G06T2201/0053

CLIENT-SERVER READING OF MACHINE-READABLE INDICIA
20230037566 · 2023-02-09 ·

Image data depicting a 2D machine-readable code is up-sampled and compressed with a lossy compression process before being sent from a client device to a remote server for code reading. The remote server decompresses the sent information, extracts a payload from the machine-readable code, and causes result information to be sent back to the client device for display or other action. The up-sampling and compression operations performed on the client device can employ software instructions that are downloaded to, and executed by, browser software on the client device. Many other features and arrangements are also detailed.

Cloaking and watermark of non-coded information

A computer system for the creation of subliminal image or watermarks where the apparent video is an “obvious” image and a subliminal or “clandestine” image or watermark is hidden within the data structure. The concept is envisioned for the cloaking of images, sound, video or like digitized non-coded information. The cloaked files may be intended for storage, transmission, or clandestine placement in a public file system. The watermark may be used for the subliminal marking of a source of a file, its creation, or for tagging copyrighted information.

ELECTRONIC DEVICE
20220366522 · 2022-11-17 ·

In an electronic device that embeds information in content, copyright protection and prevention of falsification are achieved at the same time. The electronic device includes a content generation unit, a first embedding processing unit, and a second embedding processing unit. In this electronic device, the content generation unit generates content. Furthermore, in the electronic device, the first embedding processing unit embeds, in the content, first embedded information related to the content. The second embedding processing unit embeds second embedded information in the content.

Systems and methods of preparing multiple video streams for assembly with digital watermarking
11611808 · 2023-03-21 · ·

Systems and methods for encoding multiple video streams with digital watermarking for adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. In one embodiment, a method for preprocessing multimedia content into streams with watermark information includes receiving a source content media stream, generating at least two variant preprocessed streams for each received source content media stream, where each variant preprocessed stream includes different watermark information in the same locations as the other variant preprocessed streams and where marked locations are spaced apart at least a distance equal to a predetermined maximum segment size, generating a set of embed location information describing marked locations in the variant preprocessed streams, generating at least one variant output stream from each variant preprocessed stream using video compression, partitioning each variant output stream into a set of segments, where each segment is no longer than the predetermined maximum segment size and contains at most one copy of the watermark information, generating a set of segment boundary information describing the boundaries of segments within the variant output streams and the boundaries are the same between variant output streams, and generating a segment selection list using the set of embed location information and the set of segment boundary information, where the segment selection list includes only one variant segment for each segment according to a watermark sequence and the digits of the watermark sequence correspond to the watermark information applied to each variant preprocessed stream.

Collusion attack prevention

Systems and methods are described for obfuscating variants of content segments. Variants of content segments can be used to encode an identifying sequence in a transmission of content. The variants of the content segments can each include one or more marked frames and one or more unmarked frames. Variations can be introduced into the unmarked frames for each of the variants of the content segments.

SIGNED VIDEO DATA WITH LINKED HASHES
20230112135 · 2023-04-13 · ·

A method of signing prediction-coded video data, comprising: obtaining a coded video sequence including at least one I-frame (I), which contains independently decodable image data, and at least one predicted frame (P1, P2, P3, P4), which contains image data decodable by reference to at least one other frame; generating a fingerprint (H.sub.I) of each I-frame; generating a fingerprint (H.sub.P) of each predicted frame by hashing a combination of data derived from the predicted frame and data derived from an I-frame to which the predicted frame refers directly or indirectly, wherein the fingerprint of the predicted frame is independent of any further predicted frame to which the predicted frame refers directly or indirectly; and providing a signature of the video sequence including the generated fingerprints.

IMAGE CODE FOR PROCESSING INFORMATION AND DEVICE AND METHOD FOR GENERATING AND PARSING SAME
20170293992 · 2017-10-12 ·

An image code is for information storage, transfer and identification, a method of generating and analyzing the same, and an apparatus for implementing the method, the image code includes a standard image area, at least one image filled in the standard image region, at least one segment of information stream implanted in the at least one image by using digital watermarking technique and 4 location identification graphics arranged in different positions of the standard image region, the location identification graphics are arranged in the 4 vertex angles of the standard image region, including 1 feature location identification graphic and 3 basic location identification graphics; the 3 basic location identification graphics are identical and the feature location identification graphic is different from the basic location identification graphic.

Automated detection of tampered images

A content analyzer determines whether various types of modification have been made to images. The content analyzer computes JPEG ghosts from the images that are concatenated with the image channels to generate a feature vector. The feature vector is provided as input to a neural network that determines whether the types of modification have been made to the image. The neural network may include a constrained convolution layer and several unconstrained convolution layers. An image fake model may also be applied to determine whether the image was generated using a computer model or algorithm.

Securing protected content during video playback
09767840 · 2017-09-19 · ·

The disclosed embodiments provide a system that drives a display from a computer system. During operation, the system writes graphical output to protected memory and drives the display from the protected memory. If the graphical output lacks protection, the system discontinues the driving of the display from the protected memory. In particular, upon detecting a lack of protection in the graphical output, the system continues to drive the display from the protected memory during a grace period associated with the lack of protection in the graphical output. The system then discontinues driving of the display from the protected memory if protection of the graphical output does not resume during the grace period.

EMBEDDING VIDEO WATERMARKS WITHOUT VISIBLE IMPAIRMENTS

Methods, devices, and computer-program products are provided for adding and decoding data to a digital video signal in a visually imperceptible manner. For example, an encoded video frame can be obtained, and one or more blocks of the encoded video frame can be decoded. Binary data can be added to a subset of pixels from a set of pixels of the one or more blocks. For instance, a pixel component can be modulated to add the binary data. The one or more blocks can be re-encoded using at least one coding mode. The re-encoded one or more blocks can be added to the encoded video frame.