Patent classifications
G09C5/00
Privacy-Preserving Image Distribution
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Method and apparatus for embedding and extracting digital watermarking for numerical data
There is provided a method for embedding a digital watermark into and extracting a digital watermark from a numerical data set. In accordance with embodiments of the present disclosure, there is provided a method for embedding a digital watermark into a numerical data set. The method includes selecting portions of the numerical data set identified as data noise, the selected portions to be used for embedding the digital watermark into the numerical data set, the digital watermark being unique for each recipient of the numerical data. The method further includes replacing the least significant bit (LSB) of at least some of the selected portions of the numerical data set with at least portion of the digital watermark.
Systems and Methods for Message Embedding in Three-Dimensional Image Data
Systems and methods are directed to a computing system. The computing system can include one or more processors, a message embedding model, a message extraction model, and a first set of instructions that cause the computing system to perform operations including obtaining the three-dimensional image data and the message vector. The operations can include inputting three-dimensional image data and a message vector into the message embedding model to obtain encoded three-dimensional image data. The operations can include using the message extraction model to extract an embedded message from the encoded three-dimensional image data to obtain a reconstructed message vector. The operations can include evaluating a loss function for a difference between the reconstructed message vector and the message vector and modifying values for parameters of at least the message embedding model based on the loss function.
Systems and Methods for Message Embedding in Three-Dimensional Image Data
Systems and methods are directed to a computing system. The computing system can include one or more processors, a message embedding model, a message extraction model, and a first set of instructions that cause the computing system to perform operations including obtaining the three-dimensional image data and the message vector. The operations can include inputting three-dimensional image data and a message vector into the message embedding model to obtain encoded three-dimensional image data. The operations can include using the message extraction model to extract an embedded message from the encoded three-dimensional image data to obtain a reconstructed message vector. The operations can include evaluating a loss function for a difference between the reconstructed message vector and the message vector and modifying values for parameters of at least the message embedding model based on the loss function.
Encryption of digital incentive tokens within images
Embedding of digital incentive tokens within a digital image can occur cryptographically using a public key in some embodiments. An encrypted digital incentive token may be embedded within a digital image, including a variety of encrypted information. The digital image with the embedded digital incentive token may be sent to users via delivery mechanisms such as direct webpage embedding, email, text message, and social media sharing. An image recipient may be able to view the image and also take additional action including gaining access to the embedded digital incentive token. Digital incentive tokens can be embedded by altering image metadata so that the image itself is not changed in some embodiments, but data associated with the image is changed to identify the token. Pixel data can be altered to reflect a token for an image. Digital incentive tokens can also be tracked through different platforms to determine usage.
Encryption of digital incentive tokens within images
Embedding of digital incentive tokens within a digital image can occur cryptographically using a public key in some embodiments. An encrypted digital incentive token may be embedded within a digital image, including a variety of encrypted information. The digital image with the embedded digital incentive token may be sent to users via delivery mechanisms such as direct webpage embedding, email, text message, and social media sharing. An image recipient may be able to view the image and also take additional action including gaining access to the embedded digital incentive token. Digital incentive tokens can be embedded by altering image metadata so that the image itself is not changed in some embodiments, but data associated with the image is changed to identify the token. Pixel data can be altered to reflect a token for an image. Digital incentive tokens can also be tracked through different platforms to determine usage.
INTEGRATING AND DETECTING VISUAL DATA SECURITY TOKEN IN DISPLAYED DATA VIA GRAPHICS PROCESSING CIRCUITRY USING A FRAME BUFFER
An apparatus, method, and computer readable medium that include establishing a video connection between the apparatus and a first device, in response to establishing the video connection, transmitting a token to a second device equipped with a display, the token being displayed on the display of the second device, receiving visual data comprising the token displayed on the display of the second device, the visual data being generated by the first device, that includes a camera, capturing the token displayed on the display of the second device, accessing a frame buffer of a graphics processing unit (GPU), analyzing, in the frame buffer of the GPU, a frame representing a section of the visual data to detect the token, and in response to the token being detected in the visual data, generating an authentication to authenticate the video connection between the apparatus and the first device.
Visual image authentication
Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.
RECYCLING METHODS AND SYSTEMS, AND RELATED PLASTIC CONTAINERS
A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.
RECYCLING METHODS AND SYSTEMS, AND RELATED PLASTIC CONTAINERS
A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.