$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for the processing of encoded data in conjunction with an audio broadcast 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0011209 (1993-01-29)
발명자 / 주소
  • Greenberg Burton L. (New York NY)
출원인 / 주소
  • Radio Audit Systems, Inc. (Peekskill NY 02)
인용정보 피인용 횟수 : 402  인용 특허 : 0

초록

A method and apparatus for the identification and verification of audio transmission segments, such as may be broadcast by a radio station, consists of the generation of a data stream corresponding in duration to the length of the program segment and including both cumulative time data and segment i

대표청구항

An apparatus for adding identifying indicia to an audio signal segment and subsequently recovering said indicia, comprising: means for combining an inaudible data string having a series of program segment timing marks and at least one presentation of program segment identification data with said aud

이 특허를 인용한 특허 (402)

  1. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  2. Poulsen Steven P., Apparatus and method for concealing data bursts in an analog scrambler using audio repetition.
  3. Petrovic Rade ; Jemili Kanaan ; Winograd Joseph M. ; Metois Eric, Apparatus and method for embedding and extracting information in analog signals using distributed signal features.
  4. Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
  5. Petrovic Rade ; Winograd Joseph M. ; Jemili Kanaan ; Metois Eric, Apparatus and method for encoding and decoding information in analog signals.
  6. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  7. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  8. Kim, Hongseok, Apparatus and method for inserting and detecting watermark based on stochastic model.
  9. Seok,Jong Won; Hong,Jin Woo; Lee,Jin Heung, Apparatus and method for watermark embedding and detection using linear prediction analysis.
  10. Jensen,James M.; Lynch,Wendell D.; Perelshteyn,Michael M.; Graybill,Robert B.; Hassan,Sayed; Sabin,Wayne, Apparatus and methods for including codes in audio signals.
  11. Jensen James M. ; Lynch Wendell D. ; Perelshteyn Michael M. ; Graybill Robert B. ; Hassan Sayed ; Sabin Wayne, Apparatus and methods for including codes in audio signals and decoding.
  12. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  13. Lu, Daozheng; Kempter, Paul C.; Feininger, William A., Audience measurement systems and methods for digital television.
  14. Rhoads, Geoffrey B., Audio and video signal processing.
  15. Rhoads, Geoffrey B., Audio appliance and monitoring device responsive to watermark data.
  16. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  17. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  18. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  19. Rhoads Geoffrey B., Audio or video steganography.
  20. Srinivasan, Venugopal; Deng, Keqiang; Lu, Daozheng, Audio signature extraction and correlation.
  21. Srinivasan, Venugopal; Deng, Keqiang; Lu, Daozheng, Audio signature extraction and correlation.
  22. Rhoads Geoffrey B., Audio steganography.
  23. Rhoads, Geoffrey B., Audio steganography.
  24. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  25. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  26. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  27. Davis,Bruce L.; Rhoads,Geoffrey B.; Conwell,William Y., Authenticating metadata and embedding metadata in watermarks of media signals.
  28. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  29. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  30. Rhoads,Geoffrey B., Authentication of identification documents.
  31. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  32. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  33. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  34. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  35. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  36. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  37. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  38. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  39. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  40. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  41. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  42. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  43. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  44. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  45. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  46. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  47. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  48. Lam S. Katherine ; Lee Chong U., Cross-term compensation power adjustment of embedded auxiliary data in a primary data signal.
  49. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  50. Numao, Masayuki; Shimizu, Shuichi; Morimoto, Norishige; Kobayashi, Mei, Data hiding and extraction methods.
  51. Rhoads,Geoffrey B., Data hiding method and system for embedding and extracting information in signals.
  52. Moskowitz, Scott A., Data protection method and device.
  53. Moskowitz, Scott A., Data protection method and device.
  54. Moskowitz, Scott A., Data protection method and device.
  55. Moskowitz, Scott A., Data protection method and device.
  56. Nonomura,Tomoyuki; Inoue,Mitsuhiro; Minami,Masataka; Kozuka,Masayuki, Data recording and reproduction apparatus.
  57. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  58. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  59. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  60. Rhoads, Geoffrey B., Detecting hidden auxiliary code signals in media.
  61. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  62. Srinivasan,Venugopal, Detection of entropy in connection with audio signals.
  63. Srinivasan,Venugopal, Detection of signal modifications in audio streams with embedded code.
  64. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  65. Rhoads, Geoffrey B., Digital authentication with analog documents.
