$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for embedding authentication information within digital data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0357713 (1994-12-14)
발명자 / 주소
  • Barton James M. (101 Sund Ave. Los Gatos CA 95032)
인용정보 피인용 횟수 : 687  인용 특허 : 0

초록

Arbitrary digital information is embedded within a stream of digital data, in a way that avoids detection by a casual observer and that allows a user to determine whether the digital data have been modified from their intended form. The embedded information may only be extracted as authorized and ma

대표청구항

A method for embedding information into a digital data block comprising a digital representation of an object, comprising the steps of: adding information to said digital data block by embedding said information into said data block and thereby deliberately introducing errors in said modified digita

이 특허를 인용한 특허 (687)

  1. Calhoon, Sean; Rodriguez, Tony F., Active images through digital watermarking.
  2. Calhoon, Sean; Rodriguez, Tony F., Active images through digital watermarking.
  3. Michaels, Alan J., Ad-hoc network acquisition using chaotic sequence spread waveform.
  4. Michaels, Alan J.; David, Chester B., Adaptive link communications using adaptive chaotic spread waveform.
  5. Hirai,Jun; Choi,Yoonki, Additional-data embedding apparatus and additional-data embedding method.
  6. Wampler,James W.; Wampler,Scott D.; Vaitekunas,Jeffrey J., Advertising method for dynamic billboards.
  7. Michaels, Alan J.; Chester, David B., Anti-jam communications having selectively variable peak-to-average power ratio including a chaotic constant amplitude zero autocorrelation waveform.
  8. Duffield,David Jay; Hogue, Jr.,William Bennett, Anti-piracy coding of motion pictures.
  9. Waserblat, Moshe; Aharoni, Gili; Bachar, Aviv; Eliam, Barak; Freedman, Ilan, Apparatus and method for audio content analysis, marking and summing.
  10. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  11. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  12. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  13. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  14. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  15. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  16. Fudge,Brian; Thyagarajan,Kadayam; Rosen,Eric, Apparatus and method for watermarking a digital image.
  17. Fudge,Brian; Thyagarajan,Kadayam; Rosen,Eric, Apparatus and method for watermarking a digital image.
  18. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  19. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  20. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  21. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  22. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  23. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  24. Anigbogu Julian C. ; Reniska Kim, Apparatus, system and method for secure, recoverable, adaptably compressed file transfer.
  25. Reed, Alastair M., Applying digital watermarks using dot gain correction.
  26. Davis,Bruce L.; Rhoads,Geoffrey B., Associating data with images in imaging systems.
  27. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  28. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  29. Rhoads, Geoffrey B., Audio and video signal processing.
  30. Rhoads, Geoffrey B., Audio appliance and monitoring device responsive to watermark data.
  31. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  32. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  33. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  34. Rhoads Geoffrey B., Audio or video steganography.
  35. Rhoads Geoffrey B., Audio steganography.
  36. Rhoads, Geoffrey B., Audio steganography.
  37. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  38. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  39. Kirovski, Darko; Malvar, Henrique, Audio watermarking with covert channel and permutations.
  40. Kirovski,Darko; Malvar,Henrique; Jakubowski,Mariusz H., Audio watermarking with dual watermarks.
  41. Kirovski,Darko; Malvar,Henrique; Jakubowski,Mariusz H., Audio watermarking with dual watermarks.
  42. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  43. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  44. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  45. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  46. Levy,Kenneth L.; Tian,Jun, Authenticating media signals by adjusting frequency characteristics to reference values.
  47. Davis,Bruce L.; Rhoads,Geoffrey B.; Conwell,William Y., Authenticating metadata and embedding metadata in watermarks of media signals.
  48. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  49. Boehm, Reinhold; Groeschel, Alexander; Hoerich, Holger; Homm, Daniel; Schildbach, Wolfgang A.; Schug, Michael; Watzke, Oliver; Wolters, Martin; Ziegler, Thomas, Authentication of data streams.
  50. Rhoads,Geoffrey B., Authentication of identification documents.
  51. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  52. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  53. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  54. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  55. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  56. Rhoads, Geoffrey B., Authentication using a digital watermark.
  57. Geist, Bruce K., Autonomously secured image data.
  58. Rhoads, Geoffrey B., Background watermark processing.
  59. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Benchmarks for digital watermarking.
