$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital camera with apparatus for authentication of images produced from an image file 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/167
  • H04K-001/00
  • H04L-009/00
출원번호 US-0449472 (1995-05-24)
발명자 / 주소
  • Friedman Gary L. (Encino CA)
출원인 / 주소
  • The United States of America as represented by the Administrator of the National Aeronautics and Space Administration (Washington DC 06)
인용정보 피인용 횟수 : 468  인용 특허 : 0

초록

A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the privat

대표청구항

A digital camera with apparatus for authentication of images produced from an image file taken by said digital camera of a scene, said digital camera having embedded therein a private key unique to said digital camera and a known public key so uniquely based upon said private key that digital data e

이 특허를 인용한 특허 (468)

  1. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  2. Calhoon, Sean; Rodriguez, Tony F., Active images through digital watermarking.
  3. Bussard, Laurent; Müller, Ulrich; Gefflaut, Alain, Ad-hoc trust establishment using visual verification.
  4. McCloskey, Scott, Alert system based on camera identification.
  5. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  6. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  7. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  8. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  9. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  10. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  11. Fujihara,Masahiro, Apparatus and method for image/position display.
  12. Wong, Joseph D., Apparatus and method for proving authenticity with personal characteristics.
  13. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  14. McWilliam,Richard P.; Hagen,G. Lynn; Andrews,Robert G.; Hoerr,Matthew; Christianson,Adam; Demko,Brenton; Abrahams,William B.; Sutherland,Richard, Apparatus for capturing an image.
  15. Malone,Michael F.; Murphy,Frederick J., Apparatus for capturing information as a file and enhancing the file with embedded information.
  16. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  17. Silverbrook,Kia, Apparatus for validating the presence of an authorized accessory.
  18. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  19. Davis,Bruce L.; Rhoads,Geoffrey B., Associating data with images in imaging systems.
  20. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  21. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  22. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  23. Rhoads Geoffrey B., Audio steganography.
  24. Rhoads, Geoffrey B., Audio steganography.
  25. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  26. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  27. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  28. Schumacher Thomas ; Kohler Timothy L., Authenticating images from digital cameras.
  29. Davis,Bruce L.; Rhoads,Geoffrey B.; Conwell,William Y., Authenticating metadata and embedding metadata in watermarks of media signals.
  30. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  31. Wootton John R. ; Waldman Gary S. ; Hobson Gregory L., Authentication algorithms for video images.
  32. Leonard, Jon N.; Staker, Matthew W.; Gille, Robert P.; Sercel, Joel C.; Davis, Jeffery S., Authentication and validation of smartphone imagery.
  33. Leonard, Jon N.; Staker, Matthew W.; Gille, Robert P.; Sercel, Joel C.; Davis, Jeffery S., Authentication and validation of smartphone imagery.
  34. Leonard, Jon N.; Staker, Matthew W.; Gille, Robert P.; Sercel, Joel C.; Davis, Jeffery S., Authentication and validation of smartphone imagery.
  35. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  36. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  37. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  38. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  39. Walmsley,Simon Robert, Authentication of consumable items.
  40. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  41. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  42. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  43. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  44. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  45. Safai, Mohammad A., Authentication stamping in a digital camera.
  46. Rhoads, Geoffrey B., Authentication using a digital watermark.
  47. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  48. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  49. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  50. Geist, Bruce K., Autonomously secured image data.
  51. Price, Derrick; Nelson, Dwayne R.; Kleppen, Dennis Thomas, Avatar as security measure for mobile device use with electronic gaming machine.
  52. Price, Derrick; Nelson, Dwayne R.; Kleppen, Dennis Thomas, Avatar as security measure for mobile device use with electronic gaming machine.
  53. Ellingson, Eric E., Bi-directional image capture methods and apparatuses.
  54. Steinberg, Eran; Prilutsky, Yury, Camera network communication device.
  55. Ellingson, Eric E., Capturing and encoding unique user attributes in media signals.
  56. Ellingson,Eric E., Capturing and encoding unique user attributes in media signals.
  57. Chapman, Charles B.; Childers, Winthrop D.; Potts, Jerry R., Chain of custody system and method.
  58. Dewa, Harutada; Hiwada, Kiyoyasu; Saito, Tomokazu; Tsunokuni, Kazuyuki; Nakazawa, Akira, Charging/discharging device.
