Determining pose for use with digital watermarking, fingerprinting and augmented reality

ABSTRACT

Image recognition and augmented reality experiences utilize auxiliary data extracted from an image or video, or image fingerprints, or a combination of both. One claim recites a method comprising: receiving a plurality of imagery frames captured by a device sensor; identifying a plurality of key points in each of the plurality of imagery frames; resolving image pose by utilizing relative relationships of the key points between different frames of the plurality of frames; modifying imagery of at least one of the plurality of frames based on resolved image pose; and deriving a fingerprint from modified imagery. Of course other claims and combinations are provided as well.

APPLICATION FIELD

This application claims the benefit of U.S. Provisional Patent Application No. 61/719,920, filed Oct. 29, 2012. This application is also related to U.S. Provisional Patent Application No. 61/749,767, filed Jan. 7, 2013. Each of the above patent documents is hereby incorporated herein by reference in its entirety.

TECHNICAL FIELD

This disclosure relates to digital signal processing, image rendering (including Raster Image Processing for print), image recognition, data signal detection, and computer generated graphics in conjunction with live image capture and recognition (e.g., Augmented Reality).

BACKGROUND AND SUMMARY

There are a variety of ways to encode machine readable information on objects, and in particular, on printed objects. Conventional visible data carriers for printed media include various forms of bar codes, including monochrome (e.g., black and white) 1D and 2D bar codes, as well as newer higher density codes that use additional colors to carry data. One example of higher density bar codes are data glyphs, which are marks (e.g., forward and back slash marks) printed at higher resolution. When viewed from a distance, glyph codes can appear as a uniform tone, and as such, can be printed in the background around other visual information.

In these types of data carriers, the elementary units (bars or data glyph marks) are independent of other visual information and convey auxiliary data. A mark or arrangement of marks is a pattern that corresponds to an auxiliary data symbol. To read the data from a printed object, the object is first optically scanned with an image sensor, converting light to an electronic signal. The electronic signal is then analyzed to detect the elements of the mark and convert them to data.

Digital watermarking is a machine readable code in which the data is hidden within an image leveraging human visibility models to minimize visual impact on the image. For certain types of applications where image information is sparse, the auxiliary data signal can still be applied to the printed object with minimal visual impact by inserting imperceptible structures having spatial frequency and color beyond the range of human visual perception. The auxiliary data signal can be conveyed by printing ink structures or modifying existing structures with changes that are too small to see or use colors that are difficult to discern. As such, digital watermarking techniques provide the flexibility of hiding data within image content, as well as inserting data in parts of a printed object where there is little or no other visual information.

These types of visible and hidden data carriers are useful for applications where there is a need to convey variable digital data in the printed object. Hidden data carriers increase the capacity of printed media to convey visual and machine readable information in the same area. Even printed objects, or portions of objects (such as logos, pictures or graphics on a document or package) that appear identical are transformed into variable data carriers.

For some applications, it is possible to identify an image using a one-to-many pattern matching scheme. Images to be uniquely identified are enrolled in a reference database, along with metadata. In image fingerprinting schemes, image features are stored in the reference database. Then, to recognize an image, suspect images, or its features, are matched with corresponding images or features in the reference database. Once matched, the reference database can provide associated digital data stored with the image.

Data carrying signals and matching schemes may be used together to leverage the advantages of both. In particular, for applications where maintaining the aesthetic value or the information content of the image is important, a combination of digital watermarking and image fingerprinting can be used.

Combinations of watermarks and fingerprints for content identification and related applications are described in assignees U.S. Patent Publications 20060031684 and 20100322469, which are each hereby incorporated by reference in its entirety. Watermarking, fingerprinting and content recognition technologies are also described in assignee's U.S. Patent Publication 20060280246 and U.S. Pat. Nos. 6,122,403, 7,289,643, 6,614,914, and 6,590,996 which are each hereby incorporated by reference in its entirety.

In many applications, it is advantageous to insert auxiliary data in printed object in a way that does not impact the other visual information on the object, yet still enables the data to be reliably retrieved from an image captured of the object. To achieve this, a technique to exploit the gap between the limit of human visual perception and the limit of an image sensor has been developed. The gamut of human visual perception and the gamut of an image sensor are defined in terms of characteristics of the rendered output, including spatial resolution or spatial frequency and color. Each gamut is a multi-dimensional space expressed in terms of these characteristics. The gap between the gamut of human and sensor perception is a multidimensional space that our data insertion schemes exploit to insert auxiliary data without impacting other visual information on the object.

This multi-dimensional gap is a 5-dimensional space (2 spatial+3 color) or higher (spatial/color shapes, frequencies, distributions) where our methods insert:

(1) uniform texture watermarks (independent of content—but controlled for visibility), and

(2) content-based watermarks where the content is used as a reference framework. As a reference, the content is either altered in a measurable but imperceptible way or used (e.g., edges) to locate and orient an underlying variation that is intended to keep the content unchanged.

Digital printing is becoming increasingly more advanced, enabling greater flexibility and control over the image characteristics used for data insertion when preparing an image for printing. The process of preparing a digital image for printing encompasses conversion of an image by a Raster Image Processor, Raster Image Processing, halftoning, and other pre-print image processing. Background on these processes is provided below.

Along with advances in printing, the gamut of even widely used image sensors is becoming greater. For hidden data insertion, the challenge is to insert the data in the human-sensor perception gap so that it can be widely detected across many consumer devices. Of course, for certain security applications, more expensive printers and image scanners can be designed to insert security features and expand the gamut of the scanning equipment used to detect such features. This is useful to detect security features and/or tampering with such features. However, the human-device perception gap is smaller for more widely deployed sensors, such as those commonly used in mobile devices like smart phones and tablet PCs.

Our data insertion methods exploit the gap more effectively through data insertion in the process of preparing a digital image for printing. Additional control over the process of inserting auxiliary data is achieved by implementing the process in the Raster Image Processor (RIP).

A raster image processor (RIP) is a component used in a printing system which produces a raster image also known as a bitmap. The bitmap is then sent to a printing device for output. The input may be a page description in a high-level page description language such as PostScript, Portable Document Format, XPS or another bitmap of higher or lower resolution than the output device. In the latter case, the RIP applies either smoothing or interpolation algorithms to the input bitmap to generate the output bitmap.