  60. Ellingson, Eric E., Bi-directional image capture methods and apparatuses.
  61. Michaels, Alan J.; Chester, David B., Bit error rate reduction in chaotic communications.
  62. Vaitekunas,Jeffrey J.; Wampler,Scott D.; Wampler,James W., Business method for billboard advertising.
  63. Ellingson, Eric E., Capturing and encoding unique user attributes in media signals.
  64. Ellingson,Eric E., Capturing and encoding unique user attributes in media signals.
  65. Gvily,Yaniv, Client-based objectifying of text pages.
  66. Regnier Barbara Ann ; Youngers David Nicholas ; Dettinger Richard Dean ; Spors Daniel Arlan ; Thorson John David, Client/server computer system having personalizable and securable views of database data.
  67. Chester, David B.; Michaels, Alan J., Closed galois field cryptographic system.
  68. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  69. Rohatgi, Pankaj, Commitments in signatures.
  70. Michaels, Alan J.; Chester, David B., Communications system employing chaotic spreading codes with static offsets.
  71. Michaels, Alan J.; Chester, David B., Communications system employing orthogonal chaotic spreading codes.
  72. Michaels, Alan J.; Chester, David B., Communications system employing orthogonal chaotic spreading codes.
  73. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  74. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  75. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  76. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  77. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Confirming physical custody of objects.
  78. Levy, Kenneth L.; Rhoads, Geoffrey B.; Brunk, Hugh L., Connected audio and other media objects.
  79. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio content.
  80. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  81. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  82. Rhoads,Geoffrey B., Content identification, and securing media content with steganographic encoding.
  83. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  84. Tian, Jun; Stach, John, Content processing methods using reversible watermarking.
  85. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  86. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  87. Chester, David B.; Michaels, Alan J., Continuous time chaos dithering.
  88. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  89. Saito, Makoto, Controlling database copyrights.
  90. Saito, Makoto, Controlling database copyrights.
  91. Saito, Makoto, Controlling database copyrights.
  92. Rhoads, Geoffrey B., Controlling use of audio or image content.
  93. Levy, Kenneth L.; Stewart, Steven W., Conveying auxilliary data through digital watermarking.
  94. Cox Ingemar J. ; Miller Matthew L., Counteracting geometric distortions for DCT based watermarking.
  95. Rhoads,Geoffrey B., Counteracting geometric distortions in watermarking.
  96. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  97. Berringer, Ryan R.; Hougaard, Todd R.; Andrus, Richard S., Creating and verifying electronic documents.
  98. Michaels, Alan J.; Chester, David B., Cryptographic system including a mixed radix number generator with chosen statistical artifacts.
  99. Chester, David B.; Michaels, Alan J., Cryptographic system incorporating a digitally generated chaotic numerical sequence.
  100. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., Dangerous condition detection with user feedback.
  101. Saito, Makoto, Data copyright management.
  102. Saito, Makoto, Data copyright management.
  103. Saito, Makoto, Data copyright management system.
  104. Saito,Makoto, Data copyright management system.
  105. Sanford ; II Maxwell T. ; Handel Theodore G., Data embedding employing degenerate clusters of data having differences less than noise value.
  106. Saito, Makoto, Data management.
  107. Saito, Makoto, Data management system.
  108. Saito, Makoto, Data management system.
  109. Saito, Makoto, Data management system.
  110. Moskowitz, Scott A., Data protection method and device.
  111. Moskowitz, Scott A., Data protection method and device.
  112. Moskowitz, Scott A., Data protection method and device.
  113. Moskowitz, Scott A., Data protection method and device.
  114. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  115. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  116. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  117. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  118. Attias, Hagai T.; Kirovski, Darko, Detecting beat information using a diverse set of correlations.
  119. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  120. Rhoads, Geoffrey B., Detecting hidden auxiliary code signals in media.
  121. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  122. Rabin,Michael O.; Shasha,Dennis E.; Bosley,Carleton J.; Caceres,Ramon; Ingram,Aaron; Karia,Timir; Molnar,David; Beinart,Yossi, Detection and identification methods for software.
  123. Reed, Alastair M., Detection from two chrominance directions.
  124. Reed, Alastair M., Detection from two chrominance directions.
  125. Reed, Alastair M.; Cattone, Jeremy, Detection of out-of-phase low visibility watermarks.
  126. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  127. Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
  128. Rodriguez,Tony F.; Calhoon,Sean; Rhoads,Geoffrey B.; Carr,J. Scott, Digital asset management, targeted searching and desktop searching using digital watermarks.
