$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Steganography methods employing embedded calibration data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/36
출원번호 US-0436098 (1995-05-08)
발명자 / 주소
  • Rhoads Geoffrey B. (West Linn OR)
출원인 / 주소
  • Digimarc Corporation (Portland OR 02)
인용정보 피인용 횟수 : 721  인용 특허 : 0

초록

An identification code signal is impressed on a carrier to be identified (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned and the carrier thereby identified. The method and apparatus are characterized by robustness desp

대표청구항

A method of steganographic encoding characterized by: processing a sampled input signal to produce an output signal having an information signal embedded therein, the sampled input signal corresponding to a two dimensional visual image, each sample of said input signal having a value, the encoding i

이 특허를 인용한 특허 (721)

  1. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  2. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  3. Keupp, Wolfgang; Findeis, G?nter; F?rsich, Manfred, Apparatus and method for determining image correction values for printing an image acquired with a digital camera and device for printing an image on printing material.
  4. Louis H. Liang, Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters.
  5. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  6. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  7. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  8. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  9. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  10. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  11. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  12. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  13. Davis, Bruce L.; Rhoads, Geoffrey B., Audio and video content-based methods.
  14. Rhoads, Geoffrey B., Audio and video signal processing.
  15. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  16. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  17. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  18. Rhoads, Geoffrey B., Audio steganography.
  19. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  20. Rodriguez, Tony F.; Rhoads, Geoffrey B., Authenticating identification and security documents.
  21. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents.
  22. Rodriguez, Tony F., Authenticating identification and security documents and other objects.
  23. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents and other objects.
  24. Levy,Kenneth L.; Tian,Jun, Authenticating media signals by adjusting frequency characteristics to reference values.
  25. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  26. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  27. Rhoads,Geoffrey B., Authentication of identification documents.
  28. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  29. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  30. Wen, Xin, Authorizing the production of visual images from digital images.
  31. Kacker,Dhiraj; Muzzolini,Russell Ennio, Automated copyright detection in digital images.
  32. Kacker,Dhiraj; Muzzolini,Russell Ennio, Automated copyright detection in digital images.
  33. Kacker,Dhiraj; Muzzolini,Russell Ennio, Automated verification of copyrighted digital images.
  34. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Automatic digital music library builder.
  35. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Benchmarks for digital watermarking.
  36. Yasuda Naotaka,JPX ; Enomoto Mitsunobu,JPX, Braille recognition system with ternary-coding.
  37. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  38. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  39. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  40. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  41. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  42. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  43. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  44. Sandford ; II Maxwell T. ; Handel Theodore G. ; Bradley Jonathan N., Compression embedding.
  45. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  46. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  47. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  48. Altfeder, David, Computer-based system and method for adding variable security data in printing operations.
  49. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  50. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Confirming physical custody of objects.
  51. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  52. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  53. Rhoads, Geoffrey B., Controlling use of audio or image content.
  54. Rhoads, Geoffrey B., Controlling use of audio or image content.
  55. Levy, Kenneth L.; Stewart, Steven W., Conveying auxilliary data through digital watermarking.
  56. Houston, John S., Cooperative system for measuring electronic media.
  57. Houston, John S., Cooperative system for measuring electronic media.
  58. John S. Houston, Cooperative system for measuring electronic media.
  59. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  60. Cookson, Christopher J., Copy protection control system.
  61. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  62. Gasper John, Copy restrictive color-negative photographic print media.
  63. Gasper John ; Sutton James Edward, Copy restrictive documents.
  64. Drew,Jeffrey M.; Selinfreund,Richard H.; Goyette,Donald R.; Vig,Rakesh, Copy-protected optical media and method of manufacture thereof.
  65. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh, Copy-protected optical media and method of manufacture thereof.
  66. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh; Goyette, Donald R., Copy-protected optical media and method of manufacture thereof.
  67. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  68. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  69. Cox Ingemar J. ; Miller Matthew L., Counteracting geometric distortions for DCT based watermarking.
  70. Rhoads,Geoffrey B., Counteracting geometric distortions in watermarking.
  71. Becker Glenn ; Dahbour Salam H., Covert digital identifying indicia for digital image.
  72. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  73. Sharma,Ravi K., Curve fitting for synchronizing readers of hidden auxiliary data.
  74. Sanford ; II Maxwell T. ; Handel Theodore G., Data embedding employing degenerate clusters of data having differences less than noise value.
  75. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  76. Kobayashi Seiji,JPX ; Koide Akio,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data hiding method and data extraction method using statistical examination.
