$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus responsive to a code signal conveyed through a graphic image 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/36
출원번호 US-0436099 (1995-05-08)
발명자 / 주소
  • Rhoads Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Klarquist Sparkman Campbell Leigh & Whinston, LLP
인용정보 피인용 횟수 : 305  인용 특허 : 121

초록

An identification code signal is impressed on a carrier to be identified (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned and the carrier thereby identified. The method and apparatus are characterized by robustness desp

대표청구항

[ I claim:] [1.] In a method of processing image data, the method including providing image processing equipment including a computer, a storage medium, and an image processing program stored in said medium and executing on said computer, said program permitting editing of images, and providing to s

이 특허에 인용된 특허 (121)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Kahn Leonard R. (137 E. 36th St. New York NY 10016), Anti-copy system utilizing audible and inaudible protection signals.
  3. Blasbalg Herman L. (Baltimore MD), Anti-jam communications system.
  4. Blonstein Stephen M. (San Jose CA) Allen James D. (Santa Clara CA) Boliek Martin P. (Palo Alto CA), Apparatus and method for compressing still images.
  5. Nakano Kenji (Kanagawa JPX), Apparatus and method for preventing unauthorized dubbing of a recorded signal.
  6. Cooper J. Carl (1373 Sydney Dr. Sunnyvale CA 94087), Apparatus and method for receiving audio signals transmitted as part of a television video signal.
  7. Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
  8. Maufe Barry G. (London GB2), Apparatus for marking a recorded signal.
  9. Gibson James J. (Princeton NJ), Apparatus for transmitting auxiliary signal in a TV channel.
  10. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  11. Bronfin Kenneth A. (New York NY) Mahrer Stephen M. (Mt. Holly NJ) Wilson W. Robin (New York NY) Davenport Francis A. (Haddonfield NJ), Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast p.
  12. Lundy Rene R. (3016 SE. 39th Portland OR 97214) Tyler David L. (2939 SE. Taylor Portland OR 97214), Auditory subliminal message system and method.
  13. McDonald Neil A. (Witham GBX), Authenticator.
  14. Wright Christopher B. (San Francisco CA) Bristow Stephen (Los Altos Hills CA), Automated transaction system with modular printhead having print authentication feature.
  15. Chen Homer H. (Monmouth County NJ) Civanlar Mehmet R. (Monmouth County NJ) Haskell Barin G. (Monmouth County NJ), Block transform coder for arbitrarily shaped image segments.
  16. Miwa Hirohide (Kawasaki JPX) Shiratori Eiichi (Kawasaki JPX), Broadcast acknowledgement method and system.
  17. Lert ; Jr. John G. (9549 La Jolla Shores Dr. La Jolla CA 92037) Lert Peter W. (9549 La Jolla Shores Dr. La Jolla CA 92037) Cornelius John F. (1828 Dora Dr. Cardiff by the Sea CA 92007), Broadcast program identification method and system.
  18. Labedz Gerald P. (Chicago IL) Bonta Jeffrey D. (Mount Prospect IL) Schaeffer Dennis R. (Buffalo Grove IL) Tell Daniel F. (Deerfield IL), Cellular voice and data radiotelephone system.
  19. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  20. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  21. Johnson Keith O. (Pacifica CA) Pflaumer Michael W. (Berkeley CA), Compatible signal encode/decode system.
  22. Allen James D. (Rochester NY), Confidential document reproduction method and apparatus.
  23. Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Counterfeit proof ID card having a scrambled facial image.
  24. Leslie William M. (5873 Gullstrand St. San Diego CA 92122), Credit card security system.
  25. Hustig Charles H. (Hudson WI) Ward Jeffrey L. (Hudson WI) Moses Donald W. (Minneapolis MN) Bradford Robert S. (Woodland Hills CA), Data and voice communications system.
  26. Becker Wolfgang (Neubiberg DEX) Hierweger Alexander (Rottach-Egern DEX) Merkle Hansjrgen (Munich DEX) Lob Erwin (Munich DEX) Lass Joseph (Munich DEX) Kaule Wittich (Emmering DEX), Data carrier having an optical authenticity feature and methods for producing and testing said data carrier.
