarly, the image can be processed (e.g., by changing resolution, rotation, or compression) so as to change the innate biases to better reinforce the watermark signal. Compression of an image can be done in accordance with a desired identifier, with the compressor deciding which image components to retain and which to discard based, in part, on the identifier that is to be associated with the image. The techniques are also applicable to other forms of content, such as audio. A variety of other arrangements are also detailed. | 05-14-2009 |
20090125475 | Methods and Systems for User-Association of Visual Stimuli with Corresponding Responses - Methods and systems permit a user to decide what different responses are triggered when different visual stimuli are presented to the user's wireless communications device. | 05-14-2009 |
20090125607 | Methods and Arrangements Employing Digital Content Items - Methods and arrangements for identifying content, and employing such identification, are detailed. One method embeds a plural-bit digital watermark into content, but first checks to see if the content is previously watermarked. Another method applies a digital watermark detection procedure to only a sub-portion of a digital content item. Yet another arrangement involves plural-portion content, where one portion is watermarked with first data governing its rights management, and another portion is watermarked with second data governing its rights management. Still another method concerns distribution of content items, where each is watermarked with a unique ID as part of the distribution process. Yet another method concerns deriving an identifier from content, and using the content to access related metadata from a remote computer system. Still other methods concern arrangements for recognizing content, and then providing links to information about the content creator, etc., in response. A variety of other technologies and improvements are also detailed. | 05-14-2009 |
20090129627 | DIGITAL WATERMARKING SYSTEMS AND METHODS - The present invention relates to watermarking of compressed audio or video files. One claim recites a method including: obtaining a copy of a compressed audio or video file; decompressing the compressed audio or video file to yield decompressed audio or video content; determining a first watermarking component for the decompressed audio or video content, the first watermarking component intended to be steganographically hidden in the audio or video content; storing the first digital watermarking component separately from the compressed audio or video file; and then providing the stored first watermarking component, a unique plural-bit watermark identifier, and the compressed audio or video file to a remote location. Other claims and combinations are provided as well. | 05-21-2009 |
20090132547 | Steganographic Encoding for Video and Audio - The presently claimed invention relates generally to digital watermarking and steganographic data hiding for audio and video. One claim recites a user computing device including: a. an input device configured to obtain an index from an audio signal, the index being steganographically hidden in the audio signal through alterations to data representing the audio signal; and b. processing circuitry to: utilize the index to access a database comprising a plurality of records that link an index to a pointer which identifies a remote computer; retrieve from the database a pointer with at least reference to the index; and use the pointer to establish communication with the remote computer identified thereby to obtain information associated with the audio signal. Of course, additional claims and combinations are provided as well. | 05-21-2009 |
20090136085 | Detecting Embedded Signals in Media Content Using Coincidence Metrics - A method of detecting an embedded signal in a media signal. The method comprises receiving blocks of the media signal and computing a detection metric for the blocks. The detection metric comprises a measure of coincidence of detection parameters of different blocks. The method performs subsequent detection operations based on the measure of coincidence of the detection parameters. | 05-28-2009 |
20090138484 | Method for Enhancing Content using Persistent Content Identification - Methods for enhancing content objects within web pages use persistent content identification to identify content signals and associate behaviors with the content signals, such as controlling rendering of the content signals along with other information, such as advertising. One method executes within a user device and automatically inserts code within the web page to fetch remote information used in connection with rendering the content signal in a web page. Another method operates on a server and enhances a content object so that it will have certain behaviors when downloaded and presented with a web page. | 05-28-2009 |
20090172128 | Internet Linking from Audio and Image Content - An internet linking method includes providing plural-bit sampled values representing media content at a user's computer. This digital data is passed to a processing system, and an identifier of the media content derived from the sampled values is returned from that system. This derived identifier is used to index a database, from which a corresponding URL address is obtained. A link can then be established to that URL address, and information obtained from that address can be presented to the user. A steganographic decoding technique can be used in the processing system to derive the media content identifier. A variety of other features and arrangements are also detailed. | 07-02-2009 |
20090177742 | Methods and Systems Employing Digital Content - The presently claimed invention relates to methods and system employing digital content. One claim recites a method including: receiving indentifying data from a remotely located handheld device, the remotely located handheld device utilizing a multi-purpose electronic processor to extract the identifying data from data representing audible portions of an audio signal, the handheld device having captured the audio signal with a microphone; using the identifying data to identify a song corresponding to the audio signal; providing a tag including information pertaining to the song to an online-based music library associated with the remotely located handheld device or a user of the remotely located handheld device. A variety of other claims and combinations are also provided. | 07-09-2009 |
20090213828 | WIRELESS LOCAL AREA NETWORK-BASED POSITION LOCATING SYSTEMS AND METHODS - The location of one or more mobile nodes in a wireless local area network (WLAN) is determined. Nodes in the WLAN include respective ping drivers to generate ping event values related to transmit count stamps and receive count stamps for wireless messages exchanged between the nodes. Each wireless message is associated with a transmit offset corresponding to an expected transmit time. A sorting module groups the ping event values and produces a difference between the respective receive count stamps and the transmit count stamps for each wireless message. Based on the sorted ping event values, the sorting module generates transmit offset values relating to the transmit offsets. A space-time calibration unit generates, from the sorted differences and the transmit offset values, a clock rate solution and a location solution for at least one of the nodes in the WLAN. | 08-27-2009 |
20090233621 | SYSTEMS AND METHODS FOR LOCATING A MOBILE DEVICE WITHIN A CELLULAR SYSTEM - A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location. | 09-17-2009 |
20090238403 | Systems and Methods Using Identifying Data Derived or Extracted from Video, Audio or Images - The presently claimed invention relates to deriving or extracting information from audio, images and video. One claim recites a method of operating a network filter. The network includes a plurality of network nodes, the network filter is for filtering video or audio. The method includes: monitoring video or audio traffic to a particular network node; identifying a first video or audio at the particular network node through deriving identifying data from data representing the first video or audio, the deriving utilizes at least one programmed multi-purpose computer processor; determining additional information associated with the first video or audio based at least in part on the identifying information; and notifying the network node of the presence of the additional information. | 09-24-2009 |
20090252401 | Methods, Objects and Apparatus Employing Machine Readable Data - The present invention relates generally to steganography and data hiding. One claim recites an object including: electronic processing circuitry having an operating or performance metric associated therewith; and steganographic indicia carried by the object, the steganographic indicia is usable as an index to verify the operating or performance metric. Another claim recites an apparatus including: electronic memory; and machine-readable indicia usable as a registry index including data that provides an indication regarding an expected capacity of the electronic memory. Other combinations are described and claimed as well. | 10-08-2009 |
20090262975 | Deriving or Calculating Identifiers From Video Signals - The present invention relates generally to processing video signals. One claim recites a method including: utilizing a multi-purpose electronic processor programmed for analyzing a video signal to derive or calculate an identifier from data representing picture elements of the video signal or from data representing audio accompanying the video signal; providing the identifier to electronic memory or to a remote repository to obtain advertizing information; receiving advertizing information from the electronic memory or the remote repository; and controlling rendering of the advertizing information such that the advertizing information is synchronized with at least a portion of the video signal when rendered. Of course, other combinations and claims are provided as well. | 10-22-2009 |
20090286572 | Interactive Systems and Methods Employing Wireless Mobile Devices - A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed. | 11-19-2009 |
20090290754 | Deriving Identifying Data From Video and Audio - The present invention relates generally to deriving identifying data from sample values representing video or audio. One claim recites a method including: obtaining identifying data from an electronic processor that derives the identifying data from sample values representing audio or video; providing the identifying data to a database; receiving advertising information from the database, the advertising information being associated with the audio or video, and the advertising information having been identified in the database utilizing at least the identifying data; and providing the advertising information to a consumer. Of course, other combinations are provided and claimed too. | 11-26-2009 |
20090296983 | SIGNAL PROCESSING UTILIZING HOST CARRIER INFORMATION - The present invention generally relates to processing audio, video and images. One claim recites a method including: obtaining media signal comprising a steganographic signal hidden therein; utilizing a programmed electronic processor, selecting portions of the media signal for steganographic signal detection, wherein the subset of the media signal is selected based on at least one or more predetermined probability factors, in which a probability factor comprises a selection criteria or rule to identify portions of the media signal which have a higher likelihood of including a steganographic signal relative to other portions of the media signal; and utilizing a programmed electronic processor, analyzing selected portions of the media signal to obtain the steganographic signal. Of course, other claims and combinations are provided as well. | 12-03-2009 |
20100008534 | Methods for Managing Content Using Intentional Degradation and Insertion of Steganographic Codes - A method of managing media content provides a media signal in which perceptible portions are intentionally degraded in perceptual quality. In response to receiving authorization, the method transforms the media signal into a higher quality media signal in which the intentional degradation is corrected. In addition, the media content is transformed by embedding an identifying code into the higher quality media signal. Media signal processing hardware includes a receiver of the media signal and activation hardware that transforms the media signal content in response to authorization, including embedding the identifying code. | 01-14-2010 |
20100008536 | Methods and Systems for Steganographic Processing - Electronic content data (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One claim recites a method practiced by a first party, including the acts: (a) receiving content that has been previously steganographically encoded by a second party with first plural-bit data; and (b) utilizing a programmed electronic processor, further steganographically encoding the content with a second plural-bit data different than the first. The further encoding includes altering digital data representing human-perceptible attributes of the content, in a manner that is dependent on the content. Both of the first and second plural-bit data are represented in encoded content. Of course, a great variety of other claims, arrangements and features are provided. | 01-14-2010 |
20100008586 | Systems and Methods of Managing Audio and Other Media - The presently claimed invention relates to audio and video processing. One claim recites a method including: obtaining streaming audio or video on a handheld wireless device, the handheld wireless device comprising: i) a programmed electronic processor, and ii) memory; using the programmed electronic processor, analyzing data representing the audio or video to extract identifying information there from; obtaining a device identifier or user identifier from the memory; communicating the identifying information and the device identifier or user identifier to a database as part of a request to add a title corresponding to the streaming audio or video to a media collection associated with the device identifier or user identifier, and in which the title is associated with the identifying information. Of course, other claims and combinations are provided too. | 01-14-2010 |