Raster image processing is the process and the means of turning vector digital information such as a PostScript file into a high-resolution raster image. A RIP can be implemented either as a software component of an operating system or as a firmware program executed on a microprocessor inside a printer, though for high-end typesetting, standalone hardware RIPs are sometimes used. Ghostscript and GhostPCL are examples of software RIPs. Every PostScript printer contains a RIP in its firmware.

Half-toning is a process of converting an input image into halftone structures used to apply ink to a medium. The digital representation of a halftone image is sometimes referred to as a binary image or bitmap, as each elementary image unit or pixel in the image corresponds to the presence, or not, of ink. Of course, there are more variables that can be controlled at particular spatial location, such as various color components (CMYK and spot colors). Some advanced printers can control other attributes of the ink placement, such as its density or spatial depth or height.

This half-toning process is typically considered to be part of the RIP or Raster Image Processing. In some printing technologies, these halftone structures take the form of clustered dots (clustered dot half-toning). In others, the halftone structures take the form of noise-like dot patterns (e.g., stochastic screens, blue noise masks, etc.).

Our patent literature provides several techniques for digital watermarking in the halftone process. Examples of these techniques are detailed in U.S. Pat. Nos. 6,694,041 and 6,760,464, which are each hereby incorporated herein by reference in its entirety.

New printing techniques enable very fine structures to be created in the RIP which will appear visually identical to the eye. For example a 50% gray can be created with a conventional clustered dot screen pattern at 150 lines per inch, or exactly the same visual effect can be created with a much higher frequency line structure such as a stochastic screen. Usually, these two structures are not mixed on one page, as they have very different dot gain characteristics and require different corrections. However, our methods are able to correct for the mechanical dot gain, so that the two patterns appear identical when they appear on the same page. See, in particular, our prior work in dot gain correction, printer calibration, and compensating for printer and scanner effects, in U.S. Pat. Nos. 6,700,995, 7,443,537, and U.S. Patent Publication 20010040979, which are each hereby incorporated herein by reference in its entirety.

Mobile devices have a capture resolution of much greater than 150 lpi (resolution of newer phones, such as iPhone 4 is about 600 lpi or better), so they can be used to distinguish between these two types of patterns. One particular example is an image that appears as a uniform texture, yet a watermark pattern is inserted into it by modulating the line screen frequency and direction according to a watermark signal pattern. In particular, the locations of a watermark pattern are printed using a higher frequency line pattern at first direction (e.g., vertical screen angle). The other locations are printed with a lower frequency line pattern in another direction (e.g., diagonal screen angle). The watermark signal is modulated into the image by selection of a higher frequency screen at an arrangement of spatial locations that form the watermark signal pattern. When printed, these locations look similar to surrounding locations. However, when scanned, the sensor sees these locations as being different, and the watermark pattern in the resulting electronic image is easier to detect.

This approach allows a whole set of new messaging techniques to be used in the range between 150 lpi and 600 lpi where 2 spatial dimensions and 3 dimensions of color information can be inserted. This information can be watermark, barcode or any other signaling mechanism.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating the creation of a content recognition system using fingerprints and watermarks.

FIG. 2 is a block diagram illustrating the content identification process.

FIG. 3 is a diagram of a cell phone, which may be used in some content recognition systems.

FIG. 4 is a diagram showing image capture of a subject surface.

FIG. 5 is a block diagram of resolving pose information from captured imagery.

FIG. 6 is a timeline associated with resolving pose information to aid digital watermark detection.

FIG. 7 is a diagram of an Augmented Reality system providing a video overlay in a device display that corresponds to a watermarked area on a subject surface.

FIG. 8 shows a subject area including a watermarked area having different watermarked areas.

DETAILED DESCRIPTION

The process of digital watermark insertion includes generating a watermark signal, and then using that signal to modulate characteristics of the image in the human-sensor gap. As described above, this process is preferably conducted at the RIP stage to enable control over the image representation used to control application of ink to a print media.

In prior work, several methods for generating the watermark signal, and for detecting the watermark signal in images captured of printed objects, are detailed. Please see U.S. Pat. Nos. 6,614,914 and 6,590,996, which are incorporated by reference. Therefore, for this discussion, the focus is on techniques used within the RIP to insert the watermark signal.

In one implementation, the watermark signal is generated as an array of watermark signal elements. These elements are mapped to spatial locations within an image block, called a tile. This tile is then replicated (e.g., tiled in a regular, contiguous array of blocks in two dimensions) across the area of the host image in which the watermark signal is to be inserted. At a spatial location where there is image content in the host image, the watermark signal element is used to modify the host image content at that location to carry the watermark signal element, subject to constraints set for perceptual masking. These constraints enable the watermark signal to be increased or decreased (possibly to zero), depending on perceptual masking, and desired watermark signal strength. Conversely, where there is no image content, the watermark signal element is either not applied, or it can be asserted as a texture, using colors and spatial resolution that make it difficult to discern. As such, for every location in the watermark signal mapping, there is an opportunity for watermark modulation.

As noted in more examples below, the watermark signal need not be mapped to a uniform array of blocks. One alternative is use feature points in the image to form a spatial reference for insertion of a data signal.

The watermark signal can be comprised of a single data component, or more than one component, as detailed in U.S. Pat. No. 6,614,914. One component is a direct sequence spread spectrum modulated data signal. This component is generated by applying error correction coding (convolutional coding) to a data signal, which produces an error correction coded data signal. This signal is than modulated onto pseudorandom carrier signals to produce a spread spectrum modulated signal, which is then mapped to locations in a tile. This is one example of watermark signal generation, and there are many others.

Above, a method of inserting a watermark signal by varying the print structure within the RIP to modulate the watermark into an image is illustrated. A specific example is given for varying the density and direction or angle of print primitives (e.g., line structures or dots) used to print a particular color in an image having a uniform tone. A data signal pattern may also be introduced by varying the halftone screen type for different regions of an image. Print structures can vary among a set of screening types, including noise like (e.g., stochastic screens) and structured (clustered dot, line screens, etc.). This approach is not limited to watermark modulation of images with uniform tones, as it applies to inserting watermarks into various types of image content.