  27. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  28. Elsner Peter (Fritz-Baer-Str. 27 8000 Munich 71 DEX), Device for the identification of messages.
  29. Friedman Gary L. (Encino CA), Digital camera with apparatus for authentication of images produced from an image file.
  30. Sugiyama Takatoshi (Kanagawa JPX) Kubota Shuji (Kanagawa JPX) Morikura Masahiro (Kanagawa JPX) Enomoto Kiyoshi (Kanagawa JPX) Kato Shuzo (Kanagawa JPX), Digital communication system using superposed transmission of high speed and low speed digital signals.
  31. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  32. Froessl, Horst, Document and data handling and retrieval system.
  33. Philibert Alex C. (3001 Mockingbird Dr. Sierra Vista AZ 85635) Smith Jack W. (1831 Exeter Dr. Sierra Vista AZ 85635) Fox James W. (172 Andrea Dr. Sierra Vista AZ 85635), Document reproduction security system.
  34. Gotanda Motohiro (1802-10 Nakabyo ; Abiko-shi ; Chiba-ken JPX), Door lock control system.
  35. Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
  36. O\Grady William J. (Yonkers NY) Dubner Robert J. (Westwood NJ), Embedment of data in a video signal.
  37. Howard Jonathan M. (Easthampton NY), Encoding of transmitted program material.
  38. Gross Gary (Apt. 203 2721 Victoria Pk. Ave. Agincourt ; Ontario CAX M1T 3N6) Dale James (65 Huntley St. Toronto CAX M44 2L2), Encoding system.
  39. Normille James O. (Sunnyvale CA) Yeh Chia L. (Saratoga CA) Wright Daniel W. (Sunnyvale CA) Chu Ke-Chiang C. (Saratoga CA), Encoding/decoding moving images with forward and backward keyframes for forward and reverse display.
  40. Hefti Aldo (Biasca CHX), Identification system.
  41. Milheiser Thomas A. (Littleton CO), Identification system.
  42. Shiang Lu P. (Beijing CNX) He Duanfeng (Beijing CNX), Identification system using computer generated moire.
  43. Resnikoff Howard L. (Winchester MA) Pollen David (Lexington MA) Linden David C. P. (Cambridge MA) Lawton Wayne M. (Somerville MA), Image coding apparatus and method utilizing separable transformations.
  44. Goldman Robert N. (Honolulu HI), Image dissecting document verification system.
  45. Funada Masahiro (Yokohama JPX) Kitamura Toshiyuki (Kawasaki JPX) Yamamoto Mitsuhiro (Kawasaki JPX) Ohta Eiji (Fujisawa JPX), Image processing apparatus which adds apparatus identification data to images.
  46. Suzuki Takashi (Tokyo JPX), Image processing with anti-forgery provision.
  47. Pack Seung K. (Seoul KRX) Chung Tae Y. (Seoul KRX), Image signal band compressing system for digital video tape recorder.
  48. Broughton Robert S. (Beaverton OR) Laumeister William C. (San Jose CA), Interactive video method and apparatus.
  49. Hiller Thomas L. (Glen Ellyn IL) Spanke Ronald A. (Wheaton IL) Stanaway ; Jr. John J. (Wheaton IL) Wierzbicki Alex L. (Bolingbrook IL) Zola Meyer J. (Oak Park IL), Intra-switch communications in narrow band ATM networks.
  50. Maufe Barry G. (London GB2), Marked recorded signals.
  51. Conanan Virgilio D. (475 Graphic Blvd. New Milford NJ 07646), Method and apparatus for adaptively superimposing bursts of texts over audio signals and decoder thereof.
  52. Samyn Johan (Roeselare BEX), Method and apparatus for checking the authenticity of documents.
  53. Schwartz Edward L. (Sunnyvale CA), Method and apparatus for compressing and decompressing images of documents.
  54. Rushforth Craig K. (Kaysville UT) Xie Zhenhua (Salt Lake City UT) Short Robert T. (Salt Lake City UT), Method and apparatus for decoding multiple bit sequences that are transmitted simultaneously in a single channel.