20100009722 | Connected Audio and Other Media Objects - Various signal processing methods and apparatus are provided. One claim recites a method of linking media to a network resource. The method includes: computing, with an electronic processor on a handheld device, attributes of media used to identify the media; providing, from the handheld device, computed attributes of the media to a network resource, wherein the network resource uses the computed attributes of the media to identify the media or metadata associated with the media; receiving, at the handheld device, metadata associated with the identified media in the network resource. Of course, other combinations and claims are provided as well. | 01-14-2010 |
20100021004 | Hiding and Detecting Messages in Media Signals - The present invention relates to steganographically hiding messages in media signals such as video and audio signals. In one implementation, a method of decoding an encoded media signal to extract a plural-bit auxiliary signal therefrom is provided. The media signal includes a plurality of intervals, with the plural-bit auxiliary signal being steganographically encoded in at least some of the intervals. Once encoded in the media signal the plural-bit auxiliary signal is generally imperceptible to a human observer of the encoded media signal. The encoding includes subtle changes to at least some portions of the media signal to thereby represent the plural-bit auxiliary signal. The method includes receiving the encoded media signal; and decoding the received encoded media signal to extract the plural-bit auxiliary signal therefrom. The decoding analyzes a plurality of intervals of the media signal with greater or lesser confidence in the extracted multi-bit auxiliary data signal being obtained by processing more or less intervals of the encoded media signal, respectively | 01-28-2010 |
20100027837 | Extracting Multiple Identifiers from Audio and Video Content - The presently claimed invention relates generally to content identification, such as extracting identifying information from content itself. One claim recites a method including: extracting first identifying information from data representing audio elements of an audio signal, said act of extracting first identifying information from data representing audio elements of the audio signal utilizes a programmed electronic processor; extracting second identifying information from data representing picture elements of a video signal that is associated with the audio signal, said act of extracting second identifying information from data representing picture elements of the video signal utilizes a programmed electronic processor; and utilizing the first identifying information or the second identifying information in a synchronization process, said synchronization process controls content synchronization during rendering of the audio signal or the video signal. Of course, other combinations and claims are provided as well. | 02-04-2010 |
20100029380 | Interactive Gaming Objects - A method for operating an electronic gaming system captures an image of a gaming object, extracts identifying information from the image of the gaming object, and uses the extracted identifying information to reference a database to determine a behavior associated with the identifying information. The method returns data to the gaming system to execute or control the behavior of the gaming system in response to the gaming object. Various system configurations for this method as well as unique applications of it are also disclosed. | 02-04-2010 |
20100036881 | Portable Audio Appliance - The presently claimed invention relate generally to portable audio devices. One claim recites a method including: receiving audio content data through an interface of a portable personal digital device capable of playing audio; storing the received audio content data in electronic memory; audibly rendering said audio content data; utilizing an electronic processor, counting a number of plays of the received audio content data; and displaying the number of plays of the received audio content data to a user of the portable personal digital device. Of course additional claims and combination are provided as well. | 02-11-2010 |
20100040255 | Processing Data Representing Video and Audio and Methods Related Thereto - The presently claimed invention relates generally to processing data representing video and audio. One claim recites an apparatus including: electronic memory to buffer video or audio obtained from storage associated with a publicly accessible internet site; and one or more electronic processors programmed for: processing the obtained video or audio to extract identifying information therefrom, the processing processes data representing picture elements of the obtained video or processes data representing audible portions of the obtained audio; communicating with a data repository using the identifying information to identify the obtained video or audio; obtaining information associated with the identified video or audio, the information including payment information for use of the identified audio or video; and providing a remotely located user access to the payment information. Of course, other claims and combinations are provided as well. | 02-18-2010 |
20100045816 | User Feedback in Connection with Object Recognition - A user controls, by hand, relative positioning between a camera-equipped apparatus and an object, to vary image data captured by the apparatus. At least certain of the image data is processed in connection with automated recognition of the object. An action based on recognition of the object can be taken. The arrangement further includes presenting feedback data to help guide the user in connection with said positioning, so as to aid in capturing image data from which the object can be recognized. In another aspect, the apparatus can provide a sequence of state data to the user on a display device, to indicate progress through several states in connection with the object recognition. A great variety of other arrangements and technologies are also detailed. | 02-25-2010 |
20100046744 | Methods and Devices Responsive to Ambient Audio - A portable device uses a microphone to listen to ambient audio, derives data from captured audio signals, and uses the derived data to request delivery of the audio or related information to the user's home or other location. The device is desirably pocket-sized, or suitable for carrying on a key-ring. The device may also detect a watermark signal that is present in the user's environment (e.g., played through a public address speaker system) to aid the user in recalling the context from which the audio was requested. | 02-25-2010 |
20100048242 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to data driven imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 02-25-2010 |
20100054529 | Methods for Extracting Identifying Information From Video and Audio Content - The presently claimed invention relates generally to extracting or computing identifying information from media content, e.g., such as video and audio. One claim recites a method including: obtaining data representing video or audio associated with an online network resource; obtaining instructions from the online network resource, the instructions are associated with the data; processing the data in accordance with at least some of the instructions; utilizing one or more processors, computing identifying information from the data, the identifying information facilitating identification of the video or audio. Of course, other claims and combinations are provided as well. | 03-04-2010 |
20100067734 | Geographical Encoding Imagery and Video - The presently claimed invention relates generally to encoding imagery and video. One claim recites a method including: obtaining data representing an image or video captured from an aerial platform; and utilizing a multi-purpose computer processor configured to: control communication of the data; and steganographically encode the data to include information representing polynomial coefficients associated with at least one geographic dimension. Other combinations and claims are provided as well. | 03-18-2010 |
20100067737 | Steganographic Systems and Methods - The present invention relates to steganographic systems and methods. One claim recites an apparatus including: electronic memory to buffer a compressed digital watermark object, the digital watermark object is a separate object relative to a compressed video object; and an electronic processor. The electronic processor is programmed for: decompressing the compressed video object to yield a decompressed video object, the decompressed video object comprising data representing video picture elements and data representing audio elements; decompressing the digital watermark object to obtain digital watermark data; steganographically hiding the digital watermark data in the data representing video picture elements or in the data representing audio elements to yield digital watermarked video or audio; and rendering the digital watermarked video or audio. Other claims and combinations are provided too. | 03-18-2010 |
20100094639 | METHODS AND ARRANGEMENTS EMPLOYING DIGITAL CONTENT ITEMS - Methods and arrangements for identifying content, and employing such identification, are detailed. One method embeds a plural-bit digital watermark into content, but first checks to see if the content is previously watermarked. Another method applies a digital watermark detection procedure to only a sub-portion of a digital content item. Yet another arrangement involves plural-portion content, where one portion is watermarked with first data governing its rights management, and another portion is watermarked with second data governing its rights management. Still another method concerns distribution of content items, where each is watermarked with a unique ID as part of the distribution process. Yet another method concerns deriving an identifier from content, and using the content to access related metadata from a remote computer system. Still other methods concern arrangements for recognizing content, and then providing links to information about the content creator, etc., in response. A variety of other technologies and improvements are also detailed. | 04-15-2010 |
20100119108 | Methods and Arrangements for Composing Information-Carrying Artwork - Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements for future designs. The same user-interface techniques that are employed to pick colors in image-editing software (e.g. Adobe Photoshop) and fill textures in presentation programs (e.g. Microsoft PowerPoint) can similarly be used to present a palette of information patterns to a security document designer. Clicking on a visual representation of the desired pattern makes the pattern available for inclusion in a security document being designed (e.g. filling a desired area). A great variety of other features and arrangements are also detailed. | 05-13-2010 |
20100128924 | Authentication of Identification Documents - Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph. | 05-27-2010 |
20100131767 | Methods for Audio Watermarking and Decoding - The presently claimed invention relates generally to encoding and decoding audio signals to include auxiliary information. One example encoding technique includes steganography. One method recites: using a microphone, obtaining an audio signal carried by sound waves; utilizing an analog-to-digital converter to convert the audio signal into a digital audio signal; utilizing a programmed electronic processor, extracting auxiliary data from a series of segments of the digital audio signal, the segments conveying the same auxiliary data, yet the segments represent the auxiliary data differently as code signals carrying the same auxiliary data change over the blocks, the auxiliary data being steganographically hidden in the digital audio signal; and utilizing a programmed electronic processor, utilizing the auxiliary data from the series of segments to increase confidence of accurate extraction of the auxiliary data, the auxiliary data being separately decoded from the segments and combined to increase the confidence of extraction of the auxiliary data. Of course, other combination and claims are provided as well. | 05-27-2010 |
20100138012 | Methods and Devices Responsive to Ambient Audio - A portable device uses a microphone to listen to ambient audio, derives data from captured audio signals, and uses the derived data to request delivery of the audio or related information to the user's home or other location. The device is desirably pocket-sized, or suitable for carrying on a key-ring. The device may also detect a watermark signal that is present in the user's environment (e.g., played through a public address speaker system) to aid the user in recalling the context from which the audio was requested. | 06-03-2010 |
20100141779 | Methods and Systems for Interacting with Physical Objects - A camera, of a handheld computing device, is used to capture a picture of an object. At least some image data corresponding to the captured picture is provided to a processor, which returns processed information corresponding to the object. By reference to this processed information, the system automatically identifies a particular one of plural different software application programs—a program that is particularly relevant to the object, rather than being generally relevant to all objects. Output information is then produced using the identified software application program, which is then presented to the user, e.g., on a screen of the handheld computing device. A great number of other features and arrangements are also detailed. | 06-10-2010 |
