Interactive broadcast media content provider with direct audience interaction

ABSTRACT

A server system receives a digital media asset captured by a media capture device along with a dataset associated with the digital media asset. The server system generates a modified digital media asset by overlaying or embedding a glyph that encodes information pointing to the network location of the information page onto the digital media asset. A requesting device scans the glyph from the modified digital media asset and decodes from the glyph the information pointing to the network location. The information includes a certification that the digital media and the dataset associated with the digital media asset are unaltered. The requesting device may transmit communications to the server system to indicate approval or disapproval of the digital media asset, or to edit the digital media asset. The server system receives the communication and may modify the information to reflect comments, approvals, disapprovals, or edits.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation and claims the prioritybenefit of U.S. patent application Ser. No. 17/125,690 filed Dec. 17,2020, now U.S. Pat. No. 11,375,294, which claims the priority benefit ofU.S. provisional application No. 62/949,430 filed Dec. 17, 2019, thedisclosures of which are incorporated herein by reference.

BACKGROUND Field of the Invention

The present invention generally relates to digital imaging. Morespecifically, the present invention relates to processing of digitalimages.

Description of the Related Art

As devices with integrated cameras become more common, the sharing ofdigital media content is also becoming more widespread. Digital mediacontent is also being shared in more forms than ever before. However,much of the digital media content that consumers regularly access comesfrom sources that are not inherently trustworthy, such as individualusers on social media networks or blogging platforms. Because there isno way for consumers to independently verify the authenticity oftraditional digital media content, consumers of digital media contentcan unknowingly access falsified or edited digital media content, whichcan mislead consumers. Similarly, with traditional digital mediacontent, there is no way for consumers to consistently verify orauthenticate metadata, documents, annotations, or other additionalinformation associated with the media.

SUMMARY OF THE PRESENTLY CLAIMED INVENTION

Systems and methods for processing a digital media are disclosed. Adigital media capture device can be used to capture the digital mediaasset and integrate metadata from camera sensors. The digital media andthe data associated with the digital media may be received andmaintained at a cloud-based server for viewing, authorized editing, andsubsequent distribution. A glyph is embedded on the digital media assetby a server, which creates a modified digital media. A display devicedisplays the modified digital media with the embedded glyph. Arequesting device scans the glyph and request the digital media assetand the information associated with the digital media asset. The digitalmedia asset may be password protected or encrypted. The requestingdevice may communicate with the server by sharing news, location, orgiving feedback regarding the digital media.

In one example, a method for media processing is provided. The methodincludes receiving a digital media asset captured by a media capturedevice and a dataset associated with the digital media asset. The methodincludes executing instructions stored in memory, wherein execution ofthe instructions by a processor causes the processor to generate a glyphthat encodes information pointing to the network location, and generatea modified digital media asset by overlaying the glyph on the digitalmedia asset. The method includes outputting the modified digital mediaasset and information for storage at the network location.

In another example, a system for media processing is provided. Thesystem includes a transceiver, a memory that stores instructions, and aprocessor coupled to the memory, wherein execution of the instructionsby the processor causes the processor to perform system operations. Thesystem operations include receiving, using the transceiver, a digitalmedia asset captured by a media capture device and informationassociated with the digital media asset. The system operations includegenerating a glyph that encodes information pointing to the networklocation. The system operations include generating a modified digitalmedia asset by overlaying the glyph on the digital media asset. Thesystem operations include outputting the modified digital media assetfor storage at the network location.

In another example, a non-transitory computer-readable storage medium isprovided. The non-transitory computer-readable storage medium hasembodied thereon a program executable by a processor to perform a methodfor media processing. The method includes receiving a digital mediaasset captured by a media capture device and information associated withthe digital media asset. The method includes generating a glyph thatencodes information pointing to the network location. The methodincludes generating a modified digital media asset by overlaying theglyph on the digital media asset. The method includes outputting themodified digital media asset at the network location.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an image capture system that combines a camera imagewith sensor data set from a sensor system.

FIG. 2 is a flow diagram illustrating techniques for mediacertification.

FIG. 3 illustrates a network architecture through which digital mediamay be captured, certified, uploaded to a server network, verified, anddistributed to clients.

FIG. 4 illustrates an exemplary certified image within an exemplaryimage viewer application.

FIG. 5 is a flow diagram illustrating an exemplary operation of theintelligent image certification system.

FIG. 6 is a flow chart of the image processing system.

FIG. 7 illustrates a modified version of a digital media asset with anoverlaid glyph.

FIG. 8 illustrates an exemplary view of an information page of a viewerapplication.

FIG. 9 illustrates an exemplary computing system that may be used toimplement some aspects of the technology.

DETAILED DESCRIPTION

Systems and methods for processing a digital media asset are disclosed.A media capture device can be used to capture a digital media asset andintegrate metadata from camera sensors as well as other ancillary devicesensors. The digital media and the data associated with the digitalmedia may be maintained at a cloud-based server for viewing, authorizedediting, and subsequent distribution. A glyph is embedded on the digitalmedia asset and shown when a content provider broadcasts the digitalmedia on a display device. A requesting device of a viewer of thebroadcast may access the digital media and its associated informationusing the viewer's own device to scan the glyph such that the viewer canimmediately verify the authenticity of the digital media.

In some examples, a digital media asset is captured by a media capturedevice. A server system receives the digital media asset along withinformation associated with the digital media asset, such as metadata ora digital signature generated for certification that the digital mediaasset is authentic. The server system generates an information pagebased on the information associated with the digital media asset andstores the information page at a network location. The server systemgenerates a glyph, such as a QR code, that encodes information pointingto the network location. The server system generates a modified digitalmedia asset by overlaying or otherwise embedding the glyph onto thedigital media asset. The server system outputs the modified digitalmedia asset, for example by printing the modified digital media asset ortransmitting the modified digital media asset to a display device thatdisplays the modified digital media asset. A requesting device scans theglyph from the modified digital media asset, for example using a camera,and decodes from the glyph the information pointing to the networklocation. The information pointing to the network location can bereferred to as a pointer to the network location. Once the requestingdevice decodes the information pointing to the network location, therequesting device requests the information page from the server system.The server system serves the information page to the requesting device.In some cases, the requesting device transmits communications to theserver system, for example to leave a comment regarding the digitalmedia asset, to indicate approval or disapproval of the digital mediaasset, or to edit the digital media asset. The server system receivesthe communication and modifies the information page to reflect comments,approvals, disapprovals, or edits.

