H04N1/32283

METHOD AND APPARATUS FOR WATERMARK EMBEDDING AND EXTRACTING
20210407034 · 2021-12-30 · ·

Methods and apparatuses for watermark embedding and extracting are provided. A method for watermark extracting includes obtaining a carrier object embedded with a watermark image; determining at least one encoding region that includes watermark information; determining a plurality of template lattices from the at least one encoding region, the plurality of template lattices comprising a plurality of positioning template lattices and one or more encoding template lattices; and obtaining the watermark information according to the plurality of template lattices.

Method and apparatus for watermark embedding and extracting

Methods and apparatuses for watermark embedding and extracting are provided. A method for watermark extracting includes obtaining a carrier object embedded with a watermark image; determining at least one encoding region that includes watermark information; determining a plurality of template lattices from the at least one encoding region, the plurality of template lattices comprising a plurality of positioning template lattices and one or more encoding template lattices; and obtaining the watermark information according to the plurality of template lattices.

METHODS FOR REQUESTING AND AUTHENTICATING PHOTOGRAPHIC IMAGE DATA

A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

IMAGE FORMING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM
20220131983 · 2022-04-28 ·

An image forming apparatus that cooperates with a management service and a blockchain service includes a generation unit that generates an embedded image from document information about a document, an acquisition unit that acquires an embedding setting for use in embedding the embedded image in the document, a printing unit that performs printing of the document with the embedded image embedded therein based on the embedding setting, and a registration unit that registers the document information with the blockchain service, wherein, while the embedding setting includes a setting for embedding a plurality of embedded images in the document and the printing unit outputs a printed product with a plurality of embedded images embedded therein, the registration unit registers the document information with the blockchain service in such a way as to prevent the document information from being registered in an overlapping manner in registering the document information.

Systems and methods for identifying non-compliant images using neural network architectures
11758069 · 2023-09-12 · ·

Systems and methods including one or more processors and one or more non-transitory storage devices storing computing instructions configured to run on the one or more processors and perform: receiving images at an electronic platform; generating, using a fingerprinting network associated with a neural network architecture, feature embeddings corresponding to the images; generating, using the fingerprinting network, codes based on the feature embeddings; storing the codes in one or more databases; receiving, using a search component associated with the electronic platform, a non-compliant image comprising non-compliant content; and searching the codes in the one or more databases to identify one or more of the images that include non-compliant content similar to, or the same as, the non-compliant content included in the non-compliant image. Other embodiments are disclosed herein.

METHODS FOR REQUESTING AND AUTHENTICATING PHOTOGRAPHIC IMAGE DATA

A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

Methods for requesting and authenticating photographic image data

A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

Data processing device

A data processing device includes an image data receiving section that receives image data, a data conversion section that converts the image data received by the image data receiving section into data having a format different from a format of the received image data, and a hash value generation section that generates a hash value of the data obtained by conversion of the data conversion section from the received image data.

Method and apparatus for watermark embedding and extracting

Methods and apparatuses for watermark embedding and extracting are provided. A method for watermark embedding includes obtaining a carrier object and watermark information to be embedded in the carrier object; generating at least one encoding region including the watermark information according to the watermark information, the at least one encoding region including a plurality of template lattices; obtaining a watermark image according to the at least one encoding region; and embedding the watermark image in the carrier object.

Methods and apparatus to identify media using hybrid hash keys

Apparatus, system, methods, and articles of manufacture are disclosed to identify media using hash keys. An example system includes a hybrid hash key analyzer to access a metered hash key of an exposure record obtained from a meter, access reference records representative of respective portions of a plurality of media, and determine reference confirmation data candidates from respective ones of the reference records that include hash keys matching the metered hash key. The example system includes an impression logger to, when first confirmation data associated with the exposure record matches one of the reference confirmation data candidates, store an impression record that associates the media identification data associated with the matching one of the reference confirmation data candidates with a meter identifier of the exposure record. The impression logger also is to credit at least a portion of the media corresponding to the media identification data with an exposure credit.