  59. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  60. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  61. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  62. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  63. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  64. Ford, Alan; Mintel, Gregory, Configuration file download enforcement.
  65. Ford,Alan; Mintel,Gregory, Configuration file download enforcement.
  66. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Confirming physical custody of objects.
  67. Levy, Kenneth L.; Rhoads, Geoffrey B.; Brunk, Hugh L., Connected audio and other media objects.
  68. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  69. Toyokawa, Kazuhara; Morimoto, Norishige; Tonegawa, Satoko, Content data judging apparatus.
  70. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  71. Wakao,Satoru, Control apparatus and control method for image sensing apparatus.
  72. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  73. Kim, Hyung Sun; Stechkine, Alexandre; Kim, Byung Jin; Um, Soung Hyun, Copy protection method and system for digital media.
  74. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  75. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  76. Rhoads,Geoffrey B., Data entry method and system.
  77. Iwamura,Keiichi, Data processing method and apparatus.
  78. Iwamura,Keiichi, Data processing method and apparatus.
  79. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  80. Iwamura, Keiichi, Data-processing system and method for controlling same, computer program, and computer-readable recording medium.
  81. Wilson, Stephen, Decoupling identity from devices in the internet of things.
  82. Walmsley, Simon Robert; Silverbrook, Kia, Decoy device in an integrated circuit.
  83. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  84. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  85. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  86. Peters, Mark E., Deterring theft of media recording devices by encrypting recorded media files.
  87. Peters,Mark E., Deterring theft of media recording devices by encrypting recorded media files.
  88. Rodriguez,Tony F.; Calhoon,Sean; Rhoads,Geoffrey B.; Carr,J. Scott, Digital asset management, targeted searching and desktop searching using digital watermarks.
  89. Safai, Mohammad A., Digital camera and method for communicating digital image and at least one address image stored in the camera to a remotely located service provider.
  90. Ohmura, Akira, Digital camera capable of embedding an electronic watermark into image data.
  91. Safai Mohammad A. ; Wang Eugene, Digital camera having display device for displaying graphical representation of user input and method for transporting the selected digital images thereof.
  92. McIntyre Dale F. ; Patton David L., Digital camera including a printer for receiving a cartridge having security control circuitry.
  93. Iwami, Naoko; Tomokane, Takeo; Kohiyama, Tomohisa; Suzuki, Tetsuya, Digital camera storing and outputting encrypted digital image data.
  94. Nakajima,Yasumasa; Mogami,Kazuto, Digital camera, and system for detecting falsification of an image.
  95. Azuma,Motoo, Digital camera, customer authentication communication terminal equipment, and encoding service system.
  96. Furon,Teddy; Duhamel,Pierre, Digital data watermarking system using novel watermark insertion and detection methods.
  97. Kondoh, Takashi; Higurashi, Masaki; Komiya, Yasuhiro; Yamada, Hidetoshi, Digital evidential camera system for generating alteration detection data using built-in encryption key.
  98. Safai, Mohammad A., Digital image processor for a digital camera.
  99. Safai, Mohammad A., Digital image processor for a digital camera.
  100. Safai, Mohammad A., Digital image processor for a digital camera.
  101. Safai, Mohammad A., Digital image processor for a digital camera.
  102. Safai,Mohammad A., Digital image processor for a digital camera.
  103. Wickes, William C., Digital imaging device with image authentication capability.
  104. Kanai, Yoichi; Yachida, Masuyoshi, Digital measurement apparatus and image measurement apparatus.
  105. Kanai, Yoichi; Yachida, Masuyoshi, Digital measurement apparatus and image measurement apparatus.
  106. Bennett Charles Henry ; DiVincenzo David Peter ; Linsker Ralph, Digital recording system with time-bracketed authentication by on-line challenges and method of authenticating recordin.
  107. Wakao, Satoru; Akashi, Akira, Digital signature generating apparatus, method, computer program and computer-readable storage medium.
  108. Vanstone Scott A.,CAX, Digital signature protocol.
  109. Renaud Benjamin J., Digital signatures for data streams and data archives.
  110. Duerr,Thomas E.; Beser,Nicholas D.; Higbie,James H.; Paulhamus,Donna C.; Karls,Michael A.; Costello,Cash J.; Barrett,George R., Digital video authenticator.
