Patent classifications
G06T2201/0083
IMAGE TRANSFORMATION METHOD AND APPARATUS, STORAGE MEDIUM, AND COMPUTER DEVICE
An image transformation method includes: obtaining identification information of an original image; converting the identification information to an identification image; performing frequency domain transformation on the original image to obtain a pixel matrix of the original image in a frequency domain space; performing matrix decomposition on the pixel matrix to obtain an image brightness matrix; converting pixel values of corresponding pixels in the image brightness matrix based on pixel values of pixels in the identification image to obtain a converted brightness matrix; and performing inverse frequency domain transformation on the converted brightness matrix to obtain a transformed image including invisible identification information, and adding the invisible identification information to the original image.
Systems and methods for detecting data insertions in biometric authentication systems using pseudo data segments
Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a pseudo data segment included in the data stream upon transmission is detected upon receipt to confirm data transmission integrity.
Embedding video watermarks without visible impairments
Methods, devices, and computer-program products are provided for adding and decoding data to a digital video signal in a visually imperceptible manner. For example, an encoded video frame can be obtained, and one or more blocks of the encoded video frame can be decoded. Binary data can be added to a subset of pixels from a set of pixels of the one or more blocks. For instance, a pixel component can be modulated to add the binary data. The one or more blocks can be re-encoded using at least one coding mode. The re-encoded one or more blocks can be added to the encoded video frame.
Systems and methods for detecting data insertions in biometric authentication systems utilizing a secret
Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a Secret embedded into the data stream is compared to a Replica Secret upon receipt to confirm data transmission integrity.
Tracking Image Senders on Client Devices
Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.
Counterfeit detection using machine readable indicia
This disclosure relates to counterfeit detection and deterrence using advanced signal processing technology including steganographic embedding and digital watermarking. Digital watermark can be used on consumer products, labels, logos, hang tags, stickers and other objects to provide counterfeit detection mechanisms.
COMPENSATING FOR GEOMETRIC DISTORTION OF IMAGES IN CONSTRAINED PROCESSING ENVIRONMENTS
An image processing method determines a geometric transform of a suspect image by efficiently evaluating a large number of geometric transform candidates in environments with limited processing resources. Processing resources are conserved by using complementary methods for determining a geometric transform of an embedded signal. One method excels at higher geometric distortion, and specifically, distortion caused by greater tilt angle of a camera. Another method excels at lower geometric distortion, for weaker signals. Together, the methods provide a more reliable detector of an embedded data signal in image across a larger range of distortion while making efficient use of limited processing resources in mobile devices.
Tracking image senders on client devices
Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.
IMAGE CAPTURE PREVENTION
A method, computer system, and a computer program product for image capture prevention is provided. The present invention may include, in response to embedding at least one digital security mark in a visual communication, securing the visual communication. The present invention may also include preventing, based on the embedded at least one digital security mark, an image capture of the secured visual communication.
Media content proof of play over optical medium
Methods and a System are provided for proving media content was played on a display through capturing of audit information presented in watermarks when the content is played on the display. In a method, content watermarks are generated for content that is to be rendered on a display of a display device. An image sensor that is externally affixed to a corner of the display captures the watermarks as the content is rendered on the display, the image sensor captures the watermarks being played with the content from the area associated the corner where the image sensor is affixed. The image sensor captures the watermarks as images and streams the images back to the display device for storage. The stored watermarks are processed to verify that the corresponding content associated with the watermarks was played by the display device (visually rendered on the display of the display device).