Identifying product metadata from an item image

ABSTRACT

A metadata extraction machine accesses an image that depicts an item. The item depicted in the image may have an attribute that describes a characteristic of the item and an attribute descriptor that corresponds to the attribute of the item and specifies a value of the attribute. The metadata extraction machine performs an analysis of the image. The analysis may include identifying the attribute descriptor corresponding to the attribute based on image segmentation of the image. The metadata extraction machine transmits a communication to a device of a user based on the identifying of the attribute descriptor corresponding to the attribute of the item depicted in the image.

RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.14/983,458, filed Dec. 29, 2015, which is a continuation of U.S. patentapplication Ser. No. 13/028,019, filed Feb. 15, 2011, which is acontinuation of Ser. No. 14/255,735, filed Apr. 17, 2014, each of whichis hereby incorporated by reference herein in its entirety.

TECHNICAL FIELD

The subject matter disclosed herein generally relates to the processingof data. Specifically, the present disclosure addresses systems andmethods of identifying product metadata from an item image.

BACKGROUND

An image may depict an item, and the depicted item may be a specimen ofa product available for purchase. For example, a product may beavailable for purchase from a seller, and the seller may use an image ofthe item to merchandise the item, the product, or both. The seller maybe a business entity (e.g., a manufacturer, a wholesaler, or a retailerof the product) or an individual person. The product may take the formof a good or a service. Examples of goods include physical items (e.g.,a digital camera or a car) and information items (e.g., downloadeddata). Examples of services include human services (e.g., contractedwork) and automated services (e.g., subscriptions). Other examples ofproducts include authorizations (e.g., access to services, licenses, orencryption keys).

In merchandising an item, the seller may provide an image of the item(e.g., an item image) to a network-based system so that thenetwork-based system may present the image to a user of thenetwork-based system (e.g., a potential buyer of the item). Examples ofnetwork-based systems include commerce systems (e.g., shoppingwebsites), a publication systems (e.g., classified advertisementwebsites), listing systems (e.g., auction websites), and transactionsystems (e.g., payment websites). The image of the item may be presentedwithin a document (e.g., a webpage) describing the item, a search resultreferencing the item, a listing for the item (e.g., within a list ofitems available for purchase), a review of the item, a comment on theitem, or any suitable combination thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

Some embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings in which:

FIG. 1 is a diagram illustrating an image of an item, according to someexample embodiments;

FIG. 2 is a diagram illustrating another image of an item, accordingsome example embodiments;

FIG. 3 is a network diagram illustrating a network environment with ametadata extraction machine suitable for identifying product metadatafrom an item image, according to some example embodiments;

FIG. 4 is a block diagram of a metadata extraction machine, according tosome example embodiments;

FIG. 5 is a block diagram of an identification module within a metadataextraction machine, according to some example embodiments;

FIG. 6-8 are flowcharts illustrating operations in a method ofidentifying product metadata from an item image, according to someexample embodiments; and

FIG. 9 is a block diagram illustrating components of a machine,according to some example embodiments, able to read instructions from amachine-readable medium and perform any one or more of the methodologiesdiscussed herein.

DETAILED DESCRIPTION

Example methods and systems are directed to identifying product metadatafrom an item image. Examples merely typify possible variations. Unlessexplicitly stated otherwise, components and functions are optional andmay be combined or subdivided, and operations may vary in sequence or becombined or subdivided. In the following description, for purposes ofexplanation, numerous specific details are set forth to provide athorough understanding of example embodiments. It will be evident to oneskilled in the art, however, that the present subject matter may bepracticed without these specific details.

An item available for purchase may have a characteristic that can bedescribed by an attribute. For example, a woman's dress may have aparticular shape as a characteristic, and the characteristic shape maybe described by the attribute “style.” As another example, a car mayhave a particular color that is described by the attribute “exteriorcolor.” In addition to style and color, examples of attributes includesize (e.g., shoe size, or dress size) and category (e.g., carclassification or type).

An attribute of an item may have a value, and the value may be specifiedby a descriptor as one value out of multiple possible values that arevalid for that attribute. For example, a woman's dress may have a shapeconforming to a “style” known as “evening gown,” where the descriptor“evening gown” specifies one value of the attribute “style” out ofseveral possible values that are valid for the attribute “style” (e.g.,“cocktail dress” or “sundress”). As another example, a car may have an“exterior color” that is named “red,” where the descriptor “red”specifies one value of the attribute “exterior color” out of manypossible values that are valid for the attribute “exterior color” (e.g.,“green,” “white,” “blue,” or “silver”).

Accordingly, as used herein, a “characteristic” of an item is aperceivable feature of the item describable by an attribute and a value.An “attribute” of an item is a word, phrase, number, code or otherinformation that describes a characteristic of the item, and a“descriptor” is a word, phrase, number, code or other information thatspecifies a value for an attribute. As such, a characteristic of an itemmay be represented by an attribute-value pair (e.g., “style: eveninggown,” or “exterior color=red).

A system in the example form of a metadata extraction machine isconfigured to access an image that depicts an item and identify anattribute of the item and a descriptor that specifies a value for theidentified attribute. The system identifies the attribute and thedescriptor based on an analysis of the accessed image. This analysisincludes distinguishing a foreground portion of the image from abackground portion of the image. The foreground portion of the imagedepicts the item, while the background portion of the image does notdepict any part of the item. In other words, the item is absent from thebackground portion of the image. Distinguishing a foreground portionfrom the background portion may include segmenting the image to identifythe foreground and background portions. Some or all of this analysis maybe performed by the system.