  111. Rhoads, Geoffrey B., Digital watermark decoding method.
  112. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  113. Brundage, Trent J.; Lofgren, Neil E., Digital watermarked imagery, video, maps and signs.
  114. Brundage,Trent J.; Rodriguez,Tony F.; Hannigan,Brett T., Digital watermarking apparatus and methods.
  115. Brundage,Trent J.; Rodriguez,Tony F.; Hannigan,Brett T., Digital watermarking apparatus and methods.
  116. Rhoads, Geoffrey B., Digital watermarking compressed video captured from aerial sensors.
  117. Rodriguez, Tony F.; Brundage, Trent J., Digital watermarking image signals on-chip.
  118. Rodriguez, Tony F.; Brundage, Trent J., Digital watermarking methods, systems and apparatus.
  119. Yu, Hong Heather, Digital watermarking of binary document using halftoning.
  120. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  121. Roberts, Dale T.; Cremer, Markus K.; Mantle, Michael W.; White, Stephen Helling; Theeuwes, Marc, Dynamic mixed media package.
  122. Haitsma,Jaap Andre; Kalker,Antonius Adrianus Cornelis Maria; Schimmel,Steven Marco, Efficient storage of fingerprints.
  123. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  124. Rhoads, Geoffrey B.; Lofgren, Neil E., Embedding geo-location information in media.
  125. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  126. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  127. Iwamura, Keiichi, Embedding information in digital image data.
  128. Rhoads, Geoffrey B.; Stewart, Steven W.; Levy, Kenneth L., Embedding location data in video.
  129. Rhoads,Geoffrey B.; Stewart,Steven W., Embedding location data in video.
  130. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  131. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  132. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  133. Rhoads, Geoffrey B., Encoding and decoding media signals.
  134. Oakley,Ernest C., Encrypting digital camera with automatic encryption key deletion.
  135. Suominen, Edwin A, Encryption and authentication systems and methods.
  136. Suominen, Edwin A., Encryption and authentication systems and methods.
  137. Suominen, Edwin A., Encryption and authentication systems and methods.
  138. Suominen,Edwin A., Encryption and authentication systems and methods.
  139. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  140. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  141. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  142. Iwamura,Keiichi, Extracting embedded information from digital image data.
  143. Rose, Anthony, Filter for a distributed network.
  144. Rose, Anthony, Filter for a distributed network.
  145. Rose, Anthony, Filter for a distributed network.
  146. Malone,Michael F.; Murphy,Frederick J., Forensic communication apparatus and method.
  147. Shilman, Michael; Wei, Zile; Bargeron, David M., Freeform digital ink annotation recognition.
  148. Bargeron, David M., Freeform digital ink revisions.
  149. Haitsma, Jaap Andre; Kalker, Antonius Adrianus Cornelis Maria; Baggen, Constant Paul Marie Jozef; Oostveen, Job Cornelis, Generating and matching hashes of multimedia content.
  150. Rhoads,Geoffrey B.; Lofgren,Neil E.; Patterson,Philip R., Geographic information systems using digital watermarks.
  151. Rhoads,Geoffrey B.; Lofgren,Neil E.; Patterson,Philip R., Geographic information systems using digital watermarks.
  152. Rhoads, Geoffrey B., Geographical encoding imagery and video.
  153. Murphy Michael ; Woo Arthur N. ; Nichols Mark ; Schipper John, Geographical position/image digital recording and display system.
  154. Rhoads, Geoffrey B., Geographically watermarked imagery and methods.
  155. Rhoads,Geoffrey B., Geographically watermarked imagery and methods.
  156. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  157. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  158. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  159. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  160. Patterson,Philip R.; Lofgren,Neil E.; Stach,John; Rhoads,Geoffrey B., Hiding geo-location data through arrangement of objects.
  161. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  162. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  163. Jones, Robert L., Identification document with three dimensional image of bearer.
  164. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  165. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  166. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  167. Wakao,Satoru; Eguchi,Takami, Image authentication apparatus, image authentication method, and image authentication program.