Some embodiment examples—include the following:

a) Choose the angle in colorspace of watermark signal modulation (e.g., in the ab plane of Lab colorspace) to be different at different regions throughout the image. In one class of digital watermark embodiments, these regions correspond to watermark signal elements, and an arrangement of the regions forms a spatial watermark signal pattern of watermark signal elements. Data may be modulated into the pattern using spread spectrum modulation as noted above, or other data modulation schemes. The arrangement, orientation and shape of these regions may be designed to convey alternative data code signals. Multiple data signals may be interleaved for different spatial locations, as well as different directions in color space. b) Choose the spatial frequency of watermark signal modulation to be different at different regions throughout the image. Similar data insertion as mentioned for section a) also applies to this section b). c) Use the edges of the image content to define a signal along the edges in an imperceptible set of dimensions (color & spatial frequency). In this case, the edges detected in the image are used as a reference for the watermark signal. Thus, rather than being arranged in a pre-determined array of blocks or regions, the watermark signal is inserted along the direction of the edge. Along this edge, the watermark signal can have a regular pattern or structure to facilitate detection. The watermark signal is detected by first finding the edges and then detecting the watermark signal relative to these edges (e.g., by correlating the image signal with the regular pattern of the data signal). d) Use the edges of the content to define a signal perpendicular to the edges in an imperceptible set of dimensions (color & spatial frequency). As in the previous example, the edges provide a reference orientation and location of the watermark signal. e) Use higher dimensional shapes/patterns of color and spatial variations where pixels separated spatially may still be close in either spatial or color patterns. This reduces sensitivity to geometric distortions.

In some embodiments, those higher frequency spatial/color variations are designed to take advantage of lower resolution devices to generate shifts in image characteristics that can be measured. The data signal elements are inserted to exploit the Bayer pattern of RGB sensors to enhance a desired data signal that would otherwise be imperceptible. These signal elements are designed to induce distortion (e.g., aliasing, or a color shift) in the image captured through the sensor of the printed object. This distortion at the data signal locations enhances the pattern because the shift in signal characteristics at these locations increases the data signal at these locations relative to surrounding image content and noise. For example, aliasing caused by capturing a high frequency screen region with a lower frequency sensor creates a detectable data signal element at that region.

A similar effect can also be achieved by modulating ink height using a printer that is capable of controlling the height of ink deposited at a particular location. These printers enable control over height of ink by building up ink at a particular print location. This is useful for authentication or copy protection applications.

The height of the structure can be used to carry information by viewing at an angle with a device such as a fixed focus (or Lytro) camera.

The height variations can also be designed to cause color changes that are used to carry information. When the print is viewed normally, these height variations would be imperceptible if the pigment is opaque. This information can be watermark, barcode or any other signaling mechanism.

The above methods apply to variety of print primitives, and are not limited to particular line screens or clustered dot structures. With control over the RIP, the shape, spatial frequency, and orientation of structures can be specifically designed to exploit sensor geometries and Modulation Transfer Function (MTF) characteristics to cause discrimination between local regions of an image. For example, small lines slanted left and right at different spatial frequencies. Or solid dots vs. tiny dot clusters which contain the same ink density on physical object, but differ in color after acquisition through a class of image sensors (such as those sensors widely used in smartphone cameras). Some regions may use a form of noise like dot pattern (e.g., stochastic screening), while others use a shape with particular structure, like a clustered dot or line screen. The dot gain varies with number of edges (perimeter) of the print structures, so the amount of dot gain correction is also adapted based on the print structure. For example, in the example above where some regions are printed with high frequency line structures and others with lower frequency, the line widths in the high frequency structure have to be reduced more than the line widths in the lower frequency structure to compensate for dot gain.

Another approach that can be implemented within the RIP is to transform the image into a form for printing so that it has carefully controlled noise characteristics. The noise characteristics can be set globally across an image to indicate the presence of a watermark. The noise itself can comprise digital data, such as a spread spectrum modulated data signal. Alternatively, the RIP can generate an image with a pattern of regions that are detectable based on distinguishable noise characteristics. The arrangement of this pattern can be used as a reference signal to provide the location and orientation of a watermark signal inserted in the image.

The watermark may also be conveyed using a reversible image transform or detailed image characterization by manipulating the image through either transform coefficients or through local noise manipulations in a detectable yet imperceptible way. One form of reversible transform is the grayscale medial axis transform applied separately to the color directions. See, in particular, Image approximation from gray scale ‘medial axes’ by Wang, S.; Wu, A. Y.; Rosenfeld, A., in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-3, November 1981, p. 687-696.

A stochastic modeling approach that allows for detectable manipulations is the Markov Random Field (MRF) model that can be used to define local pixel relationships that convey watermark signal data elements. The MRF manipulation is particularly interesting because it can be designed to have particular noise properties that might be exploited at the detector. See, How to generate realistic images using gated MRF's Marc'Aurelio Ranzato Volodymyr Mnih Geoffrey E. Hinton, Department of Computer Science, University of Toronto

SIFT Description

SIFT is an acronym for Scale-Invariant Feature Transform, a computer vision technology developed by David Lowe and described in various of his papers including “Distinctive Image Features from Scale-Invariant Keypoints,” International Journal of Computer Vision, 60, 2 (2004), pp. 91-110; and “Object Recognition from Local Scale-Invariant Features,” International Conference on Computer Vision, Corfu, Greece (September 1999), pp. 1150-1157, as well as in U.S. Pat. No. 6,711,293.

SIFT works by identification and description—and subsequent detection—of local image features. The SIFT features are local and based on the appearance of the object at particular interest points, and are invariant to image scale, rotation and affine transformation. They are also robust to changes in illumination, noise, and some changes in viewpoint. In addition to these properties, they are distinctive, relatively easy to extract, allow for correct object identification with low probability of mismatch and are straightforward to match against a (large) database of local features. Object description by a set of SIFT features is also robust to partial occlusion; as few as 3 SIFT features from an object can be enough to compute location and pose.

The technique starts by identifying local image features—termed keypoints—in a reference image. This is done by convolving the image with Gaussian blur filters at different scales (resolutions), and determining differences between successive Gaussian-blurred images. Keypoints are those image features having maxima or minima of the difference of Gaussians occurring at multiple scales. (Each pixel in a difference-of-Gaussian frame is compared to its eight neighbors at the same scale, and corresponding pixels in each of the neighboring scales (e.g., nine other scales). If the pixel value is a maximum or minimum from all these pixels, it is selected as a candidate keypoint.

(It will be recognized that the just-described procedure is a blob-detection method that detects space-scale extrema of a scale-localized Laplacian transform of the image. The difference of Gaussians approach is an approximation of such Laplacian operation, expressed in a pyramid setting.)

The above procedure typically identifies many keypoints that are unsuitable, e.g., due to having low contrast (thus being susceptible to noise), or due to having poorly determined locations along an edge (the Difference of Gaussians function has a strong response along edges, yielding many candidate keypoints, but many of these are not robust to noise). These unreliable keypoints are screened out by performing a detailed fit on the candidate keypoints to nearby data for accurate location, scale, and ratio of principal curvatures. This rejects keypoints that have low contrast, or are poorly located along an edge.