  55. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  56. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  57. Hujink Hendrik W. (Aalten NLX), Method and apparatus for producing admission tickets.
  58. Shamir Adi (Rehovot ILX), Method and apparatus for protecting visual information with printed cryptographic watermarks.
  59. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for protection of signal copy.
  60. Callahan Sean M. (Cupertino CA), Method and apparatus for real-time lossless compression and decompression of image data.
  61. Rabbani Majid (Pittsford NY), Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system.
  62. Greenberg, Burton L., Method and apparatus for the automatic identification and verification of commercial broadcast programs.
  63. Greenberg Burton L. (New York NY), Method and apparatus for the processing of encoded data in conjunction with an audio broadcast.
  64. Krause Edward A. (San Diego CA) Tom Adam (La Jolla CA) Liu Vincent (San Gabriel CA), Method and apparatus for vector coding of video transform coefficients.
  65. Copriviza Robert C. (Tarzana CA) Dubin Arnold M. (Calabasas CA) Ackerman Edward B. (Encino CA) Wood Jackson B. (Tarzana CA) Eakins Jeffrey S. (Claremont CA) Harmon David D. (Torrance CA), Method and apparatus for video signal encoding, decoding and monitoring.
  66. Kafri Oded (Beersheba ILX) Keren Eliezer (Arad ILX), Method and apparatus of encryption of optical images.
  67. Aoki Yutaka (Fujisawa JPX) Gohda Yuji (Himeji FL JPX) Rackley Darwin P. (Boca Raton FL), Method and means for fast writing of run length coded bit strings into bit mapped memory and the like.
  68. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
  69. Kondo Kazuhiro (Kokubunji JPX) Suzuki Toshiro (Tama JPX), Method and system for transmitting variable rate speech signal.
  70. Leighton Frank T. (15 Charlesden Pk. Newtonville MA 02160) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for authenticating objects identified by images or other identifying information.
  71. Kunt Murat (Grandvaux CHX) Bign Joseph (Renens CHX) Duc Benot (Ecublens CHX), Method for the marking of documents.
  72. Greenblatt, Richard D., Method of and apparatus for integrated voice (audio) communication simultaneously with "under voice" user-transparent digital data between telephone instruments.
  73. Gassmann Gerhard-Gnter (Esslingen-Berkheim DEX), Method of and system for transmitting two different messages on a carrier wave over a single transmission channel of pre.
  74. Pommier Daniel (Mordelles FRX), Method of digital sound broadcasting in television channels with spectrum interlacing.
  75. Butera Bill (Emmendingen DEX), Method of encoding and decoding the video data of an image sequence.
  76. Rothfjell Rolf E. (Kalix SEX), Method of securing simple codes.
  77. Blthgen Bjrn (Celle DEX), Method of transmitting audio information and additional information in digital form.
  78. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  79. Tow Robert F. (Palo Alto CA), Methods and means for embedding machine readable digital data in halftone images.
  80. van der Gracht Peter K. (Burnaby CAX) Donaldson Robert W. (Vancouver CAX), Modem for pseudo noise communication on A.C. lines.
  81. Goldman Robert N. (Kailua HI), Non-counterfeitable document system.
  82. Borror Alan L. (Andover MA) Ellis Ernest W. (Carlisle MA) Faramarzpour Faramarz (Sudbury MA) MacKenzie Hugh R. (Belmont MA) McGowan Donald A. (Stoneham MA), Optical storage identification card and read/write system.
  83. Ruell Hartwig (Fuerstenfeldbruck DEX), Personal authentication system.
  84. Schmidt Johan M. (Eindhoven NLX) Voorman Johannes O. (Eindhoven NLX), Radio broadcasting system with transmitter identification.
  85. Schreiber William F. (Cambridge MA) Lippman Andrew B. (Salem MA) Adelson Edward H. (Cambridge MA) Netravali Aran N. (Westfield NJ), Receiver-compatible enhanced definition television system.
