Patent application number | Description | Published |
20090296983 | SIGNAL PROCESSING UTILIZING HOST CARRIER INFORMATION - The present invention generally relates to processing audio, video and images. One claim recites a method including: obtaining media signal comprising a steganographic signal hidden therein; utilizing a programmed electronic processor, selecting portions of the media signal for steganographic signal detection, wherein the subset of the media signal is selected based on at least one or more predetermined probability factors, in which a probability factor comprises a selection criteria or rule to identify portions of the media signal which have a higher likelihood of including a steganographic signal relative to other portions of the media signal; and utilizing a programmed electronic processor, analyzing selected portions of the media signal to obtain the steganographic signal. Of course, other claims and combinations are provided as well. | 12-03-2009 |
20100009714 | Decoding Information to Allow Access to Computerized Systems - The presently claimed invention relates generally to gaining access to secure systems. One claim recites an apparatus including: an image or video sensor for capturing image or video data; and a multi-purpose computer processor configured to: decode machine-readable information encoded in captured image or video data representing a plurality of physical objects, each instance of machine-readable information includes identifying information; determine an order in which the physical objects are presented to the image or video sensor for evaluation via the identifying information; and comparing the order to a predetermined sequence to determine whether to allow access to a remotely located computerized system. The apparatus may be housed, e.g., in a cell phone. Other combinations and claims are provided as well. | 01-14-2010 |
20100202653 | Watermarking Systems and Methods - Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed. | 08-12-2010 |
20110069861 | Distributed Decoding of Digitally Encoded Media Signals - Digital data is decoded from media signals (e.g., audio, images, video, etc.) using a distributed processing in which a first device receives and pre-processes the signal, and transmits it to a remote device for further decoding. One method pre-filters the media signal, leaving a residual from which digital data is decoded. Other arrangements progressively send portions of the signal for decoding operations. | 03-24-2011 |
20120070078 | Histogram Methods and Systems for Object Recognition - A multidimensional histogram is used to characterize an image (or object), and is used to identify candidate matches with one or more reference images (or objects). An exemplary implementation employs hue information for two of the dimensions, and a second derivative function based on luminance for a third dimension. The simplicity and speed of the detailed arrangements make them well suited for use with cell phones and other mobile devices, which can use the technology for image/object recognition, e.g., in visual search applications. | 03-22-2012 |
20120076435 | Signal Processors and Methods for Estimating Transformations Between Signals with Phase Deviation - A phase deviation method determines translation between a reference and suspect signal by analyzing a phase deviation surface created by computing a deviation metric for phase shift estimates and then analyzing a surface formed from the deviation metrics for an array of translation offsets. The phase deviation method analyzes the deviation surface to determine a translation offset that minimizes phase deviation. This method is applied at increasing levels of detail to refine the translation offset. | 03-29-2012 |
20120078989 | Signal Processors and Methods for Estimating Transformations Between Signals with Least Squares - Signal processing devices and methods estimate transforms between signals using a least squares technique. From a seed set of transform candidates, a direct least squares method applies a seed transform candidate to a reference signal and then measures correlation between the transformed reference signal and a suspect signal. For each candidate, update coordinates of reference signal features are identified in the suspect signal and provided as input to a least squares method to compute an update to the transform candidate. The method iterates so long as the update of the transform provides a better correlation. At the end of the process, the method identifies a transform or set of top transforms based on a further analysis of correlation, as well as other results. | 03-29-2012 |
20120126017 | Hiding Auxiliary Data with Line Structure Modification - The present disclosure relates generally to information hiding and digital watermarking. One claim recites a method of hiding auxiliary data in an image. The image includes line structures. The method include: receiving an image including line structures; identifying a frequency associated with the line structures; using a programmed processor modulating the frequency associated with the line structures to convey auxiliary data in the image, in which the presence of the auxiliary data is hidden from a human observer of the image, but the auxiliary data is machine-detectable. Other claims, implementations and embodiments are provided as well. | 05-24-2012 |
20130064419 | COMBINED WATERMARKING AND FINGERPRINTING - Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples. | 03-14-2013 |
20130308818 | CONTENT RECOGNITION AND SYNCHRONIZATION USING LOCAL CACHING - A content fingerprint based recognition system employs local caching of portions of a fingerprint database to manage network services for identifying which programs a user's mobile device is exposed to and the timing of events within the program. The system enables background recognition and synchronization of network services in a way that consumes less device power and bandwidth. | 11-21-2013 |
20140023226 | COMBINED WATERMARKING AND FINGERPRINTING - Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples. | 01-23-2014 |
20140037129 | REDUCING WATERMARK PERCEPTIBILITY AND EXTENDING DETECTION DISTORTION TOLERANCES - The present disclosures relates generally to digital watermarking and data hiding. One claim recites a smartphone comprising: a camera to capture video of a display that is rendering video, in which the video comprises a first watermark signal embedded in a first portion of the data, a second watermark signal embedded in a second portion of the data, and a third watermark signal embedded in a third portion of the data, in which at least two of the first watermark signal, second watermark signal and third watermark signal are inversely related to one another; electronic memory for buffering data representing captured video; one or more electronic processors programmed for: applying a first perspective distortion to the data representing the captured video to yield first perspective distorted video; and analyzing the first perspective distorted video to detect digital watermarking, in which a second perspective distortion is applied to the data representing the captured video to yield second perspective distorted video when the analyzing does not detect digital watermarking, and then performing analyzing the second perspective distorted video to detect digital watermarking. Of course, other claims are provided too. | 02-06-2014 |