20100142749 | Digital Watermarking Apparatus and Methods - The present invention relates to various digital watermarking methods, apparatus and systems. One claim recites a method of determining a size or denomination of a momentary object. The method includes: utilizing a configured, multi-purpose electronic processor, decoding a digital watermark embedded in a monetary object, the watermark including data corresponding to a denomination of the monetary object; based on the data, determining feedback to indicate the denomination of the monetary object; and providing the feedback. Handheld computing devices can be advantageously employed with this combination. Of course, other combinations are provided and claimed. | 06-10-2010 |
20100142752 | Signal Processing of Audio and Video Data, including Deriving Identifying Information - The present invention relates generally to signal processing of media content, e.g., audio or video content. One form of signal processing derives identifying information from media content. One claim recites a method including: upon encountering audio or video content, and using a programmed electronic processor, attempting to derive identifying information from data representing the encountered audio or video content; if a digital watermark is not obtained from the data representing the encountered audio or video content, modifying the encountered audio or video content; and then attempting to attempting to derive identifying information from data representing the modified audio or video content. Of course, other claims are provided too. | 06-10-2010 |
20100146285 | Digital Watermarks - The present invention relates generally to digital watermarking and steganographic data hiding. In one embodiment a method of rendering content to a user is provided. The rendered content includes a digital watermark embedded therein. In another embodiment, digital watermarking is utilized to facilitate purchase or lease of audio or video content over a network or with a remote computer. In still another embodiment, a compression characteristic is determined, and subsequent steganographic embedding is influenced based on the characteristic. Other embodiments are provided as well. | 06-10-2010 |
20100150395 | Data Transmission by Extracted or Calculated Identifying Data - The present invention relates to data transmission, and more particularly relates to use of extracted or calculated identifying data as proxies in transmission. One claim recites a method including: receiving identifying data and information from a handheld device, the identifying data having been calculated from audible portions or video portions of first content utilizing at least a programmed electronic processor housed within the handheld device, in which the handheld device comprises a media player for rendering audio or video content to a user of the handheld device, and the information comprises capabilities associated with the handheld device; with reference to a database, determining additional content, enhanced or improved relative to the first content, that is associated with: i) the identifying data, and ii) the information; and providing metadata associated with the additional content to the handheld device. These techniques could be advantageously applied to cell phones. Of course, other combinations and claims are also provided. | 06-17-2010 |
20100163629 | Security Document Carrying Machine Readable Pattern - The present invention relates generally to security documents (e.g., banknotes, ID documents, certificates, packaging, etc.). One claim recites a security document including a security pattern provided thereon. The security pattern includes a line structure in which lines width or line spacing is adjusted to convey a predefined, machine-readable pattern in a frequency transform domain. Another claim recites a security document including a security pattern provided thereon. The security pattern is provided in the security document through modifications to a color provided on the security document. The security pattern conveys a predefined, machine-readable pattern in a frequency transform domain. Of course, additional combinations and claims are provided as well. | 07-01-2010 |
20100165158 | METHOD AND APPARATUS FOR SENSOR CHARACTERIZATION - The detailed technology relates to optical sensors, and more particularly relates to characterizing local behaviors of a sensor, and using such characterization information in a sensor-based system. In a particular arrangement, output signals produced from each of plural sensing elements in a 2D optical sensor are checked to determine whether they tend to differ from output signals produced by one or more neighboring sensing elements—when combined across plural captured image frames. The results are stored in an associated memory, and can be consulted in determining how image data captured from the sensor should be used. The technology is particularly illustrated in the context of a watermark decoder for a cell phone camera. A variety of other features and arrangements are also detailed. | 07-01-2010 |
20100172538 | Hiding and Detecting Auxiliary Data in Media Materials and Signals - The present technology relates to steganographically hiding messages in materials such as paper stock, plastic and film. The technology can also be used to encode auxiliary data in imagery, which may be separately marked (e.g., by altering values of digital image pixels), or may simply be formed on a marked material. | 07-08-2010 |
20100172540 | Synchronizing Rendering of Multimedia Content - Auxiliary data encoded in multimedia content signals synchronizes rendering of different media content types in multimedia content. This auxiliary data includes one or more digital watermarks that are used to synchronize playback of the different media content signals. The digital watermarks identify different media signals, identify rendering locations, such as temporal or spatial areas in a first signal where the media signal is to be rendered, or provide rendering control scripts for controlling playback. | 07-08-2010 |
20100185306 | Methods and Systems Employing Digital Content - A portable device for use with audio or visual content (e.g., an MP3 player-like device, or a camera-enabled device) is equipped with one or more features/capabilities, including: a user interface through which a consumer can instruct that content be delivered to a different consumer's device, the ability to derive identifiers from content and take action(s) based thereon, the ability to count playbacks of content; and/or the ability to interact with remote web services. A variety of other features and arrangements are also detailed. | 07-22-2010 |
20100198941 | METHODS AND ARRANGEMENTS EMPLOYING DIGITAL CONTENT ITEMS - Methods and arrangements for identifying content, and employing such identification, are detailed. One method embeds a plural-bit digital watermark into content, but first checks to see if the content is previously watermarked. Another method applies a digital watermark detection procedure to only a sub-portion of a digital content item. Yet another arrangement involves plural-portion content, where one portion is watermarked with first data governing its rights management, and another portion is watermarked with second data governing its rights management. Still another method concerns distribution of content items, where each is watermarked with a unique ID as part of the distribution process. Yet another method concerns deriving an identifier from content, and using the content to access related metadata from a remote computer system. Still other methods concern arrangements for recognizing content, and then providing links to information about the content creator, etc., in response. A variety of other technologies and improvements are also detailed. | 08-05-2010 |
20100205445 | WATERMARK SYSTEMS AND METHODS - Various improvements relating to digital watermarking and related technologies are detailed, including methods that enhance security and functionality, and new articles including watermarked puzzles and marked DNA. | 08-12-2010 |
20100226525 | Processing Audio or Video Content with Multiple Watermark Layers - The present invention relates generally to audio and video processing, e.g., with digital watermarking. One claim recites an apparatus including: electronic memory for buffering data representing audio or video, and an electronic processor. The electronic processor is programmed for: (i) controlling receipt of data representing audio or video, the data representing audio or video comprising at least two digital watermark layers, the first watermark layer comprising a content identifier which uniquely identifies the content, and the second watermark layer comprising a distributor identifier which identifies a distributor or distribution channel associated with the content; and (ii) embedding a third watermark layer in the audio or video, in which the third watermark layer is embedded through alterations to data representing audible portions of the audio or through alterations to data representing video picture elements of the video, and in which each of the first watermark layer, the second watermark layer and the third digital watermark layer are embedded in the audio or video content with different watermark protocols or different watermark keys. Of course, other claims are provided as well. | 09-09-2010 |
20100226528 | Digital Watermarking Video Captured from Airborne Platforms - Digital watermarking technology is used in conjunction with video captured from airborne platforms (e.g., satellites, remotely controlled aerial vehicles and aircraft). One claim recites an airborne platform comprising: a camera for capturing video depicting at least a portion of the earth's surface; and an electronic processor. The electronic processor is programmed for: obtaining geographical metadata associated with captured video; encoding first digital watermarking in the captured video through alterations to data representing the captured video, in which the first digital watermarking is generally imperceptible to a human observer of the captured video when rendered to the human observer in real time, and in which the first digital watermarking comprises or links to the geographical metadata; and controlling transmission of digital watermarked video to a remotely located receiver on or in the earth's surface. Another claim recites: that the electronic processor is further programmed for: hiding second digital watermarking in data representing the captured video, the second digital watermarking comprising a plural-bit payload that includes data representing a refinement relative to at least some of the geographical metadata. Other claims and combinations are provided too. | 09-09-2010 |
20100226529 | Methods and Apparatus to Process Imagery or Audio Content - The presently claimed invention relates generally to digital watermarking, and processing imagery (e.g., including video) or audio content. One claim recites a method including: obtaining first media comprising imagery or audio; obtaining second media comprising imagery or audio; aggregating the first media and the second media to yield a unit; and using a programmed electronic processor, examining the unit for the presence of a digital watermark. Another claim recites a method comprising: upon encountering imagery or audio content, performing a screening operation on the imagery or audio content; based at least in part on the result of the screening operation, determining whether to derive or extract identifying data from the imagery or audio content, said act of determining uses a programmed electronic processor; providing the identifying data for storage in an electronic data record. Still another claim recites a method comprising: using a programmed electronic processor, extracting identifying data from data representing imagery or from data representing audio; automatically dialing a telephone number; providing the identifying data for telephonic communication to a device hosting the telephone number; receiving signals representing a human voice command; and providing signals for telephonic communication to a device hosting the telephone number. Of course, other claims and combinations are provided too. | 09-09-2010 |
20100260375 | Method and Apparatus for Associating Identifiers with Content - Watermark detection in an image or the like can be optimized by exploiting the innate biases in the image to emphasize the watermark signal. The watermark signal can be trial-located with different origins in the image to find one that yields improved results. Similarly, the image can be processed (e.g., by changing resolution, rotation, or compression) so as to change the innate biases to better reinforce the watermark signal. Compression of an image can be done in accordance with a desired identifier, with the compressor deciding which image components to retain and which to discard based, in part, on the identifier that is to be associated with the image. The techniques are also applicable to other forms of content, such as audio. A variety of other arrangements are also detailed. | 10-14-2010 |
20100261465 | METHODS AND SYSTEMS FOR CELL PHONE INTERACTIONS - Integrating wireless capability into a device (e.g., a thermostat, a parking meter, a hotel alarm clock, etc.), effectively adds to the device a graphical user interface (GUI) capability. The user's cell phone can be employed for interaction with the device via such a GUI. In one particular arrangement, a cell phone camera captures an image of a thermostat, from which an identifier (e.g., a steganographic digital watermark) is decoded and used to access a corresponding record at a remote server. The server in this arrangement causes a JavaScript application to be returned to the cell phone—which may correspond both to the thermostat which is to be controlled, and to the cell phone that is to control it. An exemplary GUI takes the form of a graphical overlay—presented in registered alignment atop the camera-captured image of the device. Once the application establishes an initial session between the phone and the controlled device, the phone may later recall the GUI to allow further device interaction—such as changing the thermostat temperature from the user's desk (or adding time to a parking meter from across town). The interfaces may be customized, e.g., for user preferences, and for different specific task-oriented interactions. By such technology, a user's cell phone serves as multi-purpose interface for dealing with a variety of wireless-equipped devices. | 10-14-2010 |