  77. Jun Yoshida JP; Kenichi Nagasawa JP; Keiichi Iwamura JP, Data processing apparatus and method and storage medium.
  78. Yoshida, Jun; Iwamura, Keiichi, Data processing apparatus and method and storage medium.
  79. Yamazaki, Takeshi; Iwamura, Keiichi, Data processing apparatus and method, and storage medium.
  80. Yoshida,Jun; Iwamura,Keiichi, Data processing apparatus and method, and storage medium therefor.
  81. Iwamura,Keiichi, Data processing method and apparatus.
  82. Iwamura,Keiichi, Data processing method and apparatus.
  83. Moskowitz, Scott A., Data protection method and device.
  84. Moskowitz, Scott A., Data protection method and device.
  85. Moskowitz, Scott A., Data protection method and device.
  86. Moskowitz, Scott A., Data protection method and device.
  87. Weldon, James; Schneck, Jr., Karl R.; Lackritz, Hilary S.; Smith, Jerry; McLaughlin, Mark; Merry, J. Bradford, Data protection on an optical disk.
  88. Slade, Glen Jonathan, Data storage.
  89. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  90. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  91. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  92. Osamu Kawamae JP; Toshifumi Takeuchi JP; Hiroshi Yoshiura JP; Takao Arai JP, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  93. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  94. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  95. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  96. Wen, Xin; Honsinger, Chris W., Detecting embedded information in images.
  97. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  98. Rhoads, Geoffrey B., Detecting hidden auxiliary code signals in media.
  99. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  100. Brundage, Trent J., Detecting media areas likely of hosting watermarks.
  101. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  102. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  103. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  104. Daniel D. Thaxton ; William H. Mowry, Jr., Device for authenticating a security document.
  105. Xu, Changsheng; Wu, Jiankang; Sun, Qibin; Xin, Kai; Li, Haizhou, Digital audio watermarking using content-adaptive, multiple echo hopping.
  106. Rhoads, Geoffrey B., Digital authentication with analog documents.
  107. Rhoads, Geoffrey B., Digital authentication with analog documents.
  108. Rhoads,Geoffrey B., Digital authentication with analog documents.
  109. Rhoads, Geoffrey B.; Carr, J. Scott; Perry, Burt W., Digital authentication with digital and analog documents.
  110. Tian,Jun, Digital authentication with digital and analog documents.
  111. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  112. Terada,Koichi; Fujii,Yukio; Fujikawa,Yoshifumi; Iwagaki,Taruhi, Digital content protection using invisible and visible watermarks.
  113. Paltenghe, Cris T., Digital graphic signature system.
  114. Chang, Michael M.; Schmidt, Kenneth A.; Su, Dongpei; Li, Sheng; Wong, Kendrick; Lubman, Larry; Abkarian, Alfred; Schafer, Stephen L., Digital image attribute plane compression.
  115. Rhoads, Geoffrey B., Digital watermark decoding method.
  116. Muratani, Hirofumi, Digital watermark embedding apparatus, digital watermark detecting apparatus, digital watermark embedding method, digital watermark detecting method and computer program product.
  117. Taguchi, Jun'ichi; Yoshiura, Hiroshi; Echizen, Isao; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Digital watermark image processing method.
  118. Iwamura,Keiichi, Digital watermark processing apparatus, and digital contents distribution system using the apparatus.
  119. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  120. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  121. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  122. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  123. Pun, Thierry; Voloshynovskiy, Slava; Deguillaume, Frédéric, Digital watermarking method robust against local and global geometric distortions and projective transforms.
  124. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  125. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  126. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  127. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  128. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  129. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  130. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  131. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  132. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  133. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  134. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  135. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  136. Geoffrey B. Rhoads, Digital watermarks and methods for security documents.
  137. Stach,John; Brundage,Trent J., Digital watermarks for unmanned vehicle navigation.
  138. Lofgren, Neil; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermaking holograms for use with smart cards.
  139. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  140. Lofgren, Neil E.; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermarking holograms for identity documents.
  141. Bakos, Yannis; Brynjolfsson, Erik, Directory read inhibitor for optical storage media.
  142. Patrick O'Neal Nunally, Document authentication using a mark that is separate from document information.
  143. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  144. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  145. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  146. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed.
  147. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  148. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  149. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  150. Gennaro, Rosario; Tresser, Charles, Electronic cash controlled by non-homomorphic signatures.
  151. Tewfik, Ahmed; Zhu, Bin; Swanson, Mitch, Embedding data in and detecting embedded data from video objects.
  152. Pelly,Jason Charles; Tapson,Daniel; Keating,Stephen Mark, Embedding data in material.
  153. Brunk,Hugh L.; Alattar,Osama M., Embedding digital watermarks in spot colors.
  154. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  155. Iwamura, Keiichi, Embedding information in digital image data.
