Patent classifications
G06T1/0071
Per-window digital watermark for desktop applications
Embodiments are described for placing a watermark over application windows in a desktop. For each application window that is opened in the desktop, the system can determine whether the application requires a watermark, for example, based on a predefined list that specifies which applications require watermarks. For each application window that requires a watermark, a uncovered watermark region can be calculated where the watermark will appear. An overlay can be placed over the application windows, for example in a top-level window that does not receive mouse and keyboard inputs, and the watermark can be drawn in the overlay over the location of the uncovered watermark region of each application. As a result, watermarks can be placed over a plurality of specified application windows in an efficient and convenient manner.
System and method for digital watermarking
Some implementations may include a method for watermarking an identification document, the method including: modulating a spatial luminance pattern associated with a first digital watermark to encode a first portion of personally identifiable information; modulating a spatial chrominance distribution associated with a second digital watermark to encode a second portion of the personally identifiable information; and applying the first digital watermark and the second digital watermark to the identification document.
MULTIPLE SCRAMBLED LAYERS FOR AUDIO WATERMARKING
Apparatus, systems, articles of manufacture, and methods are disclosed for multiple scrambled layers for audio watermarking. An example system includes a processor to execute instructions to: divide the watermark into a plurality of watermark symbols; map the watermark symbols to a plurality of frequency bins according to a first distribution scheme to create a first watermark layer having a first combination of the frequency bins and a second watermark layer having a second combination of the frequency bins, subsets of adjacent ones of the plurality of frequency bins grouped into a corresponding plurality of frequency clumps; determine a sequence for shifting watermark symbols between the frequency clumps to cause different combinations of watermark symbols that include one watermark symbol from each watermark layer to share up to a first number of frequency bins, the first number of frequency bins to be less than a number of watermark symbols in respective ones of the different combinations; and generate a second distribution scheme to map the watermark symbols in accordance with the sequence.
IMAGE CAPTURE PREVENTION
A method, computer system, and a computer program product for image capture prevention is provided. The present invention may include, in response to embedding at least one digital security mark in a visual communication, securing the visual communication. The present invention may also include preventing, based on the embedded at least one digital security mark, an image capture of the secured visual communication.
GENERATING ARTISTIC DESIGNS ENCODED WITH ROBUST, MACHINE-READABLE DATA
Artwork carrying machine readable data is generated by editing artwork according to a data signal or transforming the data signal into artwork. The machine-readable data signal is generated from a digital payload and converted into an image tile. Artwork is edited according to the image tile by moving graphic elements, adapting intersections of lines, or altering line density, among other techniques. Artwork is generated from the data signal by skeletonizing it and applying morphological operators to a skeletal representation, such as a medial axis transform. Artistic effects are introduced by filtering the data signal with directional blurring or shape filters.
DETECTION OF ENCODED SIGNALS AND ICONS
The present disclosure relates to signal decoding and icon (e.g., a logo, shape, icon, etc.) detection. In some implementations, a first response is provided upon signal decoding but no icon detection within first captured image data, and a second response is provided upon signal decoding and icon detection within the first captured image data. Other aspects, combinations and implementations are described as well.
Detecting watermark modifications
Methods, apparatus and articles of manufacture (e.g., computer readable media) to detect watermark modifications are disclosed. Example apparatus disclosed herein are to encode a first watermark in a first media signal to obtain a second media signal, the first watermark associated with a first watermark layer. Disclosed example apparatus are also to determine, from the second media signal, a first metric corresponding to the first watermark. Disclosed example apparatus are further to determine, from the second media signal, a second metric corresponding to a second watermark encoded in the second media signal, the second watermark associated with a second watermark layer different from the first watermark layer. Disclosed example apparatus are also to output, based on the first metric and the second metric, an indication of whether the second watermark has been modified.
Identification document with multiview image
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for applying a ghost image to an identification document that include the actions of obtaining a first image of an object. Identifying a first portion of the first image that corresponds with the object and a second portion of the first image that does not correspond with the object. Generating a second image by converting the first image to a negative image, and removing the second portion of the first image that does not correspond to the object. Generating a halftone image from the second image. Causing optically variable media to be applied to the identification document based on the halftone image. The optically variable media has a first appearance when viewed from in reflected light at a first angle and a second, different appearance when viewed in reflected light at a second, different angle.
M-ary cyclic coding
An example method is described in which a processor receives a first plurality of symbols selected from a first set of symbols, translates the first plurality of symbols into a second plurality of symbols selected from an M-ary cyclic symbol set, and writes the second plurality of symbols to a surface. An additional example method is described in which a processor captures an image of at least a portion of a surface, detects a first plurality of symbols from the image, where the first plurality of symbols comprises symbols selected from an M-ary cyclic symbol set, translates the first plurality of symbols into a second plurality of symbols selected from a second set of symbols, and performs at least one task responsive to the second plurality of symbols.
Generating artistic designs encoded with robust, machine-readable data
Artwork carrying machine readable data is generated by editing artwork according to a data signal or transforming the data signal into artwork. The machine-readable data signal is generated from a digital payload and converted into an image tile. Artwork is edited according to the image tile by moving graphic elements, adapting intersections of lines, or altering line density, among other techniques. Artwork is generated from the data signal by skeletonizing it and applying morphological operators to a skeletal representation, such as a medial axis transform. Artistic effects are introduced by filtering the data signal with directional blurring or shape filters.