20100284564 | Steganographic Encoding - The present invention relates generally to steganographic encoding. One claim recites a consumer product including: a metallic or shinny surface including a machine-readable pattern, the machine-readable pattern including plural-bit auxiliary data hidden in a steganographic manner, and the pattern provides at least diffuse or Lambertian reflection. Another claim recites a consumer product including: a shiny or metallic surface including a pattern, the pattern including or representing the auxiliary data in a steganographic manner, and in which the pattern is provided with an ink or dye and in which at least one of a coloration or finish of the ink or dye is selected to hide the ink or dye with respect to at least one of a first coloration or the first finish. The auxiliary data comprises or links to information regarding the physical object. Of course, other claims and combinations are also provided. | 11-11-2010 |
20100290666 | Controlling Use of Audio or Image Content - The present invention relates generally to controlling use of audio (e.g., ambient or digital audio) or image content (e.g., the image content may comprise video). One claim recites a method comprising: receiving data representing audio elements or image picture elements, the audio elements or image picture elements being captured using a sensor; using a programmed electronic processor, analyzing the data representing audio elements or image picture elements to extract identifying information therefrom; communicating extracted identifying information to a database; receiving control information from the database; carrying out an action based at least in part on the control information. Of course, other claims are provided as well. | 11-18-2010 |
20100293106 | Location-Based Arrangements Employing Mobile Devices - In one arrangement, a first user sends information from a portable device and receives a response that depends, at least in part, on the location of a second user's portable device. The information sent from the first portable device may be based on data captured by a sensor in that device. In another arrangement, a user of a portable device sends two types of data, sensor-related data and location-related data, and receives a response that is based on both of these of data. In one particular such embodiment, the user scans a barcode or watermark from a coupon or other printed object, and sends decoded payload data—together with location data (e.g., GPS data)—to a remote server. The remote server routes the information to a vendor near the user who can, e.g., fulfill an order for food delivery to the user. | 11-18-2010 |
20100293276 | METHODS FOR ANALYZING ELECTRONIC MEDIA INCLUDING VIDEO AND AUDIO - The present disclosure includes methods and apparatus for analyzing audio and video. One claim recites: a method including at a network access point, and using a programmed electronic processor, analyzing data representing audio or video to extract identifying information therefrom, the analyzing operates on data representing audible portions of the audio or operates on data representing picture elements of the video; using the identifying information, determining whether to allow the audio or video to be communicated through the network access point; and providing details associated with said act of determining. Of course, other combinations are provided and claimed as well. | 11-18-2010 |
20100296526 | Wireless Methods and Devices Employing Plural-Bit Data Derived from Audio Information - A portable wireless device includes a processor portion, which is adapted to process audio information in two different ways, for two different purposes. One is to help generate a signal that drives a speaker of the device, so that a user can listen thereto. Another is to process audio information to derive plural-bit data therefrom. The device can then take an action based on the derived plural-bit data. In one particular arrangement, the processor is configured as a steganographic decoder. A variety of other features and arrangements are also detailed, including image-based methods, and arrangements employing various types of fingerprinting. | 11-25-2010 |
20100296695 | Methods and Systems for Steganographic Processing - The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too. | 11-25-2010 |
20100310117 | COLOR IMAGE OR VIDEO PROCESSING - The present invention relates generally to color image processing. One claim recites a method comprising: determining a plurality of color attributes associated with video or imagery; determining which samples representing the video or imagery should receive digital watermarking based on the plurality of color attributes; transforming at least some of the samples into a transform domain; and utilizing a programmed electronic processor, modifying transform domain coefficients representing the samples to hide the digital watermarking therein. Of course other claims and combinations are provided as well. | 12-09-2010 |
20100310118 | Printing Media and Methods Employing Digital Watermarking - Stationery, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization). | 12-09-2010 |
20100310164 | COLOR IMAGE OR VIDEO PROCESSING - The present invention relates generally to color image processing. One claim recites a method of color masking an image or video including: reading color values of an image sample of the image or video and a corresponding change of an attribute of the image sample; and based on the color values of the image sample, and using a programmed electronic processor, mapping the change in the image sample attribute to a change in color components of the image sample that is equivalent to the change in the image sample attribute, yet reduces visibility of the change in the image sample attribute for the specific color values of the image sample. Another claim recites a method including: obtaining data representing digital imagery or video; analyzing at least a portion of the data to determine one or more color characteristics associated with the at least a portion of the data, said act of analyzing yielding a result; based at least in part on the result, generating a key; and using a programmed electronic processor, embedding auxiliary data in the data representing digital imagery or video using the key. Of course other claims and combinations are provided as well. | 12-09-2010 |
20100318664 | STEGANOGRAPHIC ENCODING FOR VIDEO AND IMAGES - The presently claimed invention relates generally to digital watermarking and steganographic data hiding for video and images. One claim recites a method of connecting a user computing device to one of a plurality of remote computers available for communication over a network. The method includes: a) obtaining streaming data representing a two dimensional color image or video, the two dimensional color image or video including an index steganographically hidden therein through alterations to the two dimensional color image or video; b) analyzing the streaming data to obtain the index; c) accessing a database with the index, the database comprising a plurality of records that associate an index to a pointer, the pointer identifying a remote computer on the network, in which the pointer is determined as a function of the index; and d) using the pointer to establish communication with the remote computer identified thereby. Of course, additional claims and combinations are provided as well. | 12-16-2010 |
20100322035 | Audio-Based, Location-Related Methods - The presently claimed technology relates generally to audio-based, location-related methods. One claim recites a method in which a microphone in a user's portable device captures ambient sound, and corresponding data is then processed to determine location information about the user's location. Action is then taken involving the determined location information. By such arrangement, location information is determined by reference to ambient sound captured by a user-carried portable device. A great number of other features and arrangements are also detailed. | 12-23-2010 |
20110002503 | Identification Documents and Authentication of Such Documents - The present invention relates generally to identification documents. One claim recites an apparatus to authentic an identification document. The identification document comprising first machine-readable information including a first plural-bit message, and semantic information carried on or in the identification document. The apparatus includes: a first reader to read the first machine-readable information to obtain the first plural-bit message; a second reader to obtain information from the semantic information carried on or in the identification document; an electronic processor programmed as a decryption unit to decrypt the first plural-bit message or the information obtained from the semantic information; and an electronic processor programmed as a decision unit to determine whether the identification document is authentic based at least in part on the first plural-bit message and the semantic information. Other claims and combinations are provided as well. | 01-06-2011 |
20110007936 | Encoding and Decoding Media Signals - The present disclosure relates generally to encoding and decoding signals from media signals. One claim recites an apparatus comprising: electronic memory for storing blocks of a media signal; an electronic processor programmed for: determining a detection metric for the blocks, the detection metric comprising a measure of coincidence of detection parameters of different blocks; and performing detection operations based on the measure of coincidence of the detection parameters. Of course, other claims and combinations are provided as well. | 01-13-2011 |
20110013802 | Content Objects with Computer Instructions Steganographically Encoded Therein, and Associated Methods - Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie. | 01-20-2011 |
20110019001 | Wireless Mobile Phone Methods - A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed. | 01-27-2011 |
20110026086 | Vibratory Scanning - Motion is introduced into a scanning operation, in addition to the motion that is inherent in any scanning operation. For example, in a flatbed scanner a linear array of scanning devices is positioned across a document in a first or “x” direction and this array is moved across the document in a perpendicular or “y” direction. With embodiments of the present technology a vibratory motion is introduced into the scanning process—not aligned with the basic “y” direction of scan. Such vibratory motion can be controlled in accordance with pre-stored data, or a random process can be employed. In some arrangements, the vibration reduces Moiré patterns. In other arrangements, the vibration causes a hidden pattern to be revealed from the scanned object. A great many other features and arrangements are also detailed. | 02-03-2011 |
20110026777 | Methods and Devices Involving Imagery and Gestures - A portable wireless device (e.g., a mobile phone) is moved or positioned by a user to signal user input. The device takes an action based on such gesture, where the action involves imagery captured by the device. A great variety of other features and arrangements are also detailed. | 02-03-2011 |
20110034176 | Methods and Systems for Content Processing - Many of the detailed technologies are useful in enabling a smart phone to respond to a user's environment, e.g., so it can serve as an intuitive hearing and seeing device. A few of the detailed arrangements involve using radio base station SDR equipment (e.g., at a cell tower) to perform image recognition operations for phones; forecasting service needs from remote processors, and reserving such capacity in advance of use; delegating a remote execution task to a service provider chosen in a competitive process, such as by a reverse auction; using nearby processors, e.g., in an automobile, another phone, or set-top box, for remote execution tasks; phones with separable camera and/or illumination components; phone camera illumination using different colors of light; using search tree methods with image frames captured at different focuses; using a phone's microprojector to aid in object identification; correcting lens aberrations by texture mapping captured imagery onto a corrective polygon surface using a phone GPU; etc. A great variety of other features and arrangements are also detailed. | 02-10-2011 |
20110040780 | AUDIO PROCESSING - The presently claimed invention relates generally to processing streaming audio signals. One claim recites a method including: using a programmed electronic processor, analyzing a streaming audio signal to obtain identifying information therefrom; providing the identifying information to a remotely located database, the database including a plurality of records that associate identifying information with pointers; receiving from the database a pointer corresponding to the provided identifying information; using the pointer to establish communication with a remote website including information associated with the audio signal; and providing an audible tone to a user in association with at least one of the foregoing. Of course, other claims and combinations are provided as well. | 02-17-2011 |