  156. Masuda Hiroshi,JPX ; Ohbuchi Ryutarou,JPX ; Aono Masaki,JPX, Embedding information in three-dimensional geometric model.
  157. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  158. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  159. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  160. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  161. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  162. Rhoads, Geoffrey B., Encoding and decoding media signals.
  163. Zhao, Jian, Enhanced content distribution using advertisements.
  164. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  165. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  166. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  167. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  168. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  169. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  170. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  171. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  172. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  173. Iwamura,Keiichi, Extracting embedded information from digital image data.
  174. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  175. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  176. Nielsen Jakob, Fingerprinting plain text information.
  177. Winograd, Joseph M., Forensic marking using a common customization function.
  178. Winograd, Joseph M., Forensic marking using a common customization function.
  179. Winograd, Joseph M., Forensic marking using a common customization function.
  180. Reed, Alastair M.; Falkenstern, Kristyn R.; Berfanger, David; Bai, Yang, Full color visibility model using CSF which varies spatially with local luminance.
  181. Reed, Alastair M.; Falkenstern, Kristyn R.; Berfanger, David; Bai, Yang, Full color visibility model using CSF which varies spatially with local luminance.
  182. Reed, Alastair M.; Bai, Yang; Falkenstern, Kristyn R.; Berfanger, David, Full-color visibility model using CSF which varies spatially with local luminance.
  183. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based detection keys.
  184. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  185. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  186. Lyons, Robert G.; Reed, Alastair M.; Stach, John F., Geometric enumerated watermark embedding for colors and inks.
  187. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  188. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  189. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  190. Odenwalder, Joseph P., High data rate CDMA wireless communication system using variable sized channel codes.
  191. Odenwalder, Joseph P., High data rate CDMA wireless communication system using variable sized channel codes.
  192. Odenwalder, Joseph P., High rate CDMA wireless communication system using variable sized channel codes.
  193. Alattar, Adnan M., Identification and protection of security documents.
  194. Alattar, Adnan M., Identification and protection of video.
  195. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  196. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  197. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  198. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  199. Moroo,Jun; Noda,Tsugio, Image data processing apparatus, image data processing method, and computer readable medium.
  200. Moroo,Jun; Noda,Tsugio, Image data processing apparatus, image data processing method, and computer readable medium.
  201. Moroo,Jun; Noda,Tsugio, Image encoding apparatus, method and program.
  202. Kaneda, Kitahiro; Iwamura, Keiichi; Ohta, Ken ichi; Ishida, Yoshihiro; Kato, Shinichi; Hayashi, Junichi; Tamaru, Jun; Eguchi, Takami, Image processing apparatus and method.
  203. Miyashita,Tomoyuki, Image processing apparatus and method.
  204. Miyashita,Tomoyuki, Image processing apparatus and method.
  205. Matsuzawa, Junji, Image processing apparatus, audio recording method, and recording medium storing an audio recording program.
  206. Iwamura, Keiichi; Makita, Takeshi; Ishida, Yoshihiro, Image processing apparatus, image processing method, and storage medium.
  207. Chen,Xinwu; Ji,Xin; Wang,Libing; Ishida,Yoshihiro, Image processing method, apparatus and storage medium.
  208. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  209. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  210. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  211. Hayashi, Junichi; Iwamura, Keiichi; Ishida, Yoshihiro, Image processor and image processing method.
  212. Rhoads,Geoffrey B., Image processor and image processing method.
  213. Iwamura, Keiichi; Kaneda, Kitahiro, Image processor, method thereof, computer program, and computer readable storage medium.
  214. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  215. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  216. Kawaguchi, Eiji; Eason, Richard; Tsuda, Kunihiro, Information card and information card system.
  217. Kadono Shinya,JPX, Information embedding method, information extracting method, information embedding apparatus, information extracting apparatus, and recording media.
  218. Kadono,Shinya, Information embedding method, information extracting method, information embedding apparatus, information extracting apparatus, and recording media.
  219. Hayashi,Junichi, Information processing method and information processing apparatus.
  220. Felsher, David Paul, Information record infrastructure, system and method.
  221. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  222. Donescu,Ioana, Insertion and extraction of a message in an image.
  223. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  224. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  225. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  226. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  227. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  228. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  229. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  230. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  231. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  232. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  233. Thompson, Robert F.; Exter, Neil; Bakos, Yannis; Minns, Richard A.; Takiff, Larry, Limited play optical devices with interstitial reactive layer and methods of making same.