The system then stores the identified descriptor of the item as metadataof the item. For example, the system may store the attribute ascorresponding to the descriptor (e.g., as an attribute-value pair). Instoring the descriptor of the item, the system may add the descriptor tothe metadata of the item. Alternatively, the system may use thedescriptor to replace another descriptor in the metadata of the item.Since the item is a specimen of a product, the system may store theidentified descriptor as metadata of the product.

The analysis of the image may further include identifying a shape of theitem or product, a color of the item or product, a pattern on the itemor product, text on the item or product, or any suitable combinationthereof, within the image of the item. The system may identify theattribute, the descriptor, or both, based on the identified shape,color, pattern, or text.

In some situations, the image may include prohibited information. Asused herein, “prohibited information” refers to information that isdisallowed (e.g., according to one or more rules or policies) within animage submitted to a network-based system (e.g., a network-basedcommerce system). The prohibited information may include text, a shape(e.g., a graphic), or both. Examples of text that may be prohibitedinclude a uniform resource locator (URL), a profane or vulgar word, aparticular message (e.g., a copyrighted statement or phrase), and aparticular brand name (e.g., a manufacturer, importer, or retailer).Examples of shapes that may be prohibited include a design (e.g., acopyrighted design), a logo, a trademark, and a symbol (e.g., anoffensive or obscene symbol).

The analysis of the image may include identifying the prohibitedinformation within the image of the item. Accordingly, the descriptoridentified by the system may indicate that the image includes prohibitedinformation (e.g., indicates that prohibited information is present inthe image). Based on the identification of the prohibited information,the system may initiate a response to the prohibited information.Examples of responses include notifying a seller of the item, requestinganother (e.g., policy compliant) image of the item, removing the image,removing a listing of the item, restricting the seller (e.g., preventingthe seller from using a portion of the network-based system).

In various example embodiments, the system may receive the image from adevice that corresponds to the seller of the item. Having identified thedescriptor, the system may communicate a message to the device of theseller. The message may include a question regarding whether toassociate the descriptor with the item, a suggestion that the descriptorbe associated with the item, a recommendation that the descriptor beassociated with the item, a notification that the descriptor isassociated with the item, or any suitable combination thereof.

In some example embodiments, the system may receive user input that isrelated to the identified descriptor from a device of a user (e.g., ofthe metadata extraction machine or of the network-based system). Forexample, the user input may include the identified descriptor, theidentified attribute, another descriptor that specifies a differentvalue valid for the identified attribute, or any suitable combinationthereof. In response to reception of user input, the system may providea recommendation of the item to the device of the user based on theidentified descriptor.

FIG. 1 is a diagram illustrating an image 110 of an item, according tosome example embodiments. The item is a specimen of a product (e.g., adress) The image 110 represents the item by depicting it in theforeground portion 120 of the image 110. The item is absent from thebackground portion 130 of the image 110.

The image further depicts a design 122 (e.g., a stylized “H”), as wellas text 124 (e.g., “Happy To Be Me!”). As shown, the design 122 and thetext 124 appear within the image 110 on the foreground portion 120 ofthe item shown in the image 110,

FIG. 2 is a diagram illustrating another image 210 of an item, accordingsome example embodiments. The appearance of the image 210 is similar tothe appearance of the image 110 described above. However, the image 210additionally includes prohibited text 212, 214, and 216. As shown, theprohibited text 212 is a message (e.g., “Do not buy from thiswebsite!”). The text 214 is a message that includes a manufacturer(e.g., “Abby Buttons”) of the item depicted in the image 210. The text216 is a URL (e.g., “http://www.shadycompetitor.net/”).

In some situations, the prohibited text 212, 214, and 216 may beincluded in the image 210 by an unscrupulous seller, for example, in anattempt to dissuade a user of a network-based commerce system (e.g., anonline shopping website) from purchasing the item via the network-basedcommerce system. Accordingly, the network-based commerce system mayimplement a policy or rule that forbids use of the prohibited text 212,214, and 216 within the network-based commerce system.

FIG. 3 is a network diagram illustrating a network environment 300 witha metadata extraction machine 310 that is suitable for identifyingproduct metadata from an item image (e.g., image 110 or image 210),according to some example embodiments. The network environment 300includes the metadata extraction machine 310, an item database 315, auser device 330, and a seller device 350, all communicatively coupled toeach other via a network 390. As shown, the metadata extraction machine310 and the item database 315 are included (e.g., as components) withina network-based commerce system 305.

The metadata extraction machine 310 may be a server (e.g., a webserver). The item database 315 may be a data repository (e.g., a fileserver) that stores information pertinent to the metadata extractionmachine 310, the network-based commerce system 305, or any suitablecombination thereof.

Also shown in FIG. 3 are a user 332 and a seller 352. The user 332 is auser of the user device 330, and the seller 352 corresponds to theseller device 350. The seller 352 may be a seller of the item that isavailable for purchase, and the user 332 may be a potential purchaser(e.g., a potential buyer) of the item. The user 332, the seller 352, orboth, may be a human user (e.g., a human being), a machine user (e.g.,software program to interact with a client device), or any suitablecombination thereof. The user 332 is not part of the network environment300, but is associated with the user device 330. The user device 330 maybe a deskside computer belonging to the user 332. Similarly, the seller352 is not part of the network environment 300, but is associated withthe seller device 350. As an example, the seller device 350 may be atablet computer belonging to the seller 352.

