최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0359015 (2003-02-04) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 123 인용 특허 : 308 |
To enhance decoding of signals suspected of containing an embedded auxiliary signal, a suspect signal is screened to compute detection values evincing presence and strength of the embedded signal. Screening strategies control detector actions, such as rejecting un-marked signals, improving synchroni
To enhance decoding of signals suspected of containing an embedded auxiliary signal, a suspect signal is screened to compute detection values evincing presence and strength of the embedded signal. Screening strategies control detector actions, such as rejecting un-marked signals, improving synchronization of a reader used to extract hidden messages in suspect signals, determining authenticity of signals, and controlling use of the signals.
1. A method of analyzing a signal suspected of being embedded with an auxiliary signal, the method comprising:computing detection values from a suspect signal, where each detection value corresponds to a measure of an auxiliary signal embedded in the suspect signal, the auxiliary signal being detect
1. A method of analyzing a signal suspected of being embedded with an auxiliary signal, the method comprising:computing detection values from a suspect signal, where each detection value corresponds to a measure of an auxiliary signal embedded in the suspect signal, the auxiliary signal being detected comprises a set of attributes embedded at locations within the suspect signal, and each detection value is a measure of the set of attributes;computing a relative detection value based on an analysis of two or more of the detection values relative to each other; andcontrolling detector action based on the relative detection value. 2. The method of claim 1 wherein the detector action comprises determining whether the suspect signal is authentic. 3. The method of claim 1 where the detection values have corresponding orientation parameters; and wherein the orientation parameters approximate a spatial or temporal transform that at least a portion of the suspect signal has undergone subsequent to being embedded with an auxiliary signal. 4. A tangible medium on which is stored instructions for performing the method of claim 1. 5. The method of claim 1 wherein the auxiliary signal carries hidden message symbols in the suspect signal. 6. The method of claim 1 wherein the auxiliary signal performs a dual function of carrying a message of two or more symbols and an orientation signal. 7. The method of claim 1 wherein the attributes comprise impulse functions in a transform domain. 8. The method of claim 7 wherein the transform domain comprises a frequency domain. 9. The method of claim 7 including filtering impulse functions detected in the suspect signal as a function of neighboring samples of the detected impulse functions. 10. The method of claim 1 wherein the detection values comprise correlation values. 11. The method of claim 10 wherein the detection values comprise correlation values in a two dimensional correlation. 12. A method of detecting an auxiliary signal embedded in a suspect signal, the embedded auxiliary signal having a set of attributes embedded at locations within the suspect signal, the method comprising:computing detection values for two or more auxiliary signal candidates in the suspect signal;evaluating a detection metric based on the detection values; and controlling a detector action based on the detection metric; wherein the metric provides a measure of an embedded auxiliary signal that adapts to the suspect signal according to detection values computed from the suspect signal; and wherein the detection values are each computed as a measure of the set of attributes of the auxiliary signal. 13. The method of claim 12 wherein the detection metric comprise a measure of strength of an auxiliary signal embedded in the suspect signal. 14. The method of claim 13 wherein the measure of strength is used to determine whether the suspect signal is authentic; and wherein a further detection action is evaluating the metric to determine whether the suspect signal is authentic. 15. The method of claim 12 wherein the detection values comprise correlation values. 16. The method of claim 12 wherein the detection metric is part of a multistage classifier for classifying the suspect signal. 17. The method of claim 16 wherein the classifier classifies the suspect signal as being marked or un-marked with an auxiliary embedded signal. 18. The method of claim 16 wherein the classifier determines whether the suspect signal is authentic. 19. A tangible medium on which is stored instructions for performing the method of claim 12. 20. A detector for analyzing suspect signals having embedded auxiliary signals comprising:a first screening stage for classifying a suspect signal based on a first detection metric that measures a set of attributes of an auxiliary embedded signal;a second screening stage for classifying the suspect signal based on a second detection metric that measures a set of attributes of an auxiliary embedded signal;wherein t he first and second stages form a multistage classifier for determining whether a suspect signal is authentic based on measures derived from an embedded auxiliary signal.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.