FIG. 1 illustrates an image capture system that combines a camera imagewith a sensor data set from a sensor system. An exemplary sensor systemis illustrated as an intelligent image sensor 100. The camera image istaken using a camera embedded as a part of an image capture device. Thisdevice can be a camera such as a digital or analog point-and-shootcamera, a digital or analog single-lens reflex “SLR” camera, a digitalor analog image-capturing telescope, a digital or analog image-capturingmicroscope, or a digital or analog camcorder or digital image sensorsystem. Consumer electronic devices with imaging componentry may also beused. For example, the user device can be a portable consumer userdevice such as a smartphone, a tablet device, a laptop computer, awearable device, computerized glasses, a portable gaming console, or aportable media player device. Less mobile devices may also be used suchas desktop computers, television systems, gaming consoles, and varioustypes of conveyances.

Digital image sensor 110 may capture various sensor measurements fromvarious sensors that may be part of, or coupled to, the digital mediacapture device, such as the GPS coordinates where the digital media wastaken, camera orientation, elevation, latitude, and altitude. Capturedinformation may further or alternatively include the roll of the imagecapture device, the pitch of the image capture device, the yaw of theimage capture device, the velocity and/or direction of the image capturedevice, the viewing angle of the image capture device, the azimuthand/or compass bearing of the image capture device. Informationconcerning the horizon angles of the image capture device and theinclination and declination of the image capture device may likewise becollected. Such metadata can be attached to both images, audios andvideos. The captured image and the metadata may be automaticallytransferred directly to a secure data center 120.

FIG. 2 is a flow diagram illustrating techniques for mediacertification. At operation 205, a media asset is captured by a sensorof a digital media capture device, optionally with its metadata as well.The metadata may include, for example, latitude and longitudecoordinates from a GNSS receiver or other positioning receiver, anidentification of the media capture device, a timestamp identifying dateand time of capture, an altitude at capture, a heading at capture, aninclination at capture, a yaw at capture, a roll at capture, pitch atcapture, a watermark, an annotation, any other data that might be foundin image EXIF metadata, elevation or altitude, velocity at capture,path, speed, direction, distance, weather conditions, barometer reading& change, dew point, humidity, sun angle, temperature, compass heading,media certification status, annotation certification status, incidentnote certifications status, incident report certification status, eventnumber, time, date, time zone, title, media type (IR, multi-spectrum,RADAR, LIDAR, IJV, 2-dimensionality, 3-dimensionality), wind speed, winddirection, radar data, cloud coverage, visibility, flood data, any othermetadata discussed herein, or combinations thereof.

At operation 210, an asymmetric public key infrastructure (PKI) keypair—with a private key and a corresponding public key—is generated bythe media capture device of operation 205 or by servers 325. In somecases, the keys of the key par may be RSA 1024 asymmetric keys. Othertypes of asymmetric keys may be used.

At operation 215, a digital signature is computed by generating a hashdigest—optionally using a secure hash algorithm such as SHA-0, SHA-1,SHA-2, or SHA-3—of the captured media, and optionally of the metadata aswell. At operation 220, the digital signature is encrypted with theprivate key. The media and/or metadata may also be encrypted using theprivate key. The private key is optionally destroyed at operation 225,or may simply never be written to non-volatile memory in the firstplace.

At operation 230, the public key is published, either by sending it tothe servers 325, to an authentication server such as a certificateauthority, or by otherwise sending it for publication in anotherpublicly accessible and trusted network location. At operation 235,verification as to the authenticity of the media and metadata may occurby decrypting the encrypted digital signature using the public keybefore or after publication at operation 230, and verifying whether ornot the hash digest stored as part of the decrypted digital signaturematches a newly generated hash digest of the media. If the new hashmatches the hash decrypted using the public key, then verification issuccessful, and the media asset has not been modified since capture (orat least since certification). If the new hash does not match the hashdecrypted using the public key, then verification is unsuccessful, andthe media asset has been modified since capture (or at least sincecertification). The same can be done using the metadata if a hash digestof the metadata is included in the digital signature. The verificationas to the authenticity of the media and metadata at operation 235 mayalso include decrypting the media asset and/or the metadata itself, ifeither or both were encrypted at operation 220. This verification mayoccur at the digital media capture device—though it may instead oradditionally be performed at the server 325, for example before theserver 325 indexes the media as part of a cloud storage systemaccessible by client devices.

Once the authentication of operation 235 succeeds, a certified mediadataset is generated by bundling the media, metadata, and the encrypteddigital signature, for example in a zip file or other compressed archivefile. The public key may also be bundled with them, though additionalsecurity may be provided by publishing it elsewhere to a trustedauthentication server. At operation 245, the certified media dataset(and optionally the public key) is transmitted to a secondary device,such as a server 325 or a viewer device (i.e., a client device).

In some cases, additional data besides the media asset and associatedmetadata may also be certified, either or separately from the mediaasset or together with the certification of the media asset. If theadditional data is certified together with the media asset, the hash anddigital signatures at operation 215 may be hashes of the media asset aswell as the additional data, thereby certifying the media asset alongwith the additional data. If the additional data is certified separatelyfrom the media asset, the entire process 200 may be repeated, with theadditional data treated as a media asset. Additional data may includealterations or annotations to a media asset, or at least a subset of areport that is generated based on the media asset, or at least a subsetof a report that is generated to include the media asset. Metadatacorresponding to the additional data in some cases identifying one ormore author(s) of the additional data and/or one or more devices onwhich the additional data was generated and/or certified, and/or fromwhich the additional data was submitted to the server(s) 325. In somecases, a certain media asset can be associated with multiple additionaldata items, such as multiple notes, annotations, and/or reports bydifferent authors, the same authors, or some combination thereof.

In other words, the operations 200 of FIG. 2 illustrate data integrityprecautions that can be taken. For example, all data (e.g., media assetand/or additional data and/or metadata) can, in some embodiments, besecured in a local database with a globally unique identifier to ensureits integrity. The asset's security and integrity can be ensured via aDigital Signature that is made up of a SHA1 digest, the time that theasset was captured and the device of origin. This allows the mobile appor server to detect changes due to storage or transmission errors aswell as any attempt to manipulate or change the content of the asset.The Digital Signature can be encrypted with a public/private key-pairthat is generated uniquely for that asset by the media capture device.The private key can be destroyed by the media capture device and/ornever written to a disk or stored in a memory of the media capturedevice or any other device; as such, this ensures that the asset cannotbe re-signed and cannot be changed without those changes beingdetectable.

