Methods, apparatus and programs for generating and utilizing content signatures
First Claim
Patent Images
1. A method comprising:
- obtaining a content item, wherein the content item includes auxiliary data steganographically embedded therein through changes to perceptible elements of data representing the content item, wherein the embedded auxiliary data is imperceptible;
decoding, using an electronic processor, the auxiliary data steganographically embedded within the content item;
dynamically deriving, using the electronic processor, a content signature from the content item, wherein the content signature comprises a reduced-bit representation of the content item; and
carrying out an action as dictated by the auxiliary data, wherein the action is associated with the content signature.
5 Assignments
0 Petitions
Accused Products
Abstract
The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method comprising: obtaining a sequence of content identifiers, the sequence of content identifiers corresponding to one or more segments of a media signal; and utilizing at least a processor or electronic processing circuitry, carrying out a convolution operation based on the sequence of content identifiers and content signatures housed or stored in a database to identify the media signal. Of course, other claims and combination are provided as well.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining a content item, wherein the content item includes auxiliary data steganographically embedded therein through changes to perceptible elements of data representing the content item, wherein the embedded auxiliary data is imperceptible; decoding, using an electronic processor, the auxiliary data steganographically embedded within the content item; dynamically deriving, using the electronic processor, a content signature from the content item, wherein the content signature comprises a reduced-bit representation of the content item; and carrying out an action as dictated by the auxiliary data, wherein the action is associated with the content signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium having instructions stored thereon that, when executed by a computing device, cause the computing device to perform operations comprising:
-
obtaining a content item, wherein the content item includes auxiliary data steganographically embedded therein through changes to perceptible elements of data representing the content item, wherein the embedded auxiliary data is imperceptible; decoding the auxiliary data steganographically embedded within the content item; deriving a content signature from the content item, wherein the content signature comprises a reduced-bit representation of the content item; and carrying out an action as dictated by the auxiliary data, wherein the action is associated with the content signature. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
one or more electronic processors configured to; obtain a content item, wherein the content item includes auxiliary data steganographically embedded therein through changes to perceptible elements of data representing the content item, wherein the embedded auxiliary data is imperceptible; decode the auxiliary data steganographically embedded within the content item; derive a content signature from the content item, wherein the content signature comprises a reduced-bit representation of the content item; and carry out an action as dictated by the auxiliary data, wherein the action is associated with the content signature. - View Dependent Claims (16, 17, 18, 19, 20)
Specification