Methods and systems for user-association of visual stimuli with corresponding responses

ABSTRACT

Methods and systems permit a user to decide what different responses are triggered when different visual stimuli are presented to the user&#39;s wireless communications device.

RELATED APPLICATION DATA

This patent application is a continuation of U.S. application Ser. No.12/244531, filed Oct. 2, 2008, which is a division of U.S. patentapplication Ser. No. 11/359,756, filed Feb. 21, 2006, which is adivision of U.S. patent application Ser. No. 09/690,773, filed Oct. 17,2000 (now U.S. Pat. No. 7,003,731), which is a continuation in part ofU.S. patent application Ser. No. 09/633,587, filed Aug. 7, 2000 (nowabandoned), which is a continuation in part of U.S. patent applicationSer. No. 09/343,104, filed Jun. 29, 1999 (now abandoned). U.S. patentapplication Ser. No. 09/343,104 claims priority from U.S. ProvisionalApplication No. 60/134,782, filed May 19, 1999. U.S. patent applicationSer. No. 09/690,773 is also a continuation in part of U.S. patentapplication Ser. No. 09/571,422, filed May 15, 2000 (now U.S. Pat. No.6,947,571), which claims priority to U.S. Provisional Application No.60/134,782, filed May 19, 1999. These patent applications are herebyincorporated by reference.

The subject matter of the present application is related to thatdisclosed in U.S. Pat. No. 5,862,260, and in application Ser. No.09/503,881, filed Feb. 14, 2000 (now U.S. Pat. No. 6,614,914), which arehereby incorporated by reference.

TECHNICAL FIELD

The present technology relates to signal processing, and in particularrelates to arrangements for associating user-defined behaviors withdifferent visual stimuli.

BACKGROUND AND SUMMARY

Digital watermarking is a process for modifying physical or electronicmedia to embed a machine-readable code into the media. The media may bemodified such that the embedded code is imperceptible or nearlyimperceptible to the user, yet may be detected through an automateddetection process. Most commonly, digital watermarking is applied tomedia signals such as images, audio signals, and video signals. However,it may also be applied to other types of media objects, includingdocuments (e.g., through line, word or character shifting), software,multi-dimensional graphics models, and surface textures of objects.

Digital watermarking systems typically have two primary components: anencoder that embeds the watermark in a host media signal, and a decoderthat detects and reads the embedded watermark from a signal suspected ofcontaining a watermark (a suspect signal). The encoder embeds awatermark by altering the host media signal. The reading componentanalyzes a suspect signal to detect whether a watermark is present. Inapplications where the watermark encodes information, the readerextracts this information from the detected watermark.

Several particular watermarking techniques have been developed. Thereader is presumed to be familiar with the literature in this field.Particular techniques for embedding and detecting imperceptiblewatermarks in media signals are detailed in the assignee's co-pendingapplication Ser. No. 09/503,881 (now U.S. Pat. No. 6,614,914) and U.S.Pat. No. 5,862,260, which are hereby incorporated by reference.

Content can also be processed to extract an identifier by techniquessuch as applying a hashing algorithm to the content data, yielding,e.g., a 128 bit identifier.

The present technology provides methods and systems for associatingobjects with machine behaviors. In this context, machine behaviors referto actions by devices or systems in response to a triggering event.Examples of these behaviors include fetching a web page, opening anemail client to send an email to a specific person, initiating a phoneor video conference call, etc.

One illustrative embodiment is a method by which an end-user customizesbehavior of a camera-equipped wireless communications device. Thecustomization includes defining different user-desired behaviors thatare associated with different visual stimuli, so that differentbehaviors are triggered when the user later presents different visualstimuli to the device.

Another illustrative embodiment is a computer including a user interfaceon which an image of an object is presented on the left side, and animage depicting a corresponding behavior is presented on the right side.Associated controls can permit the user to associate different objectswith different behaviors.