More particularly this process starts by—for each candidate keypoint—interpolating nearby data to more accurately determine keypoint location. This is often done by a Taylor expansion with the keypoint as the origin, to determine a refined estimate of maxima/minima location.

The value of the second-order Taylor expansion can also be used to identify low contrast keypoints. If the contrast is less than a threshold (e.g., 0.03), the keypoint is discarded.

To eliminate keypoints having strong edge responses but that are poorly localized, a variant of a corner detection procedure is applied. Briefly, this involves computing the principal curvature across the edge, and comparing to the principal curvature along the edge. This is done by solving for eigenvalues of a second order Hessian matrix.

Once unsuitable keypoints are discarded, those that remain are assessed for orientation, by a local image gradient function. Magnitude and direction of the gradient are calculated for every pixel in a neighboring region around a keypoint in the Gaussian blurred image (at that keypoint's scale). An orientation histogram with 36 bins is then compiled—with each bin encompassing ten degrees of orientation. Each pixel in the neighborhood contributes to the histogram, with the contribution weighted by its gradient's magnitude and by a Gaussian with σ 1.5 times the scale of the keypoint. The peaks in this histogram define the keypoint's dominant orientation. This orientation data allows SIFT to achieve rotation robustness, since the keypoint descriptor can be represented relative to this orientation.

From the foregoing, plural keypoints are different scales are identified—each with corresponding orientations. This data is invariant to image translation, scale and rotation. 128 element descriptors are then generated for each keypoint, allowing robustness to illumination and 3D viewpoint.

This operation is similar to the orientation assessment procedure just-reviewed. The keypoint descriptor is computed as a set of orientation histograms on (4×4) pixel neighborhoods. The orientation histograms are relative to the keypoint orientation and the orientation data comes from the Gaussian image closest in scale to the keypoint's scale. As before, the contribution of each pixel is weighted by the gradient magnitude, and by a Gaussian with σ 1.5 times the scale of the keypoint. Histograms contain 8 bins each, and each descriptor contains a 4×4 array of 16 histograms around the keypoint. This leads to a SIFT feature vector with (4×4×8=128 elements). This vector is normalized to enhance invariance to changes in illumination.

The foregoing procedure is applied to training images to compile a reference database. An unknown image is then processed as above to generate keypoint data, and the closest-matching image in the database is identified by a Euclidian distance-like measure. (A “best-bin-first” algorithm is typically used instead of a pure Euclidean distance calculation, to achieve several orders of magnitude speed improvement.) To avoid false positives, a “no match” output is produced if the distance score for the best match is close—e.g., 25%—to the distance score for the next-best match.

To further improve performance, an image may be matched by clustering. This identifies features that belong to the same reference image—allowing unclustered results to be discarded as spurious. A Hough transform can be used—identifying clusters of features that vote for the same object pose.

An article detailing a particular hardware embodiment for performing the SIFT procedure, suitable for implementation in a next generation cell phone, is Bonato et al, “Parallel Hardware Architecture for Scale and Rotation Invariant Feature Detection,” IEEE Trans on Circuits and Systems for Video Tech, Vol. 18, No. 12, 2008.

An alternative hardware architecture for executing SIFT techniques is detailed in Se et al, “Vision Based Modeling and Localization for Planetary Exploration Rovers,” Proc. of Int. Astronautical Congress (IAC), October, 2004.

While SIFT is perhaps the most well-known technique for generating robust local descriptors, there are others, which may be more or less suitable—depending on the application. These include GLOH (c.f., Mikolajczyk et al, “Performance Evaluation of Local Descriptors,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 27, No. 10, pp. 1615-1630, 2005) and SURF (c.f., Bay et al, SURF: Speeded Up Robust Features,” Eur. Conf. on Computer Vision (1), pp. 404-417, 2006; Chen et al, “Efficient Extraction of Robust Image Features on Mobile Devices,” Proc. of the 6th IEEE and ACM Int. Symp. On Mixed and Augmented Reality, 2007; and Takacs et al, “Outdoors Augmented Reality on Mobile Phone Using Loxel-Based Visual Feature Organization,” ACM Int. Conf. on Multimedia Information Retrieval, October 2008).

Watermarking and Fingerprinting System Configurations

FIG. 1 is a block diagram illustrating the creation of a content recognition system using fingerprints and watermarks. The digitized input image/video/audio signals 100 are input to the fingerprint calculator/watermark embedder 102, which computes multiple fingerprints for each content item to be uniquely recognized, and also watermarks the content item. In a database entry process 102, the fingerprints are entered and stored in a database, along with additional information, such as metadata for the content item, a digital master copy for use as needed (see Patent Application Publication 20100322469 for description of techniques involving use of original content in watermark detection and determining location within content). A database organization process 106 in a database system sorts and arranges the fingerprints in a data structure, such as a tree structure to enable fast searching and matching. This database itself may be distributed over an array of computers in an identification network (108). This network receives queries to identify or recognize content items based on a stream of fingerprints and/or watermarks from a requesting device, such as a user's handheld mobile device or other computing device (node in a network of monitoring devices).

US Patent Publication No 20060280246 includes the following description:

Fingerprinting is a method of identifying multimedia content by deriving a number or set of numbers that uniquely identify that content. The fingerprint may be fragile, such as a secure hash (e.g., SHA, MD5, etc.) or robust. In the case of a robust fingerprint, the fingerprint is expected to remain relatively the same despite processing distortion due to broadcasting, compression, geometrical distortion, etc.

One form of robust hash for video is a waveform constructed from statistics of each frame in the video as shown in FIGS. 160 and 162 in FIG. 6 [of the '684 publication]. These statistics can be representing compactly as a vector of the changes in the statistic from frame to frame in a video sequence, such as a Group of Pictures (GOP) in a video coding format like MPEG. Examples of the statistics that can be used for the fingerprint include the frame average for luminance and the variance. For compressed streams, fingerprints can be extracted from the compressed data, such as the DCT coefficients in the I-frames, the motion vectors, etc.

