Patent application number | Description | Published |
20090022360 | Quantization-Based Data Embedding in Mapped Data - Novel methods and systems for quantization based data embedding and reading in host signals, such as image, audio and video signals. To embed auxiliary data in a host signal, an embedder maps the host signal from a first domain into a mapped signal in a second domain. The embedder performs quantization based embedding of auxiliary data into the host signal using quantizers. The quantizers are adapted such that the relationship between corresponding quantizers in the first and second domains satisfies a predetermined constraint. The mapping improves the robustness of the data embedding method by increasing the chances that the embedded data can be recovered by an auxiliary data reader after modifications. A related embedding method projects the mapped signal unto a vector, and specifically, a pseudorandom vector. It performs quantization based embedding on the projected signal. The use of this projection provides added robustness of the embedded data to noise and other forms of distortion. | 01-22-2009 |
20090220121 | Arrangement of Objects in Images or Graphics to Convey a Machine-Readable Signal - The present invention provides methods and systems related to arranging objects (e.g., circles, dots and other shapes) in images and graphics to convey a machine-readable signal. One claim recites a method including: integrating a plurality of objects in an image or graphic, the objects being arranged in a pattern that is machine-readable by a programmed computer processor, the plurality of objects being integrated in the image or graphic so that the pattern is hidden in the image or graphic through cooperation with design elements of the image or graphic; and providing a visible structure for aiding in machine-reading of the pattern by the programmed computer processor. Of course, other combinations are provided and claimed as well. | 09-03-2009 |
20090232350 | Encoding and Decoding Auxiliary Signals - This disclosure describes methods and systems for encoding and decoding signals from a host signal such as audio, video or imagery. One claim recites a method comprising: receiving a host signal carrying an auxiliary signal; extracting data representing at least some features of the host signal, said extracting utilizes one or more processors; using the data representing at least some features of the host signal to determine a key; and detecting the auxiliary signal in a transform domain associated with the key, the detecting utilizes one or more processors. Other claims and combinations are provided as well. | 09-17-2009 |
20090285446 | Signal Embedding and Detection using Circular Structures in a Transform Domain of a Media Signal - Machine readable signals embedded in other media signals include a circular structure in a transform domain to facilitate detection. The machine readable signals are not apparent to human observers of rendered media containing the machine readable signals, such as images and documents. A detector captures the media signal, transforms it to the transform domain, and then uses the circular structure in the transform domain to facilitate detection despite rotation of the media signal. | 11-19-2009 |
20100013951 | Digital Watermarking Methods, Programs and Apparatus - The present claims recite various steganographic and digital watermarking methods and apparatus. One claim recites a method of watermarking a representation of a physical object. The method includes: projecting a watermark orientation component onto a physical object; and using a camera or image sensor, capturing an image or video of the physical object including the watermark orientation component as projected thereon. Another claim recites an apparatus including: a light source for projecting a registration component onto a physical object; a camera or sensor for capturing an image or video of the physical object including the registration component as projected thereon; and an electronic processor programmed for encoding a message in the image or video captured by said camera or sensor. Of course, other claims and combinations are provided as well. | 01-21-2010 |
20100086170 | Progressive Image Quality Control Using Watermarking - The ability to remove a watermark from an encoded image by reversible watermarking opens the possibility of various novel applications. Several such applications are detailed. One permits different classes of consumers to gain access to different versions of an image. A pristine image is intentionally degraded in some fashion, and distributed to consumers. By reference to one or more watermarks in the degraded image, some or all of the degradation can be removed, or transformed to a less-objectionable state. Through such arrangements, image consumers with different needs can gain access to versions of the image having differing qualities. | 04-08-2010 |
20100135525 | Content Processing Methods Using Reversible Watermarking - The ability to remove a watermark from encoded content (e.g., an image) opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied. | 06-03-2010 |
20100202653 | Watermarking Systems and Methods - Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed. | 08-12-2010 |
20100254566 | Watermarking of Data Invariant to Distortion - A data set is transformed to a domain in which values are robust to distortion. The values are then expanded to carry auxiliary data. To recover the data, the data set is transformed into the domain, further transformed to get a set of possibly expanded data, and then processed to extract auxiliary data from the expanded values. | 10-07-2010 |
20100322468 | Encoding and Decoding Auxiliary Signals - This disclosure describes apparatus and systems for encoding and decoding signals from a host signal such as audio, video or imagery. One claim recites an apparatus comprising: electronic memory for storing a media signal representing audio or video; and an electronic processor. The electronic processor is programmed for: extracting data representing at least some features of the media signal; using the extracted data as a key to select coefficients in a transform domain, the coefficients representing the media signal; and modifying selected coefficients to hide a steganographic signal in the media signal. Of course, other claims and combinations are provided as well. | 12-23-2010 |
20110044494 | Quantization-Based Data Embedding in Mapped Data - Novel methods and systems for quantization based data embedding and reading in host signals, such as image, audio and video signals. To embed auxiliary data in a host signal, an embedder maps the host signal from a first domain into a mapped signal in a second domain. The embedder performs quantization based embedding of auxiliary data into the host signal using quantizers. The quantizers are adapted such that the relationship between corresponding quantizers in the first and second domains satisfies a predetermined constraint. The mapping improves the robustness of the data embedding method by increasing the chances that the embedded data can be recovered by an auxiliary data reader after modifications. A related embedding method projects the mapped signal unto a vector, and specifically, a pseudorandom vector. It performs quantization based embedding on the projected signal. The use of this projection provides added robustness of the embedded data to noise and other forms of distortion. | 02-24-2011 |
20110110555 | Arrangement of Objects in Images or Graphics to Convey a Machine-Readable Signal - The disclosure provides apparatus related to arranging objects (e.g., circles, dots and other shapes) in images and graphics to convey a machine-readable signal. One claim recites an apparatus including: electronic memory for storing image or graphic data; and an electronic processor programmed for: integrating a plurality of objects in stored image or graphic data, the objects being arranged in a pattern that is machine-readable, the plurality of objects being integrated in the image or graphic so that the pattern is hidden in the image or graphic through cooperation with design elements of the image or graphic; and providing a visible structure for aiding in machine-reading of the pattern. Of course, other combinations are provided and claimed as well. | 05-12-2011 |
20120218444 | METHODS AND SYSTEMS FOR DEALING WITH PERSPECTIVE DISTORTION IN CONNECTION WITH SMARTPHONE CAMERAS - Arrangements are detailed to aid a user in positioning a camera-equipped device (e.g., a smartphone) at a particular viewing position relative to an object being imaged. Other embodiments discern the device's viewing position, and then undertake image or other processing that is dependent on such viewpoint. A great number of other features and arrangements are also detailed. | 08-30-2012 |
20130104010 | Arrangements for Increasing Detection Confidence - In one embodiment, a first set of digital data (e.g., an image) is tested for the presence of a certain feature (e.g., a certain face), yielding one of two outcomes (e.g., not-present, or present). If the testing yields the first outcome, no additional testing is performed. If, however, the testing yields the second outcome, further testing is performed to further check this outcome. Such further testing is performed on a second set of digital data that is based on, but different from, the first set of data. Only if the original testing and the further testing both yield the same second outcome is it treated as a valid result. A variety of other features and arrangements are also detailed. | 04-25-2013 |