More specifically, media asset data, such as image, video, audio, 3Ddistance measurements, or other sensor data are captured by a camera,microphone, and/or other sensors integrated with the digital mediacapture device and/or sensors connected to the digital media capturedevice in a wired or wireless manner. The digital media capture devicealso generates and/or extracts metadata (e.g., EXIF metadata)corresponding to this captured media asset, for example identifying thedigital media capture device, a timestamp of capture, a date of capture,an author or owner of the digital media capture device, and any othermetadata. A digital signature is generated by generating a hash of boththe captured media and at least some of this metadata. For example, thedigital signature may be a hash of the captured media, the timestamp,and an identifier of the digital media capture device that captured themedia. The hash may be computed using a secure hash algorithm (SHA),such as SHA-0, SHA-1, SHA-2, or SHA-3. The digital media capture deviceand/or a second device that receives the media asset from the digitalmedia capture device may then generate a public and private key pairusing a public key infrastructure (PKI), where the keys may be forexample RSA 1024 bit keys. The private key is used to encrypt thedigital signature, and may then be deleted, erased, and/or destroyed, insome cases via overwriting for more security. The certified mediaasset—meaning the media asset, the encrypted digital signature, and the(optionally encrypted) metadata—are uploaded to the cloud severs 325, insome cases along with the public key, optionally securely via HTTPS oranother secure network transfer protocol. The public key may be uploadedto the same cloud server(s) 325 or to a different system, such as acertificate authority (CA) server. The media asset and its metadata arenow certified. Any server or client can retrieve the public key from thecloud server 325 system or CA server and decrypt the encrypted digitalsignature to verify that it matches a new hash generated using mediaasset and/or metadata at a later time, thereby verifying that the mediaasset and metadata have not been changed since certification. The samecertification process may be used for additional data based on the mediaasset, such as annotations, notes, and reports. In some cases, such averification check is performed at the media capture device 305 orsecond device before the media asset and metadata and encrypted digitalsignature and public key are sent by the media capture device or seconddevice to the server(s). In some cases, such a verification check isperformed at the server(s) after receipt of the certified media asset.

Metadata may include, for example, time, location, media capture,orientation, media size, resolution, frame size, elevations, centimeter3D GPS position, digital media capture device speed, heading, or somecombination thereof.

FIG. 3 illustrates a network architecture through which digital mediamay be captured, certified, uploaded to a server network, verified, anddistributed to clients.

A digital media capture device 305 captures digital media, which mayinclude one or more image(s), video(s), sensor data, or a combinationthereof. The digital media capture device 305 may be a user mobiledevice, a drone or UAV, a vehicle, a body camera, a surveillance camera,a dash camera, a wearable device, a phone another type of device, or acombination thereof. The image and/or sensor data may be categorized ata step 307 (e.g., for example based on type of media, time, location,other metadata associated with capture of the digital media, or somecombination thereof) and/or certified at a step 310 (e.g., as in theprocess 200 of FIG. 2 ). Categorization 307 and/or certification 310 mayoccur at the digital media capture device 305 or a second device thatreceives the digital media asset from the digital media capture device.In some cases, categorization 307 may be skipped.

In another example, a digital media capture device 305 can be used tocapture the digital media asset, integrate metadata from one or moredigital media capture device sensors and embed one or more glyphs on thedigital media asset during the capture process. The digital media andthe data associated with the digital media may be received andmaintained at a cloud-based server for viewing, subsequent distribution,and interrogation of authenticity.

Once digital media is captured at the digital media capture device 305,categorized at step 307, and/or certified at step 310, the certified(and in some cases categorized) digital media data may be autonomouslysent to one or more servers 325 by the digital media capture device or asecond device that receives the digital media data from the digitalmedia capture device. The digital media capture device and/or the seconddevice transmits the certified (and in some cases categorized) digitalmedia data to the servers 325 over the internet 320 using one or morewired and/or wireless network interfaces 315, which may include cellularnetworks (e.g., 3G, 4G, LTE, or 5G), W-Fi, wireless local area networks(WLAN), any other wired and/or wireless network interfaces discussedherein, or a combination thereof.

Once the certified digital media data is received by the servers 325,the servers 325 store, verify, file, organize, and publish the certifieddigital media data so that the certified digital media data is madeaccessible through the internet 320 to client devices 330. The servers325 may receive the public key transmitted at operation 245 of theprocess 200 and use the public key to verify that the certified digitalmedia data is authentic and unaltered.

In some cases, the digital media capture device can first synchronizeits image and/or sensor data with a second device, such as a mobiledevice 360 and/or a base station. For example, a camera of the digitalmedia capture device may first synchronize its data with a user mobiledevice 360 (e.g., a smartphone or wearable device) or a base station,which can then transmit the certified digital media to the internet 320and server(s) 325 of the cloud system. Other devices, such as handhelddigital cameras, body cameras, and binoculars may include the digitalmedia capture device, and/or in some cases may connect with theserver(s) 325.

Client devices 330 or 360 may include a user interface 740 that includesfunctions for visual reports, maps for satellite or street view,integration with other devices or software, storyboard, administrativefunctions, communication, search, audit, and functions for managingsystem, storage, domain, synchronization, and chain of custody to allowfor collaboration 335 among devices 330 and/or 360 as furtherillustrated in FIG. 8 .

FIG. 4 illustrates an exemplary certified image within an exemplaryimage viewer application. The exemplary image viewer application 410displays an image 420 and shows a “certified image” stamp or “certifiedby [image certifying authority]” stamp graphic 450 in the upper leftcorner of the image 420, signifying that the image 420 is a certifiedimage and therefore is certified as authentic and unaltered. In theexample of FIG. 4 , the image certifying authority is “ImageKeeper.” Insome examples, a different image certifying authority may be identified.The exemplary image viewer 410 also shows some image metadata along thebottom 440 of the image 420 and additional metadata in a metadataviewing box 430 on the right-hand side of the image 420. The bottom 440of the image 420 may include geospatial metadata, such as heading angle,latitude, longitude, altitude, etc. The bottom 440 of the image 420 mayfurther include the time and date of the digital media capture. Thismetadata is also certified as part of the certification process, and mayin some cases also be marked with a “certified image” stamp or“certified by [image certifying authority]” stamp graphic itself tosignify that it, too, is certified as authentic and unaltered.

FIG. 5 is a flow diagram illustrating an exemplary operation of theintelligent image certification system. In particular, a media capturedevice 510 captures an image 550 and certifies the image 550 uponcapture. During the capture, the metadata associated with the capture ofthe image 550 may be displayed on the media capture device 510. Forexample, while the media capture device 510 is pointed at an object tobe captured, the geospatial information and date and time of capture maybe displayed in real-time on the media capture device 510 and updated asthe media capture device 510 is moved in location or as time passes. Themedia capture device 510 may display the object to be captured and thesensor and metadata associated with the capture simultaneously duringthe capture of the digital media asset. The certified image 550 istransferred, optionally through the server(s) 540, to a viewer device520, which views the certified image 550 in a viewer application 410.The viewer application 410 may display meters corresponding to imagedata security levels, for instance identifying a degree of confidence inthe authenticity and unaltered nature of the certified image 550.