  129. Rhoads, Geoffrey B., Digital authentication with analog documents.
  130. Rhoads, Geoffrey B., Digital authentication with analog documents.
  131. Rhoads,Geoffrey B., Digital authentication with analog documents.
  132. Zhao Jian ; Koch Eckhard,DEX, Digital authentication with analog documents.
  133. Saito, Makoto, Digital content management system and apparatus.
  134. Saito, Makoto, Digital content management system and apparatus.
  135. Saito, Makoto, Digital content management system and apparatus.
  136. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  137. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  138. Michaels, Alan J.; Chester, David B., Digital generation of an accelerated or decelerated chaotic numerical sequence.
  139. Prokoski,Francine J., Digital imaging system for evidentiary use.
  140. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  141. Rhoads, Geoffrey B., Digital watermark decoding method.
  142. Reed, Alastair M.; Hannigan, Brett T., Digital watermark detection using predetermined color projections.
  143. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  144. Brundage, Trent J.; Brunk, Hugh L., Digital watermark key generation.
  145. Brundage, Trent J.; Brunk, Hugh L., Digital watermark key generation.
  146. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  147. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  148. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  149. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  150. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  151. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  152. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  153. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  154. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  155. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  156. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Digital watermarking methods and apparatus for use with audio and video content.
  157. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  158. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  159. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  160. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  161. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  162. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  163. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  164. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  165. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Digital watermarking to resolve multiple claims of ownership.
  166. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  167. Marshall, Alan D., Digital watermarks.
  168. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  169. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  170. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  171. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  172. Andelin, Victor L.; Levy, Kenneth L., Digitally watermarking documents associated with vehicles.
  173. Chester, David B.; Michaels, Alan J., Discrete time chaos dithering.
  174. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  175. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  176. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  177. Wampler,Scott D., Dynamic device and method for dispensing machines.
  178. Wampler,Scott D.; Wampler,James W.; Vaitekunas,Jeffrey J., Dynamic device for billboard advertising.
  179. Rohatgi, Pankaj, Efficient hybrid public key signature scheme.
  180. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  181. Rhoads,Geoffrey B., Embedding auxiliary signals with multiple components into media signals.
  182. Brunk,Hugh L.; Alattar,Osama M., Embedding digital watermarks in spot colors.
  183. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  184. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  185. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  186. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  187. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  188. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  189. Chang Kenneth H. P., Encoding and decoding a message within an image.
  190. Chang, Kenneth H. P., Encoding and decoding a message within an image.
  191. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  192. Rhoads, Geoffrey B., Encoding and decoding media signals.
  193. Chang, Kenneth H. P., Encoding and recording a message within an image.
  194. Reed, Alastair M., Encoding in two chrominance directions.
  195. Reed, Alastair M., Encoding in two chrominance directions.
  196. Chester, David B.; Michaels, Alan J., Encryption via induced unweighted errors.
  197. Reed, Alastair M.; Hannigan, Brett T.; Brundage, Trent J., Enhancing embedding of out-of-phase signals.
  198. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  199. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  200. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  201. Beckett, Cynthia F.; Alur, Deepak; Jansson, Mats; Hyde, Virginia C., Event-driven servers for data extraction and merge for EDI transaction processing using the internet.
  202. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  203. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  204. Rhoads, Geoffrey B., Files and methods employing common information in both header and steganographic embedding.
  205. Schultz, Mark Alan; Osawa, Roy, Film fingerprinting.
  206. Rhoads, Geoffrey B.; Levy, Kenneth L., Fingerprint methods and systems for media signals.
  207. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  208. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  209. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  210. Michaels, Alan J., Hidden Markov Model detection for spread spectrum waveforms.
  211. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  212. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  213. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  214. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  215. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  216. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; McNeil, Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  217. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; McNeil, Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  218. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Hebrank,John H.; McNeil,Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  219. Michaels, Alan J.; Chester, David B., High-speed cryptographic system using chaotic sequences.
  220. Gennaro Rosario ; Rohatgi Pankaj, How to sign digital streams.
  221. Gennaro Rosario ; Rohatgi Pankaj, How to sign digital streams.
  222. Alattar, Adnan M., Identification and protection of security documents.
  223. Alattar, Adnan M., Identification and protection of video.
  224. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  225. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  226. Jones, Robert L., Identification document with three dimensional image of bearer.
