$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Binary image processing for decoding self-clocking glyph shape codes

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-007/10
  • G06K-019/06
출원번호 US-0560659 (1990-07-31)
발명자 / 주소
  • Bloomberg Dan S. (Palo Alto CA)
출원인 / 주소
  • Xerox Corporation (Stamford CT 02)
인용정보 피인용 횟수 : 233  인용 특허 : 0

초록

Binary image processing techniques are provided for decoding bitmap image space representations of self-clocking glyph shape codes of various types (e.g., codes presented as original or degraded images, with one or a plurality of bits encoded in each glyph, while preserving the discriminability of g

대표청구항

A process for decoding a bitmap image space representation of a self-clocking glyph shape code composed of glyphs having shapes that encode digital data values, such that every distinct data value that is encoded by said code is represented by the shape of a respective glyph; said glyphs being selec

이 특허를 인용한 특허 (233)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Adding information or functionality to a rendered document via association with an electronic counterpart.
  3. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Adding value to a rendered document.
  4. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Aggregate analysis of text captures performed by multiple users from rendered documents.
  5. Jackson Warren B. ; Biegelsen David K. ; Jared David A. ; Stearns Richard G., Analog glyph detector and detector arrays.
  6. Holloway Christopher J.,GBX ; Matyas ; Jr. Stephen Michael, Apparatus and method for authentication of printed documents.
  7. Mori,Toshihiro, Apparatus and method for detecting a pattern.
  8. Mori,Toshihiro, Apparatus and method for detecting a pattern.
  9. Cohen Nathan ; van de Wetering Edwin,NLX, Apparatus and method for rapidly convergent parallel processed deconvolution.
  10. Ericson,Petter, Apparatus and methods relating to image coding.
  11. Ericson,Petter, Apparatus and methods relating to image coding.
  12. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Applying scanned information to identify content.
  13. King, Martin; Grover, Dale; Kushler, Clifford; Stafford-Fraser, James; Mannby, Claes-Fredrik, Archive of text captures from rendered documents.
  14. King, Martin; Grover, Dale; Kushler, Clifford; Stafford-Fraser, James; Mannby, Claes-Fredrik, Archive of text captures from rendered documents.
  15. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  16. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  17. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  18. Rhoads Geoffrey B., Audio steganography.
  19. Rhoads, Geoffrey B., Audio steganography.
  20. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  21. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  22. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  23. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  24. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  25. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  26. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  27. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  28. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  29. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Automatically capturing information, such as capturing information using a document-aware device.
  30. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J.; Daley-Watson, Christopher J., Automatically providing content associated with captured information, such as information captured in real-time.
  31. Davies Daniel ; Bloomberg Dan S. ; Weltman Robert E., Broad bandwidth image domain communication channel with symbol interference suppression.
  32. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplement information.
  33. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplemental information.
  34. Lopresti Daniel P. ; Esakov Jeffrey ; Zhou Jiangying, Clock free two-dimensional barcode and method for printing and reading the same.
  35. Ericson, Petter; Bryborn, Mattias, Coding and decoding methods and apparatuses.
  36. Pettersson,Mats Petter; Ericson,Petter, Coding pattern.
  37. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  38. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  39. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Contextual dynamic advertising based upon captured rendered text.
  40. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Data capture from rendered documents using handheld device.
  41. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Data capture from rendered documents using handheld device.
  42. Maybaum, William H.; Stewart, Robert L.; Conant, George E., Data encoding and decoding.
  43. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  44. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  45. Rhoads, Geoffrey B., Decoding steganographic messages embedded in media signals.
  46. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  47. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Determining actions involving captured information and electronic content associated with rendered documents.
  48. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  49. Daniel D. Thaxton ; William H. Mowry, Jr., Device for authenticating a security document.
  50. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  51. Rhoads, Geoffrey B., Digital watermark decoding method.
  52. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  53. Hecht David L. ; Petrie Glen W., Distributed dimensional labeling for dimensional characterization of embedded data blocks.
  54. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Document enhancement system and method.
  55. Davis Michael, Efficient methods of performing morphological operations.
  56. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  57. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  58. Crookham, David M.; Skogg, Nicole S., Encoding and decoding data in an image.
  59. Crookham, David M.; Skogg, Nicole, Encoding and decoding data in an image for social networking communication.
  60. Skogg, Nicole S.; Crookham, David M., Encoding and decoding data into an image using identifiable marks and encoded elements.
  61. Rhoads, Geoffrey B., Encoding and decoding media signals.
  62. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Establishing an interactive environment for rendered documents.
  63. David L. Hecht, Exclusive or cross-coupled framing codes for self-clocking glyphs.
  64. Hecht David L. ; Jared David A. ; Flores L. Noah ; Stearns Richard G. ; Chang Kenneth H. P., Glyph address carpet methods and apparatus for providing location information in a multidimensional address space.
  65. Rao, John; Bernstein, Jeffrey, Glyph encryption system and related methods.
  66. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device.