20110051998 | Methods for Controlling Rendering of Images and Video - The present disclosure includes disclosure generally related to digital watermarking and steganographic encoding. One claim recites an apparatus including: electronic memory for buffering data representing video or imagery; and an electronic processor. The electronic processor is programmed for: analyzing the data representing video or imagery, the video or imagery comprising digital watermarking hidden therein through alterations, the digital watermarking comprising content classification information; decoding the content classification information from the digital watermarking; and controlling display or rendering of the video or imagery in response to the content classification information. Other combinations are provided and claimed as well. | 03-03-2011 |
20110058707 | Digital Watermarks - The present invention relates generally to information encoding, data hiding, steganography and digital watermarking. One claim recites: using a programmed electronic processor, encoding content with a plural-bit digital watermark in accordance with initial encoding parameters; determining an assessment of the encoded plural-bit digital watermark in each of two or more portions of the content; for each of the two or more portions of the content, adjusting at least one of the initial encoding parameters according to a determined assessment for a respective portion of the content; and using a programmed electronic processor, encoding the content with said plural-bit watermark in accordance with adjusted encoding parameters. Other claims are provided as well. | 03-10-2011 |
20110066658 | Methods and Devices Employing Content Identifiers - Content identifiers are associated with respective metadata. Through use of the metadata, a user's experience with the content can be enhanced. A variety of other arrangements are also detailed. | 03-17-2011 |
20110066734 | NETWORK LINKING METHODS AND APPARATUS - The presenting invention relates generally to indirect linking methods and apparatus. One claim recites a method including: a) using a programmed electronic processor, reading an index from color imagery steganographically modulated with the index; b) accessing a database with the index, the database comprising a plurality of records that link an index to a pointer which identifies a remote computer on a network; c) extracting a pointer from the database as a function of the index; and d) using the pointer to establish communication with the remote computer identified thereby. Of course, other combinations are provided and claimed as well. | 03-17-2011 |
20110081041 | Variable Message Coding Protocols For Encoding Auxiliary Data in Media Signals - Variable message coding protocols enable greater flexibility in encoding auxiliary data in media signals. One such protocol employs a version identifier that indicates the type of coding used to process an auxiliary data message before it is embedded in a host media signal. This version identifier specifies the type of error robustness coding applied to a variable message. The error robustness coding may be varied to alter the message payload capacity for different versions of auxiliary data embedding and reading systems. Another protocol uses control symbols to specify the format and variable length of the variable message. | 04-07-2011 |
20110098029 | SENSOR-BASED MOBILE SEARCH, RELATED METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 04-28-2011 |
20110098056 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 04-28-2011 |
20110102143 | Authenticating Signals and Identification and Security Documents - The present disclosure relates to signals and identification and security documents and methods and systems for authenticating such. In one claim, a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document. Other claims, implementations and embodiments are provided as well. | 05-05-2011 |
20110106539 | Audio and Video Signal Processing - The present disclosure related generally to audio and video signal processing. Various arrangements are disclosed. One method recites: (a) obtaining data representing audible portions of audio or representing picture portions of video; (b) using a programmed electronic processor, determining identifying information from the obtained data by computing a frequency transform to produce frequency transform data, and processing the frequency transform data to derive a pattern, and using the pattern as the identifying information for the audio or video; and (c) using the identifying data to facilitate purchase or license of the audio or video. Other arrangements are disclosed as well. | 05-05-2011 |
20110129115 | Digital Authentication with Analog Documents - Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph. | 06-02-2011 |
20110142280 | Authenticating Identification and Security Documents - The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too. | 06-16-2011 |
20110158468 | Error Processing of Steganographic Message Signals - A form of error processing is used to decode steganographic messages embedded in image and audio signals in the presence of distortion, which tends to introduce errors in steganographic data communication. Content signals with auxiliary embedded data are analyzed to detect embedded message signals. Confidence values are assigned to the message signals and used to ascertain whether a message has been accurately detected. Error processing enables accurate message extraction in the presence of “soft errors” in the embedded message signal. This error processing enables more effective recovery of the steganographic message from content signals that undergo distortion and/or loss transformations after being embedded with steganographic data. | 06-30-2011 |
20110159921 | METHODS AND ARRANGEMENTS EMPLOYING SENSOR-EQUIPPED SMART PHONES - The present technology concerns improvements to smart phones and related sensor-equipped systems. Some embodiments relate to smart phone-assisted commuting, e.g., by bicycle. Some involve novel human-computer interactions, e.g., using tactile grammars—some of which may be customized by users. Others involve spoken clues, e.g., by which a user can assist a smart phone in identifying what portion of imagery captured by a smart phone camera should be processed, or identifying what type of image processing should be conducted. Some arrangements include the degradation of captured content information in accordance with privacy rules, which may be location-dependent, or based on the unusualness of the captured content, or responsive to later consultation of the stored content information by the user. A great variety of other features and arrangements are also detailed. | 06-30-2011 |
20110161076 | Intuitive Computing Methods and Systems - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 06-30-2011 |
20110194730 | CONTROL SIGNALS IN STREAMING AUDIO OR VIDEO INDICATING A WATERMARK - Methods and apparatuses for searching for a control signal in streaming video or streaming audio that indicates the presence of a watermark in the streaming video or streaming audio. The streaming video or streaming audio is received and searched for a control signal. The detection of a control signal indicates the presences of a digital watermark in the streaming video or streaming audio. An indicator is triggered based upon detecting the control signal. | 08-11-2011 |
20110212717 | Methods and Systems for Content Processing - Mobile phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others concern user interface improvements. Other aspects relate to imaging architectures, in which a mobile phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Still other aspects relate to distribution of processing tasks between the mobile device and remote resources (“the cloud”). Elemental image processing (e.g., simple filtering and edge detection) can be performed on the mobile phone, while other operations can be referred out to remote service providers. The remote service providers can be selected using techniques such as reverse auctions, through which they compete for processing tasks. A great number of other features and arrangements are also detailed. | 09-01-2011 |
20110214044 | Methods and Arrangements Relating to Signal Rich Art - Art is infused with network identifiers at the time of its creation, rather than as a post-process. The identifiers may be encoded as overt elements of the art, and enable the artist to reprogram—over time—an augmentation of the artwork experience via network-delivered components. These network components can include stimuli present when the artist created the work (e.g., music), commentary by the artist, video and augmented reality features, audience-crowdsourced content (e.g., imagery of, or feedback provided by, other viewers encountering the artwork), etc. The artwork augmentation can vary with the user's context (e.g., location, demographics, interests, history). Physical brushes can be equipped to insert such identifiers in graphic arts; other authoring tools are disclosed as well. The network experience can be delivered via smartphones, projectors, and other devices. A great number of other features and arrangements are also detailed. | 09-01-2011 |
20110243375 | INSERTING WATERMARKS INTO PORTIONS OF DIGITAL SIGNALS - The present invention relates generally to watermarking. In one implementation a method of pre-analyzing a digital signal for encoding digital watermarks using a digital filter comprising determining what changes in the digital signal will be affected by the digital filter is provided. In another implementation a system for pre-analyzing a digital signal for encoding at least one digital watermark using a digital filter is provided. The method includes a processor for identifying an area of the digital signal that will be affected by the digital filter; and an encoder for encoding the at least one digital watermark in the digital signal, the encoder encoding the at least one digital watermark so as to avoid the at least one area of the digital signal that will be affected by the digital filter. Other implementations are provided as well. | 10-06-2011 |
20110274270 | CONTENT CONTAINING A STEGANOGRAPHICALLY ENCODED PROCESS IDENTIFIER - A method includes receiving graphic data and steganographically encoding machine-readable data in the graphic data. The machine-readable data identifies a computer implemented process that is to be invoked when the steganographic encoding is decoded and acted upon by a computing device. | 11-10-2011 |
20110274310 | HIDDEN IMAGE SIGNALLING - An image is encoded to define one or more spatial regions that can be sensed by a suitably-equipped mobile device (e.g., a smart phone), but are imperceptible to humans. When such a mobile device senses one of these regions, it takes an action in response (e.g., rendering an associated tone, playing linked video, etc.). The regions may overlap in layered fashion. One form of encoding employs modification of the color content of the image at higher spatial frequencies, where human vision is not acute. In a particular embodiment, the encoding comprises altering a transform domain representation of the image by adding signal energy in a first chrominance channel, where the added signal energy falls primarily within a segmented arc region in a transform domain space. | 11-10-2011 |
20110274313 | SIGNAL PROCESSING OF AUDIO AND VIDEO DATA, INCLUDING ASSESSMENT OF EMBEDDED DATA - The present invention relates generally to signal processing of media content, e.g., audio or video content. One form of signal processing derives identifying information from media content. One claim recites a method including: upon encountering audio or video content, and using a programmed electronic processor, attempting to derive identifying information from data representing the encountered audio or video content; if a digital watermark is not obtained from the data representing the encountered audio or video content, modifying the encountered audio or video content; and then attempting to attempting to derive identifying information from data representing the modified audio or video content. Of course, other claims are provided too. | 11-10-2011 |
20110276663 | CONTROLLING A DEVICE BASED UPON STEGANOGRAPHICALLY ENCODED DATA - A method includes receiving, at a first device, data representing a graphic. The graphic includes non-uniformly toned regions with information steganographically encoded therein. The steganographically encoded information is decoded from the received data. The method also includes communicating with a second device and receiving data from the second device. An aspect of operation of the first device is controlled in accordance with the data received from the second device. The data received from the second device is a function of the decoded information. | 11-10-2011 |
20110311096 | Object Processing Employing Movement - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through use of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 12-22-2011 |
20120008823 | DIGITAL WATERMARKS - The present invention relates generally to digital watermarking and steganographic data hiding. In one embodiment a method of rendering content to a user is provided. The rendered content includes a digital watermark embedded therein. In another embodiment, digital watermarking is utilized to facilitate purchase or lease of audio or video content over a network or with a remote computer. In still another embodiment, a compression characteristic is determined, and subsequent steganographic embedding is influenced based on the characteristic. Other embodiments are provided as well. | 01-12-2012 |
20120045089 | DECODING A WATERMARK AND PROCESSING IN RESPONSE THERETO - Watermark encoders and decoders can be integrated into operating systems, Internet browsers, media players, and other applications and devices. Such integration enables the watermark-enabled application or device to provide additional functionality and information available via the watermark. The watermark, for example, may link to metadata or actions related to a media object. To exploit this watermark enabled functionality, the integrated application uses a watermark decoder to access the related metadata and actions. The user interface of the integrated application is enhanced to present metadata and actions linked via the watermark. Similarly, watermark encoders may be integrated into applications to convert media objects into enhanced, watermarked objects. A variety of other arrangements and features are also detailed. Many arrangements can be implemented using object identifiers other than watermarks. | 02-23-2012 |