  234. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  235. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  236. Hawes, Jonathan L., Linking documents through digital watermarking.
  237. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  238. Mondie, George R., Low visual impact labeling method and system.
  239. Rodriguez, Tony F., Machine-readable features for objects.
  240. Philip E. Rollhaus ; John R. Powell ; Eric J. Carlson ; Daniel J. Ehntholt ; Irwin C. Winkler ; Christopher J. Marmo ; James R. Valentine, Machine-readable optical disc with reading-inhibit agent.
  241. Rollhaus Philip E. ; Powell John R. ; Carlson Eric J. ; Ehntholt Daniel J. ; Winkler Irwin C. ; Marmo Christopher J. ; Valentine James R., Machine-readable optical disc with reading-inhibit agent.
  242. Tian,Jun; Levy,Kenneth L.; Brunk,Hugh L., Measuring quality of service of broadcast multimedia signals using digital watermark analyses.
  243. Weiss,David, Media bridge method and apparatus.
  244. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  245. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  246. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  247. Adams Phillip M., Media-independent document security method and apparatus.
  248. Phillip M. Adams, Media-independent document security method and apparatus.
  249. Lubin, Jeffrey; Polyzois, Christos Alkivladis, Method and apparatus for analog insertion of low frequency watermarks.
  250. Selinfreund, Richard H.; Goyette, Donald Roland; Drew, Jeffrey M.; Vig, Rakesh, Method and apparatus for controlling access to storage media.
  251. Selinfreund,Richard H.; Goyette,Donald Roland; Drew,Jeffrey M.; Vig,Rakesh, Method and apparatus for controlling access to storage media.
  252. Flores, L. Noah; Gorbet, Matthew G.; Hecht, David L., Method and apparatus for decoding angular orientation of lattice codes.
  253. Op De Beeck, Marc Joseph Rita; Haitsma, Jaap Andre; Kalker, Antonius Adrianus Cornelis Maria, Method and apparatus for detecting a watermark in a manipulated image.
  254. Chiba, Hirotaka; Noda, Tsugio, Method and apparatus for determining encoding availability, and computer product.
  255. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  256. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  257. Gorbet, Matthew G.; Flores, L. Noah; Hecht, David L.; Banerjee, Shilajeet, Method and apparatus for display of spatially registered information using embedded data.
  258. Bender Walter ; Gruhl Daniel ; Morimoto Norishige,JPX, Method and apparatus for echo data hiding in audio signals.
  259. Isnardi Michael Anthony ; Musgrave Clyde, Method and apparatus for embedding a watermark into a digital image or image sequence.
  260. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  261. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  262. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  263. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  264. Sun, Qibin; Wu, Jiankang; Deng, Huijie Robert, Method and apparatus for embedding digital information in digital multimedia data.
  265. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  266. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  267. Kondo,Hiroshi, Method and apparatus for generating data representative of features of an image.
  268. Daly Scott J., Method and apparatus for hiding one image or pattern within another.
  269. Florencio Dinei A. ; Isnardi Michael A., Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence.
  270. Hecht, David L.; Flores, L. Noah; Petrie, Glen W.; Karlsson, Sven, Method and apparatus for implementing a camera mouse.
  271. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  272. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  273. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  274. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  275. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  276. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  277. Ray Lawrence A. ; Honsinger Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  278. Cesnik, Jeffrey Thomas, Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors.
  279. Murray, Eric; Rubin, Owen Robert, Method and apparatus for watermarking binary computer code with modified compiler optimizations.
  280. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  281. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  282. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  283. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  284. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  285. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  286. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  287. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  288. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  289. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  290. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  291. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  292. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  293. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  294. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  295. Yoshiura, Hiroshi; Echizen, Isao; Taguchi, Junichi; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Method and system for embedding information into contents.
  296. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  297. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  298. Goodman, Daniel I., Method and system for real-time control of document printing.
  299. Goodman, Daniel I., Method and system for real-time control of document printing.
  300. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  301. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  302. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  303. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  304. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  305. Bloom, Jeffrey A.; Cox, Ingemar J.; Miller, Matthew L., Method for data preparation and watermark insertion.
  306. Anthony H. Otto, Method for digital compression of color images.
  307. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  308. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  309. Wenjun Zeng, Method for extracting multiresolution watermark images to determine rightful ownership.
  310. Schwenk, Joerg; Toensing, Friedrich, Method for generating digital watermarks for electronic documents.
  311. Dugelay, Jean-Luc, Method for hiding binary data in a digital image.
  312. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  313. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  314. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  315. Krieg Kowald,Marianne, Method for rendering surface layer of limited play disk lightfast.