Further features will become apparent with reference to the followingdetailed description and accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a system diagram depicting a system for associating watermarkenabled objects with machine behaviors, and for triggering thosebehaviors in response to decoding watermarks.

FIG. 2 is a diagram depicting a variant of the system shown in FIG. 1showing system components for enabling users to perform watermarkidentifier registration and embedding.

FIG. 3 is a flow diagram illustrating initiating an identified behaviorand presenting output to a user.

FIG. 4 is a block diagram of a wireless telephone device.

DETAILED DESCRIPTION

The following description details a system and related methods forassociating watermark enabled objects with machine behaviors. Toillustrate the system, the description focuses on an example ofwatermark enabled stickers. As noted, the system applies more broadly towatermarking both physical and electronic objects. In particular,aspects of the system may be used for watermarking media signals likeimages, video and audio, as well as applying watermarks to physicalobjects. Watermarks may be applied to physical objects by placing awatermarked image on a physical object, by modulating the surfacetopology of the object, etc. See U.S. Pat. No. 5,862,260, for moreinformation about watermark embedding of and decoding from physical andelectronic objects.

Stickers in all their varieties have found an enduring place in oursociety. From the workplace (Post-It® brand message notes), to kids in aclassroom, stickers have an inherent value associated with them, whetherit be functional (seals, labels, etc.) or just to identify yourself witha particular affinity group (bumper stickers on cars). By placing awatermark on stickers they can be used in novel ways. By encoding a setof stickers with a watermark during production, specific machinebehaviors can be assigned to them. These behaviors can be associated oreven possibly changed by anyone from the manufacturer through thedistributor, all the way to the end-user. In addition, the users cancreate their own watermark enabled stickers by creating an image,embedding a watermark in it, and associating the watermark with one ormore machine behaviors.

These behaviors may include, but are not limited to the following:

Taking the user to a web-site linked to the watermark via a networkaddress of the web-site or index to the network address.

Opening an email client to email to a specific person (e.g., a personwhose email address is stored in the machine behavior descriptionassociated with the watermark).

Launching the user into an Interframe Relay Chat (IRC) session thatother people with the same sticker can participate in.

Authenticating the user as part of a process of accessing a networkresource, such as account information or access to a computer network.

Authentication the user in an electronic commerce transaction performedon a computer network.

Sending an electronic card.

Placing a phone or video-conference call.

As props in a computer game. For example, the prop is a multi-sided, ormulti-faceted object, where each side or facet has a watermarked imageconveying a different message used to control the game. The computergame includes a watermark decoder for extracting the messages from imageframes captured of the prop. The message may directly carry the messageor act as an index to a more detailed game instruction in a database,such as an instruction that changes over time based on changes to thecorresponding database entry by the user or game manufacturer.

As a visual aide for disabled users.

Anywhere where machine vision is not feasible.

In each of the above applications, the watermark carries informationthat links the watermarked object (e.g., sticker) with a machinebehavior. To trigger this behavior, a watermark decoder applicationcaptures an image or images of the watermarked sticker, extracts thewatermark, and uses information embedded in the watermark to determinethe associated machine behavior. The watermark decoder then takes actionto initiate the machine behavior associated with the watermark.

For some applications, it is useful to enable the user to control thebehavior associated with a watermarked object. This type of managementmay be handled by creating accounts for users and providing access tothe accounts via some authentication method (email, passwords, etc.).For a number of reasons, these access methods can be problematic (losingpasswords, asking kids for their email addresses, etc.). As analternative, watermarks may be used to manage the process of associatingbehaviors with a watermarked object.

For example, in the scenario where a user wants to assign behaviors to aset of watermarked stickers they have received, they can hold up thefirst sticker (or its packaging), and be taken to a registrationapplication to activate the stickers in the pack.