Any of the machines, databases, or devices shown in FIG. 3 may beimplemented in a general-purpose computer modified (e.g., configured orprogrammed) by software to be a special-purpose computer to perform thefunctions described herein for that machine. For example, a computersystem able to implement any one or more of the modules or methodologiesdescribed herein is discussed below with respect to FIG. 9. As usedherein, a “database” is a data storage resource and may store datastructured as a text file, a table, a spreadsheet, a relationaldatabase, a triple store, or any suitable combination thereof. Moreover,any two or more of the machines illustrated in FIG. 3 may be combinedinto a single machine, and the functions described herein for any singlemachine may be subdivided among multiple machines.

The network 390 may be any network that enables communication betweenmachines (e.g., the metadata extraction machine 310 and the sellerdevice 350). Accordingly, the network 390 may be a wired network, awireless network, or any suitable combination thereof. The network 390may include one or more portions that constitute a private network, apublic network (e.g., the Internet), or any suitable combinationthereof.

FIG. 4 is a block diagram of the metadata extraction machine 310,according to some example embodiments. The metadata extraction machine310 includes an access module 410, an identification module 420, astorage module 430, a communication module 440, a policy module 450, anda recommendation module 460, all configured to communicate with eachother (e.g., via a bus, a shared memory, or a switch). Any one or moreof these modules may be implemented using hardware (e.g., a processor ofa machine) or a combination of hardware and software. Moreover, any twoor more of these modules may be combined into a single module, and thefunctions described herein for a single module may be subdivided amongmultiple modules.

The access module 410 is configured to access an image (e.g., image 110or image 210) that depicts an item. As noted above, the item may be aspecimen of a product available for purchase (e.g., from the seller352). The item may have an attribute that describes a characteristic ofthe item, and the item may have a descriptor that specifies a value ofthe attribute.

The identification module 420 is configured to identify the attribute ofthe item and the descriptor of the item. The identification module 420may identify the attribute and the descriptor based on analysis of theimage. As noted above, this analysis may include distinguishing theforeground portion (e.g., foreground portion 120) of the image from abackground portion (e.g., background portion 130) of the image, wherethe foreground portion depicts the item and the item is absent from thebackground portion. In various example embodiments, the identificationmodule 420 is configured to perform the analysis of the image.

The storage module 430 is configured to store the identified descriptorof the item as metadata of the item. For example, the storage module 430may store the identified descriptor in the item database 315, asmetadata of the item. Storage of the identified descriptor may includeadding the identified descriptor as new metadata of the item.Alternatively, storage of the identified descriptor may includereplacing an existing descriptor with the identified descriptor withinan existing metadata of the item.

The communication module 440 is configured to receive the image. Forexample, the communication module 440 may receive the image from theseller device 350 (e.g., upon submission of the image by the seller352). In some example embodiments, the communication module 440 mayprovide the seller device 350 with software (e.g., an application,applet, or app) that configures the seller device 350 to communicatewith the communication module 440 (e.g., send the image). According tocertain example embodiments, the communication module 440 may providethe user device 330 with software (e.g., an application, applet, or app)that configures the user device 330 communicate with the communicationmodule 440 (e.g., send user input). The communication module 440 isfurther configured to communicate one or more messages to the sellerdevice 350. As noted above, the message may include a question regardingwhether to associate the descriptor with the item, a suggestion that thedescriptor be associated with the item, a recommendation that thedescriptor be associated with the item, a notification that thedescriptor is associated with the item, or any suitable combinationthereof.

The policy module 450 is configured to implement (e.g., enforce) one ormore rules or policies of the network-based commerce system 305. In someexample embodiments, the identification module 420 is configured toidentify prohibited information within the image. The policy module 450is further configured to initiate a response to the prohibitedinformation (e.g., in response to the identification of the prohibitedinformation). As noted above, examples of such a response includenotifying a seller of the item, requesting another (e.g., policycompliant) image of the item, removing the image, removing a listing ofthe item, and restricting the seller (e.g., preventing or de-authorizingthe seller from using a portion of the network-based system).

The recommendation module 460 is configured to provide one or morerecommendations of items. For example, the recommendation module 460 mayprovide a recommendation of the item depicted in the image accessed bythe access module 410. As another example, the recommendation module 460may provide a recommendation of another item (e.g., one that ispertinent to the item depicted in the image). A recommendation may beprovided by the recommendation module 460 based on the identifieddescriptor, the identified attribute, or both. In some exampleembodiments, the communication module 440 is configured to receive userinput that is related to the descriptor identified from the image by theidentification module 420. The user input may be received from the userdevice 330 (e.g., as a submission by the user 332), and the user inputmay include the identified attribute, the identified descriptor, anotherdescriptor that is valid for the identified attribute, or any suitablecombination thereof. The recommendation module 460 may be configured toprovide one or more recommendations of items to the user device 330, inresponse to the received user input and based on the received userinput.

FIG. 5 is a block diagram of the identification module 420 within themetadata extraction machine 310, according to some example embodiments.The identification module 420 includes an image analysis module 510. Theimage analysis module 510 is configured to perform the analysis of theimage that depicts the item. Accordingly, the image analysis module 510may enable the identification module 420 to perform the analysis of theimage.

The image analysis module 510 includes an image segmentation module 511,a shape identification module 513, a color identification module 515, apattern identification module 517, and a text identification module 519,all configured to communicate with each other (e.g., via a bus, a sharedmemory, or a switch). Any one or more of these modules may beimplemented using hardware (e.g., a processor of a machine) or acombination of hardware and software. Moreover, any two or more of thesemodules may be combined into a single module, and the functionsdescribed herein for a single module may be subdivided among multiplemodules.