  316. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  317. Michael G. Bantum, Method for transparent marking of digital images for storage, retrieval and processing within a computer database.
  318. Hilton David,GBX, Method of and apparatus for manipulating digital data works.
  319. Fan, Zhigang; Cheng, Hui; Rolleston, Robert J., Method of detecting changes occurring in image editing using watermarks.
  320. Echizen, Isao; Yoshiura, Hiroshi; Anzai, Kousuke; Kurosu, Yutaka, Method of extracting digital watermark information and method of judging bit value of digital watermark information.
  321. Echizen, Isao; Yoshiura, Hiroshi; Kurosu, Yutaka; Anzai, Kousuke, Method of extracting digital watermark information and method of judging bit value of digital watermark information.
  322. Echizen, Isao; Yoshiura, Hiroshi; Kurosu, Yutaka; Anzai, Kousuke, Method of extracting digital watermark information and method of judging bit value of digital watermark information.
  323. Isao Echizen JP; Hiroshi Yoshiura JP; Yutaka Kurosu JP; Kousuke Anzai JP, Method of extracting digital watermark information and method of judging but value of digital watermark information.
  324. Nguyen, Eric, Method of inserting and extracting a digital signature.
  325. Takashi Yamaguchi JP, Method of processing image information and method of preventing forgery of certificates or the like.
  326. Yamaguchi, Takashi, Method of processing image information and method of preventing forgery of certificates or the like.
  327. Iwamura,Keiichi, Method of using plural watermarks to prevent unauthorized image copying.
  328. Putnam, Jon S., Method, system and program product for broadcast advertising and other broadcast content performance verification utilizing digital artifacts.
  329. Putnam, Jon S., Method, system and program product for broadcast error protection of content elements utilizing digital artifacts.
  330. Nash-Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  331. Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  332. Putnam, Jon S., Method, system and program product for the insertion and retrieval of identifying artifacts in transmitted lossy and lossless data.
  333. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
  334. Qiao Yong ; Mok Fai ; Zhou Gan, Methods and apparatus for gesture recognition based on templates.
  335. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  336. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  337. Lawandy, Nabil M.; Zepp, Charles M.; Norland, Kenneth S., Methods and apparatus for rendering an optically encoded medium unreadable.
  338. Nabil M. Lawandy ; Charles M. Zepp ; Kenneth S. Norland, Methods and apparatus for rendering an optically encoded medium unreadable.
  339. Lawandy, Nabil M.; Zepp, Charles M.; Smuk, Andrei; Krieg-Kowald, Marianne, Methods and apparatus for rendering an optically encoded medium unreadable and tamper-resistant.
  340. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  341. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  342. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  343. Rhoads,Geoffrey B., Methods and apparatus to produce security documents.
  344. Geoffrey B. Rhoads, Methods and devices for recognizing banknotes and responding accordingly.
  345. Serret Avila,Xavier; Boccon Gibod,Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  346. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  347. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  348. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  349. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  350. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  351. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  352. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  353. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  354. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  355. Geoffrey B. Rhoads, Methods and systems for watermark processing of line art images.
  356. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  357. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  358. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  359. Davis,Bruce L.; Rhoads,Geoffrey B., Methods and tangible objects employing machine readable data.
  360. Davis,Bruce L.; Rhoads,Geoffrey B., Methods and tangible objects employing machine readable data in photo-reactive materials.
  361. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  362. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  363. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  364. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  365. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  366. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  367. Rhoads,Geoffrey B., Methods for audio watermarking and decoding.
  368. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  369. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  370. Rhoads,Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  371. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  372. Tam, Kar Yan; Tsang, Kai Fung; Kwok, Sai Ho; Cheung, Shing Chi, Methods for embedding data in digital audio data.
  373. Rhoads, Geoffrey B., Methods for encoding security documents.
  374. Davis, Bruce L.; Perry, Burt; Carr, J. Scott, Methods for evidencing illicit use of a computer system or device.
  375. Rhoads Geoffrey B., Methods for identifying equipment used in counterfeiting.
  376. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  377. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  378. Rhoads, Geoffrey B., Methods for marking images.
  379. Rhoads,Geoffrey B., Methods for marking images.
  380. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  381. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  382. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  383. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  384. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  385. Rhoads, Geoffrey B., Methods for steganographic encoding media.
  386. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  387. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  388. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  389. Rhoads, Geoffrey B., Methods for watermark decoding.
  390. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  391. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  392. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  393. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  394. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  395. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  396. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  397. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  398. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  399. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  400. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  401. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  402. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  403. Bonn, Mark J.; Jintaseranee, Kosol; Hoelzle, Sean Patrick; Choi, Heesook, Mobile security using graphical images.