FIG. 2 is a block diagram illustrating the content identification process. Incoming signals 109 are captured in a receiver 110. This includes still or video image capture in which images are captured and digitized with an image sensor like a camera or other image capture device, as well as ambient audio capture by microphone. It also includes receipt of audio, image or video content in a broadcast or transmission channel, including broadcast stream or file transfer. The recognition process may be invoked as part of a systematic Internet monitoring or broadcast monitoring of content signals, in home audience measurement, batch database searching and content indexing, or user requests for content recognition and metadata searching. The fingerprint calculator/watermark extracter 112 computes fingerprints and/or watermarks for incoming content items and issues them to a database for database search for matching fingerprints and data look up for watermark based identifiers 114. The fingerprint matches found in the search process and watermark identifiers provide content identification (a number or some other form of index for metadata lookup), which in turn, enables look up of metadata corresponding to the content identification in one or more metadata databases. The metadata is then returned to device 116 for display/output or further processing. This may involve returning metadata to a device that requested the database search or some other device to which the search results are directed (e.g., a user's home device, or a monitoring system's data collection database in which the metadata and recognition events are aggregated and compiled for electronic report generation).

AR Exploitation

Sometimes watermark detection needs properly aligned image data to establish a proper registration for reliable payload recovery. Suitable image alignment is difficult to achieve in many mobile environments. For example, and with reference to FIG. 4, a smartphone captures imagery of a subject surface (e.g., a magazine, newspaper, object, etc.). The pose relative to the smartphone's video camera and the subject surface (sometimes referred to as “image pose”) changes as a user positions the phone to capture video. In this context, pose can include perspective angle, scale, rotation and translation.

I have developed methods and systems to accurately estimate geometry capture distortion and modify imagery prior to watermark detection. This can be used in connection with augmented reality overlays to provide rich user experiences. But it all starts with determining the correct relative pose.

As an initial overview, and with reference to FIG. 5, captured image frames are analyzed to identify key points. These key points can be tracked over time to resolve relative image geometry including pose. The captured imagery can be modified according to the resolved geometry to remove any distortion introduced by relative camera positioning including, e.g., removing rotation, perspective angle, scale, etc. The watermark detector can analyze the modified, captured imagery in search of a previously hidden digital watermark.

Our methods can be implemented by many suitable electronic devices. One example is a portable device including a video camera, e.g., such as a smartphone, tablet, pad, etc. With reference to FIG. 6, software (e.g., a smartphone App) is enabled on the portable device. (One example of the software may include a modified version of Digimarc's Digimarc Discover application. From Digimarc's website: “Digimarc Discover uses multiple content identification technologies—digital watermarking, audio fingerprinting and QR code and barcode detection—to give smartphones the ability to see, hear and engage with all forms of media. Consumers simply launch the Digimarc Discover app and point their phone at the content of interest—an ad, article, package, retail sign, etc.—and are instantly connected to a menu of optional experiences such as learn more, view a video, launch an app, map directions, share via social media, save for later or make a purchase.”)

Image data, e.g., video frames captured by the device's video camera is gathered and provided to a pose detector or detection process to determine pose of the camera relative to a depicted subject surface. Captured imagery can be modified to remove any distortion, e.g., scale, perspective, translation, rotation. The modified imagery is analyzed for hidden digital watermarking. Once detected, the digital watermarking can serve as a backbone for an augmented reality (AR) experience. For example, the watermarking may include a link to obtain video. The video can be overlaid in a device display area. In some cases, the video can be overlaid in image display area spatially corresponding to the subject surface's that includes digital watermarking (FIG. 7). Updated pose information can be provided to ensure that the overlaid graphics or video continue to be positioned where intended, e.g., the video can continue to be played in the intended spatial area, even as the camera moves relative to the object's surface.

Positioning and tracking of overlay graphics and video can be enhanced e.g., by tracking and mapping image frames or features with the image frames. For example, a keyframe-based SLAM system as discussed in Klein, et al., “Parallel Tracking and Mapping on a camera phone,” Mixed and Augmented Reality, ISMAR 2009, 8th IEEE International Symposium on 19-22 Oct. 2009, which is hereby incorporated by reference in its entirety, could be used. Other tracking such as natural feature tracking or marker-based systems, etc. could be used as well for the position and tracking of overlay graphics, video and other AR features.

But let's go back and even further discuss pose detection.

Imagery (video) frames are captured with a device sensor, e.g., a camera. A first image frame I₁ is analyzed to detect “key points”. A key point generally represents a robust image characteristic. Some examples of key points include, e.g., a feature corner or other characteristic, an area having one or more (locally) large non-zero derivatives, etc. Other features as discussed above under the SIFT section can be used as well. Homography matrices can be constructed representing key points from I₁ relative to another image frame I₂. (Of course, it is not necessary for frames I₁ and I₂ to be adjacently located frames. In fact, there is some benefit for frames to have some sufficient distance between them to have a representable difference in rotation, scale, translation, perspective, etc. Additionally, homography can be estimated from an image pair itself (e.g., two images), instead of from two (2) or more sets of corresponding keypoints.) For example, the EMS homography described in Benhimane et al, “Homography-based 2d visual tracking and servoing,” The International Journal of Robotics Research, Vol. 26, No. 7, pages 661-676, July 2007, could be used to represent a transform between key points in different image frames. The Benhimane paper is hereby incorporated herein by reference in its entirety. In noisy imagery, we've found that 20-60 key points are sufficient. Of course, more or less key points could be used with varying degrees of success.

Multiple pose Homographies can be constructed, e.g., between I1 and I2, I2 and I3, I3 and I4, and so on. Given at least four (4) views (e.g., frames) of the subject surface, and corresponding pose Homographies between the frames, a cost function can be utilized to find pose information that best fits a current frame. I prefer to use between 4-10 homographies with a cost function; however, additional homographies may be used as well. The techniques (including the cost function in section 2.2.1) described in Pirchheim, et al., “Homography-Based Planar Mapping and Tracking for Mobile Phones,” IEEE International Symposium on Mixed and Augmented Reality, 2011, could be used to find such pose information. The Pirchheim paper is hereby incorporated herein by reference in its entirety. The Homography that minimizes the cost function can be used to provide pose information.

Pirchheim's Section 2.2.1 states:

“2.2.1 Cost Function and Parameterization

In the following we describe the mathematical formulation of the optimization scheme given in [A. Ruiz, P. E. L. de Teruel, and L. Fernandez. Practical planar metric rectification. In Proc. BMVC 2006, 2006] for completeness. We define the scene plane to be located in the canonical position z=0 corresponding to the (x; y) plane. Thus, points on the plane have a z-coordinate equal zero and can be written as (x; y; 0; 1) in homogeneous coordinates.