The image segmentation module 511 is configured to segment an image(e.g., image 110 or image 210) into a foreground portion (e.g.,foreground portion 120) of the image and a background portion (e.g.,background portion 130) of the image. For example, the imagesegmentation module 511 may perform graph cuts segmentation (e.g., usingone or more graph cut techniques) to segment the image. This may havethe effect of identifying the foreground portion and the backgroundportion within the image. Hence, the image segmentation module 511 mayenable the image analysis module 510 to distinguish the foregroundportion from the background portion of the image. Accordingly, theidentification module 420 may identify the attribute, the descriptor, orboth, based on the segmented image.

In some example embodiments, the item depicted in the image is aspecimen of a product that has a particular shape represented within theimage. The shape identification module 513 is configured to identify ashape (e.g., design 122) within an image (e.g., image 110 or image 210).For example, the shape identification module 513 may identify a shape ofthe product, of a portion of the product, of the item, of a portion ofthe item, or any suitable combination thereof. Accordingly, theidentification module 420 may identify the attribute, the descriptor, orboth, based on the identified shape. The identification of the shape maybe based on a comparison of the shape to one or more reference shapesstored in a database (e.g., item database 315).

In certain example embodiments, the item depicted in the image is aspecimen of a product that has a particular color represented within theimage. The color identification module 515 is configured to identify acolor (e.g., red) within the image. For example, the coloridentification module 515 may identify a color of the product, of aportion of the product, of the item, of a portion of the item, or anysuitable combination thereof. Accordingly, the identification module 420may identify the attribute, the descriptor, or both, based on theidentified color.

In various example embodiments, the item depicted in the image as aspecimen of a product that has a particular pattern represented withinthe image. The pattern identification module 517 is configured toidentify a pattern (e.g., stripes or plaid) within the image. Forexample, the pattern identification module 517 may identify a pattern on(e.g., applied to) the product, on a portion of the product, on theitem, on a portion of the item, or any suitable combination thereof.Accordingly, the identification module 420 may identify the attribute,the descriptor, or both, based on the identified pattern. Theidentification of the pattern may be based on a comparison of thepattern to one or more reference patterns stored in a database (e.g.,item database 315).

In some example embodiments, the item depicted in the image is aspecimen of a product that has text represented within the image. Thetext identification module 519 is configured to identify text (e.g., aletter, a number, a word, a phrase, or punctuation) within the image.For example, a text identification module 519 may identify text on(e.g., applied to) the product, on a portion of the product, on theitem, on a portion of the item, or any suitable combination thereof.Accordingly, the identification module 420 may identify the attribute,the descriptor, or both, based on the identified text. Theidentification of the text may be based on a comparison of the text toone or more reference strings of text stored in a database (e.g., itemdatabase 315).

In certain example embodiments, the image includes prohibitedinformation in the form of prohibited text (e.g., prohibited text 212,214, or 216). The text identification module 519 is configured toidentify prohibited text within the image. For example, the textidentification module 519 may identify prohibited text on the product,on a portion of the product, on the item, on a portion of the item, inthe foreground portion (e.g., foreground portion 120) of the image, inthe background portion (e.g., background portion 130) of the image, orany suitable combination thereof. Accordingly, the identification module420 may identify an attribute that indicates whether prohibited text ispresent in the image. Furthermore, the identification module 420 mayidentify a descriptor that indicates that the image includes prohibitedtext (e.g., a flag value indicating that prohibited text is presentwithin the image). The identification of the prohibited text may bebased on a comparison of the prohibited text to one or more referencestrings of text stored in a database (e.g., item database 315).

In various example embodiments, the image includes prohibitedinformation in the form of a prohibited shape (e.g., design 122). Theshape identification module 513 is configured to identify one or moreprohibited shapes within the image. For example, the shapeidentification module 513 may identify a prohibited shape on theproduct, on a portion of the product, on the item, on a portion of theitem, in the foreground portion (e.g., foreground portion 120) of theimage, in the background portion (e.g., background portion 130 of theimage, or any suitable combination thereof. Accordingly, theidentification module 420 may identify an attribute that indicateswhether a prohibited shape is present in the image. Furthermore, theidentification module 420 may identify a descriptor that indicates thatthe image includes a prohibited shape (e.g., a flag value indicatingthat a prohibited shape is present within the image). The identificationof the prohibited shape may be based on a comparison of the prohibitedshape to one or more reference shapes stored in a database (e.g., itemdatabase 315) as prohibited shapes.

FIG. 6-8 are flowcharts illustrating operations in a method 600 ofidentifying product metadata from an image (e.g., image 110 or image210), according to some example embodiments. Operations in the method600 may be performed by the metadata extraction machine 310, using oneor more modules described above with respect to FIG. 4-5.

As shown in FIG. 6, some example embodiments of the method 600 includeoperations 610, 620, and 630. In operation 610, the access module 410 ofthe metadata extraction machine 310 accesses an image (e.g., image 110or image 210) that depicts an item.

In operation 620, the identification module 420 of the metadataextraction machine 310 identifies an attribute of the item and adescriptor of the item based on an analysis of the image. The analysismay include distinguishing a foreground portion (e.g., foregroundportion 120) of the image from a background portion (e.g., backgroundportion 130) of the image.

In operation 630, the storage module 430 of the metadata extractionmachine 310 stores at least the identified descriptor of the item asmetadata of the item (e.g., in the item database 315). Storage of theidentified descriptor may include storing the identified attribute. Forexample, the storage module 430 may store the identified descriptor ascorresponding to the identified attribute (e.g., as an attribute-valuepair).