FIG. 6 is a flow chart of image processing system. A digital media assetcaptured by a digital media capture device, such as an image captured bya camera, is received by the media processing system (e.g., serversystem 325 of FIG. 3 ). The digital media asset may be in the form ofimage data, audio data, video data, RADAR data, LIDAR data, SONAR data,SODAR data, sensor data from one or more other sensors, or somecombination thereof. The media processing system may also receivemetadata related to the digital media asset. The metadata may includelocation, orientation, navigation attributes, orientation of the mediacapture device, time of the capture, date of capture, photographer,identity of the digital media capture device, owner of the digital mediacapture device, sensor data from one or more other sensors coupled tothe digital media capture device, or some combination thereof.

When the digital media asset 605 and its metadata are captured by thedigital media capture device 305, the digital media asset and itsmetadata are autonomously certified (as in FIG. 2 ) and sent by thedigital media capture device 305 to the internet/cloud system where thedigital data is filed, stored, and accessed through the web in asystematic or serialized format. The system generates an informationpage based on the information associated with the digital media asset ona network location. The internet/cloud system can include one or moreserver systems, which may be connected to each other. In some cases,this internet/cloud system is a wireless multiplexed system for securelystoring digital data to and from mobile digital devices. In some cases,the digital data (e.g., images, reports) are securely held in onecentral place, either by a hardware memory device, server, or a datacenter.

In another example, a digital media capture device can be used tocapture the digital media asset, integrate metadata from one or moredigital media capture device sensors and embed one or more glyphs on thedigital media asset during the capture process. The digital media andthe data associated with the digital media may be received andmaintained at a cloud-based server for viewing, subsequent distribution,and interrogation of authenticity.

The digital media asset 605 is embedded with a glyph that encodesinformation pointing to the internet/cloud system. This glyph can be aquick response (QR) code. The glyph can also be a barcode, Aztec code,brand logo, URL, and/or MaxiCode or other identifier in addition to orinstead of the QR code. The information pointing to the internet/cloudsystem can encode or otherwise include a URL. The system then generatesa modified digital media asset by overlaying the glyph on the digitalmedia asset 605.

The embedded glyph on the digital media asset is shown when a contentprovider broadcasts the digital media asset on a display device or oneor more social platforms. A requesting device scans the glyph from thedisplayed digital media asset, for example using a camera, and decodesfrom the glyph information pointing to a network location. Once therequesting device decodes the information pointing to a networklocation, the requesting device requests the digital media assetinformation from the server system. The server system searches for thedigital media asset, executes instructions to validate the digital mediaauthenticity, serves a dynamically generated information page containingthe original certified authentic digital media asset along with anypersisted information, including any metadata, to the requesting devicefor viewing or enabling interaction between the viewer and the serversystem.

Once the digital data is in the internet or cloud system, the digitalmedia asset 605 may be protected through a various technologies andsystem controls. Security, digital signature, watermarking, encryptionphysical access, password credentials area can be utilized throughoutthe system. Original digital data can be confirmed, saved and protectedthough various technologies and system controls. The system may generatea hash digest of the digital media asset and a unique key paircorresponding to the digital media asset. The unique key consists of aprivate key and a public key, in which the private key is used toencrypt both the hash digest and the metadata. The public key may betransmitted to a network server. The information pointing to the networklocation may require a passcode to access the digital data.

A content provider (e.g., the servers 325 or a device that retrieves themodified digital media dataset and/or information page from the servers325 or the media capture device 305) may broadcast the informationregarding the digital media by displaying the media as well as the glyphassociated with the media during its broadcast on a display device. Thecontent provider may be television network, radio channel, newspaper, ormagazine publisher. Viewers of the broadcast may request to access thedigital media and its associated information by scanning the glyph fromthe broadcast with the viewer's device. This data can be transferredover a wired or a wireless connection. When requested to provide thedigital media data, the system may generate a decrypted signature bydecrypting the digital signature using the public key, generate a hashbased on the digital media asset, and verify that the hash matches thedecrypted signature.

In one embodiment, when a viewer of the broadcast requests thisinformation, the viewer may be shown the information page correspondingto the digital media asset. In another embodiment, the viewer may beprompted to provide a passcode to access the information page containingthe digital media asset and its metadata. The information page mayinclude a certification that the digital media asset is unaltered basedon the hash matching the decrypted signature.

FIG. 7 illustrates a modified version 700 of a digital media asset 710with an overlaid glyph. The digital media asset 710 is illustrated inFIG. 7 as an image. In another embodiment, the digital media asset 710may be a document, which may include texts or a combination of imagesand texts. The server system 325 generates the glyph 720 to encodeinformation identifying a network location, such as a Uniform ResourceLocator (URL) of the network location, of an information page associatedwith the digital media asset 710 (e.g., the information page 800illustrated in FIG. 8 ). The server system 325 generates the modifieddigital media asset 700 by generating a glyph 720 and overlaying theglyph 720 on at least a portion of the digital media asset 710, or byotherwise embedding the glyph 720 into the digital media asset 710. Thecertified digital media asset 710 may also be modified by overlayingcertain metadata 730 over the digital media asset 710. In some examples,the glyph 720 is overlaid over a portion of the digital media asset 710without modifying the digital media asset 710. For instance, the glyph720 can be a separate layer than the digital media asset 710 and can bemoved relative to the digital media asset 710. In some examples, theglyph 720 is positioned adjacent to or near the digital media asset 710without being overlaid over the digital media asset 710.

The glyph 720 is overlaid over the bottom right of the digital mediaasset 710 in the example illustrated in FIG. 7 . The glyph 720 isillustrated as a quick response (QR) Code. A requesting device mayinteract with this glyph 720 by scanning the QR Code with a camera orother scanner of the requesting device. For instance, the requestingdevice may be a smart phone or tablet with a QR Code scanner that scansthe glyph 720. The requesting device may decode the glyph to obtain thenetwork location (e.g., the URL) of the information page. The requestingdevice may “go to” the network location using a browser or otherapplication running on the requesting device. To go to the networklocation, the requesting device can request the information page fromthe servers 325. The servers 325 can provide the information page to therequesting device in response to the request, and in some examples alsoin response to successful identification and/or authentication of therequesting device and/or the user of the requesting device (e.g., byverifying device ID of the requesting device, a username of the user, apassword of the user, and/or other identifying information).