FIG. 1 is a system diagram depicting a system for associating watermarkenabled objects with machine behaviors, and for triggering thosebehaviors in response to decoding watermarks. The system depicted inFIG. 1 is implemented on a computer network, namely, the Internet. Theuser accesses the system via a computer 100 connected to the Internet.The computer broadly encompasses a variety of devices, such as PersonalComputers, set-top boxes, personal digital assistants, Internetappliances, set-top boxes, telephones (including wireless devices),audio and video players, and imaging devices (CCD or CMOS cameras,camcorders, printers, fax machines, copiers, etc.). The computer isconnected to an image capture device 102, such as a PC camera orscanner, and includes watermark decoder software for decoding watermarksfrom images captured from the image capture device.

The system architecture shown in FIG. 1 includes a system (106) formanaging the process of assigning behaviors to watermarked objects aswell as a database management system (108) for initiating behaviors inresponse to decoding watermarks from the objects. These two systems maybe integrated or implemented separately. In the application depictedhere, the registration system and database management system areaccessible via a network interface using standard network technology,including HTML, XML, and TCP/IP. A watermark embedding system haspreviously embedded watermarks carrying watermark identifiers intostickers. The stickers (or packages of them) also include a registrationidentifier used to activate the behaviors associated with them.

The registration system maintains a registration database includingrecords of the registration identifiers and corresponding watermarkidentifiers. The registration identifiers are serialized numberscorresponding to the watermarked stickers or packages of them. Thewatermark identifiers are a form of object identifiers that are encodedinto the watermarks on the corresponding stickers. The registrationsystem maintains a registration database 110 of data records indicatingthe watermark identifiers associated with each registration identifier.When a user selects a behavior to be associated with a watermarkedobject via the registration system, the registration system sends anupdate 112 to a behavior database 114 specifying the behavior to beassociated with a corresponding watermark identifier. In response, thedatabase management system 108 updates its database to include a recordthat indicates the behavior associated with a particular watermarkidentifier.

The database management system 108 is also responsible for supportingmachine behavior associated with a watermarked sticker in response todetection of the watermark on the sticker. It has a network interfacefor communicating with other computers over the Internet. In particular,it receives requests in the form of an XML packet from a watermarkdecoding computer, extracts a watermark identifier from the packet andlooks up the associated behavior or behaviors in the behavior database.It then initiates the associated behavior. The details of how thisbehavior is carried out depend on the application and type of behavior.

In a typical registration process, the user accesses the registrationsystem via a registration web site, which presents an HTML interface tothe users' computers. The user may fetch the HTML pages of thisinterface using an Internet browser or application program, like thewatermark decoder application executing on the computer 100. Thisinterface enables the user to enter a registration identifier to start aprocess of associating behaviors with watermark identifiers embedded inwatermarked stickers. In response to a registration identifier, theregistration system returns a page that enables the user to specify thebehavior. In the case where the behavior is linking a watermarkedsticker to a web site, the user specifies the network address of the website, such as a URL or IP address. In the case where the behavior islinking a watermarked sticker to an email message, the user specifiesthe email address of the email recipient.

As noted above, there are many other types of watermark enabledbehaviors. They can be classified as providing information to thewatermark decoding computer, launching some software program or machineaction, or a combination of both. Table 1 below gives some examples ofbehaviors, and the related information and actions.

TABLE-US-00001 TABLE 1 Behavior Information Returned to AssociatedMachine or Type Decoding Computer Software Actions linking to URL, webpage launching browser on client web site to fetch/render web page atURL opening an email address of target launching email client and emailclient recipient populating address field with target recipient startinga address of chat session launching chat application chat session(watermarks on the stickers can be designed such that only those holdingthe stickers can gain access to the chat session, each by showing thesticker to his or her watermark decoder enabled camera) accessingaddress of account launching of browser account information applicationto access information account information or other through a webinterface; network supplying user resources authentication informationfrom watermarked object and/or from user (user password, user name, logon, etc.) sending an card template launching client applicationelectronic to enable the user to design card the card and add personalmessage, launching email application to send electronic card (or link toelectronic card) placing a phone number or IP address launchingapplication to phone or of destination initiate phone call over videothe internet or telephone conference network call props in an identifierof prop, and game application receives interactive possibly othercontext prop and context computer information, such as game informationand responds game player holding the prop, etc. accordingly visualreturns information in the browser, or other media aid for form ofgraphics, audio, or player applications render disabled video (mayprovide address the information (such as users of audio or video contentat the streaming media) on an audio or video server on the decodingcomputer the Internet) machine machine instruction machine or softwarecontrol executes instruction.