As shown in FIG. 7, the method 600 may include operations 710, 720, 721,723, 725, 727, 729, 730, 740, and 750. Operations 710-750 may beperformed by the metadata extraction machine 310, using one or moremodules described above with respect to FIG. 4-5.

In operation 710, the communication module 440 of the metadataextraction machine 310 receives the image (e.g., image 110 or image 210)from the seller device 350. For example, the communication module 440may receive the image as a submission from the seller 352 via the sellerdevice 350 and the network 390. Operation 610 may be performed by theaccess module 410 in response to reception of the image in operation710.

In operation 720, the image analysis module 510 within theidentification module 420 of the metadata extraction machine 310performs the analysis of the image discussed above with respect tooperation 620. Accordingly, the analysis of the image may be performedby the image analysis module 510 as part of operation 620, as executedby the identification module 420. One or more of operations 721-729 maybe included in the analysis performed by the image analysis module 510.

In operation 721, the image segmentation module 511 within the imageanalysis module 510 processes (e.g., segments) the image to identify aforeground portion (e.g., foreground portion 120) of the image and abackground portion (e.g., background portion 130) of the image.Accordingly, the distinguishing of the foreground portion from thebackground portion discussed above with respect to operation 620 may bebased on the identification of the foreground portion and the backgroundportion performed in operation 721.

In operation 723, the shape identification module 513 within the imageanalysis module 510 identifies (e.g., recognizes) a shape representedwithin the image. As noted above, the shape may be of a portion orentirety of a product or item depicted in the image. Accordingly, theidentification of the attribute of the item, the descriptor of the item,or both, discussed above with respect to operation 620 may be performedby the identification module 420 based on the shape identified inoperation 723. In some example embodiments, the shape identificationmodule 513 recognizes a prohibited shape (e.g., design 122) within theimage as being prohibited information within the image.

In operation 725, the color identification module 515 within the imageanalysis module 510 identifies (e.g., recognizes) a color representedwithin the image. As noted above, the color may be of a portion orentirety of a product or item depicted in the image. Accordingly, theidentification of the attribute of the item, the descriptor of the item,or both, discussed above with respect to operation 620 may be performedby the identification module 420 based on the color identified inoperation 725.

In operation 727, the pattern identification module 517 within the imageanalysis module 510 identifies (e.g., recognizes) a pattern representedwithin the image. As noted above, the pattern may be on a portion orentirety of a product or item depicted in the image. Accordingly, theidentification of the attribute of the item, the descriptor of the item,or both, discussed above with respect to operation 620 may be performedby the identification module 420 based on the pattern identified inoperation 727.

In operation 729, the text identification module 519 within the imageanalysis module 510 identifies (e.g., recognizes) text representedwithin the image. As noted above, the text may be on a portion orentirety of a product or item depicted in the image. Accordingly, theidentification of the attribute of the item, the descriptor of the item,or both, discussed above with respect to operation 620 may be performedby the identification module 420 based on the text identified inoperation 729. In some example embodiments, the text identificationmodule 519 recognizes prohibited text (e.g., prohibited text 212, 214,or 216) within the image as being prohibited information within theimage.

According to some example embodiments, operation 730 is included withinoperation 630. In operation 730, the storage module 430 of the metadataextraction machine 310 adds the descriptor identified in operation 620to existing metadata of the item (e.g., stored within the item database315). For example, the identified descriptor may be added by appendingthe identified descriptor to the existing metadata of the item.

According to alternative example embodiments, operation 740 is includedwithin operation 630. In operation 740, the storage module 430 of themetadata extraction machine 310 replaces an existing descriptor with thedescriptor identified in operation 620 within existing metadata of theitem (e.g., stored within the item database 315). For example, theexisting descriptor may be overwritten with the identified descriptor inthe metadata of the item.

In operation 750, the communication module 440 communicates a message tothe seller device 350 (e.g., via the network 390). As noted above, themessage may include a question regarding whether to associate thedescriptor with the item, a suggestion that the descriptor be associatedwith the item, a recommendation that the descriptor be associated withthe item, a notification that the descriptor is associated with theitem, or any suitable combination thereof.

As shown in FIG. 8, the method 600 may include operations 810, 812, 814,820, 821, 823, 825, 827, and 829. Operations 810-829 may be performed bythe metadata extraction machine 310, using one or more modules describedabove with respect to FIG. 4-5.

In operation 810, the communication module 440 of the metadataextraction machine 310 receives a user input from the user device 330.For example, the communication module 440 may receive the user input asa submission from the user 332 via the user device 330 and the network390. The user input is related to the descriptor identified in operation620, to the attribute identified in operation 620, or to both. Forexample, the user input may include the identified descriptor (e.g.,“evening gown” or “red”), the identified attribute (e.g., “style” or“color”), another descriptor that specifies a different value that isvalid for the identified attribute (e.g., “cocktail dress” or “green”),or any suitable combination thereof.

In some example embodiments, operation 810 is followed by operation 812,operation 814, or both. In operation 812, the recommendation module 460of the metadata extraction machine 310 provides a recommendation of theitem to the user device 330. The providing of the recommendation may bebased on the descriptor identified in operation 620, the attributeidentified in operation 620, or both. In operation 814, therecommendation module 446 provides a recommendation of another item(e.g., a further item different from the item depicted in the image) tothe user device 330. Again the providing of the recommendation may bebased on the identified descriptor, the identified attribute, or both.Accordingly, metadata (e.g., the identified descriptor) extracted fromthe image may be utilized in recommending one or more items or productsto the user 332. Operation 814 may be repeated to provide multiplerecommendations of other items (e.g., further items different from theitem depicted in the image) to the user device 330.

