Supercharge Your Innovation With Domain-Expert AI Agents!

Methods, systems, and media for detecting two-dimensional videos placed on sphere in abusive spherical video content

A video content, spherical technology, applied in the direction of program/content distribution protection, graphic image conversion, character and pattern recognition, etc.

Pending Publication Date: 2020-10-23
GOOGLE LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it may be difficult to determine the circumstances in which copyrighted video content is superimposed on, inserted into, or stitched together with spherical video content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, systems, and media for detecting two-dimensional videos placed on sphere in abusive spherical video content
  • Methods, systems, and media for detecting two-dimensional videos placed on sphere in abusive spherical video content
  • Methods, systems, and media for detecting two-dimensional videos placed on sphere in abusive spherical video content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] According to various embodiments, mechanisms (which may include methods, systems, and media) for detecting misuse of two-dimensional video placed on a sphere in spherical video content by tiling the sphere are provided.

[0042] In some embodiments, the mechanisms described herein may be used to detect certain types of video content superimposed on and / or stitched together with spherical video content. For example, in some embodiments, the mechanism may be used to detect potentially copyrighted video content or potentially copyrighted audio content that has been superimposed on or inserted into spherical video content. It should be noted that various fingerprinting techniques have been used to identify copyrighted content, for example by matching a portion of a content item with a reference content item in a database of reference content items. However, these fingerprinting techniques sometimes fail to identify copyrighted video content that has been inserted into spher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, and media for analyzing spherical video content are provided. More particularly, methods, systems, and media for detecting two-dimensional videos placed on a sphere in abusive spherical video content are provided. In some embodiments, the method comprises: receiving an identifier of a spherical video content item, wherein the spherical video content item has a plurality of views;selecting a first frame of the spherical video content item; projecting the first frame of the spherical video content item to a two-dimensional region using a projection defined by a mapping according to which neighboring points of the first frame are mapped to respective neighboring points of the region, and one or more contiguous portions of the frame are each mapped to a corresponding plurality of contiguous portions of the region; identifying an area within the region which meets a criterion indicative of the region having a likelihood above a threshold of including a particular type ofcontent; in response to identifying the area within the region which meets the criterion, analyzing the identified area of the region using a video fingerprinting technique; and, in response to determining that content associated with the identified area of the region matches a reference content item of a plurality of reference content items using the video fingerprinting technique, generating anindication of the match in association with the identifier of the spherical video content item.

Description

technical field [0001] The disclosed subject matter relates to methods, systems, and media for analyzing spherical video content and, in some embodiments, detecting misuse of two-dimensional video placed on a sphere in spherical video content by tiling the sphere . More specifically, the disclosed subject matter relates to identifying a match between content in spherical video content and one of a plurality of reference content items. Background technique [0002] People often view video content via different video service providers, for example, by streaming the content from the service providers. In many cases, the video content is compared to a database of reference video files to determine whether the video content matches one of the reference video files. This is useful, for example, in determining whether video content includes content that is already copyrighted by another content creator or entity. [0003] Immersive or 360-degree spherical video content has becom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V20/48G06V20/46G06F21/16G06T3/06
Inventor 菲利普·帕维蒂克
Owner GOOGLE LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More