  168. Rhoads, Geoffrey B., Image capture device with steganographic data embedding.
  169. Narayanaswami,Chandrasekhar; Kirkpatrick,Edward Scott, Image capturing system and method for automatically watermarking recorded parameters for providing digital image verification.
  170. Wakao, Satoru; Iwamura, Keiichi; Nakamoto, Yasuhiro, Image data verification.
  171. Wakao, Satoru; Iwamura, Keiichi, Image data verification system.
  172. Shimazawa, Yoichi; Yoshiura, Syoichiro, Image forming apparatus using image data and identification information in relation to an arbitrary image output apparatus.
  173. Shimazawa,Yoichi; Yoshiura,Syoichiro, Image forming apparatus using image data and identification information in relation to an output apparatus.
  174. Wakao,Satoru, Image generation apparatus, image file generation method, image verification apparatus and image verification method.
  175. Hayashi, Junichi; Tagashira, Nobuhiro; Kishi, Kazuya; Nakamoto, Yasuhiro; Imamoto, Yoshiharu, Image input apparatus, image verification apparatus, and control methods therefor.
  176. Rhoads, Geoffrey B.; Lofgren, Neil E.; Patterson, Philip R., Image management system and methods using digital watermarks.
  177. Brundage, Trent J.; Rodriguez, Tony F.; Hannigan, Brett T., Image or video display devices.
  178. Wakao,Satoru; Iwamura,Keiichi, Image processing apparatus and image processing method.
  179. Yasuhara, Hiroshi, Image processing apparatus and its method.
  180. Wakao, Satoru; Yamashita, Hiroki, Image processing apparatus, image processing method, computer program and computer-readable recording medium.
  181. Wakao, Satoru; Yamashita, Hiroki, Image processing apparatus, image processing method, computer program and computer-readable recording medium.
  182. Ito, Taeko; Hitosuga, Emi, Image sensing apparatus and method of controlling the same.
  183. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  184. Wakao, Satoru, Image verification apparatus and image verification method.
  185. Wakao,Satoru; Iwamura,Keiichi, Image verification system.
  186. Wakao,Satoru, Image verification system, image verification apparatus, and image verification method.
  187. Bargeron,David M.; Simard,Patrice Y.; Srivastava,Vivek, Image-based document indexing and retrieval.
  188. Wakao, Satoru, Imaging apparatus.
  189. Ferren, Bran; Hillis, W. Daniel; Hope, Clinton Blake, Imaging method and device using biometric information for operator authentication.
  190. Ferren, Bran; Hillis, W. Daniel; Hope, Clinton Blake, Imaging method and device using biometric information for operator authentication.
  191. Ferren,Bran; Hillis,W. Daniel; Hope,Clinton Blake, Imaging method and device using biometric information for operator authentication.
  192. Myers, Charles G., Imaging systems with data encryption and embedding capabalities.
  193. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  194. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  195. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  196. Jaffe, Jonathan E.; Goldhar, Joel D.; Warot, Michael A., Indigenous authentication and searching system and method.
  197. Jaffe, Jonathan E.; Goldhar, Joel D.; Warot, Michael A., Indigenous authentication for sensor-recorders and other information capture devices.
  198. Hayashi, Junichi, Information processing apparatus and information processing method.
  199. Hayashi, Junichi; Imamoto, Yoshiharu; Tagashira, Nobuhiro; Kishi, Kazuya; Nakamoto, Yasuhiro; Oishi, Kazuomi, Information processing apparatus and information processing method.
  200. Hayashi, Junichi, Information processing apparatus and information processing method for image verification.
  201. Hayashi, Junichi; Tagashira, Nobuhiro; Kishi, Kazuya; Nakamoto, Yasuhiro; Imamoto, Yoshiharu; Tamaru, Jun, Information processing apparatus and method of controlling the same.
  202. Iwamura, Keiichi; Murakami, Tomochika; Wakao, Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  203. Iwamura,Keiichi; Murakami,Tomochika; Wakao,Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  204. Iwamura, Keiichi, Information processing apparatus, method therefor, computer program, and computer-readable storage medium.
  205. Okihara, Kenichi; Harada, Koji; Hayashi, Junichi, Information processing apparatus, verification apparatus, and methods of controlling the same.
  206. Hayashi,Junichi, Information processing method and information processing apparatus.
  207. Iwamura, Keiichi, Information processing method, falsification verification method and device, storage medium, and program.