In another embodiment, the requesting device scanning the glyph 720 isdirected to the URL where the digital media asset is stored. Therequesting device accessing the URL can cause a digital media bank(e.g., the server system 325) to search for the associated digital mediaasset, perform the authenticity verification, and output the digitalmedia asset and an information page to the requesting device.

In some cases, the modified digital media asset 700 may also include ahyperlinked text or region of the digital media asset (e.g., as part ofthe glyph 720 or adjacent to the glyph 720), so that a user viewing themodified digital media asset on a device can click or tap thehyperlinked text or region to go to the network location (e.g., URL) ofthe information page even without a camera or QR code scanner. In somecases, the QR code may be the hyperlinked region of the modified digitalmedia asset.

In some other cases, scanning the glyph 720 may trigger an option toinitiate an authenticity analysis of the digital media asset 710 by aviewer device. Scanning the glyph 720 may also trigger an authenticityanalysis of the metadata, geospatial data, digital signature, pixelvariation, or other data associated with the digital media asset 710.The results from the authenticity analysis may be displayed on theviewer device to indicate whether the digital media asset 710 or thedata associated with the digital media asset 710, such as digitalsignature, pixel variation, metadata, or geospatial data are authenticor showing no pixel variation.

For example, the authenticity analysis of pixel variation in the digitalmedia asset 710 can, for instance, compare the pixels in the digitalmedia assets to the pixels in an encrypted copy of the digital mediaasset received from the media capture device, which may be decryptedusing a public key upon receipt by the server system 325. In anotherexample, the authenticity analysis of metadata and/or geospatial data inthe image may compare the metadata and/or geospatial data of the digitalmedia asset 710 to an encrypted copy of the metadata and/or geospatialdata received from the media capture device, which may be decryptedusing a public key upon receipt by the server system 325. The overallresult may be based on a combination of the previously describedanalyses, and for instance identify a percentage of the analysesindicating successful authentication and/or a percentage of the analysesindicating failed authentication.

In some examples, a viewer or administrator may set permissions at theserver 325 so that only certain requesting devices may be able to accessthe information page. For example, certain device IDs of requestingdevices can be whitelisted or blacklisted at the server 325 from beingserved the information page by the server system 325. The server system325 may request a username and/or password from the requesting device,and requesting devices using certain usernames and/or passwords can bewhitelisted or blacklisted at the server system 325 from being servedthe information page by the server system 325.

FIG. 8 illustrates an exemplary view of an information page 800 of theviewer application. The information page 800 may be displayed using theviewer application 410 on a client device (e.g., client device 330and/or 360). For example, the information page 800 may be displayedusing the viewer application 410 on the client device after scanning theglyph 720 of FIG. 7 with a camera associated with the client device. Theclient device may decode, from the glyph 720, information pointing tothe network location (e.g., a URL) where the information page 800associated with the digital media 710 is stored. The network locationcan be password-protected, in which case the client device may be servedaccess the information page 800 by the server system 325 after sending ausername and/or password to the server system 325. The server system 325may serve the information page to the client device. The informationpage 800 may be referred to as the information 800.

The information page 800, in the example illustrated in FIG. 8 ,includes a copy of the modified digital media asset 700, including theimage 710 with the glyph 720 overlaid. The information page 800 can alsoinclude information 810, such as sensor and metadata informationassociated with the digital media 710 and/or with capture of the digitalmedia 710. For example, the information page 800 can include information810 such as the location the digital media asset 710 was captured and/orcreated, an identifier identifying the user who captured and/or createdthe digital media asset 710, a date of capture and/or creation of thedigital media asset 710, a timestamp of the capture and/or creation ofthe digital media asset 710, or combinations thereof. The informationpage 800 can include information 810 identifying camera settings usingduring capture of the digital media asset 710, such as aperture size,exposure time, shutter speed, ISO speed, HDR mode, focus, flash, digitalgain, analog gain, white balance, image processing settings, orcombinations thereof. The information page 800 can include information810 such as application record, version number, artist or author,brightness, camera model, creator tool, current IPTC, encoding process,image height, image width, or a combination thereof. Any combination ofthe above-recited types of information 810 may be part of theinformation page 800 that is displayed in the viewer application 410along with the digital media 710 or modified digital media 700.

Further, information 810 may include a result of authenticity analysisof the digital media asset 710 and/or the authenticity analysis of thedata associated with the digital media asset 710, such as digitalsignature, pixel variation in the digital media asset, metadata,geospatial data, an overall result, or a combination thereof, asdescribed in FIG. 7 .

In some examples, viewers, such as a first viewer 820A and a secondviewer 820B, can interact with the digital media asset 710 andassociated information 810. In some examples, the first viewer 820A canrefer to a first viewer device associated with the first viewer 820A,and the second viewer 820B can refer to a second viewer deviceassociated with the first viewer 820B. In some examples, the firstviewer 820A can refer to a first viewer account associated with thefirst viewer 820A, and the second viewer 820B can refer to a secondviewer account associated with the first viewer 820B. In some examples,the first viewer 820A and the second viewer 820B refer to clientdevices, such as client devices 330 and/or 360 of FIG. 3 . In someexamples, the first viewer 820A and the second viewer 820B refer toviewer devices, such as viewer device 520 of FIG. 5 . Viewer habits maybe compiled from the views. For example, the server system 325 can storethe number of views of the digital media asset 710 by each viewer.Viewer habits may allow the content provider to learn the viewer'sfavorite channels or the viewing times. Each viewer may interact withthe information page 800 by providing an input. For instance, the inputprovided by the viewer may be a comment, news, location, events,incidents, media, or feedback regarding the digital media 710. Theserver system 325 may receive the input transmitted from the viewers820A-820B regarding each viewer's interaction with the digital media710, and may update the information page 800 to identify the input alongwith other inputs and/or feedback from other viewers.

For example, FIG. 8 illustrates that viewer 820A and viewer 820B haveleft comment 830A and comment 830B respectively, regarding the digitalmedia 710, the information 810, and/or anything else on the informationpage 800. Moreover, FIG. 8 illustrates viewer data 840 of the digitalmedia 710, which displays that 52 viewers have approved or expressedpositive opinion of the digital media 710 and 23 viewers havedisapproved or expressed negative opinion the digital media 710. Theapproval and disapproval numbers may correlate with the opinions of theviewers 820A-B regarding the authenticity of the digital media 710, witha high number of approval indicating that the digital media 710 isauthentic. The view data 840 may also indicate the total number of viewsof the digital media asset 710 viewed by different viewers 820A-B. Allof these may be referred to as inputs by the viewers 820A-B. In someembodiments, the information page 800 may allow viewers 820A-B to editthe digital media asset 710. Such edits to the digital media asset byviewers 820A-B may be logged. A chain of custody and a chain ofmodifications/edits may be stored in the secure server 325, any otherremote servers, or in a distributed ledger, such as blockchain.

