G06T2201/005

CONTENT MANAGEMENT BASED ON DITHER-LIKE WATERMARK EMBEDDING
20180018748 · 2018-01-18 ·

Methods, devices and computer program products allow embedding and detection of watermarks into and from a multimedia content. One watermark embedding method includes selecting a content segment that lacks inherent features for embedding of watermarks without producing perceptible artifacts, and obtaining a first dither pattern corresponding to a first watermark symbol of a watermark symbol alphabet, where each symbol is associated with a particular dither pattern. Further, each particular dither pattern, upon combination with the multimedia content segment that lacks inherent features, produces a composite content segment without perceptible artifacts. By combining the first dither pattern with the multimedia content segment that lacks inherent features, a first composite content segment with the first embedded watermark symbol is produced. The detection of watermarks messages can be carried out quickly by examining a small portions of the multimedia because even the featureless content segments include embedded watermarks.

System and method for encoding and authenticating a digital image

An encoding apparatus partitions a digital image into multiple regions for subsequent encoding. A first encryption code is associated with a first region, a second encryption code is associated with a second region and the first code, and a third code is associated with the first code, the second code and a third region. An authentication apparatus authenticates the digital image in an inverse process.

STEGANOGRAPHIC ACCESS CONTROLS
20170357794 · 2017-12-14 ·

Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.

Content management based on dither-like watermark embedding

Methods, devices and computer program products allow embedding and detection of watermarks into and from a multimedia content. One watermark embedding method includes selecting a content segment that lacks inherent features for embedding of watermarks without producing perceptible artifacts, and obtaining a first dither pattern corresponding to a first watermark symbol of a watermark symbol alphabet, where each symbol is associated with a particular dither pattern. Further, each particular dither pattern, upon combination with the multimedia content segment that lacks inherent features, produces a composite content segment without perceptible artifacts. By combining the first dither pattern with the multimedia content segment that lacks inherent features, a first composite content segment with the first embedded watermark symbol is produced. The detection of watermarks messages can be carried out quickly by examining a small portions of the multimedia because even the featureless content segments include embedded watermarks.

Content Creation and Licensing Control

Content creation and licensing control techniques are described. In a first example, a content creation service is configured to support content creation using an image along with functionality to locate the image or a similar image that is available for licensing. In another example, previews of images are used to generate different versions of content along with an option to license images previewed in an approved version of the content. In a further example, fingerprints are used to locate images used as part of content creation by a content creation service without leaving a context of the service. In yet another example, location of licensable versions of images is based at least in part on identification of a watermark included as part of an image. In an additional example, an image itself is used as a basis to locate other images available for licensing by a content sharing service.

Content creation and licensing control

Content creation and licensing control techniques are described. In a first example, a content creation service is configured to support content creation using an image along with functionality to locate the image or a similar image that is available for licensing. In another example, previews of images are used to generate different versions of content along with an option to license images previewed in an approved version of the content. In a further example, fingerprints are used to locate images used as part of content creation by a content creation service without leaving a context of the service. In yet another example, location of licensable versions of images is based at least in part on identification of a watermark included as part of an image. In an additional example, an image itself is used as a basis to locate other images available for licensing by a content sharing service.

Normalized mark data

In one example, a system including an isolation engine, a normalization engine, and a channel engine is described. In the example, the isolation engine generates mark data using a mark technique based on a first input color channel and a second input color channel, the normalization engine scales intensity values of a set of pixels of the mark data to a greater range, and the channel engine generates output channel data for a plurality of output color channels from normalized mark data based on the scaled intensity values.

Creation and identification of unforgeable printable image information data
09681020 · 2017-06-13 ·

The present application relates to a method for producing and authenticating unforgeable printable image comprising information color values and inference color values. The present application further provides for unforgeable printed images.

METHOD AND ELECTRONIC DEVICE FOR ADDING WATERMARK TO VIDEO
20170161862 · 2017-06-08 ·

The embodiment of the present application relates to the field of videos, in particular to a method and electronic device for adding watermarks to a video. The method disclosed by this application comprises: determining multiple sub-regions; determining binary expected play time information of a target image and a digit in the binary expected play time information corresponding to each sub-region; and adjusting the specific parameter value of each sub-region so that a video display terminal determines the binary expected play time information of the target image according to the parity values of the specific parameter values of all sub-regions of the target image.

NORMALIZED MARK DATA

In one example, a system including an isolation engine, a normalization engine, and a channel engine is described. In the example, the isolation engine generates mark data using a mark technique based on a first input color channel and a second input color channel, the normalization engine scales intensity values of a set of pixels of the mark data to a greater range, and the channel engine generates output channel data for a plurality of output color channels from normalized mark data based on the scaled intensity values.