  208. Borden, Bruce; Brand, Russell, Information source agent systems and methods for backing up files to a repository using file identicality.
  209. Borden, Bruce; Brand, Russell, Information source agent systems and methods for distributed data storage and management using content signatures.
  210. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  211. Woo Arthur N., Integrated audio recording and GPS system.
  212. Walmsley, Simon Robert; Silverbrook, Kia, Integrated circuit having obscured state change circuitry.
  213. Walmsley, Simon Robert, Integrated circuit incorporating protection from power supply attacks.
  214. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  215. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  216. Rhoads,Geoffrey B., Internet linking from image content.
  217. Ahern, Keith Thomas, Invisible encoding of meta-information.
  218. Lewis Tony, Key replacement in a public key cryptosystem.
  219. Lewis Tony, Key replacement in a public key cryptosystem.
  220. Kaplan George R. ; Shachrai Avigdor,ILX ; Anner Oded,ILX ; Gurvich Leonid,ILX, Laser making system and certificate for a gemstone.
  221. George R. Kaplan ; Avigdor Shachrai IL; Oded Anner IL; Leonid Gurvich IL, Laser marking system.
  222. Kaplan George R. ; Shachrai Avigdor,ILX ; Anner Oded,ILX ; Gurvich Leonid,ILX, Laser marking system.
  223. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  224. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  225. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  226. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  227. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  228. Bargeron, David M., Lifting ink annotations from paper.
  229. Harper, Richard; Gosset, Philip; Banks, Richard M., Linking captured images using short range communications.
  230. Hawes, Jonathan L., Linking documents through digital watermarking.
  231. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  232. Vataja, Timo, Location-based content protection.
  233. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  234. Smith, Craig M.; Reisch, Robert V., Matching of digital images to acquisition devices.
  235. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  236. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  237. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating area biometric scanners.
  238. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating area biometric scanners.
  239. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  240. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  241. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  242. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating swipe biometric scanners.
  243. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating swipe biometric scanners.
  244. McWilliam, Richard P.; Hagen, G. Lynn; Andrews, Robert G.; Hoerr, Matthew; Christianson, Adam; Demko, Brenton; Abrahams, William B.; Sutherland, Richard, Method and apparatus for authenticating unique items such as sports memorabilia.
  245. Steinberg,Eran; Prilutsky,Yury, Method and apparatus for controlled camera useability.
  246. Anderson, Eric C., Method and apparatus for correcting aspect ratio in a camera graphical user interface.
  247. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  248. Pavley, John F.; Anderson, Eric C., Method and apparatus for editing heterogeneous media objects in a digital imaging device.
  249. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  250. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  251. Steinberg Eran ; Yeremenko Vasily, Method and apparatus for in-camera encryption.
  252. Steinberg Eran, Method and apparatus for in-camera image marking and authentication.
  253. Oishi, Kazuomi, Method and apparatus for input of coded image data.
  254. Oishi, Kazuomi, Method and apparatus for input of coded image data.
  255. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  256. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  257. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  258. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  259. Aggarwal,Gaurav; Amer,Nabil Mahmoud; Austel,Vernon Ralph; Dubey,Pradeep Kumar; Kulshreshtha,Ashutosh; Martens,Marco; Scott,Bruce Albert; Smith,Sean William; Tresser,Charles Philippe; von Gutfeld,Robe, Method and apparatus for producing duplication-and imitation-resistant identifying marks on objects, and duplication-and duplication-and imitation-resistant objects.
  260. Aisenberg Sol ; Freedman George ; Hed A. Ze'ev ; Pavelle Richard, Method and apparatus for providing secure time stamps for documents and computer files.
  261. Silverbook, Kia; Walmsley, Simon Robert, Method and apparatus for reducing optical emissions in an integrated circuit.
  262. Shiota Kazuo,JPX ; Haneda Norihisa,JPX ; Fukada Shigekazu,JPX ; Takemura Kazuhiko,JPX, Method and apparatus for reproducing image from data obtained by digital camera and digital camera used therefor.
  263. Shiota, Kazuo; Haneda, Norihisa; Fukada, Shigekazu; Takemura, Kazuhiko, Method and apparatus for reproducing image from data obtained by digital camera and digital camera used thereof.