  86. Melen Roger D. (Los Altos Hills CA), Record document authentication by microscopic grain structure and method.
  87. Betts William L. (St. Petersburg FL) Zuranski Edward S. (Largo FL), Secondary channel for digital modems using spread spectrum subliminal induced modulation.
  88. Margolin George D. (Newport Beach CA), Secure identification card and system.
  89. Goldman Robert N. (Kailua HI), Secure transaction card and verification system.
  90. Rourke John L. (Fairport NY) Wing Peter D. (Webster NY) Ratcliffe ; II Jack F. (Pittsford NY) Valliere Paul J. (Fairport NY), Security system for electronic printing systems.
  91. Miyata Kunio (Tokyo JPX), Security system with imaging function.
  92. Best Stuart J. (Hayes GB2) Willard Reginald A. (Hayes GB2), Signal identification.
  93. Bain Walter F. (Lovettsville VA), Signaling system.
  94. Hyatt Gilbert P. (7841 Jennifer Circle La Palma CA 90623), Signature filter system.
  95. Moses Donald W. (1590 Murphy Pkwy. Eagan MN 55122-1753), Simultaneous transmission of data and audio signals by means of perceptual coding.
  96. Moses Donald W. (1590 Murphy Pkwy. Eagan MN 55122-1753), Simultaneous transmission of data and audio signals by means of perceptual coding.
  97. Moses Donald W. (Minneapolis MN) Hustig Charles (Hudson WI) Ballard C. Ray (Venice FL), Simultaneous transmission of two information signals within a band-limited communications channel.
  98. Maxemchuk Nicholas F. (Mountainside NJ), Spread spectrum arrangement for (de)multiplexing speech signals and nonspeech signals.
  99. Ishigaki Yukinobu (Tokyo JPX), Spread spectrum communication system.
  100. Iwasaki Yoshiki (Yokohama JPX), Spread spectrum communication system.
  101. DeJean Jean P. (Cincinnati OH) Lu Daozheng (Buffalo Grove IL) Weissman Robert (Westport CT), Spread spectrum digital data transmission over TV video.
  102. Werner Jean-Jacques (Holmdel NJ), Spread-spectrum identification signal for communications system.
  103. Hilton Howard E. (Snohomish WA), Statistically based continuous autocalibration method and apparatus.
  104. Causse D\Agraives Bertrand (Ispra ITX) Mathieu Janny (Nancy FRX) Jamar Patrick (Nancy FRX), Surface texture reading access checking system.
  105. Weinblatt Lee S. (797 Winthrop Rd. Teaneck NJ 07666), Survey of radio audience.
  106. Tyrrell Raymond E. (Raleigh NC) Bishop O. Lamar (Raleigh NC) Powell William E. (Raleigh NC) Krisher Dale L. (Raleigh NC) Stephenson William H. (Raleigh NC) Briscoe M. Rodney (Raleigh NC) Thorne Hal A, Synchronous optical transmission system.
  107. Schilling Donald L. (Sands Point NY), Synchronous spread-spectrum communications system and method.
  108. Vasilik Kenneth E. (Scotts Valley CA), System and methods for improved storage and processing of BITMAP images.
  109. Sherman Robert (1555 Rising Glen Rd. Los Angeles CA 90069), System for communication using a broadcast audio signal.
  110. Balkanski Alexandre (Palo Alto CA) Purcell Stephen C. (Mountain View CA) Kirkpatrick ; Jr. James W. (San Jose CA) Bonomi Mauro (Palo Alto CA) Hsu Wen-Chang (Saratoga CA), System for compression and decompression of video data using discrete cosine transform and coding techniques.
  111. Tetrick Kenneth H. (Minneapolis MN) McCoy Randall L. (St. Paul MN), System for forming picture, alphanumeric and micrographic images on the surface of a plastic card.
  112. Dlugos Daniel F. (Huntington CT), System for printing encrypted messages with bar-code representation.
  113. Saito Tutomu (Yokohama JPX) Iwamoto Akito (Kamakura JPX), System for recording an image having a facial image and ID information.