  66. Rhoads, Geoffrey B., Digital authentication with analog documents.
  67. Rhoads,Geoffrey B., Digital authentication with analog documents.
  68. Ramaswamy, Arun; Srinivasan, Venugopal, Digital data insertion apparatus and methods for use with compressed audio/video data.
  69. Ramaswamy, Arun; Srinivasan, Venugopal, Digital data insertion apparatus and methods for use with compressed audio/video data.
  70. Rhoads, Geoffrey B., Digital media methods.
  71. Rhoads, Geoffrey B., Digital watermark decoding method.
  72. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  73. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  74. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  75. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Digital watermarking methods and apparatus for use with audio and video content.
  76. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  77. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  78. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Digital watermarking to resolve multiple claims of ownership.
  79. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  80. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  81. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  82. Bodin,William Kress; Thorson,Derral Charles, Dynamic media interleaving.
  83. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  84. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  85. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  86. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  87. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  88. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  89. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  90. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  91. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  92. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  93. Rhoads, Geoffrey B., Encoding and decoding media signals.
  94. Neuhauser, Alan R.; Lynch, Wendell D.; Jensen, James M., Encoding and decoding of information in audio signals.
  95. Jensen, James M.; Neuhauser, Alan R., Encoding multiple messages in audio data and detecting same.
  96. Zhao, Jian, Enhanced content distribution using advertisements.
  97. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  98. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  99. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  100. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  101. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  102. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  103. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  104. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  105. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  106. Winograd, Joseph M., Forensic marking using a common customization function.
  107. Winograd, Joseph M., Forensic marking using a common customization function.
  108. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  109. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  110. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  111. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  112. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  113. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  114. Jones, Robert L., Identification document with three dimensional image of bearer.
  115. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  116. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  117. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  118. Swanson Mitchell D. ; Tewfik Ahmed H. ; Hosur Srinath, Image and document management system for content-based retrieval.
  119. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  120. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  121. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  122. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  123. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  124. Nakano, Toshihisa; Harada, Shunji; Yamamoto, Masaya; Murase, Kaoru; Ogawa, Tomoki; Suzuki, Ryoji; Ishihara, Hideshi, Information burying device and detecting device.
  125. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  126. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  127. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  128. Rhoads, Geoffrey B., Internet linking from audio.
  129. Rhoads,Geoffrey B., Internet linking from image content.
  130. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  131. Venkatesan,Ramarathnam; Yacobi,Yacov, License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer.
  132. Venkatesan, Ramarathnam; Yacobi, Yacov, License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer.
  133. Venkatesan, Ramarathnam; Yacobi, Yacov, License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer.
  134. Venkatesan,Ramarathnam; Yacobi,Yacov, License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer.
  135. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  136. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  137. Hawes, Jonathan L., Linking documents through digital watermarking.
  138. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  139. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  140. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  141. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  142. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  143. Kolessar, Ronald S.; Neuhauser, Alan R., Message reconstruction from partial detection.
  144. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method and apparatus for bar code data interchange.
  145. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D., Method and apparatus for bar code data interchange.
  146. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D., Method and apparatus for bar code data interchange.
  147. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D., Method and apparatus for bar code data interchange.
  148. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D.; Staman,Paul R., Method and apparatus for capturing and decoding an image of a remotely located bar code.
  149. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D.; Staman,Paul R., Method and apparatus for capturing and decoding an image of a remotely located bar code.
  150. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  151. Lee Chong U. ; Moallemi Kamran ; Warren Robert L., Method and apparatus for embedding auxiliary data in a primary data signal.
  152. Lee Chong U. ; Moallemi Kamran ; Warren Robert L., Method and apparatus for embedding auxiliary data in a primary data signal using frequency and time domain processing.
  153. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for embedding data, including watermarks, in human perceptible images.
  154. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  155. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  156. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  157. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  158. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  159. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  160. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  161. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for scene-based video watermarking.
  162. Lee Chong U. ; Moallemi Kamran ; Warren Robert L., Method and apparatus for transporting auxiliary data in audio signals.
  163. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for video watermarking using perceptual masks.
  164. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  165. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  166. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  167. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  168. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  169. Hayek, Georges Nicolas; Fleury, Emmanuel; Blondeau, Fabien, Method and system for accessing information and/or data available on a wide area computer network.
  170. Hayek,Georges Nicolas; Fleury,Emmanuel; Blondeau,Fabien, Method and system for accessing information and/or data available on a wide area computer network.
  171. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  172. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  173. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  174. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  175. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  176. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  177. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  178. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  179. Wang, Avery Li-Chun; Barton, Christopher Jacques Penrose; Mukherjee, Dheeraj Shankar; Inghelbrecht, Philip, Method and system for identifying sound signals.