The unknowns in the optimization are the camera poses Pi relative to this plane. Under the assumption that all world points are located on the plane, camera poses can easily be re-formulated as 2D homographies by eliminating the third column of the pose matrix Pi:

$\begin{matrix} {{\begin{pmatrix} u \\ v \\ 1 \end{pmatrix} \sim {\left( R \middle| t \right)\begin{pmatrix} x \\ y \\ 0 \\ 1 \end{pmatrix}}} = {\left( r_{1} \middle| r_{2} \middle| t \right){\begin{pmatrix} x \\ y \\ 1 \end{pmatrix}.}}} & (1) \end{matrix}$

The resulting pose homographies have the following important property based on the observation that their first and second columns are ortho-normal vectors, where r₁ and r₂ are the first and second column of R respectively:

$\begin{matrix} {{C^{T} \cdot C} = {{\begin{pmatrix} r_{1}^{T} \\ r_{2}^{T} \\ t \end{pmatrix}\left( r_{1} \middle| r_{2} \middle| t \right)} = \begin{pmatrix} 1 & 0 & \ldots \\ 0 & 1 & \ldots \\ \ldots & \ldots & \ldots \end{pmatrix}}} & (2) \end{matrix}$

Additionally, given a pose homography C₁ and the homography H_(2;1) mapping from camera C₁ to C₂, the corresponding pose homography C₂ can be computed as follows: C ₂ =H _(2,1) ·C ₁.  (3)

C₁ must observe the constraint (2). Moreover, by substituting (3) into (2) we obtain the following additional constraint for C₁:

$\begin{matrix} {{C_{2}^{T} \cdot C_{2}} = {{\left( {C_{1}^{T}H_{21}^{T}} \right) \cdot \left( {H_{21}C_{1}} \right)} = {\begin{pmatrix} 1 & 0 & \ldots \\ 0 & 1 & \ldots \\ \ldots & \ldots & \ldots \end{pmatrix}.}}} & (4) \end{matrix}$

We can formulate the constraint as a cost function on C₁ by enforcing that the off-diagonal entries are 0 and the diagonal entries have the same value. Thus, we define the following cost function for one homography H_(i;1):

$\begin{matrix} {{{\left( {H_{i,1}C_{1}} \right)^{T}\left( {H_{i,1}C_{1}} \right)} = \begin{pmatrix} a_{1,1} & a_{1,2} & \ldots \\ a_{1,2} & a_{2,2} & \ldots \\ \ldots & \ldots & \ldots \end{pmatrix}},} & (5) \\ {{e_{i}\left( C_{1} \right)} = {\left( {a_{1,2}/a_{1,1}} \right)^{2} + {\left( {{a_{2,2}/a_{1,1}} - 1} \right)^{2}.}}} & (6) \end{matrix}$

The resulting cost function (6) exploits well-known orthogonality constraints over the image of the absolute conic [R. I. Hartley and A. Zisserman. Multiple View Geometry in Computer Vision. Cambridge University Press, second edition, 2004] and holds for any homography H_(i;1) mapping from the reference camera to another camera i. For a set of cameras C_(i), all connected with individual homographies H_(i;1) to a reference camera C₁, we construct a cost function by adding up individual costs, obtaining a single cost function for the unknown reference camera pose C₁

$\begin{matrix} {{e\left( C_{1} \right)} = {\sum\limits_{i}\;{{e_{i}\left( C_{1} \right)}.}}} & (7) \end{matrix}$

Overall, the whole problem of estimating all camera poses Ci can be reduced to finding one camera pose C1 that minimizes the total cost function (7). A homography H_(2;1) between two cameras has 8 degrees of freedom because it is defined up to scale. By fixing the unknown plane and allowing the second camera C₂ to move freely, the first camera C1 has only 2 degrees of freedom left. Ruiz et al. [ . . . ] propose to fix the camera position and vary the camera tilt (x-axis) and roll (z-axis) angles but remain vague concerning the valid 2DOF parameter range. Geometrically, we interpret the parameterization as depicted in FIG. 4. Plane and reference camera are defined to be located in canonical position, the plane aligning with the world (x; y) plane and the reference camera located at position (0; 0; −1) such that world and camera coordinate systems align. We assume that the plane rotates and the camera stays fixed. The first rotation around the x-axis lets the plane move along a circle aligned with the (y,z) camera plane. The second rotation lets the plane move along another circle aligned with the (x; y) camera plane. Avoiding the plane to be rotated behind the camera, we define (−π/2; π/2) as range for the x-rotation parameter. For the z-rotation parameter we define [−π/2, π/2) as the valid range to avoid solution symmetry.”

The above mentioned papers: i) A. Ruiz, P. E. L. de Teruel, and L. Fernandez. Practical planar metric rectification, In Proc. BMVC 2006, 2006, and ii) R. I. Hartley and A. Zisserman, Multiple View Geometry in Computer Vision, Cambridge University Press, second edition, 2004, are each hereby incorporated herein by reference in their entireties.

There are many refinements. For example, different homographies can be created for different pose parameters, e.g., separate out image translation or group together scale and rotation, etc. Also, a first pose estimate can be provided based on one or more pose parameters, and then refine the estimate by using additional parameters.

Captured image data can be modified to remove or modify distortion based on the pose information. Watermark detection can be carried out on the modified imagery.

The pose information need not be perfect, but provides pose information that preferably gets the pose detection in the ball park for watermark detection. For example, the digital watermarking detection currently used in the Digimarc Discover application currently can produce reads with a perspective angle of up to ±30-35%.

Successful watermark detection can launch an AR experience as discussed above. A watermark payload bit (or bits) can also be used to trigger an announcement to a user that an AR overlay is about to launch and/or offer, e.g., the user a chance to cancel or proceed with the AR experience.

The pose detector can continue to detect pose information (e.g., based on minimizing a cost function associated with pose Homographies) from captured imagery long after a watermark has been detected. This may provide the AR system with continuing pose information as the AR experience continues. This continuing pose information can be provided to the AR system to help determine relative positioning of any overlay graphics relative to captured imagery.

A potentially more accurate approach is to provide base-line orientation information from digital watermark detection. For example, successful watermark detection may also provide image orientation information. Indeed, digital watermarking many include orientation attributes (see, e.g., U.S. Pat. Nos. 8,243,980; 7,116,781 and 6,614,914; which are each hereby incorporated herein by reference in its entirety) that are helpful to identify the original rotation, scale and translation of the imagery when the watermark was inserted. This base-line orientation information can be used by an AR system, e.g., for transforming captured imagery for display on a device screen to accommodate for relative capture device pose. (Watermark orientation information can also be used to update or reset pose information being calculated by a Pose Detector.)