For a given application, the registration system provides information tothe user to enable the user to select the behavior and provide pertinentinformation, such as URL, IP address, phone number, email address,content file (e.g., audio, image or video file), etc. The registrationsystem formulates a description of the behavior, associates it with thewatermark identifier specified by the user, and creates an update 112 tothe behavior database.

The user then uses the stickers or shares them with friends. To triggerthe behavior of a sticker, a user captures an image of the sticker withan image capture device 102 using a watermark decoder application 104executing on the computer 100. The watermark decoder extracts thewatermark identifier from a watermark embedded in the image on thesticker. It then sends the watermark identifier to the databasemanagement system 108 via the Internet, which in turn, looks up theassociated behavior. The database management system then triggers theassociated behavior by sending information, or instructions back to thedecoding computer. The decoding computer renders the information, andlaunches a software or other machine action associated with theinstructions returned from the database. The database need not beimplemented in a remote computer. For example, the database may beimplemented in the watermark decoding computer or device.

As an enhancement to the registration process, objects may carrywatermarks that automatically link the user to the registration website. For example, one side of the sticker 116 or its packaging 118 maycontain a watermark with the network address or an index to a networkaddress of the registration web site. The user shows this part of thesticker or packaging to the image capture device. The watermark decoderextracts the watermark and looks up the network address in the behaviordatabase, and launches a browser to fetch the registration web site. Thewatermark may also carry the registration identifier. In this case, theregistration web site can tailor the web page returned to the user to bespecific to the watermarked object. If the user or someone elsepreviously associated a behavior with the sticker, the registration website returns the current status associated with the registrationidentifier and the behaviors associated with the watermarked objectslinked to that registration identifier. To get detailed informationabout particular watermarked objects during the registration process,the user can show the watermarked object to a camera, and use awatermark decoder to extract the watermark identifier and supply it tothe registration system. In response, the registration system takes thewatermark identifier, queries the behavior database via the databasemanagement system, and returns a description of the associatedbehaviors. This approach provides a simple and automated process ofactivating watermark enabled objects.

For more information about an object identifier registration system andsystem for linking objects with machine behaviors, see U.S. patentapplication Ser. No. 09/571,422 (now U.S. Pat. No. 6,947,571), which ishereby incorporated by reference.

In some applications, the user may wish to create his or her ownwatermarked objects. FIG. 2 illustrates a system that enables users toassign watermark identifiers to corresponding behaviors and objects andupdate the behavior database. In this particular system, the user'scomputer includes a watermark embedder application (120). However, theembedder application may be implemented on a separate computer, such asa server on the Internet accessible via a client application on theuser's computer 100. In the former case, the user embeds the watermarkinto the desired image content on his computer. In the latter case, theclient supplies the image content to the server, which performswatermark embedding and returns watermarked images to the client. Inboth cases, the watermarked objects are created by printing thewatermarked images on objects.

The process begins when an embedder 120 creates a registration request.In the system shown in FIG. 2, the embedder 120 is a softwareapplication running on the computer 100. The embedder formulates therequest in a request file. The system provides a template for therequest file. The request file specifies the number of watermarkidentifiers requested and the names of the media files to be embedded.The file may also specify the behaviors to be associated with eachwatermark identifier. Alternatively, the user can specify the behaviorsto be associated with the watermark identifier at a later time using themethods described in this document. In the case where embedding isperformed on a server as opposed to the user's computer, the requestfile may also include the media file (e.g., an image file) carrying thecontent to be embedded with the watermark identifier.