According to various example embodiments, operation 620 results in theidentification module 420 of the metadata extraction machine 310identifying the prohibited information within the image (e.g.,prohibited text 212, 214, or 216 within image 210). For example,prohibited information may be identified by the shape identificationmodule 513 in operation 723, by the text identification module 519 inoperation 729, or any suitable combination thereof. In response to theidentified prohibited information, the metadata extraction machine 310may perform operation 820, which involves initiating one or moreresponses to the prohibited information. Example responses are shown inFIG. 8 as operations 821-829.

In operation 821, the communication module 440 of the metadataextraction machine 310 notifies the seller 352 that the image includesprohibited information. For example, the communication module 440 maysend an electronic message addressed to the seller 352. As anotherexample, the communication module 440 may provide a pop-up alert withina web page displayed by the seller device 350).

In operation 823, the communication module 440 of the metadataextraction machine 310 requests that the seller 352 provide anotherimage (e.g., a policy compliant image) that depicts the item without theprohibited information. As examples, such request may be communicated byan electronic message address to the seller 352, by a pop-up alertwithin a web page displayed by the seller device 350, or any suitablecombination thereof.

In operation 825, the storage module 430 of the metadata extractionmachine 310 removes the image from the network-based commerce system305. For example, the storage module 430 may delete the image from adata repository where the image is stored (e.g., item database 315).

In operation 827, the policy module 450 of the metadata extractionmachine 310 may remove a listing of the item from the network-basedcommerce system 305. For example, the item database 315 may store thelisting of the item among multiple listings of multiple items availablefor purchase, and in performing operation 827, the policy module 450 maydelete the listing of the item from the item database 315.

In operation 829, the policy module 450 of the metadata extractionmachine 310 may restrict (e.g., prevent) the seller 352 from using someor all of the network-based commerce system 305. For example, the policymodule 450 may suspend or terminate a user account of the seller 352. Asanother example, the policy module 450 may de-authorize the seller 352from using certain portions of the network-based commerce system 305(e.g., a user interface for uploading images when listing an itemavailable for purchase).

According to various example embodiments, one or more of themethodologies described herein may facilitate extraction of metadataregarding an item or product from an image of the item or product. Inparticular, one or more of the methodologies described herein mayconstitute all or part of a business method (e.g., a business methodimplemented using a machine) that provides users of a network-basedsystem with information (e.g., metadata and recommendations) useful inmaking decisions regarding purchasing an item. Accordingly, one or moreof the methodologies described herein may have the effect of increasingsales of a product or item, educating a user on the product or item, orany suitable combination thereof.

When these effects are considered in aggregate, one or more of themethodologies described herein may obviate a need for certain efforts orresources that otherwise would be involved in matching users (e.g., aspotential purchasers) with products or specimens thereof that are likelyto be of interest. Efforts expended by a user in identifying a productor item for purchase may be reduced by one or more of the methodologiesdescribed herein. Computing resources used by one or more machines,databases, or devices (e.g., within the network environment 300) maysimilarly be reduced. Examples of such computing resources includeprocessor cycles, network traffic, memory usage, data storage capacity,power consumption, and cooling capacity.

FIG. 9 illustrates components of a machine 900, according to someexample embodiments, that is able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform any one or more of the methodologies discussed herein.Specifically, FIG. 9 shows a diagrammatic representation of the machine900 in the example form of a computer system and within whichinstructions 924 (e.g., software) for causing the machine 900 to performany one or more of the methodologies discussed herein may be executed.In alternative embodiments, the machine 900 operates as a standalonedevice or may be connected (e.g., networked) to other machines. In anetworked deployment, the machine 900 may operate in the capacity of aserver machine or a client machine in a server-client networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment. The machine 900 may be a server computer, a clientcomputer, a personal computer (PC), a tablet computer, a laptopcomputer, a netbook, a set-top box (STB), a personal digital assistant(PDA), a cellular telephone, a smartphone, a web appliance, a networkrouter, a network switch, a network bridge, or any machine capable ofexecuting the instructions 924 (sequentially or otherwise) that specifyactions to be taken by that machine. Further, while only a singlemachine is illustrated, the term “machine” shall also be taken toinclude a collection of machines that individually or jointly executethe instructions 924 to perform any one or more of the methodologiesdiscussed herein.

The machine 900 includes a processor 902 (e.g., a central processingunit (CPU), a graphics processing unit (GPU), a digital signal processor(DSP), an application specific integrated circuit (ASIC), aradio-frequency integrated circuit (RFIC), or any suitable combinationthereof), a main memory 904, and a static memory 906, which areconfigured to communicate with each other via a bus 908. The machine 900may further include a graphics display 910 (e.g., a plasma display panel(PDP), a liquid crystal display (LCD), a projector, or a cathode raytube (CRT)). The machine 900 may also include an alphanumeric inputdevice 912 (e.g., a keyboard), a cursor control device 914 (e.g., amouse, a touchpad, a trackball, a joystick, a motion sensor, or otherpointing instrument), a storage unit 916, a signal generation device 918(e.g., a speaker), and a network interface device 920.

The storage unit 916 includes a machine-readable medium 922 on which isstored the instructions 924 (e.g., software) embodying any one or moreof the methodologies or functions described herein. The instructions 924may also reside, completely or at least partially, within the mainmemory 904, within the processor 902 (e.g., within the processor's cachememory), or both, during execution thereof by the machine 900.Accordingly, the main memory 904 and the processor 902 may be consideredas machine-readable media. The instructions 924 may be transmitted orreceived over a network 926 (e.g., network 390) via the networkinterface device 920.

