Patent classifications
G06T2201/0052
Systems and methods for embedding data in remote session displays
Methods and systems for embedding data in an image. The methods include, by a computing device: receiving data indicative of a source of an image that is one of a series of images that collectively provide a visual representation of a state of an application of the computing device, identifying, region of the image that is the same in another image of the series of images, determining a size of the identified region, and embedding the data within the identified region of the image in response to a comparison between the determined size of the identified region and a threshold.
SECURE FACE IMAGE TRANSMISSION METHOD, APPARATUSES, AND ELECTRONIC DEVICE
This application discloses a secure face image transmission method performed by an electronic device. In this application, when a camera component of the electronic device acquires any face image, face image information can be read from a buffer. The face image information is used for indicating a quantity of all face images historically acquired by the camera component. Identification information is embedded in the face image to obtain the face image carrying the identification information. The identification information is used for indicating the face image information but not perceivable by a human being. The face image carrying the identification information is transmitted to a remote server for authenticating the face image using the identification information. Therefore, the security of the face image acquired by the camera component is improved, and the security of the face image transmission process is effectively ensured.
DETECTING A SUB-IMAGE REGION OF INTEREST IN AN IMAGE USING PILOT SIGNALS
An example device for processing image data includes a memory configured to store an image; and one or more processors implemented in circuitry and configured to: process the image to identify a pilot signal in the image indicating a portion of the image, the pilot signal forming a boundary around the portion and having pixel values defined according to a mathematical relationship with pixel values within the portion such that the pilot signal is not perceptible to a human user and is detectable the device; determine the portion of the image using the pilot signal; and further process the portion to attempt to detect one or more contents of the portion without attempting to detect the one or more contents of the image in portions of the image outside the portion.
METHOD AND DEVICE FOR WATERMARK-BASED IMAGE INTEGRITY VERIFICATION
The present disclosure provides a method of embedding a watermark on a Joint Photographic Experts Group (JPEG) image. The method includes: performing an entropy decoding on the JPEG image to generate quantized discrete cosine transform (DCT) coefficients; determining target bits in a bit plane of the quantized DCT coefficients on the basis of a watermark-embedding table (WET); and embedding a watermark based on metadata of the JPEG image in the target bits. Also, the present disclosure provides a method of verifying integrity of the image by using the embedded watermark.
METHOD OF ENCODING WATERMARK INTO DIGITAL IMAGE, APPARATUS FOR ENCODING WATERMARK INTO DIGITAL IMAGE, METHOD OF DETECTING WATERMARK IN DIGITAL IMAGE, APPARATUS FOR DETECTING WATERMARK IN DIGITAL IMAGE, AND COMPUTER-PROGRAM PRODUCT
A method of encoding a watermark into a digital image is provided. The method includes partitioning an image into a plurality of blocks of a same size; accumulating the plurality of blocks of the same size into a single block image; performing a Fourier transformation on the single block image to obtain a two-dimensional Fourier spectrum defined by Fourier coefficients at different positions of a Fourier domain; inserting a watermark into a frequency domain of the two-dimensional Fourier spectrum by modifying the two-dimensional Fourier spectrum as a function of watermarking coefficients in the watermark, to obtain a modified Fourier spectrum; performing an inverse Fourier transformation on the modified Fourier spectrum to obtain a watermarked image; copying the watermarked image horizontally and vertically into a plurality of copied watermarked images; and splicing the plurality of copied watermarked images into a reconstituted watermark image.
IMAGE TRANSFORMATION METHOD AND APPARATUS, STORAGE MEDIUM, AND COMPUTER DEVICE
An image transformation method includes: obtaining identification information of an original image; converting the identification information to an identification image; performing frequency domain transformation on the original image to obtain a pixel matrix of the original image in a frequency domain space; performing matrix decomposition on the pixel matrix to obtain an image brightness matrix; converting pixel values of corresponding pixels in the image brightness matrix based on pixel values of pixels in the identification image to obtain a converted brightness matrix; and performing inverse frequency domain transformation on the converted brightness matrix to obtain a transformed image including invisible identification information, and adding the invisible identification information to the original image.
System and method for digital watermarking
Some implementations may provide a method that includes: receiving, at a mobile device, data encoding a first digital watermark present on the identification document; extracting a first portion of personally identifiable information encoded by a spatial luminance pattern associated with the first digital watermark; receiving, at a mobile device, data encoding a second digital watermark present on the identification document; extracting a second portion of personally identifiable information encoded by a spatial luminance pattern associated with the first digital watermark; and validating the identification document based on at least one of the first portion of personally identifiable information or the second portion of personally identifiable information.
IMAGE PROCESSING METHOD AND APPARATUS, STORAGE MEDIUM AND COMPUTER DEVICE
This application relates to an image processing method and apparatus, a storage medium, and a computer device. The method includes: obtaining a frequency domain mark image, the frequency domain mark image being obtained by performing frequency domain transformation on a spatial domain mark image; obtaining a transparency parameter configured corresponding to the frequency domain mark image; obtaining target page data; and performing layer superimposition rendering of the frequency domain mark image and the target page data according to the transparency parameter. The solution provided in this application can effectively protect target page data.
Method of extracting watermark data in an image with reference to a noise-based image located in the image based on a comparison process performed in the frequency domain
Provided is a method of embedding and extracting watermark data that is robust against geometric distortion and low-quality photographing and for which the probability of successfully extracting watermark data for an original image is high, while the probability of successfully extracting the watermark data in the case of unauthorized copying is seriously impaired. The data embedding method according to an embodiment of the present invention comprises a step of converting the noise-based image using watermark data, and a step of adjusting the original image using the converted noise-based image.
SYSTEM FOR MITIGATING THE PROBLEM OF DEEPFAKE MEDIA CONTENT USING WATERMARKING
Watermarking media content, in combination with blockchain and distributed storage networks, prevents the proliferation of Deepfake content. Digital watermarks are embedded in the audio and video tracks of video clips of trusted content producers at the time the videos are captured or before they are distributed. The watermarks are detected at the social media network's portals, nodes, and back ends. The embedded watermark imparts a unique identifier to the video, that links it to a blockchain. The watermarks also allow video source tracking, integrity verification, and alteration localization. The watermark detectors can be standalone software applications, or they can be integrated with other applications. They are used to perform three main tasks: (1) they alert the Internet user when he watches an inauthentic news video, so that he may discard it, (2) they prevent a Deepfake content from propagating through the network (3) they perform forensic analysis to help track and remove Deepfake content postings.