20120074222 | Document Processing Methods - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 03-29-2012 |
20120077542 | Methods and Arrangements Employing Mixed-Domain Displays - An image is encoded to define one or more spatial regions that can be sensed by a suitably-equipped mobile device (e.g., a smartphone), but are imperceptible to humans. When such a mobile device senses one of these regions, it takes an action in response (e.g., rendering an associated tone, playing linked video, etc.). The regions may overlap in layered fashion. One form of encoding employs modification of the color content of the image at higher spatial frequencies, where human vision is not acute. In a particular embodiment, the encoding comprises altering a transform domain representation of the image by adding signal energy in a first chrominance channel, where the added signal energy falls primarily within a segmented arc region in a transform domain space. In another arrangement, a smartphone display presents both image data captured from a scene, and a transform representation of the image data (e.g., in the Fourier domain). This latter information can aid a user in positioning the phone, e.g., to enhance decoding of a steganographic digital watermark. In still another arrangement, foveal filtering is applied to of smartphone-captured image data in connection with other image processing. | 03-29-2012 |
20120131140 | FINGERPRINTS AND MACHINE-READABLE CODES COMBINED WITH USER CHARACTERISTICS TO OBTAIN CONTENT OR INFORMATION - The present invention relates generally to processing audio and video data. One claim recites a method of accessing content stored in a remote database. The method includes: receiving video or audio data; decoding an auxiliary machine-readable code from the video or audio data; deriving a fingerprint, which fingerprint is separate from the machine-readable code, from the video or audio data itself; providing user characteristics or an index to user characteristics; and by using the machine-readable code, fingerprint and user characteristics or information obtained with the index to user characteristics, accessing the content stored in the remote database. Of course, additional combinations and claims are provided as well. | 05-24-2012 |
20120134548 | Smartphone-Based Methods and Systems - Methods and arrangements involving portable devices are disclosed. One arrangement enables a content creator to select software with which that content should be rendered—assuring continuity between artistic intention and delivery. Another arrangement utilizes the camera of a smartphone to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some of the detailed technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed. | 05-31-2012 |
20120158550 | MUSIC METHODS AND SYSTEMS - The disclosure details a variety of applications of steganographic encoding and decoding of auxiliary information in physical and media objects. In particular, digital watermarks embedded in media content are used to initiate automated transactions associated with the content and to link creative content with information or transactions. | 06-21-2012 |
20120163666 | Object Processing Employing Movement - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 06-28-2012 |
20120165046 | Intuitive Computing Methods and Systems - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 06-28-2012 |
20120190404 | Methods and Systems for Content Processing - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 07-26-2012 |
20120218436 | Sensor-Based Mobile Search, Related Methods and Systems - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 08-30-2012 |
20120224743 | SMARTPHONE-BASED METHODS AND SYSTEMS - Methods and arrangements involving portable devices, such as smartphones and tablet computers, are disclosed. Exemplary arrangements utilize the camera portions of such devices to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some of the detailed technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed. | 09-06-2012 |
20120258776 | Methods and Systems for Content Processing - Disclosed are technologies are useful in enabling a smart phone to respond to a user's environment, e.g., so it can serve as an intuitive hearing and seeing device. Some of the detailed arrangements involve using radio base station SDR equipment (e.g., at a cell tower) to perform image recognition operations for phones; forecasting service needs from remote processors delegating a remote execution task to a service provider chosen in a competitive process; using nearby processors, e.g., in an automobile, another phone, or set-top box, for remote execution tasks; phones with separable camera and/or illumination components; phone camera illumination using different colors of light; using search tree methods with image frames captured at different focuses; using a phone's microprojector to aid in object identification; correcting lens aberrations by texture mapping captured imagery onto a corrective polygon surface using a phone GPU; etc. A great variety of other features are also detailed. | 10-11-2012 |
20120273570 | Physical Credentials and Related Methods - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article through use of a variety of different card constructions (e.g., involving quantum dots, phase change materials, MEMS structures, etc.). A variety of other arrangements and features are also detailed. | 11-01-2012 |
20120280908 | Smartphone-Based Methods and Systems - Arrangements involving portable devices (e.g., smartphones and tablet computers) are disclosed. One arrangement enables a content creator to select software with which that creator's content should be rendered—assuring continuity between artistic intention and delivery. Another utilizes a device camera to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed. | 11-08-2012 |
20120281871 | COLOR IMAGE OR VIDEO PROCESSING - A method of color masking an image or video includes reading color values of an image sample of the image or video and a corresponding change of an attribute of the image sample. Based on the color values of the image sample, the change in the image sample attribute is mapped to a change in color components of the image sample that is equivalent to the change in the image sample attribute, yet reduces visibility of the change in the image sample attribute for the specific color values of the image sample | 11-08-2012 |
20120281880 | Sensing Data from Physical Objects - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 11-08-2012 |
20120309415 | MULTIPATH COMPENSATION WITHIN GEOLOCATION OF MOBILE DEVICES - A location of a mobile device within a network is determined. The network includes a plurality of fixed nodes. A method includes receiving, at the plurality of fixed nodes, receive messages transmitted from the mobile communication device. Each of the plurality of fixed nodes generates a receive count stamp for each receive message corresponding to a local counter value at the receipt of the receive message. At each of the plurality of fixed nodes, the method includes processing the receive count stamps to calculate a set of pseudo-ranges between the respective fixed node and the mobile device, and measuring multipath delay included within the set of pseudo-ranges. Based on the measurement, the multipath delay is removed from the set of pseudo-ranges to determine a range estimate between the mobile device and each of the fixed nodes. Based on the range estimates, a location of the mobile device is calculated. | 12-06-2012 |
20130011062 | Methods and Systems for Content Processing - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 01-10-2013 |
20130048722 | METHODS AND ARRANGEMENTS FOR SENSING IDENTIFICATION INFORMATION FROM OBJECTS - In one arrangement, retail product packaging is digitally watermarked over most of its extent to allow machine identification by one or more inexpensive cameras at retail checkouts. Such a system also considers image fingerprints, product configuration, barcodes and other available information in identifying products. Imagery captured by conventional or plenoptic cameras is processed to derive several perspective-transformed views, which are provided to the identification system—increasing throughput by minimizing the need to manually reposition items for identification. Crinkles and other deformations in product packaging are optically sensed, allowing the surface to be virtually flattened to aid identification. A marked conveyor belt at the checkout station increases speed and accuracy, and provides other benefits to both shoppers and sellers. A great variety of other features are also detailed. | 02-28-2013 |
20130086466 | CONTENT SENSITIVE CONNECTED CONTENT - The disclosure describes a method of connecting multimedia content to a network resource. This method operates in a computer network environment. Operating in a network connected device, the method extracts an identifier from a media signal, such as from a digital watermark, perceptual hash, or other machine extracted signal identifier. It then sends the identifier to a network along with context information indicating device type information. From the network, the method receives related data associated with the media signal via the identifier. The related data is adapted to the network connected device based on the device type information. This device type information may include a display type, so that the related date may be formatted for rendering on the display type of the device. This device type information may also include a connection speed so that the related data may be optimized for the connection speed of the device. | 04-04-2013 |
20130100301 | METHODS AND ARRANGEMENTS FOR PROCESSING IMAGE DATA - An image can be encoded to define one or more spatial regions that are detectable by a suitably-equipped mobile device (e.g., a smartphone), but are imperceptible to humans. When such a mobile device senses one of these regions, it takes an action in response (e.g., rendering an associated tone, playing linked video, etc.). The mobile device may send an excerpt of captured imagery to a cloud processor, which responds with an estimate of the viewing angle by which the image was captured. The mobile device can perform further operations (e.g., re-sampling, watermark decoding) based on this viewing angle estimate. A great variety of other features and arrangements are also detailed. | 04-25-2013 |
20130104010 | Arrangements for Increasing Detection Confidence - In one embodiment, a first set of digital data (e.g., an image) is tested for the presence of a certain feature (e.g., a certain face), yielding one of two outcomes (e.g., not-present, or present). If the testing yields the first outcome, no additional testing is performed. If, however, the testing yields the second outcome, further testing is performed to further check this outcome. Such further testing is performed on a second set of digital data that is based on, but different from, the first set of data. Only if the original testing and the further testing both yield the same second outcome is it treated as a valid result. A variety of other features and arrangements are also detailed. | 04-25-2013 |
20130128060 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 05-23-2013 |
20130172048 | Authenticating Identification and Security Documents and Other Objects - The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too. | 07-04-2013 |
20130183952 | Smartphone-Based Methods and Systems - Arrangements involving portable devices (e.g., smartphones and tablet computers) are disclosed. One arrangement enables a content creator to select software with which that creator's content should be rendered—assuring continuity between artistic intention and delivery. Another utilizes a device camera to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some technologies concern improvements to the user interfaces associated with such devices. Others involve use of these devices in connection with shopping, text entry, sign language interpretation, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern use of linked data in portable devices—some of which exploit GPU capabilities. Still other technologies concern computational photography. A great variety of other features and arrangements are also detailed. | 07-18-2013 |
20130217440 | IMAGE PROCESSING ARCHITECTURES AND METHODS - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality is improved, and new functionality is provided. Some aspects relate to imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. A great number of other features and arrangements are also detailed. | 08-22-2013 |
20130223673 | METHODS AND ARRANGEMENTS FOR IDENTIFYING OBJECTS - In some arrangements, product packaging is digitally watermarked over most of its extent to facilitate high-throughput item identification at retail checkouts. Imagery captured by conventional or plenoptic cameras can be processed (e.g., by GPUs) to derive several different perspective-transformed views—further minimizing the need to manually reposition items for identification. Crinkles and other deformations in product packaging can be optically sensed, allowing such surfaces to be virtually flattened to aid identification. Piles of items can be 3D-modelled and virtually segmented into geometric primitives to aid identification, and to discover locations of obscured items. Other data (e.g., including data from sensors in aisles, shelves and carts, and gaze tracking for clues about visual saliency) can be used in assessing identification hypotheses about an item. A great variety of other features and arrangements are also detailed. | 08-29-2013 |