  227. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  228. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  229. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  230. Abdel-Mottaleb, Mohamed, Image and video authentication system.
  231. Maitz Glenn S. ; Good Walter F. ; Herron John M. ; Gur David, Image facsimile with real time image segmentation.
  232. Wakao, Satoru; Yamashita, Hiroki, Image processing apparatus, image processing method, computer program and computer-readable recording medium.
  233. Maeda, Masamine, Image processing method, image processing apparatus, image processing system and memory medium.
  234. Tian,Jun; Stach,John; Lofgren,Neil E., Image processing methods using reversible watermarking.
  235. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  236. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  237. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Including a metric in a digital watermark for media authentication.
  238. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  239. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  240. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  241. Felsher, David Paul, Information record infrastructure, system and method.
  242. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  243. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  244. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  245. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett Alan; Rhoads,Geoffrey B., Integrating digital watermarks in multimedia content.
  246. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  247. Rhoads, Geoffrey B., Internet linking from audio.
  248. Rhoads,Geoffrey B., Internet linking from image content.
  249. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  250. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  251. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  252. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  253. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  254. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  255. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  256. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  257. Hawes, Jonathan L., Linking documents through digital watermarking.
  258. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  259. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  260. Honsinger Chris W. ; Jones Paul W. ; Rabbani Majid ; Stoffel James C., Lossless recovery of an original image containing embedded data.
  261. Chester, David B., Low level sequence as an anti-tamper Mechanism.
  262. Reed, Alastair M.; Berkley, Jr., Lou H., Low visibility watermark using time decay fluorescence.
  263. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  264. Stebbings, David W., METHOD FOR MINIMIZING PIRATING AND/OR UNAUTHORIZED COPYING AND/OR UNAUTHORIZED ACCESS OF/TO DATA ON/FROM DATA MEDIA INCLUDING COMPACT DISCS AND DIGITAL VERSATILE DISCS, AND SYSTEM AND DATA MEDIA FOR .
  265. Reed, Alastair M.; Rodriguez, Tony F., Machine-readable security features for printed objects.
  266. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
  267. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., Managing and indexing content on a network with image bookmarks and digital watermarks.
  268. Brundage, Trent J.; Brunk, Hugh L., Message encoding.
  269. Brundage, Trent J.; Brunk, Hugh L., Message key generation.
  270. Brundage, Trent J.; Brunk, Hugh L., Message key generation.
  271. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  272. Lubin, Jeffrey; Polyzois, Christos Alkivladis, Method and apparatus for analog insertion of low frequency watermarks.
  273. Rhoads, Geoffrey B., Method and apparatus for associating identifiers with content.
  274. Rhoads,Geoffrey B., Method and apparatus for associating identifiers with content.
  275. Levy, Kenneth L., Method and apparatus for automatic ID management.
  276. Levy, Kenneth L., Method and apparatus for content management.
  277. Levy, Kenneth L., Method and apparatus for content management.
  278. Levy, Kenneth L., Method and apparatus for content management.
  279. Goldberg Randy G. ; Sachs Richard M. ; Wetzel William R., Method and apparatus for creating electronic water marks in digital data.
  280. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  281. Isnardi Michael Anthony ; Musgrave Clyde, Method and apparatus for embedding a watermark into a digital image or image sequence.
  282. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  283. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  284. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  285. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  286. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for embedding data, including watermarks, in human perceptible images.
  287. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  288. Sun, Qibin; Wu, Jiankang; Deng, Huijie Robert, Method and apparatus for embedding digital information in digital multimedia data.
  289. Florencio Dinei A. ; Isnardi Michael A., Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence.
  290. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  291. Rabin, Michael O.; Shasha, Dennis E., Method and apparatus for protecting information and privacy.
  292. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  293. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  294. Rabin,Michael O.; Shasha,Dennis E.; Beinart,Yossi; Caceres,Ramon; Karia,Timir; Molnar,David; Rolinson,Sean, Method and apparatus for protecting information and privacy.
  295. Costa,Pierre, Method and apparatus for providing controlled impairments to an optical transport system.
  296. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  297. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for scene-based video watermarking.
  298. Hershey, John E.; Harrison, Daniel D.; Grabb, Mark L.; Welles, Kenneth B.; Nestler, Douglas G., Method and apparatus for steganographic embedding of meta-data.