Watermark information can be used to modify or remove unwanted rotation, scaling or translation, essentially restoring the image to the state in which it was watermarked. This restored image content allows for reliable digital fingerprint analysis. Consider the possibilities.

Having access to the original image when embedding watermarking, a watermark embedder can analyze image areas and based, e.g., on color, luminance, texture and/or coefficient information, can calculate a fingerprint of the area. For example, and with reference to FIG. 8, areas 1-6 are separately fingerprinted. This information can be stored in association with a digital watermark that is embedded in the areas.

A watermark detector later encounters imagery depicting areas 1-6. If the watermark is redundantly encoded in areas 1-6 (e.g., the same watermark is placed in each area), the detector might have trouble determining whether it detected the watermark from area 3 vs. area 1 vs. area 4, and so on. This may matter if a different AR experience is intended for different areas on the subject's surface.

Since the imagery is restored to its original or near original form, the watermark detector, or a unit cooperating with the watermark detector, may compute a corresponding digital fingerprint of the detection area. This can be compared to the original fingerprint (created at embedding) to determine the location of the watermark detection area, e.g., does the fingerprint correspond to areas 1 or 3 or 4. In one example the fingerprint calculation process uses coefficients of a linear projection. When a watermark is read, the watermark detector (or software/device) cooperating with the detector, may communicate the watermark payload to a registry. This registry may include the original fingerprint information that the detector can use to determine the digital watermark read location. Knowing the location of a detection block can be important in some applications where the spatial position of the watermark on a surface is used by an AR system (e.g., overlaying video only over certain areas of a photograph that contains multiple watermark areas or blocks).

The area or block position alternatively can be included in a watermark payload. For example, an ID or other indicator may indicate the location, or relative location of the watermarked area.

System and Components

It is envisioned that the above processes, systems and system components can be implemented in a variety of computing environments and devices. It is specifically contemplated that the processes and components will be implemented within devices and across multiple devices. For example, signal capture, signature calculation and database entry and organization are performed on a set of devices to construct a recognition system, and signal capture, signature calculation and database search and retrieval are performed on another set of devices, which may be distinct or overlap.

The computing environments used to implement the processes and system components encompass a broad range from general purpose, programmable computing devices to specialized circuitry, and devices including a combination of both. The processes and system components may be implemented as instructions for computing devices, including general purpose processor instructions for a variety of programmable processors, including microprocessors, Digital Signal Processors, electronic processors, etc. These instructions may be implemented as software, firmware, etc. These instructions can also be converted to various forms of processor circuitry, including programmable logic devices, application specific circuits, including digital, analog and mixed analog/digital circuitry. Execution of the instructions can be distributed among processors and/or made parallel across processors within a device or across a network of devices. Transformation of content signal data may also be distributed among different processor and memory devices.

The computing devices include, e.g., one or more processors, one or more memories (including computer readable media), input devices, output devices, and communication among these components (in some cases referred to as a bus). For software/firmware, instructions are read from computer readable media, such as optical, electronic or magnetic storage media via a communication bus, interface circuit or network and executed on one or more processors.

The above processing of content signals includes transforming of these signals in various physical forms. Images and video (forms of electromagnetic waves traveling through physical space and depicting physical objects) may be captured from physical objects using cameras or other capture equipment, or generated by a computing device. Similarly, audio pressure waves traveling through a physical medium may be captured using an audio transducer (e.g., microphone) and converted to an electronic signal (digital or analog form). While these signals are typically processed in electronic and digital form to implement the components and processes described above, they may also be captured, processed, transferred and stored in other physical forms, including electronic, optical, magnetic and electromagnetic wave forms. The content signals are transformed during processing to compute signatures, including various data structure representations of the signatures as explained above. In turn, the data structure signals in memory are transformed for manipulation during searching, sorting, reading, writing and retrieval. The signals are also transformed for capture, transfer, storage, and output via display or audio transducer (e.g., speakers).

While reference has been made to mobile devices (like cell phones) and embedded systems, it will be recognized that this technology finds utility with all manner of devices—both portable and fixed. PDAs, organizers, portable music players, desktop computers, wearable computers, servers, etc., can all make use of the principles detailed herein. Particularly contemplated cell phones include the Apple iPhone, and cell phones following Google's Android specification (e.g., the G1 phone, manufactured for T-Mobile by HTC Corp.). The term “cell phone” should be construed to encompass all such devices, even those that are not strictly-speaking cellular, nor telephones. (Details of an iPhone, including its touch interface, are provided in published patent application 20080174570, which is hereby incorporated herein by reference.)

The design of cell phones and other computers that can be employed to practice the methods of the present disclosure are familiar to the artisan. In general terms, each includes one or more processors, one or more memories (e.g. RAM), storage (e.g., a disk or flash memory), a user interface (which may include, e.g., a keypad, a TFT LCD or OLED display screen, touch or other gesture sensors, a camera or other optical sensor, a microphone, etc., together with software instructions for providing a graphical user interface), a battery, and an interface for communicating with other devices (which may be wireless, such as GSM, CDMA, W-CDMA, CDMA2000, TDMA, EV-DO, HSDPA, WiFi, WiMax, or Bluetooth, and/or wired, such as through an Ethernet local area network, a T-1 internet connection, etc.). An exemplary cell phone that can be used to practice part or all of the detailed arrangements is shown in FIG. 3.

The processor can be a special purpose hardware device, or may be implemented by a programmable device executing software instructions read from a memory or storage, or by combinations thereof. (The ARM series of CPUs, using a 32-bit RISC architecture developed by Arm, Limited, is used in many cell phones.) References to “processor” should thus be understood to refer to functionality, rather than any particular form of implementation.

In addition to implementation by dedicated hardware, or software-controlled programmable hardware, the processor can also comprise a field programmable gate array, such as the Xilinx Virtex series device. Alternatively the processor may include one or more digital signal processing cores, such as Texas Instruments TMS320 series devices.

Software instructions for implementing the detailed functionality can be readily authored by artisans, from the descriptions provided herein.