20140037131 | STEGANOGRAPHIC ENCODING AND DECODING - This patent document relates generally to steganography and digital watermarking. One claim recites, in a watermark encoder, a method of encoding auxiliary information in an image or video comprising: using a programmed electronic processor, computing a change in an attribute of an image or video sample to encode auxiliary information in the image or video; and changing color values of the image or video sample to effect the change in the attribute, in which changes to color values are determined based at least in part on both: i) visibility of the changes, and ii) anticipated watermark detection. Of course, other claims are provided too. | 02-06-2014 |
20140093120 | DIGITAL WATERMARKING METHODS, APPARATUS AND SYSTEMS - The present invention relate generally to digital watermarking and data hiding. One claim recites a method including: obtaining first data and second color data, the first color data and the second color data represent data from a color image signal or color video signal; obtaining a digital watermark pattern, the pattern aiding detection of a watermark message; separating the digital watermark pattern into first frequency components and second frequency components; utilizing a programmed electronic processor or electronic processing circuitry, modifying the first color data by hiding the first frequency components therein; and utilizing a programmed electronic processor or electronic processing circuitry, modifying the second color data by hiding the second frequency components therein. Of course, other combinations and claims are provided too. | 04-03-2014 |
20140108020 | MULTI-MODE AUDIO RECOGNITION AND AUXILIARY DATA ENCODING AND DECODING - Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting. | 04-17-2014 |
20140142958 | MULTI-MODE AUDIO RECOGNITION AND AUXILIARY DATA ENCODING AND DECODING - Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting. | 05-22-2014 |
20140244514 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS - The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors. The one or more processors are configured for: controlling the video camera to capture imagery corresponding to a checkout terminal's display, the display displaying imagery including digital watermarking information hidden therein, the information including transaction information; processing captured imagery to decode the digital watermarking to obtain the transaction information; receiving user input corresponding to payment information included in a component of the virtual wallet; controlling communication with a remotely located third party, so that the transaction information and payment information are provided to the third party; outputting a request for user confirmation based on a request received from the third party; and controlling communication with the remotely located third party so that a user confirmation is provided to the third party. A great variety of other features, arrangements and claims are also detailed. | 08-28-2014 |
20140342773 | DISTRIBUTED COMPUTING FOR PORTABLE COMPUTING DEVICES - This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. One claim recites a method for identifying a content item from a host signal captured on a mobile telephone handset, comprising: from the handset, receiving filtered data from the host signal for use in identifying the content item; processing the filtered data to compute a content fingerprints; using the content fingerprints to determine an action associated with the content item, in which said determining utilizes information pertaining to an operating system associated with the mobile telephone handset; and communicating information associated with the action to the mobile telephone handset. Of course, other claims and combinations are provided as well. | 11-20-2014 |
20140343931 | ROBUST SIGNATURES DERIVED FROM LOCAL NONLINEAR FILTERS - Content signal recognition is based on a multi-axis filtering of the content signal. The signatures are calculated, formed into data structures and organized in a database for quick searching and matching operations used in content recognition. For content recognition, signals are sampled and transformed into signatures using the multi axis filter. The database is searched to recognize the signals as part of a content item in the database. Using the content identification, content metadata is retrieved and provided for a variety of applications. In one application, the metadata is provided in response to a content identification request. | 11-20-2014 |
20140378810 | PHYSIOLOGIC DATA ACQUISITION AND ANALYSIS - The availability of high quality imagers on smartphones and other portable devices facilitates creation of a large, crowd-sourced, image reference library that depicts skin rashes and other dermatological conditions. Some of the images are uploaded with, or later annotated with, associated diagnoses or other information (e.g., “this rash went away when I stopped drinking milk”). A user uploads a new image of an unknown skin condition to the library. Image analysis techniques are employed to identify salient similarities between features of the uploaded image, and features of images in this reference library. Given the large dataset, statistically relevant correlations emerge that identify to the user certain diagnoses that may be considered, other diagnoses that may likely be ruled-out, and/or anecdotal information about similar skin conditions from other users. Similar arrangements can employ audio and/or other physiologically-derived signals. A great variety of other features and arrangements are also detailed. | 12-25-2014 |
20150016712 | METHODS FOR OBJECT RECOGNITION AND RELATED ARRANGEMENTS - Methods and arrangements involving portable user devices such smartphones and wearable electronic devices are disclosed, as well as other devices and sensors distributed within an ambient environment. Some arrangements enable a user to perform an object recognition process in a computationally- and time-efficient manner. Other arrangements enable users and other entities to, either individually or cooperatively, register or enroll physical objects into one or more object registries on which an object recognition process can be performed. Still other arrangements enable users and other entities to, either individually or cooperatively, associate registered or enrolled objects with one or more items of metadata. A great variety of other features and arrangements are also detailed. | 01-15-2015 |
20150071565 | SIGNAL PROCESSORS AND METHODS FOR ESTIMATING TRANSFORMATIONS BETWEEN SIGNALS WITH PHASE DEVIATION - A phase deviation method determines an offset between a reference and suspect signal by analyzing a phase deviation surface created by computing a deviation metric for phase shift and then analyzing a surface formed from the deviation metrics for an array of offsets. The phase deviation method analyzes the deviation surface to determine an offset that minimizes phase deviation. This method is applied at increasing levels of detail to refine the determination of the offset. | 03-12-2015 |