As used herein, the term “memory” refers to a machine-readable mediumable to store data temporarily or permanently and may be taken toinclude, but not be limited to, random-access memory (RAM), read-onlymemory (ROM), buffer memory, flash memory, and cache memory. While themachine-readable medium 922 is shown in an example embodiment to be asingle medium, the term “machine-readable medium” should be taken toinclude a single medium or multiple media (e.g., a centralized ordistributed database, or associated caches and servers) able to storeinstructions (e.g., instructions 924). The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring instructions (e.g., software) for execution by the machine, suchthat the instructions, when executed by one or more processors of themachine (e.g., processor 902), cause the machine to perform any one ormore of the methodologies described herein. The term “machine-readablemedium” shall accordingly be taken to include, but not be limited to, adata repository in the form of a solid-state memory, an optical medium,a magnetic medium, or any suitable combination thereof.

Throughout this specification, plural instances may implementcomponents, operations, or structures described as a single instance.Although individual operations of one or more methods are illustratedand described as separate operations, one or more of the individualoperations may be performed concurrently, and nothing requires that theoperations be performed in the order illustrated. Structures andfunctionality presented as separate components in example configurationsmay be implemented as a combined structure or component. Similarly,structures and functionality presented as a single component may beimplemented as separate components. These and other variations,modifications, additions, and improvements fall within the scope of thesubject matter herein.

Certain embodiments are described herein as including logic or a numberof components, modules, or mechanisms. Modules may constitute eithersoftware modules (e.g., code embodied on a machine-readable medium or ina transmission signal) or hardware modules. A “hardware module” is atangible unit capable of performing certain operations and may beconfigured or arranged in a certain physical manner. In various exampleembodiments, one or more computer systems (e.g., a standalone computersystem, a client computer system, or a server computer system) or one ormore hardware modules of a computer system (e.g., a processor or a groupof processors) may be configured by software (e.g., an application orapplication portion) as a hardware module that operates to performcertain operations as described herein.

In some embodiments, a hardware module may be implemented mechanically,electronically, or any suitable combination thereof. For example, ahardware module may include dedicated circuitry or logic that ispermanently configured to perform certain operations. For example, ahardware module may be a special-purpose processor, such as a fieldprogrammable gate array (FPGA) or an ASIC. A hardware module may alsoinclude programmable logic or circuitry that is temporarily configuredby software to perform certain operations. For example, a hardwaremodule may include software encompassed within a general-purposeprocessor or other programmable processor. It will be appreciated thatthe decision to implement a hardware module mechanically, in dedicatedand permanently configured circuitry, or in temporarily configuredcircuitry (e.g., configured by software) may be driven by cost and timeconsiderations.

Accordingly, the term “hardware module” should be understood toencompass a tangible entity, be that an entity that is physicallyconstructed, permanently configured (e.g., hardwired), or temporarilyconfigured (e.g., programmed) to operate in a certain manner or toperform certain operations described herein. As used herein,“hardware-implemented module” refers to a hardware module. Consideringembodiments in which hardware modules are temporarily configured (e.g.,programmed), each of the hardware modules need not be configured orinstantiated at any one instance in time. For example, where thehardware modules comprise a general-purpose processor configured bysoftware to become a special-purpose processor, the general-purposeprocessor may be configured as respectively different hardware modulesat different times. Software may accordingly configure a processor, forexample, to constitute a particular hardware module at one instance oftime and to constitute a different hardware module at a differentinstance of time.

Hardware modules can provide information to, and receive informationfrom, other hardware modules. Accordingly, the described hardwaremodules may be regarded as being communicatively coupled. Where multiplehardware modules exist contemporaneously, communications may be achievedthrough signal transmission (e.g., over appropriate circuits and buses)between or among two or more of the hardware modules. In embodiments inwhich multiple hardware modules are configured or instantiated atdifferent times, communications between such hardware modules may beachieved, for example, through the storage and retrieval of informationin memory structures to which the multiple hardware modules have access.For example, one hardware module may perform an operation and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware module may then, at a latertime, access the memory device to retrieve and process the storedoutput. Hardware modules may also initiate communications with input oroutput devices, and can operate on a resource (e.g., a collection ofinformation).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions describedherein. As used herein, “processor-implemented module” refers to ahardware module implemented using one or more processors.

Similarly, the methods described herein may be at least partiallyprocessor-implemented, a processor being an example of hardware. Forexample, at least some of the operations of a method may be performed byone or more processors or processor-implemented modules. Moreover, theone or more processors may also operate to support performance of therelevant operations in a “cloud computing” environment or as a “softwareas a service” (SaaS). For example, at least some of the operations maybe performed by a group of computers (as examples of machines includingprocessors), with these operations being accessible via a network (e.g.,the Internet) and via one or more appropriate interfaces an applicationprogram interface (API)).

The performance of certain of the operations may be distributed amongthe one or more processors, not only residing within a single machine,but deployed across a number of machines. In some example embodiments,the one or more processors or processor-implemented modules may belocated in a single geographic location (e.g., within a homeenvironment, an office environment, or a server farm). In other exampleembodiments, the one or more processors or processor-implemented modulesmay be distributed across a number of geographic locations.