Next, the embedder connects, via a network connection, to theregistration system 106. In particular, it connects to a registrationweb site via an Internet connection. This web site requests theembedder's username and password to authenticate it.

The user enters his username and password via a user interface displayedon the PC 100 and submits them to the web site for authentication.

Upon authentication, the registration website 106 returns an HTML pagepresenting the embedder with a user interface screen that allows theuser to locate the embedder's registration request file for uploading tothe web site. The user then enters a command to instruct the embedder toupload the selected request file.

The embedder provides the information required to locate the file on theembedder's computer and submits it for upload.

The registration request file is uploaded into a registration loaderprogram 122.

The registration loader 122 performs a quick scan of the uploadedregistration request file and reports back to the embedder any errors informat that it detects. If there are errors, the file is not processed.

If the registration request file is properly formatted, the embedderreceives a confirmation from the registration website 106 that therequest file has been successfully uploaded and will be submitted forprocessing by the registration loader 122.

The embedder may now either submit a new registration request file orlogoff of the registration web site 106.

The registration loader 122 uses the information contained in theembedder's uploaded registration request file to automatically allocate(register) watermark identifiers in a registration database 110. Theidentifiers are in the form of serial numbers. Once this process iscompleted, the registration loader 122 initiates a request to aregistration extractor 124 for these new registration entries.

Upon receipt of a request, the registration extractor 124 accesses theregistration database 110 and creates embedder control files for each ofthese new registered watermark identifiers (e.g., serial numbers).

Upon completion of this process, the registration extractor 124 processsends the embedder control file(s) back to the embedder via Internete-mail. In the event that the embedder is server based, the extractorsends the control file(s) (or a pointer to them) to the embedder server126, which may be integrated with the registration system or implementedat a different Internet site. The extractor 124 also sends an update 128to the behavior database 114 to create database records associating eachof the watermark identifier with a behavior.

Once the embedder 120 has received the embedder control file(s), it usesthese file(s), along with the media file(s) (in this case, image files)and a set of embedding instructions to the embedder 120 to instruct theembedder to automatically embed the list of watermark serial numbersincluded in the embedder control file(s) into the listed media files,producing a set of watermark-embedded media files. In the case where theembedder is server based, the client executing on the PC 100 uploads themedia files to be embedded to the embedder server, either directly or aspart of the registration process (e.g., as part of the request file).The embedder server then returns the watermarked files to the computer100 via e-mail or other network file transfer protocol.

For detailed disclosure describing how to embed watermarks in mediasignals, including images, audio, and video, see U.S. Pat. No.5,862,260, and co-pending application Ser. No. 09/503,881, filed Feb.14, 2000, incorporated above.

The embedder may create watermarked objects by printing watermarkedimages on objects, such as stickers, documents, etc. The embedder sendsthe watermarked image to a printer 128, which in turn, prints the imageon an object.

The above system provides a mechanism for linking objects to machinebehaviors. As noted previously, this mechanism applies to both physicalobjects, like stickers and packaging, and electronic objects, likeimage, audio and video signals. It also applies to other forms ofmachine readable signal carriers that can be applied to such objects,including bar codes, magnetic stripes, Radio Frequency tags, integratedcircuit chips, organic transistors, etc. These machine readable carrierscan be used in the same way that watermarks are used in the example ofwatermarked enabled stickers above.