Typically, devices for practicing the detailed methods include operating system software that provides interfaces to hardware devices and general purpose functions, and also include application software that can be selectively invoked to perform particular tasks desired by a user. Known browser software, communications software, and media processing software can be adapted for uses detailed herein. Some embodiments may be implemented as embedded systems—a special purpose computer system in which the operating system software and the application software is indistinguishable to the user (e.g., as is commonly the case in basic cell phones). The functionality detailed in this specification can be implemented in operating system software, application software and/or as embedded system software.

Different of the functionality can be implemented on different devices. For example, in a system in which a cell phone communicates with a server at a remote service provider, different tasks can be performed exclusively by one device or the other, or execution can be distributed between the devices. For example, extraction of signatures from a test image on a cell phone, and searching of a database for corresponding reference images on a remote server, is one architecture, but there are many others. For example, information about reference images may be stored on the cell phone—allowing the cell phone to capture a test image, generate signatures, and compare against stored signature data structures for reference images—all without reliance on externals devices. Thus, it should be understood that description of an operation as being performed by a particular device (e.g., a cell phone) is not limiting but exemplary; performance of the operation by another device (e.g., a remote server), or shared between devices, is also expressly contemplated. (Moreover, more than two devices may commonly be employed. E.g., a service provider may refer some tasks, functions or operations, to servers dedicated to such tasks.)

In like fashion, data can be stored anywhere: local device, remote device, in the cloud, distributed, etc.

Operations need not be performed exclusively by specifically-identifiable hardware. Rather, some operations can be referred out to other services (e.g., cloud computing), which attend to their execution by still further, generally anonymous, systems. Such distributed systems can be large scale (e.g., involving computing resources around the globe), or local (e.g., as when a portable device identifies nearby devices through Bluetooth communication, and involves one or more of the nearby devices in an operation.)

CONCLUDING REMARKS

Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms. To provide a comprehensive disclosure without unduly lengthening the specification, applicants incorporate by reference the patents and patent applications referenced above, in their entireties.

The methods, processes, and systems described above may be implemented in hardware, software or a combination of hardware and software. For example, the signal processing operations described above may be implemented as instructions stored in a memory and executed in a programmable computer (including both software and firmware instructions), implemented as digital logic circuitry in a special purpose digital circuit, or combination of instructions executed in one or more processors and digital logic circuit modules. The methods and processes described above may be implemented in programs executed from a system's memory (a computer readable medium, such as an electronic, optical or magnetic storage device). The methods, instructions and circuitry operate on electronic signals, or signals in other electromagnetic forms. These signals further represent physical signals like image signals (e.g., light waves in the visible spectrum) captured in image sensors. These electromagnetic signal representations are transformed to different states as detailed above to detect signal attributes, perform pattern recognition and matching, encode and decode digital data signals, calculate relative attributes of source signals from different sources, etc.

The above methods, instructions, and hardware operate on reference and suspect signal components. As signals can be represented as a sum of signal components formed by projecting the signal onto basis functions, the above methods generally apply to a variety of signal types. The Fourier transform, for example, represents a signal as a sum of the signal's projections onto a set of basis functions.

The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated. 

What is claimed is:
 1. A method comprising: receiving imagery captured by a device sensor, in which the device sensor comprises an image or video camera; analyzing the imagery to decode digital watermarking therefrom, in which the digital watermarking comprises orientation attributes; determining orientation information from the orientation attributes, the orientation information being associated with a capture position of the device sensor relative to an imaged subject; providing the orientation information for use by an augmented reality (AR) system; and using one or more configured processors, refining the orientation information determined from the orientation attributes with image homography, in which the orientation information is utilized as a starting pose for the image homography.
 2. The method of claim 1 further comprising: identifying a plurality of key points in the imagery, in which the key points represent robust image characteristics that are independent of the digital watermarking, in which said refining utilizes pose homographies associated with the key points.
 3. The method of claim 2 in which said refining further minimizes a cost function associated with the pose homographies.
 4. The method of claim 1 in which the AR system overlays graphics or video on a display screen in an area corresponding to a spatial area in which the digital watermarking was detected from the imagery.
 5. The method of claim 1 in which the AR system utilizes the orientation information to transform the imagery for display on a display screen.
 6. The method of claim 1 in which the digital watermarking comprises a payload, in which said method further comprises initiating an announcement associated with the AR system utilizing at least a portion of the payload.
 7. The method of claim 1 further comprising: modifying the imagery according to the orientation information to yield modified imagery; and deriving a fingerprint from the modified imagery, the fingerprint comprising a hash of the modified imagery.
 8. The method of claim 7 further comprising providing the fingerprint to the AR system to help facilitate display of graphics or video on a display screen corresponding to a spatial area of modified imagery from which the fingerprint was derived from.
 9. A mobile device comprising: a device sensor comprising an image or video camera; memory storing instructions; one or more processors configured by the instructions for: analyzing imagery captured by said device sensor to extract an encoded signal therefrom, in which the encoded signal comprises orientation attributes; determining orientation information from the orientation attributes, the orientation information being associated with a capture position of said device sensor relative to an imaged subject; providing the orientation information for use by an augmented reality (AR) system; and adapting the orientation information determined from the orientation attributes with image homography, in which the orientation information is utilized as a starting pose for the image homography.
 10. The mobile device of claim 9 further comprising the AR system.
 11. The mobile device of claim 10 in which said AR system is configured for overlaying graphics or video on a display screen in an area corresponding to a spatial area in which the encoded signal was detected from the imagery.
 12. The mobile device of claim 10 in which said mobile device comprises a display screen, and in which said AR system is configured for utilizing the orientation information to transform the imagery for display on said display screen.
 13. The mobile device of claim 10 in which the encoded signal comprises a payload, in which at least a portion of the payload is used to initiate an announcement associated with said AR system.
 14. The mobile device of claim 10 in which said instructions comprise instructions to configure said one or more processors for: transforming the imagery according to the orientation information to yield modified imagery; and extracting a fingerprint from the modified imagery, the fingerprint comprising a hash of the modified imagery.
 15. The mobile device of claim 14 further comprising a display screen, and instructions to configure said one or more processors for providing the fingerprint to said AR system to help facilitate display of graphics or video on said display screen corresponding to a spatial area of modified imagery from which the fingerprint was derived from.
 16. The mobile device of claim 9 in which said instructions comprise instructions to configure said one or more processors for: identifying a plurality of key points in the imagery, in which the key points represent robust image characteristics that are independent of the encoded signal, in which said adapting utilizes pose homographies associated with the key points.
 17. The mobile device of claim 16 in which said instructions comprise instructions to configure said one or more processors for minimizing a cost function associated with the pose homographies. 