  180. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  181. Wang, Avery Li-Chun; Barton, Christopher Jacques Penrose; Mukherjee, Dheeraj Shankar; Inghelbrecht, Philip, Method and system for purchasing pre-recorded music.
  182. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  183. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  184. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D., Method for data interchange.
  185. Snyder, David M.; Melick, Bruce D.; Baych, Leslie D.; Staman, Paul R.; Peters, Nicholas J.; Probst, Gregory P., Method for data interchange.
  186. Snyder, David M.; Melick, Bruce D.; Baych, Leslie D.; Staman, Paul R.; Peters, Nicholas J.; Probst, Gregory P., Method for data interchange.
  187. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  188. Srinivasan, Venugopal, Method for encoding an input signal.
  189. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  190. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  191. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  192. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for tagged bar code data interchange.
  193. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for tagged bar code data interchange.
  194. Melick,Bruce D.; Snyder,David M.; Baych,Leslie D., Method for tagged bar code data interchange.
  195. Rowse, Graham, Method of providing a radio service at a remote terminal.
  196. Putnam, Jon S., Method, system and program product for broadcast advertising and other broadcast content performance verification utilizing digital artifacts.
  197. Putnam, Jon S., Method, system and program product for broadcast error protection of content elements utilizing digital artifacts.
  198. Nash-Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  199. Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  200. Putnam, Jon S., Method, system and program product for the insertion and retrieval of identifying artifacts in transmitted lossy and lossless data.
  201. Peiffer, John C.; Hicks, Michael A.; Wright, David H.; Mears, Paul M.; Srinivasan, Venugopal; Lu, Daozheng; Kempter, Paul C., Methods and apparatus for identifying a digital audio signal.
  202. Peiffer, John C.; Hicks, Michael A.; Wright, David H.; Mears, Paul M.; Srinivasan, Venugopal; Lu, Daozheng; Kempter, Paul C., Methods and apparatus for identifying a digital audio signal.
  203. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  204. Ramaswamy, Arun, Methods and apparatus to meter content exposure using closed caption information.
  205. Wheeler, Henry B.; Lu, Daozheng; Kempter, Paul C.; Feininger, William A., Methods and apparatus to monitor reception of programs and content by broadcast receivers.
  206. Srinivasan, Venugopal; Ramaswamy, Arun, Methods and apparatus to verify presentation of media content.
  207. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  208. Snyder, David M.; Melick, Bruce D.; Baych, Leslie D.; Staman, Paul R.; Peters, Nicholas J.; Probst, Gregory P., Methods and systems for data interchange.
  209. Snyder, David M.; Melick, Bruce D.; Baych, Leslie D.; Staman, Paul R.; Peters, Nicholas J.; Probst, Gregory P., Methods and systems for data interchange.
  210. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  211. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  212. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  213. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  214. Rhoads,Geoffrey B., Methods and systems for steganographic processing.
  215. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  216. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  217. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  218. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  219. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  220. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  221. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  222. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  223. Rhoads,Geoffrey B., Methods for audio watermarking and decoding.
  224. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  225. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  226. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  227. Rhoads, Geoffrey B., Methods for detecting alteration of audio.
  228. Rhoads Geoffrey B., Methods for detecting alteration of audio and images.
  229. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  230. Rhoads, Geoffrey B., Methods for encoding security documents.
  231. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  232. Rhoads, Geoffrey B., Methods for marking images.
  233. Rhoads,Geoffrey B., Methods for marking images.
  234. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  235. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  236. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  237. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  238. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  239. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  240. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  241. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  242. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  243. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  244. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  245. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  246. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  247. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  248. Srinivasan, Venugopal, Multi-band spectral audio encoding.
  249. Whymark, Thomas J, Multi-market broadcast tracking, management and reporting method and system.
  250. Whymark, Thomas J., Multi-market broadcast tracking, management and reporting method and system.
  251. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  252. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  253. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  254. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  255. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  256. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  257. Rhoads,Geoffrey B., Network linking using index modulated on data.
  258. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  259. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  260. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  261. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  262. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  263. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  264. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  265. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  266. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  267. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  268. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  269. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  270. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  271. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  272. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  273. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  274. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  275. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  276. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  277. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  278. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  279. Lee Chong U. (San Diego CA) Moallemi Kamran (Del Mar CA) Hinderling Jurg (San Diego CA), Post-compression hidden data transport.