While these technologies provide a mechanism for linking objects tomachine behaviors, there is a need for a tool that explicitlyfacilitates the creative coordination between the object and thebehavior linked to it. The linking process results in a potentiallycomplex database structure which not only embodies the fundamentalobject to behavior link, but also might include a hierarchy of deliveredresponses as a function of user implicit or explicit requests. Or, saidin a quite different way, the creative process of linking an object tocomplex data-driven responses is itself a creative endeavor all toitself, involving thinking through the various different reactions thatusers will want and expect when using an object as a portal. The artistwho is tasked with creating the choreography between an object and asimple or complex machine behavior will need explicit assistance fromwell designed tools, resulting in a database record which memorializesthat creativity as an active element within a connectivity systemdescribed in this document and U.S. patent application Ser. No.09/571,422 (now U.S. Pat. No. 6,947,571). The immediate creative outputis a database structure. The long term creative output is the active useof that structure as a stimulus-response hub.

Whether a link design tool be web-server based, or whether it be astand-alone application similar in kind to an Adobe Photoshop or a QuarkExpress, it is possible to offer visual metaphors to a creative designerwhich literally presents that designer with an image of the to-be-linkedobject along with explicit visual links to one or more data responses.

One embodiment of this tool for linking printed objects to web pages isa local computer application which presents an image of a printed objecton the left side of an application's window pane and the image of a webpage on the right side of the application pane. The images of theprinted objects may be stored locally or fetched from a remote device(e.g., a content database) and rendered to the left side of the screen.Similarly, the web pages may be stored locally or downloaded from websites on the Internet or some other network. The user interface of theapplication displays a control such as a button, labeled, “Connect”,“Link” or some other active word representing the process of associatingan object with a corresponding machine behavior. The user, havingbrowsed through a series of objects to be linked, and browsed through aseries of potential web site destinations, finding the best“matched-pair”, pushes the button and off this relational link goes intoa queue waiting to “go live”, or, in other words, a temporary record isstored for a candidate link to be sent to the behavior database of thelinking system described previously. A user can perform multiple linksper session, queueing them up as they go, reviewing the queue at somepoint in time, then directing the links to become active at thebehavioral database, as described previously and in the referenceddocuments.

An extension begins by generalizing the single printed item to be anicon or visual analogy to a related set of printed material. Graphicaluser interface methods can be employed to move, manipulate, view andotherwise process this icon in a fashion familiar to creativeprofessionals. Likewise, surrounding this generalized icon representingthe object(s) to be printed can be a whole series of icons representinga variety of potential data-delivered responses that are possible links.Existing web pages, placeholders for web pages to be designed, streamingmedia icons, Java application icons, “links to links” icons wherein agiven response may explicitly point to a menu of actions presented tothe end user. (end user=consumer doing the linking). This list ofpossible responses is incomplete but nevertheless representative ofgraphically displaying the possible relationships between printedmaterial and data responses.

As in the baseline case, various relationships can be created betweenobjects and responses, ultimately stored into a queue. The actualfunctionality and quality assurance of the links could be tested in theprocess. Once the creative artist is satisfied with their link or set oflinks, the queue can be sent to go live at the behavior database andfurther double checks on quality performed.

Cconcluding Remarks

Having described and illustrated the principles of the technology withreference to specific implementations, it will be recognized that thetechnology can be implemented in many other, different, forms. Toprovide a comprehensive disclosure without unduly lengthening thespecification, applicants incorporate by reference the patents andpatent applications referenced above.

While the technology is illustrated with reference to watermarkedstickers, aspects of the technology apply to other object typesincluding media signals like audio and video. There are number ofdifferent watermark embedding and decoding methods that may be used. Thewatermark embedding process may modulate features of a signal in thetime, frequency, spatial or some other transform domain of the signal tobe watermarked.

In addition to an object identifier, the watermark may be used to conveyother information, such as an index to related metadata, renderingcontrol instructions, etc. For example, the watermark can carry anetwork address or index to a network address to link the watermarkedsignal to a network resource such as a related web site.

Other machine readable codes may be embedded in an object and used tolink the object to a machine behavior. Some examples include bar codes,magnetic stripes, RF tags, etc. The devices and methods used to extractan identifier from the machine readable code differ, yet the process forregistering identifiers and associating behavior with objects may besimilar.

