Patent classifications
G06T2201/0083
WATERMARKING IN A VIRTUAL DESKTOP INFRASTRUCTURE ENVIRONMENT
Disclosed are examples of embedding watermarks in a VDI session of a user. The watermark is based upon the user's identity and can be embedded into the VDI session to aid in the identification of data that is compromised from the VDI session. The watermark can be extracted from an image without needing the original image for extraction purposes.
Information bearing devices and authentication devices including same
An information bearing device comprising a data bearing pattern, the data bearing pattern comprising MN pattern defining elements which are arranged to define a set of characteristic spatial distribution properties (.sub.u,v.sup.M,N(x,y)), wherein the set of data comprises a plurality of discrete data and each said discrete data (u.sub.i,v.sub.i) has an associated data bearing pattern which is characteristic of said discrete data, and the set of characteristic spatial distribution properties is due to the associated data bearing patterns of said plurality of discrete data, wherein said discrete data and the associated data bearing pattern of said discrete data is related by a characteristic relation function (.sub.k.sub.
METHOD AND APPARATUS FOR DIGITAL WATERMARKING OF THREE DIMENSIONAL OBJECT
In one embodiment, a method for 3D digital watermarking for a triangular mesh using one or more key parameters is disclosed including forming a Hamiltonian path of a desired length around a selected vertex in a selected direction of a spiral; marking the selected vertex a dead end if there is a deadlock and continuing the spiral; and applying a watermark by introducing points in a path order on edges of the spiral, wherein information is encoded at a partition of adjacent triangles at one or more of the points.
COUNTERFEIT DETECTION USING MACHINE READABLE INDICIA
This disclosure relates to counterfeit detection and deterrence using advanced signal processing technology including steganographic embedding and digital watermarking. Digital watermark can be used on consumer products, labels, logos, hang tags, stickers and other objects to provide counterfeit detection mechanisms.
Compensating for geometric distortion of images in constrained processing environments
An image processing method determines a geometric transform of a suspect image by efficiently evaluating a large number of geometric transform candidates in environments with limited processing resources. Processing resources are conserved by using complementary methods for determining a geometric transform of an embedded signal. One method excels at higher geometric distortion, and specifically, distortion caused by greater tilt angle of a camera. Another method excels at lower geometric distortion, for weaker signals. Together, the methods provide a more reliable detector of an embedded data signal in image across a larger range of distortion while making efficient use of limited processing resources in mobile devices.
Machine-Learned Models for Imperceptible Message Watermarking in Videos
Systems and methods of the present disclosure are directed to a computing system. The computing system can obtain a message vector and video data comprising a plurality of video frames. The computing system can process the input video with a transformation portion of a machine-learned watermark encoding model to obtain a three-dimensional feature encoding of the input video. The computing system can process the three-dimensional feature encoding of the input video and the message vector with an embedding portion of the machine-learned watermark encoding model to obtain spatial-temporal watermark encoding data descriptive of the message vector. The computing system can generate encoded video data comprising a plurality of encoded video frames, wherein at least one of the plurality of encoded video frames includes the spatial-temporal watermark encoding data.
Geometric enumerated watermark embedding for colors and inks
The present disclosure relates generally to digital watermarking and signal encoding. Various colors can be evaluated and modified to carry an encoded or auxiliary signal.
Systems and methods for detecting data insertions in biometric authentication systems using encryption
Systems and methods of detecting an unauthorized data insertion into a stream of data segments extending between electronic modules or between electronic components within a module, wherein a data stream is encrypted with a secure encryption key for transmission, then decrypted upon receipt using a corresponding secure decryption key to confirm data transmission integrity.
Semi-transparent embedded watermarks
A watermark image may be generated that includes a first set of encoded pixels each of which is assigned a first transparency value and a second set of encoded pixels each of which is assigned a second transparency value, the second transparency level being different from the first transparency level. The encoded pixels may be distributed among a set of blank pixels such that each encoded pixel neighbors one or more blank pixels in the watermark image, and in particular at least two blank pixels in the watermark image. Herein, each blank pixel may be assigned the second transparency value. The watermark image may be overlaid and blended over a background source image to create an encoded source image. A decoder system may recover encoded information from the encoded source image.
Method and apparatus for publishing locational copyrighted watermarking video
Method and apparatus are disclosed for publishing locational copyrighted watermarking video. According to some embodiments, a method for embedding location information into a video comprises: separating the video into at least one key frame and at least one in-between frame set corresponding to the at least one key frame; receiving location data for the at least one key frame; encrypting the location data for the at least one key frame based on a location private key; and embedding the encrypted location data into the at least one key frame.