  264. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  265. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  266. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  267. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  268. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure measurement certification.
  269. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for secure measurement certification.
  270. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for secure measurement certification.
  271. Barrus, John; Gormish, Michael; Chemishkian, Sergey, Method and apparatus for tamper proof camera logs.
  272. Barrus, John; Gormish, Michael; Chemishkian, Sergey, Method and apparatus for tamper proof camera logs.
  273. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  274. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  275. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  276. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  277. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  278. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  279. Cox,Ingemar J.; Miller,Matthew L.; Rayner,Douglas F., Method and device for inserting and authenticating a digital signature in digital data.
  280. Timothy Joseph Chainer ; Claude A. Greengard ; Paul Andrew Moskowitz ; Alejandro Gabriel Schrott ; Charles P. Tresser ; Robert Jacob von Gutfeld ; Chai Wah Wu, Method and system for authenticating objects and object data.
  281. McCloskey, Scott, Method and system for camera sensor fingerprinting.
  282. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  283. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  284. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  285. Mergen, John Francis; Powell, Carl Marshall Eliot; Wood, Daniel M., Method and system for providing image processing to track digital information.
  286. de Queiroz,Ricardo L, Method for authentication of JPEG image data.
  287. Lord William P. ; Abdel-Mottaleb Mohamed ; Epstein Michael, Method for confirming the integrity of an image transmitted with a loss.
  288. Schwenk, Joerg; Toensing, Friedrich, Method for generating digital watermarks for electronic documents.
  289. Raynor,Jeff, Method for generating unique image sensor identification, and image sensor system for use therewith.
  290. Cox, Ingemar J.; Miller, Matthew L., Method for increasing the functionality of a media player/recorder device.
  291. Ingemar J. Cox ; Matthew L. Miller, Method for increasing the functionality of a media player/recorder device or an application program.
  292. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  293. Lu, Zhou; Yu, Huazhang, Method for managing the hardware device.
  294. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  295. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  296. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  297. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  298. Nagel, Uwe, Method for operating an image-processing device and a corresponding image-processing device.
  299. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  300. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  301. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  302. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for providing location certificates.
  303. Fischer, Addison M., Method for providing location certificates.
  304. Herbert, Howard C.; Davis, Derek L., Method for secure distribution and configuration of asymmetric keying material into semiconductor devices.
  305. Hafenscher, Albert, Method for validating a road traffic control transaction.
  306. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  307. Carro,Fernando Incertis, Method of authenticating a plurality of files linked to a text document.
  308. Van De Sluis, Bartel Marinus, Method of enhancing rendering of a content item, client system and server system.
  309. Acharya, Tinku; Raj, Kannan, Method of integrating a watermark into a compressed image.
  310. Acharya, Tinku; Raj, Kannan, Method of integrating a watermark into a compressed image.
  311. Tinku Acharya ; Kannan Raj, Method of integrating a watermark into a compressed image.
  312. Carro,Fernando Incertis, Method of invisibly embedding into a text document the license identification of the generating licensed software.
  313. Rhoads,Geoffrey B., Method of steganographically embedding geo-location data in media.
  314. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines.
  315. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines.
  316. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or monitoring a party's compliance with a schedule for taking medicines.
  317. Oishi, Kazuomi, Methods and apparatus for input of coded image data.
  318. Hong Heather Yu ; Min Wu ; Xin Li ; Alexander D. Gelman, Methods and apparatus for multi-layer data hiding.
  319. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  320. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  321. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  322. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  323. Rhoads, Geoffrey B., Methods and apparatus to process video and audio media.
  324. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  325. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  326. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  327. Rhoads,Geoffrey B., Methods and systems for steganographic processing.
  328. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  329. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  330. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  331. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  332. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  333. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  334. Rhoads Geoffrey B., Methods for detecting alteration of audio and images.
  335. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  336. Rhoads, Geoffrey B., Methods for encoding security documents.
  337. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  338. Rhoads, Geoffrey B., Methods for marking images.
  339. Rhoads,Geoffrey B., Methods for marking images.
  340. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  341. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  342. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  343. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  344. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  345. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  346. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  347. Carro,Fernando Incertis, Methods of invisibly embedding and hiding data into soft-copy text documents.