  114. Soltesz John A. (1082 Broadway Ave. Masury OH 44438), System for the secure storage and transmission of data.
  115. Warner, Paul, System for transmitting data simultaneously with audio.
  116. Clark John I. (Milford CT), System having a character generator for printing encrypted messages.
  117. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  118. Greenberg Burton L. (28 E. 10th St. New York NY 10003), Television program transmission verification method and apparatus.
  119. Collier Christopher J. (Carshalton Beeches GB2) Murray Robert J. (Horley GB2), Transmission system for sending two signals simultaneously on the same communications channel.
  120. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  121. Waggener William N. (Sarasota FL), Video system for conveying digital and analog information.

이 특허를 인용한 특허 (305)

  1. Zhao, Jian, Active watermarks and watermark agents.
  2. Zhao, Jian, Active watermarks and watermark agents.
  3. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  4. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  6. Rhoads, Geoffrey B., Analyzing audio, including analyzing streaming audio signals.
  7. Koltai Ferenc,HUX ; Baros Laszlo,HUX ; Adam Bence,HUX ; Takacs Ferenc,HUX, Anti-counterfeiting method and apparatus using digital screening.
  8. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  9. Louis H. Liang, Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters.
  10. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  11. Watanabe,Junya, Apparatus and methods for inserting and detecting electronic watermark.
  12. Watanabe,Junya, Apparatus and methods for inserting and detecting electronic watermark.
  13. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  14. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  15. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  16. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  17. Hawes, Jonathan L., Associating media through encoding.
  18. Rhoads, Geoffrey B., Audio and video signal processing.
  19. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  20. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  21. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  22. Rhoads, Geoffrey B., Audio steganography.
  23. Rodriguez, Tony F.; Rhoads, Geoffrey B., Authenticating identification and security documents.
  24. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents.
  25. Rodriguez, Tony F., Authenticating identification and security documents and other objects.
  26. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents and other objects.
  27. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  28. Rhoads,Geoffrey B., Authentication of identification documents.
  29. Safai, Mohammad A., Authentication stamping in a digital camera.
  30. Wang Shen-ge, Automatic detection and retrieval of embedded invisible digital watermarks from halftone images.
  31. Jaffe, Joshua M.; Kocher, Paul C.; Jun, Benjamin C., Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems.
  32. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  33. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  34. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  35. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  36. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  37. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio and other media objects.
  38. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  39. Levy, Kenneth L., Content identification and management in content distribution networks.
  40. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  41. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  42. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Control signals in streaming audio or video indicating a watermark.
  43. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  44. Rhoads, Geoffrey B., Controlling use of audio or image content.
  45. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  46. Gasper John, Copy restrictive color-negative photographic print media.
  47. Gasper John ; Sutton James Edward, Copy restrictive documents.
  48. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  49. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  50. Cox Ingemar J. ; Miller Matthew L., Counteracting geometric distortions for DCT based watermarking.
  51. Rhoads,Geoffrey B., Counteracting geometric distortions in watermarking.
  52. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  53. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  54. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  55. Ancin, Hakan, Data embedding and extraction techniques for documents.
  56. Sanford ; II Maxwell T. ; Handel Theodore G., Data embedding employing degenerate clusters of data having differences less than noise value.
  57. Tapson,Daniel Warren, Data processing apparatus and method.
  58. Nelson David J. ; Bryant Robert C. ; Leidig Carl F., Data reader and reader system having visible centerless targeting.
  59. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  60. Bryant, Robert C.; Nelson, David J.; Small, Jeffrey A., Data-reading image capture apparatus, camera, and method of use.
  61. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  62. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  63. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  64. Hisashi Nakatsuyama JP, Device for verifying use qualifications.
  65. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  66. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  67. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  68. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  69. Rhoads, Geoffrey B., Digital authentication with analog documents.
  70. Rhoads, Geoffrey B., Digital authentication with analog documents.
  71. Rhoads,Geoffrey B., Digital authentication with analog documents.
  72. Zhao Jian ; Koch Eckhard,DEX, Digital authentication with analog documents.
  73. Safai, Mohammad A., Digital camera and method for communicating digital image and at least one address image stored in the camera to a remotely located service provider.