The presently disclosed invention may be implemented in the generalcontext of computer executable instructions via software located on andbetween a remotely operated user device (e.g., Smartphone, tablet, orother electronic device) with a computerized operating system. There maybe multiple user devices interacting with a web portal, which may belocal or may be geographically separated. The user devices may beremotely addressable with secure login, with or without password,biometric fingerprint, voice, retinal scan or encrypted log on webportal providing global internet access, either via fiber, radiofrequency, satellite, or data linking with bi-directional, cloud systemand or data center or location under user command.

The web portal and/or viewer device mobile application can includeannotation tools, allowing for creation of charts and graphics withcolor annotation incorporating picture in picture, with image numbersassociated with each image brought into the web portal workspace. Inaddition to annotation tools, any interface with all of the externaldata inputs, such as weather, news, Internet sites, other sensor datacan be integrated into the workspace and integrated into the image workareas.

FIG. 9 illustrates an exemplary computing system 900 that may be used toimplement some aspects of the technology. For example, the digital mediacapture device, the servers 325, the client devices 330, the clientdevices 360, the media capture device 510, the viewer device 520, aswell as any other computing devices, computing systems, network devices,network systems, servers, and/or arrangements of circuitry describedherein may include at least one computing system 900, or may include atleast one component of the computer system 900 identified in FIG. 9 .The computing system 900 of FIG. 9 includes one or more processors 910and memory 920. Each of the processor(s) 910 may refer to one or moreprocessors, controllers, microcontrollers, central processing units(CPUs), graphics processing units (GPUs), arithmetic logic units (ALUs),accelerated processing units (APUs), digital signal processors (DSPs),application specific integrated circuits (ASICs), field-programmablegate arrays (FPGAs), or combinations thereof. Each of the processor(s)910 may include one or more cores, either integrated onto a single chipor spread across multiple chips connected or coupled together. Memory920 stores, in part, instructions and data for execution by processor910. Memory 920 can store the executable code when in operation. Thesystem 900 of FIG. 9 further includes a mass storage device 930,portable storage medium drive(s) 940, output devices 950, user inputdevices 960, a graphics display 970, and peripheral devices 980.

The components shown in FIG. 9 are depicted as being connected via asingle bus 990. However, the components may be connected through one ormore data transport means. For example, processor unit 910 and memory920 may be connected via a local microprocessor bus, and the massstorage device 930, peripheral device(s) 980, portable storage device940, and display system 970 may be connected via one or moreinput/output (I/O) buses.

Mass storage device 930, which may be implemented with a magnetic diskdrive or an optical disk drive, is a non-volatile storage device forstoring data and instructions for use by processor unit 910. Massstorage device 930 can store the system software for implementing someaspects of the subject technology for purposes of loading that softwareinto memory 920.

Portable storage device 940 operates in conjunction with a portablenon-volatile storage medium, such as a floppy disk, compact disk orDigital video disc, to input and output data and code to and from thecomputer system 900 of FIG. 9 . The system software for implementingaspects of the subject technology may be stored on such a portablemedium and input to the computer system 900 via the portable storagedevice 940.

The memory 920, mass storage device 930, or portable storage 940 may insome cases store sensitive information, such as transaction information,health information, or cryptographic keys, and may in some cases encryptor decrypt such information with the aid of the processor 910. Thememory 920, mass storage device 930, or portable storage 940 may in somecases store, at least in part, instructions, executable code, or otherdata for execution or processing by the processor 910.

Output devices 950 may include, for example, communication circuitry foroutputting data through wired or wireless means, display circuitry fordisplaying data via a display screen, audio circuitry for outputtingaudio via headphones or a speaker, printer circuitry for printing datavia a printer, or some combination thereof. The display screen may beany type of display discussed with respect to the display system 970.The printer may be inkjet, laserjet, thermal, or some combinationthereof. In some cases, the output device circuitry 950 may allow fortransmission of data over an audio jack/plug, a microphone jack/plug, auniversal serial bus (USB) port/plug, an Apple® Lightning® port/plug, anEthernet port/plug, a fiber optic port/plug, a proprietary wiredport/plug, a BLUETOOTH® wireless signal transfer, a BLUETOOTH® lowenergy (BLE) wireless signal transfer, an IBEACON® wireless signaltransfer, a radio-frequency identification (RFID) wireless signaltransfer, near-field communications (NFC) wireless signal transfer,dedicated short range communication (DSRC) wireless signal transfer,802.11 Wi-Fi wireless signal transfer, wireless local area network(WLAN) signal transfer, Visible Light Communication (VLC), WorldwideInteroperability for Microwave Access (WiMAX), Infrared (IR)communication wireless signal transfer, Public Switched TelephoneNetwork (PSTN) signal transfer, Integrated Services Digital Network(ISDN) signal transfer, 3G/4G/5G/LTE cellular data network wirelesssignal transfer, ad-hoc network signal transfer, radio wave signaltransfer, microwave signal transfer, infrared signal transfer, visiblelight signal transfer, ultraviolet light signal transfer, wirelesssignal transfer along the electromagnetic spectrum, or some combinationthereof. Output devices 950 may include any ports, plugs, antennae,wired or wireless transmitters, wired or wireless transceivers, or anyother components necessary for or usable to implement the communicationtypes listed above, such as cellular Subscriber Identity Module (SIM)cards.

Input devices 960 may include circuitry providing a portion of a userinterface. Input devices 960 may include an alpha-numeric keypad, suchas a keyboard, for inputting alpha-numeric and other information, or apointing device, such as a mouse, a trackball, stylus, or cursordirection keys. Input devices 960 may include touch-sensitive surfacesas well, either integrated with a display as in a touchscreen, orseparate from a display as in a trackpad. Touch-sensitive surfaces mayin some cases detect localized variable pressure or force detection. Insome cases, the input device circuitry may allow for receipt of dataover an audio jack, a microphone jack, a universal serial bus (USB)port/plug, an Apple® Lightning® port/plug, an Ethernet port/plug, afiber optic port/plug, a proprietary wired port/plug, a wired local areanetwork (LAN) port/plug, a BLUETOOTH® wireless signal transfer, aBLUETOOTH® low energy (BLE) wireless signal transfer, an IBEACON®wireless signal transfer, a radio-frequency identification (RFID)wireless signal transfer, near-field communications (NFC) wirelesssignal transfer, dedicated short range communication (DSRC) wirelesssignal transfer, 802.11 Wi-Fi wireless signal transfer, wireless localarea network (WLAN) signal transfer, Visible Light Communication (VLC),Worldwide Interoperability for Microwave Access (WiMAX), Infrared (IR)communication wireless signal transfer, Public Switched TelephoneNetwork (PSTN) signal transfer, Integrated Services Digital Network(ISDN) signal transfer, 3G/4G/5G/LTE cellular data network wirelesssignal transfer, personal area network (PAN) signal transfer, wide areanetwork (WAN) signal transfer, ad-hoc network signal transfer, radiowave signal transfer, microwave signal transfer, infrared signaltransfer, visible light signal transfer, ultraviolet light signaltransfer, wireless signal transfer along the electromagnetic spectrum,or some combination thereof. Input devices 960 may include any ports,plugs, antennae, wired or wireless receivers, wired or wirelesstransceivers, or any other components necessary for or usable toimplement the communication types listed above, such as cellular SIMcards.