  348. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  349. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  350. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  351. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  352. Wells, Maxwell J.; Dhillon, Navdeep S.; Waller, David, Music searching methods based on human perception.
  353. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  354. Rhoads,Geoffrey B., Network linking using index modulated on data.
  355. Rodriguez, Tony F.; Brundage, Trent J., Noise influenced watermarking methods and apparatus.
  356. Borden, Bruce; Brand, Russell, Notifying users of file updates on computing devices using content signatures.
  357. Azuma,Ronald T.; Sarfaty,Ron, Optical see-through augmented reality modified-scale display.
  358. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  359. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  360. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  361. Squilla John R. ; Moghadam Omid A. ; Rabbani Majid, Photograhic system with selected area image authentication.
  362. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  363. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  364. Scanlon, Tom; Woolaway, James T.; Madding, Robert P., Portable multi-function inspection systems and methods.
  365. Scanlon, Tom; Woolaway, James T.; Madding, Robert P., Portable multi-function inspection systems and methods.
  366. Scanlon, Tom; Woolaway, James T.; Madding, Robert P., Portable multi-function inspection systems and methods.
  367. Walmsley, Simon Robert; Lapstun, Paul, Printing system for validating printing consumable.
  368. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  369. Safai, Mohammad A., Programmable control of operational signals in a digital camera.
  370. Kuzmich, Vsevolod M.; Ivanov, Igor O., Proprietary watermark system for secure digital media and content distribution.
  371. Rhoads, Geoffrey B.; Lofgren, Neil E., Providing travel-logs based geo-locations relative to a graphical map.
  372. Houg, Todd C., Range finding audio system.
  373. Houg, Todd C., Range finding audio system.
  374. Morito, Hajime; Iwami, Naoko; Yoshiura, Hiroshi; Konno, Chisato; Kurosu, Yutaka, Recording device.
  375. Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Representing entitlements to service in a conditional access system.
  376. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  377. Levy, Kenneth L.; Rhoads, Geoffrey B.; Hiatt, R. Stephen, Rights management system and methods.
  378. Spelman Jeffrey F. (Duvall WA) Thomlinson Matthew W. (Bellvue WA), Root key compromise recovery.
  379. Davis Derek L., Secure compressed imaging.
  380. Suominen, Edwin A., Secure messaging with disposable keys.
  381. Moghadam Omid A. ; Rabbani Majid ; Townsend Kevin A., Secure photographic systems.
  382. Steinberg, Eran, Secure storage device for transfer of data.
  383. Steinberg, Eran, Secure storage device for transfer of data via removable storage.
  384. Steinberg, Eran, Secure storage device for transfer of digital camera data.
  385. Steinberg, Eran, Secure storage device for transfer of digital camera data.
  386. Steinberg, Eran, Secure storage device for transfer of digital camera data.
  387. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  388. Bradley, Brett A., Self-orienting watermarks.
  389. Bradley,Brett A., Self-orienting watermarks.
  390. Barton, James M.; Tahmassebi, Shahin; Platt, David, Self-test electronic assembly and test system.
  391. Barmak Mansoorian ; Eric R. Fossum, Semiconductor imaging sensor with on-chip encryption.
  392. Silverbrook,Kia; Walmsley,Simon Robert, Shielding manipulations of secret data.
  393. Wada, Toshiaki, Shooting apparatus and servers, systems and methods for managing images shot by the shooting apparatus.
  394. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  395. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  396. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  397. Shilman, Michael; Viola, Paul A.; Chellapilla, Kumar H., Spatial recognition and grouping of text and graphics.
  398. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  399. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  400. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  401. Rhoads Geoffrey B., Steganographic methods and media for photography.
  402. Rhoads Geoffrey B., Steganographic system.
  403. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  404. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  405. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  406. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  407. Grosvenor,David Arthur; Cheatle,Stephen Philip, Synchronized cameras with auto-exchange.
  408. Aarnio,Ari; Tiainen,Ilkka; Rahnasto,Ilkka, System and method for associating postmark information with digital content.
  409. Decime,Jerry, System and method for authenticating digital content.
  410. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  411. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  412. Jones,William L.; Schon,Walter J., System and method for automatically protecting private video content using cryptographic security for legacy systems.