  74. Safai Mohammad A. ; Wang Eugene, Digital camera having display device for displaying graphical representation of user input and method for transporting the selected digital images thereof.
  75. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  76. Safai, Mohammad A., Digital image processor for a digital camera.
  77. Safai, Mohammad A., Digital image processor for a digital camera.
  78. Safai, Mohammad A., Digital image processor for a digital camera.
  79. Safai, Mohammad A., Digital image processor for a digital camera.
  80. Safai,Mohammad A., Digital image processor for a digital camera.
  81. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  82. Rhoads, Geoffrey B., Digital watermark decoding method.
  83. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  84. Levy, Kenneth L., Digital watermarking for workflow by tracking content or content identifiers with respect to time.
  85. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  86. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  87. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  88. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  89. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  90. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  91. Geoffrey B. Rhoads, Digital watermarks and methods for security documents.
  92. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  93. Patrick O'Neal Nunally, Document authentication using a mark that is separate from document information.
  94. Gennaro, Rosario; Tresser, Charles, Electronic cash controlled by non-homomorphic signatures.
  95. Pelly,Jason Charles; Tapson,Daniel; Keating,Stephen Mark, Embedding data in material.
  96. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  97. Wen Xin ; Honsinger Chris W., Embedding information in a digital image digitized from a developed photographic film.
  98. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  99. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  100. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  101. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  102. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  103. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  104. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  105. Kimura, Shunichi; So, Ikken; Sekino, Masanori; Koshi, Yutaka, Image processing apparatus, image processing method and computer-readable medium.
  106. Matsumoto, Kentaro; Uchio, Hirokazu, Image processing apparatus, method and recording medium therefor.
  107. Hiraishi,Junji; Taniguchi,Keitaro; Kakiuchi,Takashi, Image processing device and image input device equipped with a data synthesizing unit.
  108. Maeda, Masamine, Image processing method, image processing apparatus, image processing system and memory medium.
  109. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  110. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  111. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  112. Rhoads,Geoffrey B., Image processor and image processing method.
  113. Anoop K. Bhattacharjya ; Hakan Ancin, Information embedding in document copies.
  114. Felsher, David Paul, Information record infrastructure, system and method.
  115. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  116. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  117. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  118. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  119. Rhoads, Geoffrey B., Internet linking from audio.
  120. Rhoads,Geoffrey B., Internet linking from audio and image content.
  121. Rodriguez, Tony F.; Rhoads, Geoffrey B., Intuitive computing methods and systems.
  122. Rodriguez, Tony F.; Rhoads, Geoffrey B., Intuitive computing methods and systems.
  123. Rodriguez, Tony F.; Rhoads, Geoffrey B., Intuitive computing methods and systems.
  124. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  125. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  126. Rhoads, Geoffrey B.; Rodriguez, Tony F., Location-based arrangements employing mobile devices.
  127. Rodriguez, Tony F., Machine-readable features for objects.
  128. Thomas, Kasman E., Managing supplied data.
  129. Tian,Jun; Levy,Kenneth L.; Brunk,Hugh L., Measuring quality of service of broadcast multimedia signals using digital watermark analyses.
  130. Weiss,David, Media bridge method and apparatus.
  131. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  132. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  133. Sun, Qibin; Wu, Jiankang; Deng, Huijie Robert, Method and apparatus for embedding digital information in digital multimedia data.
  134. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  135. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  136. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  137. Bhattacharjya, Anoop, Method and apparatus for site selection for data embedding.
  138. Ray, Lawrence A.; Honsinger, Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  139. Rotholtz,Ben Aaron; Shen,Ji; Conklin,Gregory Joseph, Method and process for transmitting video content.
  140. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  141. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  142. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  143. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  144. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  145. Moskowitz,Ira S.; Ahmed,Farid, Method and system for frequency domain watermarking using a phase based filter signature.
  146. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  147. Goodman, Daniel I., Method and system for real-time control of document printing.