  299. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  300. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for video watermarking using perceptual masks.
  301. Rhoads, Geoffrey B., Method and apparatus for watermarking video images.
  302. Xu,Changsheng; Wu,Jiankang; Sun,Qibin, Method and apparatus for watermarking wavetable synthesis architectures.
  303. Jameson, David H.; Tresser, Charles P.; Wu, Chai W.; Abrams, Steven R.; Windgrad, Shmuel, Method and apparatus for watermarking with no perceptible trace.
  304. Terada, Kosei; Taruguchi, Hideaki, Method and device for incorporating additional information into main information through electronic watermaking technique.
  305. Terada, Kosei; Taruguchi, Hideaki, Method and device for incorporating additional information into main information through electronic watermarking technique.
  306. Terada, Kosei; Taruguchi, Hideaki, Method and device for incorporating additional information into main information through electronic watermarking technique.
  307. Cox,Ingemar J.; Miller,Matthew L.; Rayner,Douglas F., Method and device for inserting and authenticating a digital signature in digital data.
  308. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  309. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  310. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  311. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  312. Taruguchi Hideaki,JPX, Method and device for storing main information with associated additional information incorporated therein.
  313. Taruguchi,Hideaki, Method and device for storing main information with associated additional information incorporated therein.
  314. Taruguchi,Hideaki, Method and device for storing main information with associated additional information incorporated therein.
  315. Taruguchi,Hideaki, Method and device for storing main information with associated additional information incorporated therein.
  316. Sentinelli, Alexandro; Capovilla, Nicola; Celetto, Luca, Method and devices for distributing media contents and related computer program product.
  317. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  318. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  319. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  320. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  321. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  322. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  323. Rhoads, Geoffrey B., Method and system for encoding image and audio content.
  324. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  325. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  326. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  327. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  328. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  329. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Method and system for music distribution.
  330. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  331. Costa,Pierre, Method and system for providing controlled impairments to an optical transport system.
  332. Pruett Paul S. ; Marshall Aaron W. ; Jensen Joel R., Method and system for synchronizing computer file directories.
  333. de Queiroz,Ricardo L, Method for authentication of JPEG image data.
  334. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  335. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  336. Saito, Makoto, Method for controlling database copyrights.
  337. Saito,Makoto, Method for controlling database copyrights.
  338. Saito,Makoto, Method for controlling database copyrights.
  339. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  340. Bloom, Jeffrey A.; Cox, Ingemar J.; Miller, Matthew L., Method for data preparation and watermark insertion.
  341. Cox, Ingemar J.; Miller, Matthew L., Method for increasing the functionality of a media player/recorder device.
  342. Ingemar J. Cox ; Matthew L. Miller, Method for increasing the functionality of a media player/recorder device or an application program.
  343. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  344. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  345. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  346. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  347. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  348. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  349. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  350. Burns, Gregory, Method for watermarking computer programs.
  351. Burns,Gregory, Method for watermarking computer programs.
  352. Burns,Gregory, Method for watermarking computer programs.
  353. Acharya, Tinku; Raj, Kannan, Method of integrating a watermark into a compressed image.
  354. Acharya, Tinku; Raj, Kannan, Method of integrating a watermark into a compressed image.
  355. Tinku Acharya ; Kannan Raj, Method of integrating a watermark into a compressed image.
  356. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  357. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  358. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  359. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  360. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  361. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  362. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  363. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  364. Rhoads, Geoffrey B., Methods and arrangements for processing image data.
  365. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  366. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  367. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  368. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  369. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  370. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  371. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  372. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  373. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  374. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  375. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  376. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  377. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  378. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  379. Rhoads,Geoffrey B., Methods for audio watermarking and decoding.
  380. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  381. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  382. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  383. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  384. Rhoads,Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  385. Rhoads, Geoffrey B., Methods for detecting alteration of audio.
  386. Rhoads Geoffrey B., Methods for detecting alteration of audio and images.
  387. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  388. Rhoads, Geoffrey B., Methods for encoding security documents.
  389. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  390. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  391. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  392. Rhoads, Geoffrey B., Methods for marking images.
  393. Rhoads,Geoffrey B., Methods for marking images.
  394. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  395. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  396. Erickson, John S., Methods for playing protected content.
