$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Counterfeit proof ID card having a scrambled facial image 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0350220 (1989-05-11)
발명자 / 주소
  • Nathans Robert L. (36 Stag Dr. Billerica MA 01821)
인용정보 피인용 횟수 : 220  인용 특허 : 3

초록

A scrambled facial image of an ID card bearer is recorded upon a card and is descrambled only by using the proper descrambling control code assigned to the proper bearer upon verification of the authenticity of the bearer. The pixel scrambling method prevents card duplication, as a reproduced card w

대표청구항

Method of issuing and utilizing an ID card comprising the steps of: (a) producing facial image pixel data within a first data processor having sufficient information capable of reproducing at least a portion of the facial image of an ID card bearer; (b) employing said first data processor to scrambl

이 특허에 인용된 특허 (3)

  1. Wright Christopher B. (San Francisco CA) Bristow Stephen (Los Altos Hills CA), Automated transaction system with modular printhead having print authentication feature.
  2. Becker Wolfgang (Neubiberg DEX) Hierweger Alexander (Rottach-Egern DEX) Merkle Hansjrgen (Munich DEX) Lob Erwin (Munich DEX) Lass Joseph (Munich DEX) Kaule Wittich (Emmering DEX), Data carrier having an optical authenticity feature and methods for producing and testing said data carrier.
  3. Rothfjell Rolf E. (Kalix SEX), Method of securing simple codes.

이 특허를 인용한 특허 (220)