Some portions of this specification are presented in terms of algorithmsor symbolic representations of operations on data stored as bits orbinary digital signals within a machine memory (e.g., a computermemory). These algorithms or symbolic representations are examples oftechniques used by those of ordinary skill in the data processing artsto convey the substance of their work to others skilled in the art. Asused herein, an “algorithm” is a self-consistent sequence of operationsor similar processing leading to a desired result. In this context,algorithms and operations involve physical manipulation of physicalquantities. Typically, but not necessarily, such quantities may take theform of electrical, magnetic, or optical signals capable of beingstored, accessed, transferred, combined, compared, or otherwisemanipulated by a machine. It is convenient at times, principally forreasons of common usage, to refer to such signals using words such as“data,” “content,” “bits,” “values,” “elements,” “symbols,”“characters,” “terms,” “numbers,” “numerals,” or the like. These words,however, are merely convenient labels and are to be associated withappropriate physical quantities.

Unless specifically stated otherwise, discussions herein using wordssuch as “processing,” “computing,” “calculating,” “determining,”“presenting,” “displaying,” or the like may refer to actions orprocesses of a machine (e.g., a computer) that manipulates or transformsdata represented as physical (e.g., electronic, magnetic, or optical)quantities within one or more memories (e.g., volatile memory,non-volatile memory, or any suitable combination thereof), registers, orother machine components that receive, store, transmit, or displayinformation. Furthermore, unless specifically stated otherwise, theterms “a” or “an” are herein used, as is common in patent documents, toinclude one or more than one instance. Finally, as used herein, theconjunction “or” refers to a non-exclusive “or,” unless specificallystated otherwise.

What is claimed is:
 1. A system comprising: one or more hardwareprocessors; and a non-transitory machine-readable medium for storinginstructions that, when executed by the one or more hardware processors,cause the one or more hardware processors to perform operationscomprising: receiving, at a network-based system, an image from a clientdevice, the image including prohibited information; accessing, at arecord of a database, a policy associated with one or more images, theone or more images being submitted to the network-based system;identifying the prohibited information within the image based oncomparing content included in the image and reference content identifiedas prohibited in the policy; and initiating a response based on theidentifying of the prohibited information within the image, aninitiation of the response including transmitting a communication to theclient device.
 2. The system of claim 1, wherein the prohibitedinformation includes text, and wherein the comparing of the contentincluded in the image and the reference content identified as prohibitedin the policy includes comparing the text included in the image and oneor more reference strings identified as prohibited in the policy.
 3. Thesystem of claim 2, wherein the text includes at least one of a uniformresource locator, a profane word, a vulgar word, a copyrighted phrase,or a particular brand name.
 4. The system of claim 1, wherein theprohibited information includes a shape, and wherein the comparing ofthe content included in the image and the reference content identifiedas prohibited in the policy includes comparing the shape included in theimage and one or more reference shapes identified as prohibited in thepolicy.
 5. The system of claim 4, wherein the shape includes at leastone of a design, a logo, a trademark, or a symbol.
 6. The system ofclaim 1, wherein the communication includes a notification that theimage includes prohibited information, and a request to provide apolicy-compliant image.
 7. The system of claim 1, wherein the initiatingof the response includes: determining that the image including theprohibited information is stored in a further record of a database; andremoving the image from the further record of the database.
 8. Thesystem of claim 1, wherein the initiating of the response includes:determining that the image including the prohibited information isincluded in an online publication; and removing the image from theonline publication.
 9. The system of claim 1, wherein the initiating ofthe response includes: restricting one or more network communicationsfrom the client device.
 10. The system of claim 1, wherein theinitiating of the response includes at least one of suspending orterminating an account associated with the client device at a furtherrecord of a database.
 11. A method comprising: receiving, at anetwork-based system, an image from a client device, the image includingprohibited information; accessing, at a record of a database, a policyassociated with one or more images, the one or more images beingsubmitted to the network-based system; identifying, using one or morehardware processors, the prohibited information within the image basedon comparing content included in the image and reference contentidentified as prohibited in the policy; and initiating a response basedon the identifying of the prohibited information within the image, aninitiation of the response including transmitting a communication to theclient device.
 12. The method of claim 11, wherein the prohibitedinformation includes text, and wherein the comparing, of the contentincluded in the image and the reference content identified as prohibitedin the policy includes comparing the text included in the image and oneor more reference strings identified as prohibited in the policy. 13.The method of claim 12, wherein the text includes at least one of auniform resource locator, a profane word, a vulgar word, a copyrightedphrase, or a particular brand name.
 14. The method of claim 11, whereinthe prohibited information includes a shape, and wherein the comparingof the content included in the image and the reference contentidentified as prohibited in the policy includes comparing the shapeincluded in the image and one or more reference shapes identified asprohibited in the policy.
 15. The method of claim 14, wherein the shapeincludes at least one of a design, a logo, a trademark, or a symbol. 16.The method of claim 11, wherein the communication includes anotification that the image includes prohibited information, and arequest to provide a policy-compliant image.
 17. The method of claim 11,wherein the initiating of the response includes: determining that theimage including the prohibited information is stored in a further recordof a database; and removing the image from the further record of thedatabase.
 18. The method of claim 11, wherein the initiating of theresponse includes: determining that the image including the prohibitedinformation is included in an online publication; and removing the imagefrom the online publication.
 19. The method of claim 11, wherein theinitiating of the response includes: restricting one or more networkcommunications from the client device.
 20. A non-transitorymachine-readable storage medium comprising computer instructions that,when executed by one or more hardware processors of a system, cause theone or more hardware processors to perform operations comprising:receiving, at a network-based system, an image from a client device, theimage including prohibited information; accessing, at a record of adatabase, a policy associated with one or more images, the one or moreimages being submitted to the network-based system; identifying theprohibited information within the image based on comparing contentincluded in the image and reference content identified as prohibited inthe policy; and initiating a response based on the identifying of theprohibited information within the image, an initiation of the responseincluding transmitting a communication to the client device.