  397. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  398. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  399. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  400. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  401. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  402. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  403. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  404. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  405. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  406. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  407. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  408. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  409. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  410. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  411. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  412. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  413. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  414. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  415. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  416. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  417. Bloom, Jeffrey Adam; Zou, Dekun, Modifying a coded bitstream.
  418. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  419. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  420. Stebbings, David W., Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs.
  421. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  422. Antonellis,Darcy; Bartley,Jeffrey J.; Elo,Margit Elisabeth; Gagnon,Jean Pierre; Hogue, Jr.,William B.; Price,Edward J., Motion picture anti-piracy coding.
  423. Levy, Kenneth L.; Stewart, Steven W., Multi-channel digital watermarking.
  424. Michaels, Alan J., Multi-tier ad-hoc network in which at least two types of non-interfering waveforms are communicated during a timeslot.
  425. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  426. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  427. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  428. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  429. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  430. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  431. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protection.
  432. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protections.
  433. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  434. Hunter, Charles Eric; Hebrank, John H., Music distribution systems.
  435. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  436. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  437. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Sparks,Kelly C.; Hebrank,John H., Music distribution systems.
  438. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Sparks,Kelly C.; Hebrank,John H., Music distribution systems.
  439. Rhoads, Geoffrey B., Music methods and systems.
  440. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  441. Rhoads, Geoffrey B, Network linking methods and apparatus.
  442. Rhoads,Geoffrey B., Network linking using index modulated on data.
  443. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  444. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  445. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  446. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  447. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  448. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  449. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  450. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  451. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  452. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  453. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  454. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  455. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  456. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  457. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  458. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  459. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  460. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  461. Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
  462. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  463. Reed, Alastair M.; Rogers, Eliot, Perceptability model applied to watermark signals.
  464. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett A., Perceptual modeling of media signals for data hiding.
  465. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett Alan, Perceptual modeling of media signals for data hiding.
  466. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett Alan, Perceptual modeling of media signals for data hiding.
  467. Michaels, Alan J.; Chester, David B., Permission-based TDMA chaotic communication systems.
  468. Michaels, Alan J.; Chester, David B., Permission-based multiple access communications systems.
  469. Michaels, Alan J.; Chester, David B., Permission-based multiple access communications systems.
  470. Michaels, Alan J.; Chester, David B., Permission-based secure multiple access communication systems.
  471. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  472. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  473. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  474. Abe, Yasushi, Pixel-based digital watermarks located near edges of an image.
  475. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  476. Chang,Kenneth H. P., Print user interface system and its applications.
  477. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  478. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  479. Tian, Jun; Stach, John, Progressive image quality control using watermarking.
  480. Tian, Jun; Stach, John, Progressive image quality control using watermarking.
  481. Yi, Qina, Promotion content delivery with media content.
  482. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  483. Michaels, Alan J.; Chester, David B., Rake receiver for spread spectrum chaotic communications systems.
  484. Jones, Robert L.; Reed, Alastair M., Readers to analyze security features on objects.
  485. Levy, Kenneth L., Recoverable digital content degradation.
  486. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  487. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  488. Rhoads, Geoffrey B., Redundantly embedding auxiliary data in source signals.
  489. Rhoads,Geoffrey B.; MacIntosh,Brian T., Registering with computer systems.
  490. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., Remote sensors for detecting alert conditions and notifying a central station.
  491. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John; Fallon, James; Summer, Robert, Remote sensors for detecting alert conditions and notifying a central station.
  492. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John; Fallon, James; Summer, Robert, Remote sensors for detecting alert conditions and notifying a central station.
  493. Chayanam, Pavan; Inskeep, Todd; Miller, Eric William; Newton, Clay; Shroyer, David Charles, Reusable authentication experience tool.
  494. Chayanam, Pavan; Inskeep, Todd; Miller, Eric William; Newton, Clay; Shroyer, David Charles, Reusable authentication experience tool.
  495. Tian, Jun; Decker, Stephen K., Reversible watermarking.
  496. Alattar, Adnan M.; Stach, John; Tian, Jun, Reversible watermarking using expansion, rate control and iterative embedding.
  497. Alattar,Adnan M.; Stach,John; Tian,Jun, Reversible watermarking using expansion, rate control and iterative embedding.
  498. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  499. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  500. Cox, Ingemar J.; Miller, Matthew L., Robust digital watermarking.