  413. Schon,Walter J.; Jones,William L., System and method for automatically protecting private video content using embedded cryptographic security.
  414. Leonard, Jon N.; Staker, Matthew W.; Gille, Robert P.; Sercel, Joel C.; Davis, Jeffery S.; Bailey, Claude A., System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images.
  415. Goldberg, David; Rucklidge, William J.; Thornton, James D., System and method for generating a signed hardcopy document and authentication thereof.
  416. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  417. Nagel,Robert H., System and method for production and authentication of original documents.
  418. Nagel,Robert H., System and method for production and authentication of original documents.
  419. Quinn, Paul; Chou, Jim Chen; Freed, Michael; Ganesan, Elango, System and method for providing cryptographic video verification.
  420. Pohja, Seppo; Mononen, Jari, System and method for registering attendance of entities associated with content creation.
  421. Pohja, Seppo; Mononen, Jari, System and method for registering attendance of entities associated with content creation.
  422. Pohja,Seppo; Mononen,Jari, System and method for registering attendance of entities associated with content creation.
  423. Fredlund, John R.; Parker, Martin A., System and method of authenicating a digitally captured image.
  424. Narayanaswami, Chandrasekhar; Kirkpatrick, Edward Scott, System and methods for querying digital image archives using recorded parameters.
  425. Kamijo,Koichi; Morimoto,Norishige; Koide,Akio; Sakakura,Tohru, System for authenticating digital data.
  426. Goldberg,David; Rucklidge,William J.; Thornton,James D., System for authenticating hardcopy documents.
  427. Kia Silverbrook AU; Simon Robert Walmsley AU; Paul Lapstun AU, System for authenticating physical objects.
  428. de Queiroz, Ricardo L., System for authentication of JPEG image data.
  429. Heacock,Gregory L., System for capturing an image of the retina for identification.
  430. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  431. Geise, Doran J.; Croteau, Keith G., System to navigate within images spatially referenced to a computed space.
  432. Geise, Doran J.; Croteau, Keith G., System to navigate within images spatially referenced to a computed space.
  433. Byman Kivivuori, Birgit; Huomo, Heikki, System, apparatus, and method for effecting network connections via wireless devices using radio frequency identification.
  434. Bargeron, David M; Simard, Patrice Y; Viola, Paul A, Systems and methods for detecting text.
  435. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  436. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  437. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  438. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  439. Rhoads, Geoffrey B.; Lofgren, Neil E.; Patterson, Philip R., Systems and methods using identifying data derived or extracted from video, audio or images.
  440. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  441. Walmsley, Simon Robert, Tamper detection line circuitry for use in authenticating an integrated circuit.
  442. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  443. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  444. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  445. Davis Derek L., Time-bracketing infrastructure implementation.
  446. Van Natter, Douglas, Trusted evidence cameras and related methods and computer program products.
  447. Van Natter, Douglas Charles, Trusted evidence cameras and related methods and computer program products.
  448. Robert Paul Morris, User authentication for portable electronic devices using asymmetrical cryptography.
  449. Rhoads,Geoffrey B.; Lofgren,Neil E., Using steganographic encoded information with maps.
  450. Walmsley, Simon Robert; Lapstun, Paul, Validating apparatus for use with a pair of integrated circuits.
  451. Silverbrook, Kia; Walmsley, Simon Robert, Validating apparatus having encryption integrated circuits.
  452. Walmsley,Simon Robert, Validation protocol and system.
  453. Walmsley,Simon Robert; Lapstun,Paul, Validation protocol and system.
  454. Evans, Gregory Morgan; Evans, James; Roberts, Thomas, Venue based digital rights using capture device with digital watermarking capability.
  455. Suominen, Edwin A., Verification of signed digital documents.
  456. Suominen, Edwin A., Verification of signed video streams.
  457. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  458. Challapali, Kiran, Video signal authentication system.
  459. Rhoads Geoffrey B., Video steganography.
  460. Rhoads,Geoffrey B., Video steganography.
  461. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  462. Rhoads, Geoffrey B., Watermark embedder and reader.
  463. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  464. Geoffrey B. Rhoads, Watermark enabled video objects.
  465. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  466. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  467. Rhoads, Geoffrey B., Watermarking methods and media.
  468. Natarajan, Balas K., Watermarking of digital object.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로