  67. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  68. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  69. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  70. Crookham, David M.; Jass, Nicole, Identification and purchasing platform.
  71. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Identifying a document by performing spectral analysis on the contents of the document.
  72. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  73. King, Martin T.; Mannby, Claes-Fredrik; Smith, Michael J., Image search using text-based elements within the contents of images.
  74. Jennings Carol A. (Etobicoke CAX) Breton Marcel P. (Mississauga CAX) Isabella MaryAnna (Mississauga CAX) Johnson Eric G. (Plant City FL) Martin Trevor I. (Burlington CAX) Oliver John F. (Calgary CAX), Ink compositions with liposomes containing photochromic compounds.
  75. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  76. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  77. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  78. Wellner Pierre D.,GBX ; Flynn Michael J.,GBX ; Carter Kathleen A.,GBX ; Newman William M.,GBX, Interactive desktop display system for automatically adjusting pan and zoom functions in response to user adjustment of a feedback image.
  79. Wood, Michael C.; Jedrzejek, Tracey Hope; Freeman, Richard Glenn; Flowers, Mark; Shuler, Eric Thomas; Grunert, Margaret E.; Avery, Jason, Interactive references to related application.
  80. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  81. Iftime, Gabriel; Moffat, Karen A.; Wosnick, Jordan H.; Rotberg, Eric; Vong, Cuong; Veregin, Richard P. N.; Kazmaier, Peter M., Low melt color toners with fluorescence agents.
  82. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Mahabadi, Hadi K.; Norsten, Tyler B., Machine-readable code format.
  83. Iftime,Gariel; Kazmaier,Peter M.; Smith,Paul F.; Wagner,Christopher A.; Odell,Peter G.; Belelie,Jennifer L.; Chopra,Naveen, Machine-readable code format.
  84. Rodriguez, Tony F., Machine-readable features for objects.
  85. Crookham, David M.; Skogg, Nicole, Marketing campaign platform.
  86. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA, Marking particles.
  87. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA; James Wojtyk CA; Erwin Buncel CA, Marking particles.
  88. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA; James Wojtyk CA; Erwin Buncel CA, Marking particles.
  89. Foucher, Daniel A.; Patel, Raj D.; Chopra, Naveen; Kazmaier, Peter M., Marking particles.
  90. Chen,Liyong; Dang,Yingnong; Ma,Xiaoxu; Wang,Jian; Wang,Qiang, Maze pattern analysis.
  91. Nolan, Joseph C.; Filippini, Robert, Method and apparatus for creating a high-fidelity glyph prototype from low-resolution glyph images.
  92. Daly Scott J., Method and apparatus for hiding one image or pattern within another.
  93. Clarke Michael A. N.,GB2 ; Booth Christopher R.,GB2, Method and apparatus for identifying the orientation of a dot matrix code marking of an article.
  94. Ta,Thanh; Lao,Guillermo; Wang,Xin; Raley,Michael C.; Gilliam,Charles P.; Ham,Manuel; Tadayon,Bijan, Method and apparatus for processing usage rights expressions.
  95. Marggraff, James, Method and device for audibly instructing a user to interact with a function.
  96. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  97. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  98. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  99. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Method and system for character recognition.
  100. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  101. Marggraff, James; Chisholm, Alexander; Edgecomb, Tracy L., Method and system for implementing a user interface for a device employing written graphical elements.
  102. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  103. Martin Trevor I.,CAX ; Oliver John F.,CAX, Method for embedding and recovering machine-readable information.
  104. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  105. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Odell, Peter G.; Belelie, Jennifer L.; Chopra, Naveen, Method for embedding machine-readable information with fluorescent materials.
  106. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  107. Ma Yue ; Kanai Junichi, Method for locating and reading a two-dimensional barcode.
  108. Ma, Yue, Method for locating and reading a two-dimensional barcode.
  109. Ragnet, Francois; Moore, John A.; Saubat, Nicolas Raphaël; Cheminot, Eric H.; Lehoux, Thierry, Method for one-step document categorization and separation using stamped machine recognizable patterns.
  110. Yue Ma ; Junichi Kanai, Method for reading a two-dimensional barcode.
  111. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  112. Bronstein, Serge, Method of identifying redundant text in an electronic document.
  113. Flores L. Noah ; Karlsson Sven E. ; Hecht David L., Methods and apparatus for camera pen.
  114. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  115. Jared David A. ; Flores L. Noah ; Hecht David L. ; Stearns Richard G. ; Chang Kenneth H. P., Methods and apparatus for robust decoding of glyph address carpets.
  116. Campbell, Richard John, Methods and systems for identifying digital image characteristics.
  117. Campbell, Richard John; Speigle, Jon M., Methods and systems for identifying digital image characteristics.
  118. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Methods and systems for initiating application processes by data capture from rendered documents.
  119. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  120. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  121. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  122. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  123. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  124. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  125. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  126. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  127. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  128. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  129. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  130. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  131. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  132. Chopra,Naveen; Foucher,Daniel A.; Patel,Raj D., Multicolored photochromic display.
  133. King, Martin T.; Mannby, Claes-Fredrik; Arends, Thomas C.; Bajorins, David P.; Fox, Daniel C., Optical scanners, such as hand-held optical scanners.
  134. Petrie Glen W. ; Hecht David L., Parallel propagating embedded binary sequences for characterizing objects in N-dimensional address space.
  135. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  136. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  137. Bloomberg Dan S., Performing document image management tasks using an iconic image having embedded encoded information.
  138. Martin Trevor I.,CAX ; Jennings Carol A.,CAX ; Johnson Eric G. ; Oliver John F.,CAX, Photochromic electrostatic toner compositions.