20130241746 | A/B/C PHASE DETERMINATION AND SYNCHROPHASOR MEASUREMENT USING COMMON ELECTRIC SMART METERS AND WIRELESS COMMUNICATIONS - Phasor Measurement Units (PMUs) tend to be specialized and expensive—relegated to only key points in power distribution networks, and are generally reliant on GPS technology. The present disclosure details how any smart meter—using wireless communication—can perform sub-microsecond-grade synchrophasor measurements. Other aspects concern smart meter-based determination of A, B or C phase of the tri-phase power network. This can involve count-stamp enabling message packets sent to and/or from a smart meter, and then associating such count-stamps to local measurements of power phase by a metrology unit. Once a network of such enabled smart meters and other devices is formed, sub-microsecond metropolitan-wide and entire region-wide synchronizing time standard can calibrate local measurements of power phase, where simple A, B and C phase determination is one low hanging fruit application of such. Low cost aggregate monitoring of metropolitan-wide synchrophasors promises a next chapter of importance for that relatively recent art. | 09-19-2013 |
20130273968 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to data driven imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 10-17-2013 |
20130290379 | DOCUMENT PROCESSING METHODS - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 10-31-2013 |
20130294648 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 11-07-2013 |
20130295894 | IMAGE PROCESSING ARCHITECTURES AND METHODS - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality is improved, and new functionality is provided. Some aspects relate to imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. A great number of other features and arrangements are also detailed. | 11-07-2013 |
20130308045 | SENSOR-SYNCHRONIZED SPECTRALLY-STRUCTURED-LIGHT IMAGING - A smartphone is adapted for use as an imaging spectrometer, by synchronized pulsing of different LED light sources as different image frames are captured by the phone's CMOS image sensor. A particular implementation employs the CIE color matching functions, and/or their orthogonally transformed functions, to enable direct chromaticity capture. A great variety of other features and arrangements are also detailed. | 11-21-2013 |
20130324161 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 12-05-2013 |
20140009629 | METHODS AND ARRANGEMENTS FOR PROCESSING IMAGE DATA - The present disclosure provides methods and systems for processing data. One claim recites a camera-equipped portable computer system, comprising: a camera; one or more processors programed for: i) controlling the camera to capture image data, the captured image data corresponding to the camera's field of view; ii) defining a sub-region comprising image data within the field of view, the sub-region comprising less image data than does the full field of view; and iii) searching image data within the field of view for hidden keys, but limiting a response to detected keys to those only found within the sub-region. Of course other claims and combinations are provided too. | 01-09-2014 |
20140029809 | METHODS AND SYSTEMS FOR SIGNAL PROCESSING - An object (e.g., a driver's license) is tested for authenticity using imagery captured by a consumer device (e.g., a mobile phone camera). Corresponding data is sent from the consumer device to a remote system, which has secret knowledge about features indicating object authenticity. The phone, or the remote system, discerns the pose of the object relative to the camera from the captured imagery. The remote system tests the received data for the authentication features, and issues an output signal indicating whether the object is authentic. This testing involves modeling the image data that would be captured by the consumer device from an authentic object—based on the object's discerned pose (and optionally based on information about the camera optics), and then comparing this modeled data with the data sent from the consumer device. A great variety of other features and arrangements are also detailed. | 01-30-2014 |
20140031059 | MOBILE DEVICE POSITIONING IN DYNAMIC GROUPINGS OF COMMUNICATION DEVICES - A location aware intelligent transportation system determines ranges between a plurality of communication devices, including at least one mobile communication device. A method includes receiving receive messages transmitted from a plurality of other communication devices. Each receive message includes a transmit count stamp corresponding to a remote counter value. The mobile communication device generates a receive count stamp for each receive message. The method includes dynamically associating and disassociating the mobile communication device with a plurality of sub-groups of the plurality of other communication devices. The associating and disassociating are based at least in part on receiving receive messages from a predetermined number of other communication devices for each sub-group. For each sub-group currently associated with the mobile communication device, the method includes generating range estimates between the mobile communication device and the other communication devices in the particular sub-group. The range estimates are based on a combination of the transmit count stamps and the receive count stamps. | 01-30-2014 |
20140036894 | WIRELESS LOCAL AREA NETWORK-BASED POSITION LOCATING SYSTEMS AND METHODS - The location of one or more mobile nodes in a wireless local area network (WLAN) is determined. Nodes in the WLAN include respective ping drivers to generate ping event values related to transmit count stamps and receive count stamps for wireless messages exchanged between the nodes. Each wireless message is associated with a transmit offset corresponding to an expected transmit time. A sorting module groups the ping event values and produces a difference between the respective receive count stamps and the transmit count stamps for each wireless message. Based on the sorted ping event values, the sorting module generates transmit offset values relating to the transmit offsets. A space-time calibration unit generates, from the sorted differences and the transmit offset values, a clock rate solution and a location solution for at least one of the nodes in the WLAN. | 02-06-2014 |
20140044304 | METHODS AND SYSTEMS FOR SIGNAL PROCESSING - An object (e.g., a driver's license) is tested for authenticity using imagery captured by a consumer device (e.g., a mobile phone camera). Corresponding data is sent from the consumer device to a remote system, which has secret knowledge about features indicating object authenticity. The phone, or the remote system, discerns the pose of the object relative to the camera from the captured imagery. The remote system tests the received data for the authentication features, and issues an output signal indicating whether the object is authentic. This testing involves modeling the image data that would be captured by the consumer device from an authentic object—based on the object's discerned pose (and optionally based on information about the camera optics), and then comparing this modeled data with the data sent from the consumer device. A great variety of other features and arrangements are also detailed. | 02-13-2014 |
20140074823 | FINGERPRINTS AND MACHINE-READABLE CODES COMBINED WITH USER CHARACTERISTICS TO OBTAIN CONTENT OR INFORMATION - The present invention relates generally to processing audio and video data. One claim recites a method of accessing content stored in a remote database. The method includes: receiving video or audio data; decoding an auxiliary machine-readable code from the video or audio data; deriving a fingerprint, which fingerprint is separate from the machine-readable code, from the video or audio data itself; providing user characteristics or an index to user characteristics; and by using the machine-readable code, fingerprint and user characteristics or information obtained with the index to user characteristics, accessing the content stored in the remote database. Of course, additional combinations and claims are provided as well. | 03-13-2014 |
20140080428 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Mobile phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others concern user interface improvements. Other aspects relate to imaging architectures, in which a mobile phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Still other aspects relate to distribution of processing tasks between the mobile device and remote resources (“the cloud”). Elemental image processing (e.g., simple filtering and edge detection) can be performed on the mobile phone, while other operations can be referred out to remote service providers. The remote service providers can be selected using techniques such as reverse auctions, through which they compete for processing tasks. A great number of other features and arrangements are also detailed. | 03-20-2014 |
20140141815 | SYSTEMS AND METHODS FOR LOCATING A MOBILE DEVICE WITHIN A CELLULAR SYSTEM - A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location. | 05-22-2014 |
20140159959 | BODY-WORN PHASED-ARRAY ANTENNA - Several (in some cases many dozen) small antennae are integrated into or over a full body suit or clothing. These antennae preferably include an intra-suit or clothing wired connection to one or more small Ultra-Wide-Band (UWB) radios, e.g., in the 3-10 GHz range. In some cases, each antenna connection includes a variable delay, e.g., a few nanoseconds with picoseconds-scale resolution on the delays, thus allowing for the body-suit ensemble to act as a directional phased-array. One claim recites a radio wearable by a human comprising: a phased-array antenna including a plurality of antennae, the array being configured for wearing over or on a human body, the plurality of antennae provided for spatially positioning in multiple different regions over or on the human body; an RF radio; and a controller configured for: i) determining relative spatial position information for antennae within the phased-array antenna; and ii) using at least the relative spatial position information, controlling the radio to produce a directional UWB beam through the phased-array antenna. Another claim includes an antenna having a plurality of metamaterial elements. Of course, other claims and combinations are provided as well. | 06-12-2014 |
20140164124 | LOCATION BASED ROUTER - A location based router system comprises a router in communication with an ad hoc network of devices, including at least one mobile device. The router directs packets from the network to associated agents. The router receives queries from requesting clients, such as the mobile device, and provides location to the requesting client. Additionally, depending on preferences of the client, it also routes market packets for location based services back to the mobile device dependent on its location. | 06-12-2014 |
20140169686 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 06-19-2014 |
20140198240 | NEXT GENERATION IMAGING METHODS AND SYSTEMS - The advent of electronic-based imaging generally followed the four generalized ‘eras’ identified in FIG. | 07-17-2014 |
20140219566 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some relate to visual search capabilities, and responding to different image inputs and different contexts. Others relate to processing of image data. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. Yet others concern adapting behavior of a camera-equipped system based on previously-captured imagery. A great number of other features and arrangements are also detailed. | 08-07-2014 |
20140267851 | NEXT GENERATION IMAGING METHODS AND SYSTEMS - Novel imaging arrangements are detailed. One comprises an optical array sensor with plural photo-electron generating regions dispersed at two or more layers in the structure. Two of these photo-electron generating regions are vertically separated by at least 10 microns—making the sensor useful for sensing objects at focal distances ranging from less than ten inches, out to infinity. The photosites may be spectrally selective. One such arrangement includes a top CMOS sensor array that passes 25% or more of the visible incident light into the structure. A second CMOS sensor array can be provided at a bottom of the structure, for receiving light that was not transduced to photo-electrons elsewhere in the sensor. Another arrangement involves movement of a camera sensor, in a repetitive tracking/pop-back motion, to reduce motion blur in individual frames of a video sequence. A great number of other arrangements are also detailed. | 09-18-2014 |
20140285634 | COOPERATIVE PHOTOGRAPHY - Imagery from two or more users' different smartphones is streamed to a cloud processor, enabling creation of 3D model information about a scene being imaged. From this model, arbitrary views and streams can be synthesized. In one arrangement, a user of such a system is at a sports arena, and her view of the sporting event is blocked when another spectator rises to his feet in front of her. Nonetheless, the imagery presented on her headworn display continues uninterrupted—the blocked imagery from that viewpoint being seamlessly re-created based on imagery contributed by other system users in the arena. A great variety of other features and arrangements are also detailed. | 09-25-2014 |
20140286566 | COOPERATIVE PHOTOGRAPHY - Imagery from two or more users' different smartphones is streamed to a cloud processor, enabling creation of 3D model information about a scene being imaged. From this model, arbitrary views and streams can be synthesized. In one arrangement, a user of such a system is at a sports arena, and her view of the sporting event is blocked when another spectator rises to his feet in front of her. Nonetheless, the imagery presented on her headworn display continues uninterrupted—the blocked imagery from that viewpoint being seamlessly re-created based on imagery contributed by other system users in the arena. A great variety of other features and arrangements are also detailed. | 09-25-2014 |