  404. Bloom, Jeffrey Adam; Zou, Dekun, Modifying a coded bitstream.
  405. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  406. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  407. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  408. Levy, Kenneth L.; Stewart, Steven W., Multi-channel digital watermarking.
  409. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  410. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  411. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  412. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  413. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  414. Rhoads Geoffrey ; Gustafson Ammon, Multiple watermarking techniques for documents and other data.
  415. Rodriguez, Tony F.; Brundage, Trent J., Noise influenced watermarking methods and apparatus.
  416. Hecht, David L.; Flores, L. Noah; Gorbet, Matthew G., Operations on images having glyph carpets.
  417. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  418. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  419. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  420. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  421. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  422. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  423. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  424. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  425. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  426. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  427. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  428. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  429. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  430. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  431. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  432. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  433. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  434. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  435. Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
  436. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  437. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  438. Hannigan, Brett T.; Bradley, Brett A.; Reed, Alastair M., Perceptual modeling of media signals based on local contrast and directional edges.
  439. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett Alan, Perceptual modeling of media signals based on local contrast and directional edges.
  440. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett A., Perceptual modeling of media signals based on local contrast and directional edges.
  441. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett A., Perceptual modeling of media signals for data hiding.
  442. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett Alan, Perceptual modeling of media signals for data hiding.
  443. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett Alan, Perceptual modeling of media signals for data hiding.
  444. Stephen L. Shaffer ; John R. Squilla ; John K. McBride, Photocollage generation and modification.
  445. Stephen L. Shaffer ; John R. Squilla ; John K. McBride, Photocollage generation and modification using image recognition.
  446. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  447. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  448. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Wong, Douglas, Pre-processed information embedding system.
  449. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Wong, Douglas, Pre-processed information embedding system.
  450. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  451. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  452. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  453. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  454. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  455. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  456. Jonathan Scott Carr ; Burt W. Perry ; Geoffrey B. Rhoads, Printing and validation of self validating security documents.
  457. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  458. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  459. Selinfreund,Richard H.; Vig,Rakesh, Product packaging including digital data.
  460. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  461. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  462. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  463. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  464. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  465. Braudaway Gordon Wesley ; Mintzer Frederick Cole, Protecting images with an image watermark.
  466. Braudaway,Gordon Wesley; Mintzer,Frederick Cole, Protecting images with an image watermark.
  467. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  468. Stach,John; Brunk,Hugh L.; Sharma,Ravi K., Quantization-based data hiding employing calibration and locally adaptive quantization.
  469. Meredith B. Fischer ; Ronald P. Sansone, Recording graphical and tracking information on the face of a mailpiece.
  470. Ronald P. Sansone ; Meredith B. Fischer, Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia.
  471. Levy, Kenneth L., Recoverable digital content degradation.
  472. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  473. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  474. Sandford ; II Maxwell T. ; Handel Theodore G., Reference palette embedding.
  475. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  476. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  477. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  478. Hiroyuki Kimura JP; Takao Arai JP; Toshifumi Takeuchi JP, Reproducing method and apparatus, for a video signal having copy control information.
  479. Arimura,Koji; Inoue,Hisashi; Noridomi,Kenichi; Katsura,Takashi; Kadono,Shinya; Nakamura,Kazuhiko, Reproduction equipment, reproduction equipment specifying equipment, reproduction equipment specifying system and methods and recording media for said equipment and system.
  480. Begen, Geoffrey C., Restricted printing of postage with layout constraints in a browser.
  481. Levy, Kenneth L.; Rhoads, Geoffrey B.; Hiatt, R. Stephen, Rights management system and methods.
  482. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  483. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  484. Cox, Ingemar J.; Miller, Matthew L., Robust digital watermarking.
  485. Cox, Ingemar J.; Miller, Matthew L., Robust digital watermarking.
  486. Poorvi L. Vora, Robust watermarking for digital objects.
  487. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  488. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  489. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  490. Rhoads, Geoffrey B., Secure document design with machine readable, variable message encoded in a visible registration pattern.
  491. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  492. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  493. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  494. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  495. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  496. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  497. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  498. Stone, Chris L.; Garen, Scott, Secure tracking system and method for video program content.
  499. Coppersmith,Don; Mintzer,Frederick C.; Tresser,Charles P.; Weber,Samuel M.; Wu,Chai Wah; Yeung,Minerva Ming Yee, Secured signal modification and verification with privacy control.
  500. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  501. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  502. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  503. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  504. Geoffrey B. Rhoads, Security documents with hidden digital data.
  505. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  506. Bradley, Brett A., Self-orienting watermarks.