Input devices 960 may include receivers or transceivers used forpositioning of the computing system 900 as well. These may include anyof the wired or wireless signal receivers or transceivers. For example,a location of the computing system 900 can be determined based on signalstrength of signals as received at the computing system 900 from threecellular network towers, a process known as cellular triangulation.Fewer than three cellular network towers can also be used—even one canbe used—though the location determined from such data will be lessprecise (e.g., somewhere within a particular circle for one tower,somewhere along a line or within a relatively small area for two towers)than via triangulation. More than three cellular network towers can alsobe used, further enhancing the location's accuracy. Similar positioningoperations can be performed using proximity beacons, which might useshort-range wireless signals such as BLUETOOTH® wireless signals,BLUETOOTH® low energy (BLE) wireless signals, IBEACON® wireless signals,personal area network (PAN) signals, microwave signals, radio wavesignals, or other signals discussed above. Similar positioningoperations can be performed using wired local area networks (LAN) orwireless local area networks (WLAN) where locations are known of one ormore network devices in communication with the computing system 900 suchas a router, modem, switch, hub, bridge, gateway, or repeater. These mayalso include Global Navigation Satellite System (GNSS) receivers ortransceivers that are used to determine a location of the computingsystem 900 based on receipt of one or more signals from one or moresatellites associated with one or more GNSS systems. GNSS systemsinclude, but are not limited to, the US-based Global Positioning System(GPS), the Russia-based Global Navigation Satellite System (GLONASS),the China-based BeiDou Navigation Satellite System (BDS), and theEurope-based Galileo GNSS. Input devices 960 may include receivers ortransceivers corresponding to one or more of these GNSS systems.

Display system 970 may include a liquid crystal display (LCD), a plasmadisplay, an organic light-emitting diode (OLED) display, alow-temperature poly-silicon (LTPO) display, an electronic ink or“e-paper” display, a projector-based display, a holographic display, oranother suitable display device. Display system 970 receives textual andgraphical information, and processes the information for output to thedisplay device. The display system 970 may include multiple-touchtouchscreen input capabilities, such as capacitive touch detection,resistive touch detection, surface acoustic wave touch detection, orinfrared touch detection. Such touchscreen input capabilities may or maynot allow for variable pressure or force detection.

Peripherals 980 may include any type of computer support device to addadditional functionality to the computer system. For example, peripheraldevice(s) 980 may include one or more additional output devices of anyof the types discussed with respect to output device 950, one or moreadditional input devices of any of the types discussed with respect toinput device 960, one or more additional display systems of any of thetypes discussed with respect to display system 970, one or more memoriesor mass storage devices or portable storage devices of any of the typesdiscussed with respect to memory 920 or mass storage 930 or portablestorage 940, a modem, a router, an antenna, a wired or wirelesstransceiver, a printer, a bar code scanner, a quick-response (“QR”) codescanner, a magnetic stripe card reader, a integrated circuit chip (ICC)card reader such as a smartcard reader or a EUROPAY®-MASTERCARD®-VISA®(EMV) chip card reader, a near field communication (NFC) reader, adocument/image scanner, a visible light camera, a thermal/infraredcamera, an ultraviolet-sensitive camera, a night vision camera, a lightsensor, a phototransistor, a photoresistor, a thermometer, a thermistor,a battery, a power source, a proximity sensor, a laser rangefinder, asonar transceiver, a radar transceiver, a lidar transceiver, a networkdevice, a motor, an actuator, a pump, a conveyer belt, a robotic arm, arotor, a drill, a chemical assay device, or some combination thereof.

The components contained in the computer system 900 of FIG. 9 caninclude those found in computer systems that may be suitable for usewith some aspects of the subject technology and represent a broadcategory of computer components. That said, the computer system 900 ofFIG. 9 can be customized and specialized for the purposes discussedherein and to carry out the various operations discussed herein, withspecialized hardware components, specialized arrangements of hardwarecomponents, and/or specialized software. Thus, the computer system 900of FIG. 9 can be a personal computer, a hand held computing device, atelephone (“smartphone” or otherwise), a mobile computing device, aworkstation, a server (on a server rack or otherwise), a minicomputer, amainframe computer, a tablet computing device, a wearable device (suchas a watch, a ring, a pair of glasses, or another type of jewelry orclothing or accessory), a video game console (portable or otherwise), ane-book reader, a media player device (portable or otherwise), avehicle-based computer, another type of computing device, or somecombination thereof. The computer system 900 may in some cases be avirtual computer system executed by another computer system. Thecomputer can also include different bus configurations, networkedplatforms, multi-processor platforms, etc. Various operating systems canbe used including Unix®, Linux®, FreeBSD®, FreeNAS®, pfSense®, Windows®,Apple® Macintosh OS® (“MacOS®”), Palm OS®, Google® Android®, Google®Chrome OS®, Chromium® OS®, OPENSTEP®, XNU®, Darwin®, Apple® iOS®, Apple®tvOS®, Apple® watchOS®, Apple® audioOS®, Amazon® Fire OS®, Amazon®Kindle OS®, variants of any of these, other suitable operating systems,or combinations thereof. The computer system 900 may also use a BasicInput/Output System (BIOS) or Unified Extensible Firmware Interface(UEFI) as a layer upon which the operating system(s) are run.

In some cases, the computer system 900 may be part of a multi-computersystem that uses multiple computer systems 900, each for one or morespecific tasks or purposes. For example, the multi-computer system mayinclude multiple computer systems 900 communicatively coupled togethervia at least one of a personal area network (PAN), a local area network(LAN), a wireless local area network (WLAN), a municipal area network(MAN), a wide area network (WAN), or some combination thereof. Themulti-computer system may further include multiple computer systems 900from different networks communicatively coupled together via theinternet (also known as a “distributed” system).