  280. Lee Chong U. ; Moallemi Kamran ; Hinderling Jurg, Post-compression hidden data transport for video.
  281. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  282. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  283. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  284. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  285. Bichsel, Martin, Program or method and device for detecting an audio component in ambient noise samples.
  286. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  287. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  288. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  289. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  290. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  291. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  292. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  293. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  294. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  295. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  296. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  297. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  298. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  299. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  300. Geoffrey B. Rhoads, Security documents with hidden digital data.
  301. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  302. Bradley, Brett A., Self-orienting watermarks.
  303. Bradley,Brett A., Self-orienting watermarks.
  304. Chaoui, Luc; Arshi, Taymoor; Stavrapolous, John; Cowling, Todd; Behbehani, Taher, Set-top-box with integrated encoder/decoder for audience measurement.
  305. Tehranchi, Babak; Petrovic, Rade; Winograd, Joseph M.; Angelico, Dean Anthony, Signal continuity assessment using embedded watermarks.
  306. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  307. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  308. Kori, Teruhiko; Ezaki, Tadashi; Ogino, Akira; Kimura, Yuji, Signal reproducing method and apparatus, signal recording method and apparatus and signal recording system.
  309. Winograd, Joseph M., Social media viewing system.
  310. Wheeler, Henry B.; Lu, Daozheng, Source detection apparatus and method for audience measurement.
  311. Wheeler, Henry B.; Lu, Daozheng, Source detection apparatus and method for audience measurement.
  312. Srinivasan,Venugopal, Spectral audio encoding.
  313. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  314. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  315. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  316. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  317. Rhoads, Geoffrey B., Steganographic image processing.
  318. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  319. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  320. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  321. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  322. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  323. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  324. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  325. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  326. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  327. Rhoads Geoffrey B., Steganographic methods and media for photography.
  328. Rhoads Geoffrey B., Steganographic system.
  329. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Steganographically encoded video, deriving or calculating identifiers from video, and related methods.
  330. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  331. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  332. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  333. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  334. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  335. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  336. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  337. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  338. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  339. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  340. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  341. Olligschlaeger, Andreas M., System and method for three-way call detection.
  342. Olligschlaeger, Andreas M., System and method for three-way call detection.
  343. Olligschlaeger, Andreas M., System and method for three-way call detection.
  344. Olligschlaeger, Andreas M., System and method for three-way call detection.
  345. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  346. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  347. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  348. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  349. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  350. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  351. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  352. Emerson, III, Harry Edwin; LeBow, Gerald M; Grywalski, William A, System for modifying and targeting advertising content of internet radio broadcasts.
  353. Nobutaka Shinohara JP; Masuo Wada JP; Haruhiko Inokuma JP, System for verifying broadcast of a commercial message.
  354. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph, System reactions to the detection of embedded watermarks in a digital host content.
  355. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  356. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  357. Ramaswamy, Arun, Systems and methods to wirelessly meter audio/visual devices.
  358. Ramaswamy, Arun, Systems and methods to wirelessly meter audio/visual devices.
  359. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  360. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Systems for tagged bar code data interchange.
  361. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  362. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  363. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  364. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  365. Lin,Tai Hung, Table look-up method for abstract syntax notation encoding/decoding system.
  366. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  367. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  368. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  369. Martin, Thomas J., Three-way call detection using steganography.
  370. Martin,Thomas J., Three-way call detection using steganography.
  371. Rhoads, Geoffrey B., Tile-based digital watermarking techniques.
  372. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  373. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  374. Levy, Kenneth L., Using embedded data with file sharing.
  375. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  376. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  377. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  378. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  379. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  380. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  381. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  382. Rhoads Geoffrey B., Video steganography.
  383. Rhoads,Geoffrey B., Video steganography.
  384. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  385. Rhoads, Geoffrey B., Watermark embedder and reader.
  386. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  387. Geoffrey B. Rhoads, Watermark enabled video objects.
  388. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  389. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  390. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  391. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  392. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  393. Petrovic,Rade, Watermark position modulation.
  394. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  395. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
  396. Jones, Paul W.; Heath, J. Allen; Zolla, Robert J.; MacKenzie, Scott P.; Powers, Thomas F., Watermarking method for motion picture image sequence.
  397. Jones,Paul W.; Heath,J. Allen; Zolla,Robert J.; MacKenzie,Scott P.; Powers,Thomas F., Watermarking method for motion picture image sequence.
  398. Rhoads, Geoffrey B., Watermarking methods and media.
  399. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  400. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  401. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  402. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로