  507. Bradley,Brett A., Self-orienting watermarks.
  508. Tehranchi, Babak; Petrovic, Rade; Winograd, Joseph M.; Angelico, Dean Anthony, Signal continuity assessment using embedded watermarks.
  509. Reed, Alastair M.; Sharma, Ravi K., Signal decoding methods, apparatus and systems.
  510. Stach, John; Brunk, Hugh L.; Sharma, Ravi K., Signal embedding and detection using circular structures in a transform domain of a media signal.
  511. Hannigan, Brett T.; Levy, Kenneth L., Signal hiding employing feature modification.
  512. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  513. Winograd, Joseph M., Social media viewing system.
  514. Rhoads,Geoffrey B., Soft error decoding of steganographic data.
  515. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  516. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  517. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  518. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  519. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  520. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  521. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  522. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  523. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  524. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  525. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  526. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  527. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  528. Rhoads Geoffrey B., Steganographic methods and media for photography.
  529. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  530. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  531. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  532. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  533. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  534. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  535. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  536. Geiser, Bernd; Vary, Peter, Steganography in digital signal encoders.
  537. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  538. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  539. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  540. Stach,John, Symmetry watermark.
  541. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  542. Bell,Alan Edward; Lotspiech,Jeffrey Bruce, System and method for authorized compression of digitized music.
  543. Chaney, Jack, System and method for copy protection for digital signals.
  544. Chaney, Jack, System and method for copy protection for digital signals.
  545. Chaney, Jack, System and method for copy protection for digital signals.
  546. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  547. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  548. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  549. Hoffberg, Steven M., System and method for determining contingent relevance.
  550. John Man Kwong Kwan, System and method for digitally marking a file.
  551. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  552. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  553. Jones, Paul W.; Honsinger, Chris W.; Rabbani, Majid, System and method for embedding a watermark signal that contains message data in a digital image.
  554. Farkash, Eyal, System and method for embedding data in video.
  555. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  556. Nash Putnam,Jon, System and method for insertion and retrieval of microthreads in transmitted data.
  557. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  558. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  559. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  560. Shutt, Michael, System and method for pleographic recognition, matching, and identification of images and objects.
  561. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  562. Rajamadam C. Venkatraman ; Unmesh Sahasrabuddhe ; Ashish Warty, System and method for providing trade confirmations.
  563. Matsumori, Kunihiko, System and method for recovering bar code errors.
  564. Rusterholz John T., System and method for reordering lookup table entries when table address bits are inverted.
  565. Rusterholz John T., System and method for reordering lookup table entries when table address bits are reordered.
  566. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  567. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  568. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  569. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  570. Olligschlaeger, Andreas M., System and method for three-way call detection.
  571. Olligschlaeger, Andreas M., System and method for three-way call detection.
  572. Olligschlaeger, Andreas M., System and method for three-way call detection.
  573. Olligschlaeger, Andreas M., System and method for three-way call detection.
  574. John R. Squilla ; John K. McBride ; Stephen L. Shaffer, System and method of constructing a photo album.
  575. Squilla John R. ; Shaffer Stephen L. ; McBride John K., System and method of constructing a photo album.
  576. Squilla, John R.; Shaffer, Stephen L.; McBride, John K., System and method of constructing a photo album.
  577. Squilla, John R.; Shaffer, Stephen L.; McBride, John K.; Fitter, Jr., Charles F., System and method of constructing a photo album.
  578. Stephen L. Shaffer ; John K. Mcbride ; John R. Squilla, System and method of constructing a photo album.
  579. Squilla John R. ; Shaffer Stephen L. ; McBride John K., System and method of constructing a photo collage.
  580. Schumann Robert W. ; Iu Siu-Leong ; Bugwadia Kobad ; Mercier Guillaume ; Ramadoss Shiva ; Bergeron Michael ; Ehrhardt Jack, System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies.
  581. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  582. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  583. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  584. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  585. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  586. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  587. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  588. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  589. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  590. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  591. Geyzel, Zeev; Dorrendorf, Leonid, System for embedding data.
  592. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  593. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  594. Chen Brian ; Wornell Gregory W., System method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  595. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph, System reactions to the detection of embedded watermarks in a digital host content.
  596. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M., System reactions to the detection of embedded watermarks in a digital host content.
  597. Petrovic,Rade; Tehranchi,Babak; Winograd,Joseph M., System reactions to the detection of embedded watermarks in a digital host content.
  598. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  599. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  600. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  601. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  602. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  603. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  604. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  605. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  606. King, Graham, System, method, and computer program product for connecting or coupling analog audio tone based communications systems over a packet data network.