Some aspects of the subject technology may be implemented in anapplication that may be operable using a variety of devices.Non-transitory computer-readable storage media refer to any medium ormedia that participate in providing instructions to a central processingunit (CPU) for execution and that may be used in the memory 920, themass storage 930, the portable storage 940, or some combination thereof.Such media can take many forms, including, but not limited to,non-volatile and volatile media such as optical or magnetic disks anddynamic memory, respectively. Some forms of non-transitorycomputer-readable media include, for example, a floppy disk, a flexibledisk, a hard disk, magnetic tape, a magnetic strip/stripe, any othermagnetic storage medium, flash memory, memristor memory, any othersolid-state memory, a compact disc read only memory (CD-ROM) opticaldisc, a rewritable compact disc (CD) optical disc, digital video disk(DVD) optical disc, a blu-ray disc (BDD) optical disc, a holographicoptical disk, another optical medium, a secure digital (SD) card, amicro secure digital (microSD) card, a Memory Stick® card, a smartcardchip, a EMV chip, a subscriber identity module (SIM) card, amini/micro/nano/pico SIM card, another integrated circuit (IC)chip/card, random access memory (RAM), static RAM (SRAM), dynamic RAM(DRAM), read-only memory (ROM), programmable read-only memory (PROM),erasable programmable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), flash EPROM (FLASHEPROM), cachememory (L1/L2/L3/L4/L5/L9), resistive random-access memory (RRAM/ReRAM),phase change memory (PCM), spin transfer torque RAM (STT-RAM), anothermemory chip or cartridge, or a combination thereof.

Various forms of transmission media may be involved in carrying one ormore sequences of one or more instructions to a processor 910 forexecution. A bus 990 carries the data to system RAM or another memory920, from which a processor 910 retrieves and executes the instructions.The instructions received by system RAM or another memory 920 canoptionally be stored on a fixed disk (mass storage device 930/portablestorage 940) either before or after execution by processor 910. Variousforms of storage may likewise be implemented as well as the necessarynetwork interfaces and network topologies to implement the same.

The foregoing detailed description of the technology herein has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the technology to the precise formdisclosed. Many modifications and variations are possible in light ofthe above teaching. The described embodiments were chosen in order tobest explain the principles of the technology and its practicalapplication to thereby enable others skilled in the art to best utilizethe technology in various embodiments and with various modifications asare suited to the particular use contemplated. It is intended that thescope of the technology be defined by the claim.

While the flow diagrams show a particular order of operations performedby certain embodiments of the invention, it should be understood thatsuch order is exemplary. Alternative embodiments can perform theoperations in a different order, combine certain operations, and overlapcertain operations.

What is claimed is:
 1. A method of media processing, the methodcomprising: receiving a digital media asset captured by a media capturedevice; generating a resource locator that is indicative of a networklocation associated with the digital media asset, wherein the networklocation is configured to be interactive; generating a glyph thatencodes the resource locator that is indicative of the network location,wherein the glyph is scannable by a device to indicate the networklocation to the device; generating a modified digital media asset byoverlaying the glyph on the digital media asset; and outputting themodified digital media asset, wherein the glyph of the modified digitalmedia asset is scannable as output.
 2. The method of claim 1, whereinthe digital media asset includes an image.
 3. The method of claim 1,further comprising: receiving metadata associated with capture of thedigital media asset, wherein the network location is also associatedwith the metadata.
 4. The method of claim 1, wherein the glyph includesa quick response (QR) code that optically encodes the resource locator.5. The method of claim 1, wherein the network location includes a portalthat includes information about the digital media asset.
 6. The methodof claim 1, wherein the network location includes a portal that includesan interface for providing feedback about the digital media asset. 7.The method of claim 1, further comprising: receiving an indication thatthe device is attempting to access the network location through theresource locator encoded in the glyph of the modified digital mediaasset in response to output of the modified digital media asset.
 8. Themethod of claim 7, further comprising: receiving a passcode from thedevice; and causing information to be served to the device through thenetwork location.
 9. The method of claim 1, further comprising: storingan encrypted digital signature associated with the digital media asset,wherein authenticity of the digital media asset is verifiable bygenerating a hash of the digital media asset and comparing the hash tothe encrypted digital signature as decrypted using a public key.
 10. Themethod of claim 9, wherein the network location is configured to providethe device with the encrypted digital signature and the public key forthe device to verify the authenticity of the digital media asset.
 11. Anapparatus for media processing, the apparatus comprising: at least onememory storing instructions; and at least one processor that executesthe instructions, wherein by executing the instructions, the at leastone processor is configured to: receive a digital media asset capturedby a media capture device; generate a resource locator that isindicative of a network location associated with the digital mediaasset, wherein the network location is configured to be interactive;generate a glyph that encodes the resource locator that is indicative ofthe network location, wherein the glyph is scannable by a device toindicate the network location to the device; generate a modified digitalmedia asset by overlaying the glyph on the digital media asset; andoutput the modified digital media asset, wherein the glyph of themodified digital media asset is scannable as output.
 12. The apparatusof claim 11, wherein the digital media asset includes an image.
 13. Theapparatus of claim 11, further comprising: receiving metadata associatedwith capture of the digital media asset, wherein the network location isalso associated with the metadata.
 14. The apparatus of claim 11,wherein the glyph includes a quick response (QR) code that opticallyencodes the resource locator.
 15. The apparatus of claim 11, wherein thenetwork location includes a portal that includes information about thedigital media asset.
 16. The apparatus of claim 11, wherein the networklocation includes a portal that includes an interface for providingfeedback about the digital media asset.
 17. The apparatus of claim 11,further comprising: receiving an indication that the device isattempting to access the network location through the resource locatorencoded in the glyph of the modified digital media asset in response tooutput of the modified digital media asset.
 18. The apparatus of claim17, further comprising: receiving a passcode from the device; andcausing information to be served to the device through the networklocation.
 19. The apparatus of claim 11, further comprising: storing anencrypted digital signature associated with the digital media asset,wherein authenticity of the digital media asset is verifiable bygenerating a hash of the digital media asset and comparing the hash tothe encrypted digital signature as decrypted using a public key.
 20. Anon-transitory computer-readable storage medium, having embodied thereona program executable by a processor to perform a method of mediaprocessing, the method comprising: receiving a digital media assetcaptured by a media capture device; generating a resource locator thatis indicative of a network location associated with the digital mediaasset, wherein the network location is configured to be interactive;generating a glyph that encodes the resource locator that is indicativeof the network location, wherein the glyph is scannable by a device toindicate the network location to the device; generating a modifieddigital media asset by overlaying the glyph on the digital media asset;and outputting the modified digital media asset, wherein the glyph ofthe modified digital media asset is scannable as output.