  501. Cox, Ingemar J.; Miller, Matthew L., Robust digital watermarking.
  502. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  503. Beckett Cynthia F. ; Alur Deepak ; Jansson Mats ; Hyde Virginia C., Secure event-driven EDI transaction processing using the internet.
  504. Pong, Fong; Spada, Eric; Schramm, Karen, Secure memory access controller.
  505. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  506. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  507. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  508. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  509. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  510. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  511. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  512. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  513. Coppersmith Don ; Mintzer Frederick Cole ; Tresser Charles P. ; Wu Chai Wah ; Yeung Minerva Ming-Yee, Secured signal modification and verification with privacy control.
  514. Coppersmith,Don; Mintzer,Frederick C.; Tresser,Charles P.; Weber,Samuel M.; Wu,Chai Wah; Yeung,Minerva Ming Yee, Secured signal modification and verification with privacy control.
  515. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  516. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  517. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  518. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  519. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  520. Geoffrey B. Rhoads, Security documents with hidden digital data.
  521. Jones,Robert L.; Reed,Alastair M., Security features for objects and method regarding same.
  522. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  523. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  524. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  525. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  526. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  527. Hannigan, Brett T.; Levy, Kenneth L., Signal hiding employing feature modification.
  528. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  529. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  530. Sako, Yoichiro; Osawa, Yoshitomo; Kurihara, Akira; Kawashima, Isao; Yoneyama, Shigeyuki, Signal transmision method.
  531. Hyde Virginia C. ; Alur Deepak ; Beckett Cynthia F. ; Jansson Mats, Simultaneous bi-directional translation and sending of EDI service order data.
  532. Daniel O. Ramos ; Brian T. MacIntosh ; Geoffrey B. Rhoads, Smart images and image bookmarking for an internet browser.
  533. Rhoads,Geoffrey B., Soft error decoding of steganographic data.
  534. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  535. Sturges, Steven; Norton, Marc, Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing.
  536. Malvar, Henrique S.; Florencio, Dinei A., Spread spectrum modulation system and method for embedding digital information into digital or analog media.
  537. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  538. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  539. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  540. Rhoads, Geoffrey B., Steganographic decoding with transform to spatial domain.
  541. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  542. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  543. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  544. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  545. Rhoads, Geoffrey B., Steganographic image processing.
  546. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  547. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  548. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  549. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  550. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  551. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  552. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  553. Rhoads Geoffrey B., Steganographic methods and media for photography.
  554. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  555. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  556. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  557. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  558. Michaels, Alan J.; Chester, David B., Symbol duration dithering for secured chaotic communications.
  559. Michaels, Alan J.; Chester, David B., Symbol estimation for chaotic spread spectrum signal.
  560. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  561. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  562. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  563. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  564. Pintsov Leon A., System and method for detection of errors in accounting for postal charges in controlled acceptance environment.
  565. Hoffberg, Steven M., System and method for determining contingent relevance.
  566. John Man Kwong Kwan, System and method for digitally marking a file.
  567. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  568. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  569. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., System and method for emergency notification content delivery.
  570. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D.; McNeil, Laurie, System and method for emergency notification content delivery.
  571. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Hebrank,John H.; Fallon,James; Summer,Robert D.; McNeil,Laurie, System and method for emergency notification content delivery.
  572. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  573. Erickson, John S., System and method for managing copyrighted electronic media.
  574. Peled, Ariel; Carny, Ofir; Troyansky, Lidror; Tirosh, Oren; Roglit, Guy; Gutman, Galit, System and method for monitoring unauthorized transport of digital content.
  575. Peled, Ariel; Carny, Ofir; Troyansky, Lidror; Tirosh, Oren; Roglit, Guy; Gutman, Galit, System and method for monitoring unauthorized transport of digital content.
  576. Peled, Ariel; Troyansky, Lidror; Carny, Ofir; Tirosh, Oren; Roglit, Guy; Gutman, Gallt, System and method for monitoring unauthorized transport of digital content.
  577. Olney, Matthew; Mullen, Patrick; Grenier, Lurene; Houghton, Nigel; Pentney, Ryan, System and method for near-real time network attack detection, and system and method for unified detection via detection routing.
  578. Minematsu, Kazuhiko, System and method for on-line digital watermark detection.
  579. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  580. Roesch, Martin Frederick, System and method for real time data awareness.