  607. Brian Chen ; Gregory W. Wornell, System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators.
  608. Brian Chen ; Gregory W. Wornell, System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  609. Chen Brian ; Wornell Gregory W., System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  610. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  611. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  612. Barlow Steven ; Leaphart ; Jr. Eldridge ; Strazds Guntis V. ; Rudbart Curtis, Systems and methods for locking interactive objects.
  613. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  614. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  615. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  616. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  617. Begen, Geoffrey C., Systems and methods for protecting content when using a general purpose user interface application.
  618. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  619. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  620. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  621. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  622. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  623. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  624. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  625. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  626. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  627. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  628. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  629. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  630. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  631. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  632. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  633. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  634. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  635. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  636. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  637. Ramaswamy, Venkat, Systems and methods for spreading messages online.
  638. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  639. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  640. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  641. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  642. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  643. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  644. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  645. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  646. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  647. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  648. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  649. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  650. Goodman Rodney M. ; Emerson Karen ; Dickson Jeffrey, Television advertising automated billing system.
  651. Goodman, Rodney M.; Hackett, Karen Emerson; Dickson, Jeffrey Allen, Television advertising automated billing system.
  652. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  653. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  654. Martin, Thomas J., Three-way call detection using steganography.
  655. Martin,Thomas J., Three-way call detection using steganography.
  656. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  657. Le Henaff, Guy, Tracing a document in an electronic publication.
  658. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  659. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  660. Bruckstein, Alfred M.; Richardson, Thomas J., Transform domain image watermarking method and system.
  661. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  662. Levy, Kenneth L., Transmarking of multimedia signals.
  663. Levy,Kenneth L., Transmarking of multimedia signals.
  664. Zink Scott E. ; Baker Daniel G., Transparent embedment of data in a video signal.
  665. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  666. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  667. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  668. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  669. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  670. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  671. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  672. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  673. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  674. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  675. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  676. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  677. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  678. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  679. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  680. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  681. Antognini, Thomas Charles; Antognini, Walter Gerard, Variable formatting of digital data into a pattern.
  682. Alattar, Adnan M., Video fingerprinting to identify video content.
  683. Rhoads,Geoffrey B., Video steganography.
  684. Tewfik, Ahmed; Zhu, Bin; Swanson, Mitch, Video watermarking using temporal analysis.
  685. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  686. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  687. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  688. Echizen, Isao; Yoshiura, Hiroshi; Nakamura, Masafumi; Arai, Takao; Takeuchi, Toshifumi, Water-mark embedding method and system.
  689. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  690. Rhoads, Geoffrey B., Watermark embedder and reader.
  691. Rhoads, Geoffrey B., Watermark embedder and reader.
  692. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  693. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  694. Langelaar, Gerrit Cornelis, Watermark embedding.
  695. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  696. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  697. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  698. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  699. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B., Watermark holograms.
  700. Echizen,Isao; Yoshiura,Hiroshi; Kimura,Hiroyuki; Fukushima,Akio; Anzai,Kousuke, Watermark information detection method.
  701. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  702. Sharma, Ravi K., Watermark synchronization signals conveying payload data.
  703. Tsuria, Yossef, Watermark system.
  704. Tsuria,Yossef, Watermark system.
  705. Tsuria,Yossef, Watermark system.
  706. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  707. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  708. Rodriguez, Tony; Gustafson, Ammon; Miller, Marc; Reed, Alastair M.; Rhoads, Geoffrey B., Watermarking an image in color plane separations and detecting such watermarks.
  709. Hannigan, Brett T.; Levy, Kenneth L., Watermarking employing the time-frequency domain.
  710. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
  711. Hannigan, Brett T.; Levy, Kenneth L., Watermarking in the time-frequency domain.
  712. Hannigan,Brett T.; Levy,Kenneth L., Watermarking in the time-frequency domain.
  713. Rhoads, Geoffrey B., Watermarking methods and media.
  714. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  715. Tian, Jun; Decker, Stephen K.; Brunk, Hugh L., Watermarking recursive hashes into frequency domain regions.
  716. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  717. Tian, Jun; Decker, Stephen K., Wavelet based feature modulation watermarks and related applications.
  718. Ravi K. Sharma ; Adnan M. Alattar ; Farid Ahmed ; Geoffrey B. Rhoads, Wavelet domain watermarks.
  719. Sharma, Ravi K.; Alattar, Adnan M.; Ahmed, Farid; Rhoads, Geoffrey B., Wavelet domain watermarks.
  720. Sharma,Ravi K.; Alattar,Adnan M.; Ahmed,Farid; Rhoads,Geoffrey B., Wavelet domain watermarks.
  721. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로