The methods, processes, and systems described above may be implementedin hardware, software or a combination of hardware and software. Forexample, the auxiliary data encoding processes may be implemented in aprogrammable computer or a special purpose digital circuit. Similarly,auxiliary data decoding may be implemented in software, firmware,hardware, or combinations of software, firmware and hardware. Themethods and processes described above may be implemented in programsexecuted from a system's memory (a computer readable medium, such as anelectronic, optical or magnetic storage device).

The particular combinations of elements and features in theabove-detailed embodiments are exemplary only; the interchanging andsubstitution of these teachings with other teachings in this and theincorporated-by-reference patents/applications are also contemplated.

What is claimed is:
 1. A method comprising: receiving a proximitydetector signal indicating that a proximity identifier device associatedwith an identification (ID) badge is near; capturing machine-sensedpersonal identification of a holder of the ID badge; capturing a badgephotograph image having steganographically-encoded data; extracting thesteganographically-encoded data from the captured badge photographimage; and checking if the captured machine-sensed personalidentification of the holder of the ID badge corresponds to theextracted steganographically-encoded data.
 2. The method of claim 1,wherein the machine-sensed personal identification includes biometricdata.
 3. The method of claim 2, wherein the biometric data includes aretinal scan.
 4. The method of claim 2, wherein the biometric dataincludes a voice print.
 5. The method of claim 1, wherein themachine-sensed personal identification includes an image of the holderof the ID badge.
 6. The method of claim 1, wherein the proximitydetector signal is a radio frequency identification (RFID) signal. 7.The method of claim 1, wherein the an identification (ID) badge includesan unpowered proximity identifier circuit and a machine-sensedindicator.
 8. The method of claim 7, wherein the machine-sensedindicator is any one of a bar code, a magnetic strip, and an electronicchip.
 9. A controlled-access ID badge, the badge comprising: asteganographically-encoded photograph containing encoded identificationdata corresponding to a correct badge holder; and an unpoweredelectronic circuit configured to provide a unique signature signal uponexcitation by a radiant field, wherein the unique signature signal isconfigured to trigger a capture of a machine-sensed personalidentification of a current holder of the ID badge for comparison withextracted steganographically-encoded photograph to determine if thecurrect holder of the ID badge is the correct badge holder.
 10. Thebadge of claim 9, wherein the machine-sensed personal identificationincludes biometric data.
 11. The badge of claim 10, wherein thebiometric data includes a retinal scan.
 12. The badge of claim 10,wherein the biometric data includes a voice print.
 13. The badge ofclaim 9, wherein the machine-sensed personal identification includes animage of the holder of the ID badge.
 14. The badge of claim 9, whereinthe unique signature signal is a radio frequency identification (RFID)signal.
 15. The badge of claim 9, further comprising a machine-sensedindicator.
 16. The badge of claim 15, wherein the machine-sensedindicator is any one of a bar code, a magnetic strip, and an electronicchip.
 17. A security system comprising: a radiant field emitter; aproximity detector configured to receive a proximity detector signalindicating that a proximity identifier circuit associated with anidentification (ID) badge is communicating a unique signature signal inresponse to excitation by a radiant field from the radiant fieldemitter; a machine-sensing capture device configured to capturemachine-sensed personal identification of a holder of the ID badge; animage sensor that captures a badge photograph image havingsteganographically-encoded data; and a processor configured to extractthe steganographically-encoded data from the captured badge photographimage and check if the captured machine-sensed personal identificationof the holder of the ID badge corresponds to the extractedsteganographically-encoded data.
 18. The system of claim 17, wherein themachine-sensed personal identification includes biometric data.
 19. Thesystem of claim 17, wherein the machine-sensed personal identificationincludes an image of the holder of the ID badge.
 20. The system of claim17, wherein the unique signature signal is a radio frequencyidentification (RFID) signal.