  581. Roesch, Martin Frederick, System and method for real time data awareness.
  582. Roesch, Martin Frederick, System and method for real time data awareness.
  583. Vogel, III, William Andrew; Baker, Andrew, System and method for resolving operating system or service identity conflicts.
  584. Shi, Yun-Qing; Xuan, Guorong, System and method for reversible data hiding based on integer wavelet spread spectrum.
  585. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  586. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  587. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  588. Marshall, Marvin, System and method for securely retrieving and playing digital media.
  589. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  590. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Summer, Robert D.; Sparks, Kelly C.; Sykes, Ollin B.; Hebrank, John H., System and method permitting customers to order products from multiple participating merchants.
  591. Erickson,John S., System and methods for managing digital creative works.
  592. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  593. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  594. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  595. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  596. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  597. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  598. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  599. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  600. de Queiroz, Ricardo L., System for authentication of JPEG image data.
  601. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  602. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  603. Chen Brian ; Wornell Gregory W., System method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  604. Brian Chen ; Gregory W. Wornell, System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators.
  605. Brian Chen ; Gregory W. Wornell, System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  606. Chen Brian ; Wornell Gregory W., System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  607. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  608. Roesch, Martin; Dempster, Ronald A.; Baker, Andrew; Gustafson, Eric, Systems and methods for determining characteristics of a network and enforcing policy.
  609. Hunter, Charles E.; Ballou, Jr., Bernard L.; Hebrank, John H., Systems and methods for distribution of entertainment and advertising content.
  610. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  611. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  612. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  613. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  614. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  615. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  616. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  617. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  618. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  619. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  620. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  621. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  622. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  623. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  624. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  625. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  626. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  627. Bruckstein, Alfred M.; Richardson, Thomas J., Transform domain image watermarking method and system.
  628. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  629. Lofgren, Neil E.; Perry, Burt W.; Stach, John, Transforming data files into logical storage units for auxiliary data through reversible watermarks.
  630. Levy, Kenneth L., Transmarking of multimedia signals.
  631. Levy,Kenneth L., Transmarking of multimedia signals.
  632. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  633. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  634. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  635. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  636. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  637. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  638. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  639. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  640. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  641. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  642. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  643. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  644. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  645. Maheshwari,Umesh; Vingralek,Radek; Sibert,W. Olin, Trusted storage systems and methods.
  646. Levy,Kenneth L., User-friendly rights management systems and methods.
  647. Levy, Kenneth L., Using embedded data with file sharing.
  648. Levy, Kenneth L., Using embedded data with file sharing.
  649. Levy, Kenneth L., Using embedded data with file sharing.
  650. Levy, Kenneth L., Using object identifiers with content distribution.
  651. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  652. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  653. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  654. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  655. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  656. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  657. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  658. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  659. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  660. Rhoads,Geoffrey B., Video steganography.
  661. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  662. Reed,Allister; Hannigan,Brett, Watermark detection using adaptive color projections.
  663. Rhoads, Geoffrey B., Watermark embedder and reader.
  664. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  665. Geoffrey B. Rhoads, Watermark enabled video objects.
  666. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  667. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  668. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  669. Anglin, Hugh W., Watermark systems and methods.
  670. Hannigan, Brett T.; Levy, Kenneth L., Watermarking employing the time-frequency domain.
  671. Hannigan, Brett T.; Levy, Kenneth L., Watermarking in the time-frequency domain.
  672. Hannigan,Brett T.; Levy,Kenneth L., Watermarking in the time-frequency domain.
  673. Rhoads, Geoffrey B., Watermarking methods and media.
  674. Alattar, Adnan M.; Stach, John; Tian, Jun, Watermarking of data invariant to distortion.
  675. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  676. Tian, Jun; Decker, Stephen K.; Brunk, Hugh L., Watermarking recursive hashes into frequency domain regions.
  677. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  678. Kirovski, Darko; Malvar, Henrique, Watermarking with covert channel and permutations.
  679. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
  680. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
  681. Tian, Jun; Decker, Stephen K., Wavelet based feature modulation watermarks and related applications.
  682. Petrogiannis, Tommy; Laurie, Michael; Leblanc, François; Goudreault-Emond, Benoit, Web-based method and system for applying a legally enforceable signature on an electronic document.
  683. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  684. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  685. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  686. Rhoads, Geoffrey B., Wireless methods using signature codes.
  687. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로