  1. Tumey,David M.; Xu,Tianning, Animated toy utilizing artificial intelligence and facial image recognition.
  2. Lahiri,Sandip, Apparatus and method for computer screen security.
  3. Palmer,Glennard D.; Doughty,Ralph O.; Antaki,Patrick R., Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation.
  4. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  5. Berson William ; O'Hare Michael D. ; Zemlok Kenneth C., Apparatus for verifying an identification card.
  6. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  7. Rhoads Geoffrey B., Audio steganography.
  8. Rhoads, Geoffrey B., Audio steganography.
  9. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  10. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  11. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  12. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  13. Wootton John R. ; Waldman Gary S. ; Hobson Gregory L., Authentication algorithms for video images.
  14. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  15. Rhoads,Geoffrey B., Authentication of identification documents.
  16. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  17. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  18. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  19. Wen, Xin, Authorizing the production of visual images from digital images.
  20. Borza Michael Andrew,CAX, Biometric input with encryption.
  21. Bolle,Rudolf Maarten; Connell,Jonathan H.; Ratha,Nalini K.; Percello,Louis J., Business system and method using a distorted biometrics.
  22. Blank Eric, Card with identifying feature and removable element.
  23. Blank Eric, Card with removable, reusable element.
  24. Eric Blank, Card with removable, reusable element.
  25. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  26. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  27. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  28. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  29. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  30. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  31. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  32. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  33. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  34. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  35. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  36. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  37. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  38. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  39. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Digital anti-counterfeiting software method and apparatus.
  40. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Digital anti-counterfeiting software method and apparatus.
  41. Rhoads, Geoffrey B., Digital authentication with analog documents.
  42. Rhoads, Geoffrey B., Digital authentication with analog documents.
  43. Rhoads,Geoffrey B., Digital authentication with analog documents.
  44. Rhoads, Geoffrey B., Digital watermark decoding method.
  45. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  46. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  47. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  48. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  49. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  50. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  51. Andelin, Victor L.; Levy, Kenneth L., Digitally watermarking documents associated with vehicles.
  52. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  53. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  54. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  55. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  56. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  57. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  58. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  59. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  60. Rhoads, Geoffrey B., Encoding and decoding media signals.
  61. Kazuomi Oishi JP, Encrypting method, deciphering method and certifying method.
  62. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  63. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  64. Tumey,David M.; Xu,Tianning; Arndt,Craig M., Facial image verification utilizing smart-card with integrated video camera.
  65. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  66. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  67. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  68. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  69. Calvesio, Raymond V.; Olson, John A., High security identification system for entry to multiple zones.
  70. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  71. Marckini Eugene F., Identification card with delimited usage.
  72. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  73. Jones, Robert L., Identification document with three dimensional image of bearer.
  74. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  75. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  76. Klug Philip D., Identification methods.
  77. Bello Ralph R., Identification system and method.
  78. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  79. Robert Willem Van Der Valk BE, Identity card, information carrier and housing designed for its application.
  80. Van Der Valk, Robert Willem, Identity card, information carrier and housing designed for its application.
  81. Van Der Valk, Robert Willem, Identity card, information carrier and housing designed for its application.
  82. Powell, Robert D.; Nitzberg, Mark J., Image capture and marking.
  83. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  84. Masahiro Funada JP; Kenichi Ohta JP; Yutaka Udagawa JP; Yoichi Takaragi JP; Mitsuru Kurita JP; Eiji Ohta JP; Koichi Ishimoto JP, Image processing apparatus and method.
  85. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  86. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  87. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  88. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  89. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  90. Felsher, David Paul, Information record infrastructure, system and method.
  91. Klinefelter, Gary M.; Phillips, Kathleen; Pribula, Martin A.; Upin, Jeffrey D.; Lenz, Gary A., Ink jet card printer.
  92. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  93. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  94. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  95. Harris,Scott C., Intelligent credit card system.
  96. Rhoads,Geoffrey B., Internet linking from image content.
  97. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  98. Hawes, Jonathan L., Linking documents through digital watermarking.
  99. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  100. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  101. Katz Joseph ; Swartz Jerome ; McGlynn Daniel R., Machine readable record carrier with hologram.
  102. Terrell James R., Magnetic stripe reader with signature scanner.
  103. Ray, Lawrence A.; Ellson, Richard N., Method and apparatus for credit card verification.
  104. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  105. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  106. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  107. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  108. Jacobs,David A., Method and apparatus for providing multiple transaction cards in assembly.
  109. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  110. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  111. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  112. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  113. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  114. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  115. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  116. Cvetkovic, Slobodan; Alasia, Thomas C.; Alasia, Alfred J., Method for constructing a composite image incorporating a hidden authentication image.
  117. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  118. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  119. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  120. Ray,Lawrence A.; Joshi,Rajan L.; Pios,Gene E., Method for securely transacting a transaction based on a transaction document.
  121. Michael G. Bantum, Method for transparent marking of digital images for storage, retrieval and processing within a computer database.
  122. Chabanne, Hervé; Rieul, François; Didier, Bernard, Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method.
  123. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  124. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  125. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  126. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  127. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  128. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  129. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  130. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  131. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  132. Rhoads, Geoffrey B., Methods for encoding security documents.
  133. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  134. Rhoads, Geoffrey B., Methods for marking images.
  135. Rhoads,Geoffrey B., Methods for marking images.
  136. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  137. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  138. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  139. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  140. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  141. Sandford ; II Maxwell T. ; Handel Theodore G. ; Ettinger J. Mark, Modular error embedding.
  142. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  143. Wolfond, Gregory Howard; Shapiro, Jaime; Mansz, Robert Paul, Multi-mode credential authentication.
  144. Hoffberg, Steven M., Multifactorial optimization system and method.
  145. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  146. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  147. Haala, Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  148. Haala,Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  149. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  150. Rhoads,Geoffrey B., Network linking using index modulated on data.
  151. Cok,Ronald S.; Bryant,Robert C., Non-image pixel data stored on hard-copy image media.
  152. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Object authentication using embossed hidden images.
  153. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  154. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  155. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  156. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  157. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  158. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  159. Patel, Mehul; Swartz, Jerome, Portable multipurpose recording terminal and portable network server.
  160. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  161. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  162. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  163. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  164. Robert J. Holt ; David J. Haas, Reflective badge security identification system.
  165. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  166. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  167. Schwab Barry H., Secure identification system.
  168. Chow Sherman M.,CAX ; Serinken Nur M.,CAX ; Shlien Seymour,CAX, Secure personal identification instrument and method for creating same.
  169. Field, Gary, Security code verification for identification cards.
  170. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  171. Cobben, Johannes I. M.; Elenbaas, Abraham, Security feature comprising a perforation pattern.
  172. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  173. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Self-authenticating documents with printed or embossed hidden images.
  174. Bradley, Brett A., Self-orienting watermarks.
  175. Bradley,Brett A., Self-orienting watermarks.
  176. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  177. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  178. Novis Scott R. ; Carns William E. ; Jachimowicz Karen E., Smart card device with pager and visual image display.
  179. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  180. Rhoads Geoffrey B., Steganographic methods and media for photography.
  181. Rhoads Geoffrey B., Steganographic system.
  182. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  183. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  184. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  185. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  186. Roelse,Petrus Lambertus Adrianus, Substitution-box for symmetric-key ciphers.
  187. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  188. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  189. Hoffberg, Steven M., System and method for determining contingent relevance.
  190. Alasia,Alfred, System and method for digital image encoding.
  191. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  192. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  193. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  194. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  195. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  196. Bogosian ; Jr. Charles A., System for verifying use of credit/identification card including recording physical attributes of unauthorized users.
  197. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  198. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  199. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  200. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  201. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  202. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  203. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  204. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  205. Blank, Eric, Transaction card with attached auxiliary member.
  206. Blank,Eric; Jacobs,David A.; Mandile,Joseph T., Transaction card with attached auxiliary portion.
  207. Blank,Eric, Transaction card with shaped edge.
  208. Priddy Dennis G., Unalterable self-verifying articles.
  209. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  210. Rhoads Geoffrey B., Video steganography.
  211. Rhoads,Geoffrey B., Video steganography.
  212. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  213. Rhoads, Geoffrey B., Watermark embedder and reader.
  214. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  215. Geoffrey B. Rhoads, Watermark enabled video objects.
  216. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  217. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  218. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  219. Rhoads, Geoffrey B., Watermarking methods and media.
  220. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로