H04N2005/91357

MONITORING SYSTEM, MONITORING METHOD, AND STORAGE MEDIUM

A monitoring system of an embodiment includes an acquirer, an extractor, an encryption processor, and a generator. The acquirer is configured to acquire, from one or more monitoring cameras that capture an image of a work area in which presented information to be input is input to an input terminal, a captured image captured by the one or more monitoring cameras. The extractor is configured to extract the information to be input from the captured image acquired by the acquirer. The encryption processor is configured to encrypt the information to be input extracted by the extractor. The generator is configured to generate a replaced image in which the information to be input is made invisible, the replaced image comprising a partial image that displays information encrypted by the encryption processor at a position of the information to be input in the captured image acquired by the acquirer.

METHOD AND SYSTEM FOR COOPERATIVELY COLLECTING VIDEO DATA FROM DRIVING RECORDERS
20210067733 · 2021-03-04 · ·

A method for cooperatively collecting video data from driving recorders includes steps of: by a driving recorder serving as a requesting device, broadcasting a video request; by another driving recorder serving as a cooperative device, generating a video file in response to receipt of the video request, encrypting the video file to result in an encrypted file, and transmitting the encrypted file to a video file server; by the video file server, decrypting the encrypted file to result in the video file, storing the video file, and sending a success notification of video data collection to a user device based on contact information contained in pre-stored registration data.

Difference attack protection

In one embodiment, a method for preventing a difference attack on watermarked video content is implemented on at least one computing device and includes: manipulating values of a set of pixels to embed a forensic watermark in at least one video frame in a video content item, where the manipulating is in accordance with a given magnitude of change in the values, and introducing random noise to the at least one video frame, where the random noise is random noise of the given magnitude.

Video copy prevention systems with interaction and compression
10536670 · 2020-01-14 ·

Disclosed are systems and methods for providing video content while inhibiting the copying of that content for later viewing. Video images may be made difficult to copy for presentation at later times by the omission or addition of content developed in relation to the particular initial viewing. For instance, video information may be customized by omitting information that is not likely to be substantially perceived by the initial viewer but that is substantially likely to be perceived as missing by at least some other viewers. As another example, video information may be customized for a particular viewing instance so that it contains modified, selected or injected information that is likely to be perceived as non-disruptive or unnoticeable by the original viewer but that would be perceived as substantially noticeable and/or disruptive by some other viewers, including when parts of more than one such video information are combined in an effort to remove customization related to their respective original viewings. Various means and methods for accomplishing the forgoing in a variety of settings are disclosed including also for providing privacy related to what is viewed. In some examples higher-resolution images are provided for the region near the viewer's point-of-regard and lower resolution images are provided elsewhere, which also has the effect of reducing the bandwidth required. For interactive content rendered from digital models, a model for a central foveal region may be provide greater detail and have greater computational requirements than a model for a peripheral view, providing both economy/performance in rendering and protection against copying.

System and method for fine-grained control of privacy from image and video recording devices

Systems and methods for providing privacy control for digital capture of a recording include identifying a person within a digital capture that is a recording of a person within an environment based on received information regarding the person. A disposition tag is associated with an identified person in the recording. The disposition tag references a privacy control action to take according to privacy constraints for the person. Coordinates in the recording where the privacy control action is to be applied are determined.

Anti-piracy video transmission and display
11930294 · 2024-03-12 · ·

Methods and systems described herein generate content that quickly cycles between different-colored frames at a rapid rate that may be imperceptible to human viewers. The human eye tends to blend nearby frames together, so that a human viewer will see a full color spectrum even though only a single color is displayed at any given time. The video display may repeatedly cycle between individual color frames, thus providing video content that appears normal to a human viewer. However, a video recording device may capture only some of the color frames. Therefore, the video recorded by video recording devices may include undesirable color flicker or other color artifacts, which may deter unauthorized copying.

Copy protection system

A method of modifying the output of an output device is provided. A first code, associated with a first recipient party, is received and used to generate, within the output device, a second code, the second code containing encoded data identifying the first recipient party and instructions for activating an additional functionality of the output device. The additional functionality is activated in accordance with the instructions contained in the second code. The output of the output device is modified according to data encoded in the second code, to encode a third code in the output of the output device, the third code including an ID code associated with the first recipient party.

System and method for optical and laser-based counter intelligence, surveillance, and reconnaissance

Systems and methods for preventing image capture and exploitation by optically transmitting a disruptive effect to a digital imaging system. The disruptive effect interferes with the algorithms used to compress and analyze digital images and can be used to disable the imaging equipment or inject foreign code into the imaging system or image processing computer.

Anti-Piracy Video Transmission and Display
20190098251 · 2019-03-28 ·

Methods and systems described herein generate content that quickly cycles between different-colored frames at a rapid rate that may be imperceptible to human viewers. The human eye tends to blend nearby frames together, so that a human viewer will see a full color spectrum even though only a single color is displayed at any given time. The video display may repeatedly cycle between individual color frames, thus providing video content that appears normal to a human viewer. However, a video recording device may capture only some of the color frames. Therefore, the video recorded by video recording devices may include undesirable color flicker or other color artifacts, which may deter unauthorized copying.

Management device and image processing system

A resolution converter converts input image data to N types (N is a plural number) of image data having resolutions different with each other. A secret sharing unit performs secret sharing schemes so that the plurality of pieces of image data are respectively divided into n pieces (n is an integer equal to or more than N+1 and the same value in all of image data) of distributed data and the distributed data is reconstructed to original image data using k pieces (k is an integer equal to or more than 2 and equal to or less than n and different value for each piece of image data) among n pieces. A data combination unit generates n pieces of combination data by combining distributed data selected one by one so as not to overlap with each of resolutions and stores each piece of the combination data in different storages. As more pieces of distributed data are gathered, image data with higher resolutions can be reproduced and security for copyright, privacy, or the like can be secured in each piece of distributed data.