  139. Oliver John F. (Calgary CAX) Martin Trevor I. (Burlington CAX) Jennings Carol A. (Etobicoke CAX) Johnson Eric G. (Plant City FL) Drappel Stephan V. (Toronto CAX), Photochromic hot melt ink compositions.
  140. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Portable scanning device.
  141. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Processing techniques for text capture from a rendered document.
  142. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Processing techniques for text capture from a rendered document.
  143. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Q.; Grover, Dale L., Processing techniques for visual capture data from a rendered document.
  144. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  145. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  146. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  147. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Publishing techniques for adding value to a rendered document.
  148. Hecht,David L.; Lennon,John; Merkle,Ralph, Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics.
  149. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  150. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  151. Cahill,Bill, Scan activated optical storage article and methods thereof.
  152. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  153. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  154. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Secure data gathering from rendered documents.
  155. Mowry, Jr., William H.; Hileman, Martin H.; Haller, Robert T., Secure document with self-authenticating, encryptable font.
  156. Mowry ; Jr. William H., Security document containing encoded data block.
  157. Hecht David L. ; Stearns Richard G. ; Flores L. Noah, Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values.
  158. Bloomberg, Dan S.; Hecht, David L.; Tow, Robert F.; Flores, L. Prasadam, Self-clocking glyph shape codes.
  159. Bradley, Brett A., Self-orienting watermarks.
  160. Bradley,Brett A., Self-orienting watermarks.
  161. Cummings, Eric B.; Even, Jr., William R., Self-registering spread-spectrum barcode method.
  162. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  163. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  164. Kazmaier, Peter M.; Iftime, Gabriel; Wagner, Christopher A.; Wang, Shen-ge; Eschbach, Reiner, Solid phase change fluorescent ink and ink sets.
  165. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  166. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  167. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  168. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  169. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  170. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  171. Hecht,David L.; Petrie,Glen W.; Kaplan,Ronald M.; Luckman,Colin, System and method for distributing multilingual documents.
  172. Goldberg, David; Rucklidge, William J.; Thornton, James D., System and method for generating a signed hardcopy document and authentication thereof.
  173. King, Martin Towle; Stafford-Fraser, James Quentin; Kushler, Clifford A.; Grover, Dale L., System and method for information gathering utilizing form identifiers.
  174. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  175. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  176. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  177. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Odell, Peter G.; Belelie, Jennifer L.; Chopra, Naveen, System for embedding machine-readable information with fluorescent materials.
  178. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  179. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  180. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  182. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  183. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  184. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  185. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  188. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  190. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  197. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  198. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  199. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  200. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  201. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  202. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  203. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  204. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  205. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  206. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  207. Long, Greg; Harden, Taya; Spiegelman, Michael, Techniques for interactively coupling electronic content with printed media.
  208. Hecht David L. ; Petrie Glen W., Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture.
  209. Kazmaier, Peter M.; Iftime, Gabriel; Vanbesien, Daryl W.; Zwartz, Edward G.; Wang, Shen-ge; Eschbach, Reiner, Toners with fluorescence agent and toner sets including the toners.
  210. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  211. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  212. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  213. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  214. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  215. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  216. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  217. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  218. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  219. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  220. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  221. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  222. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  223. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  224. Stearns, Richard G.; Petrie, W. Glen; Flores, L. Noah; Hecht, David L.; Jared, David A., Use of correlation histograms for improved glyph decoding.
  225. King, Martin T.; Mannby, Claes-Fredrik; Valenti, William, Using gestalt information to identify locations in printed information.
  226. Antognini Thomas Charles ; Antognini Walter Gerald, Variable formatting of digital data into a pattern.
  227. Antognini Thomas Charles ; Antognini Walter Gerard, Variable formatting of digital data into a pattern.
  228. Antognini, Thomas Charles; Antognini, Walter Gerard, Variable formatting of digital data into a pattern.
  229. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  230. Rhoads,Geoffrey B., Video steganography.
  231. Rhoads, Geoffrey B., Watermark embedder and reader.
  232. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  233. Rhoads, Geoffrey B., Watermarking methods and media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트