20140293091 | SENSOR-SYNCHRONIZED SPECTRALLY-STRUCTURED-LIGHT IMAGING - A smartphone is adapted for use as an imaging spectrometer, by synchronized pulsing of different LED light sources as different image frames are captured by the phone's CMOS image sensor. A particular implementation employs the CIE color matching functions, and/or their orthogonally transformed functions, to enable direct chromaticity capture. A great variety of other features and arrangements are also detailed. | 10-02-2014 |
20140304122 | IMAGERY AND ANNOTATIONS - A decade from now, a visit to the supermarket will be a very different experience than the familiar experiences of decades past. Product packaging will come alive with interactivity—each object a portal into a rich tapestry of experiences, with contributions authored by the product brand, by the store selling the product, and by other shoppers. The present technology concerns arrangements for authoring and delivering such experiences. A great variety of other features and technologies are also detailed. | 10-09-2014 |
20140313303 | LONGITUDINAL DERMOSCOPIC STUDY EMPLOYING SMARTPHONE-BASED IMAGE REGISTRATION - The evolution of a skin condition over time can be useful in its assessment. In an illustrative arrangement, a user captures skin images at different times, using a smartphone. The images are co-registered, color-corrected, and presented to the user (or a clinician) for review, e.g., in a temporal sequence, or as one image presented as a ghosted overlay atop another. Image registration can employ nevi, hair follicles, wrinkles, pores, and pigmented regions as keypoints. With some imaging spectra, keypoints from below the outermost layer of skin can be used. Hair may be removed for image registration, and restored for image review. Transformations in addition to rotation and affine transforms can be employed. Diagnostic correlations with reference image sequences can be made, employing machine learning in some instances. A great variety of other features and arrangements are also detailed. | 10-23-2014 |
20140316235 | SKIN IMAGING AND APPLICATIONS - The availability of high quality imagers on smartphones and other portable devices facilitates creation of a large, crowd-sourced, image reference library that depicts skin rashes and other dermatological conditions. Some of the images are uploaded with, or later annotated with, associated diagnoses or other information (e.g., “this rash went away when I stopped drinking milk”). A user uploads a new image of an unknown skin condition to the library. Image analysis techniques are employed to identify salient similarities between features of the uploaded image, and features of images in this reference library. Given the large dataset, statistically relevant correlations emerge that identify to the user certain diagnoses that may be considered, other diagnoses that may likely be ruled-out, and/or anecdotal information about similar skin conditions from other users. A great variety of other features and arrangements are also detailed. | 10-23-2014 |
20140323142 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 10-30-2014 |
20140333794 | SENSOR-BASED MOBILE SEARCH, RELATED METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 11-13-2014 |
20140337733 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed. | 11-13-2014 |
20140340236 | SYNCHRONIZED METROLOGY IN POWER GENERATION AND DISTRIBUTION NETWORKS - Phasor Measurement Units (PMUs) tend to be specialized and expensive—relegated to only key points in power distribution networks, and are generally reliant on GPS technology. The present disclosure details how any smart meter—using wireless communication—can perform sub-microsecond-grade synchrophasor measurements. Other aspects concern smart meter-based determination of A, B or C phase of the tri-phase power network. This can involve count-stamp enabling message packets sent to and/or from a smart meter, and then associating such count-stamps to local measurements of power phase by a metrology unit. Once a network of such enabled smart meters and other devices is formed, sub-microsecond metropolitan-wide and entire region-wide synchronizing time standard can calibrate local measurements of power phase, where simple A, B and C phase determination is one low hanging fruit application of such. Low cost aggregate monitoring of metropolitan-wide synchrophasors promises a next chapter of importance for that relatively recent art. | 11-20-2014 |
20140344574 | ECONOMICALLY SECURE DIGITAL MASS MEDIA SYSTEMS - Content is encoded with a watermark that associates it with a particular consumer. When presented for playback, the rendering equipment examines the watermark to confirm that the consumer with whom the content is associated, is also the consumer with whom the equipment is associated. If there is no watermark—or if the watermark is associated with a different consumer, then playback is refused. The equipment also desirably checks whether the content has a second watermark (or even a very feeble remnant thereof), indicating that the content has been derived from content earlier provided to a different consumer. If so, playback is again refused. Thus, this embodiment will refuse to play if there is no watermark; if there is one watermark not associated with the proprietor of the equipment; or if there are two or more watermarks. | 11-20-2014 |
20140351765 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio and/or imagery from a user's environment, and acts to fulfill inferred or requested user desires. In one arrangement, a smart phone comprises: a touch screen display; a camera for capturing imagery; a microphone for capturing audio; a physical discovery button for receiving a user's indication to initiate a discovery mode; one or more processors; and memory storing software instructions for configuring said one or more processors. The software configures the processors for: responsive to a user's request via the physical discovery button, initiating a discovery mode including processing imagery captured with said camera; causing two different areas to be displayed on the touch screen display, in which a first of the two areas comprises a sensor pane in which visual information associated with captured imagery is displayed along with augmented reality graphics, and in which a second of the two areas comprises user-selectable graphic icons; and causing a user-selectable graphic icon to be displayed in the first of the two areas to allow a user to switch modes from image to audio. A great number of other features and arrangements are also detailed. | 11-27-2014 |
20140357312 | SMARTPHONE-BASED METHODS AND SYSTEMS - Arrangements involving portable devices (e.g., smartphones and tablet computers) are disclosed. One arrangement enables a content creator to select software with which that creator's content should be rendered—assuring continuity between artistic intention and delivery. Another utilizes a device camera to identify nearby subjects, and take actions based thereon. Others rely on near field chip (RFID) identification of objects, or on identification of audio streams (e.g., music, voice). Some technologies concern improvements to the user interfaces associated with such devices. For example, some arrangements enable discovery of both audio and visual content, without any user requirement to switch modes. Other technologies involve use of these devices in connection with shopping, text entry, and vision-based discovery. Still other improvements are architectural in nature, e.g., relating to evidence-based state machines, and blackboard systems. Yet other technologies concern computational photography. A great variety of other features and arrangements are also detailed. | 12-04-2014 |
20140378810 | PHYSIOLOGIC DATA ACQUISITION AND ANALYSIS - The availability of high quality imagers on smartphones and other portable devices facilitates creation of a large, crowd-sourced, image reference library that depicts skin rashes and other dermatological conditions. Some of the images are uploaded with, or later annotated with, associated diagnoses or other information (e.g., “this rash went away when I stopped drinking milk”). A user uploads a new image of an unknown skin condition to the library. Image analysis techniques are employed to identify salient similarities between features of the uploaded image, and features of images in this reference library. Given the large dataset, statistically relevant correlations emerge that identify to the user certain diagnoses that may be considered, other diagnoses that may likely be ruled-out, and/or anecdotal information about similar skin conditions from other users. Similar arrangements can employ audio and/or other physiologically-derived signals. A great variety of other features and arrangements are also detailed. | 12-25-2014 |
20150016712 | METHODS FOR OBJECT RECOGNITION AND RELATED ARRANGEMENTS - Methods and arrangements involving portable user devices such smartphones and wearable electronic devices are disclosed, as well as other devices and sensors distributed within an ambient environment. Some arrangements enable a user to perform an object recognition process in a computationally- and time-efficient manner. Other arrangements enable users and other entities to, either individually or cooperatively, register or enroll physical objects into one or more object registries on which an object recognition process can be performed. Still other arrangements enable users and other entities to, either individually or cooperatively, associate registered or enrolled objects with one or more items of metadata. A great variety of other features and arrangements are also detailed. | 01-15-2015 |
20150022675 | IMAGE PROCESSING ARCHITECTURES AND METHODS - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality is improved, and new functionality is provided. Some aspects relate to imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. A great number of other features and arrangements are also detailed. | 01-22-2015 |
20150024800 | INTUITIVE COMPUTING METHODS AND SYSTEMS - A smart phone senses audio and/or imagery from a surrounding environment, and acts to provide graphical user interfaces and toggling discovery modes. In one arrangement, a smart phone comprises: a wireless communications interface; a touch screen display; a camera for capturing imagery; a microphone for capturing audio; a physical discovery button for initiating a discovery mode, in which the discovery mode includes processing smart phone sensor-captured imagery or sensor-captured audio to obtain identification of an object depicted in sensor-captured imagery or of captured audio, the identification obtained through the wireless communications interface; one or more processors; and memory storing software instructions for configuring said one or more processors for: responsive to a request received via the physical discovery button, initiating a discovery mode including processing imagery captured with said camera; causing a sensor pane to be displayed on the touch screen display, in which captured imagery is displayed along with augmented reality graphics within the sensor pane, and causing user-selectable graphic icons to be displayed within a first area of the touch screen display; highlighting an object represented in captured imagery that is displayed within the sensor pane; and causing a user-selectable graphic icon to be displayed on the touch screen display to facilitate switching discovery modes from image to audio. A great number of other features and arrangements are also detailed. | 01-22-2015 |
20150055837 | DETECTION OF WEAK SPECKS FROM IMAGERY - Discerning small, weak features (“specks”) from imagery can be critical in early-stage cancer detection and other applications. In one aspect, the presence of a speck is judged from a large set of “votes” about whether a point in the imagery has a value above or below its neighbors. Hundreds or thousands or more votes can be gathered from one or more images, to thereby—in the aggregate—tend to confirm or refute the presence of a speck at a particular location. Votes can be based on simple pixel differences, e.g., between a pixel at the center of a 7×7 pixel image excerpt, and each of 48 other pixels in the excerpt. More sophisticated methods can employ analyses of triads, quads, and rings, and kernel-based Markov Random Field frameworks, to roll-up to a final conclusion. A great number of other features and arrangements are also detailed. The technology is particularly illustrated in the context of detecting exoplanets from astronomical imagery of remote star systems. | 02-26-2015 |
20150071485 | INFORMATION CODING AND DECODING IN SPECTRAL DIFFERENCES - Information is encoded in an image signal by exploiting spectral differences between colors that appear the same when rendered. These spectral differences are detected using image sensing that discerns the spectral differences. Spectral difference detection methods include using sensor-synchronized spectrally-structured-light imaging, 3D sensors, imaging spectrophotometers, and higher resolution Bayer pattern capture relative to resolution of patches used to convey a spectral difference signal. | 03-12-2015 |
20150071486 | SENSING DATA FROM PHYSICAL OBJECTS - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 03-12-2015 |
20150072728 | SMARTPHONE-BASED METHODS AND SYSTEMS - One arrangement concerns a portable device (e.g., a smartphone) that executes plural recognition agents, such as agents that perform fingerprint-based object recognition, fingerprint-based audio recognition, barcode reading, watermark decoding, etc. Each of the agents reads from and writes to a blackboard data structure, to which camera and microphone sensors also post their data. Queues of stored sensor data are thus available for the agents to process. In some arrangements, the agents also post—to the blackboard—estimates of the resource costs required to perform certain functions, and estimates of the quality of results that may be achieved by such functions. This allows the system to make informed decisions about how to deploy the device's limited resources (battery, processing cycles, network bandwidth, etc.). A great variety of other features and arrangements are also detailed. | 03-12-2015 |