  148. Goodman, Daniel I., Method and system for real-time control of document printing.
  149. Moon,Rodney Gene; Prakash,Ravi, Method and system for watermark detection.
  150. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  151. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  152. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  153. Bloom, Jeffrey A.; Cox, Ingemar J.; Miller, Matthew L., Method for data preparation and watermark insertion.
  154. Honsinger Chris W. ; Rabbani Majid, Method for generating an improved carrier for use in an image data embedding application.
  155. Colaitis, Marie-Jean; Marie, Pascal, Method for inserting watermark assistance data in a bitstream and bitstream comprising the watermark assistance data.
  156. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  157. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  158. Stephany Thomas M. ; Bernardi Bryan D. ; Bryant Robert C. ; Nelson David J., Method of pulsing light emitting diodes for reading fluorescent indicia, data reader, and system.
  159. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  160. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  161. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  162. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  163. Rhoads, Geoffrey B., Methods and arrangements for composing information-carrying artwork.
  164. Geoffrey B. Rhoads, Methods and devices for recognizing banknotes and responding accordingly.
  165. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  166. Hannigan,Brett T.; Bradley,Brett Alan; Perry,Burt W.; Rodriguez,Tony F., Methods and systems for read-aloud books.
  167. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  168. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  169. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  170. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  171. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  172. Rhoads, Geoffrey B., Methods for encoding security documents.
  173. Rhoads Geoffrey B., Methods for identifying equipment used in counterfeiting.
  174. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  175. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  176. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  177. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  178. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  179. Rhoads, Geoffrey B.; Conwell, William Y., Methods of interacting with audio and ambient music.
  180. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  181. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  182. Bloom, Jeffrey Adam; Zou, Dekun, Modifying a coded bitstream.
  183. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  184. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  185. Clark, William A.; Wary, Joseph C., Motion picture encoding and counterfeit tracking system and method.
  186. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  187. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  188. Rhoads, Geoffrey B, Network linking methods and apparatus.
  189. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  190. Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
  191. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  192. Kashino Yuta,JPX, Presentation apparatus for two-dimensional picture information.
  193. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  194. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  195. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  196. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  197. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  198. Dewolde, Jeffrey H., Program encoding and counterfeit tracking system and method.
  199. Safai, Mohammad A., Programmable control of operational signals in a digital camera.
  200. Meredith B. Fischer ; Ronald P. Sansone, Recording graphical and tracking information on the face of a mailpiece.
  201. Ronald P. Sansone ; Meredith B. Fischer, Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia.
  202. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  203. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  204. Cornaby, Colin P.; Weaver, Matthew M., Smartphone-based methods and systems.
  205. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  206. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  207. Brundage, Trent J.; Rhoads, Geoffrey B., Steganographic encoding.
  208. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  209. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  210. Rhoads Geoffrey B., Steganographic methods and media for photography.
  211. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  212. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  213. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  214. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  215. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  216. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  217. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in sound based on steganographic encoding.
  218. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  219. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  220. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  221. Hoffberg, Steven M., System and method for determining contingent relevance.
  222. John Man Kwong Kwan, System and method for digitally marking a file.
  223. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  224. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  225. Farkash, Eyal, System and method for embedding data in video.
  226. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  227. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  228. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  229. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  230. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  231. Rusterholz John T., System and method for reordering lookup table entries when table address bits are inverted.
  232. Rusterholz John T., System and method for reordering lookup table entries when table address bits are reordered.
  233. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  234. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  235. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  236. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  237. Olligschlaeger, Andreas M., System and method for three-way call detection.
  238. Olligschlaeger, Andreas M., System and method for three-way call detection.
  239. Olligschlaeger, Andreas M., System and method for three-way call detection.
  240. Olligschlaeger, Andreas M., System and method for three-way call detection.
  241. Isaacson, Scott; Carter, Stephen R., System and method of semantic correlation of rich content.
  242. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  243. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  244. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  245. Goldsmith Kevin Scott, System for electronic notification of account activity.
  246. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  247. Ruman, Marcille Faye; Jackson, Kelly Wade; Dreyer, Adam Howard, Systems and methods for managing the toilet training process of a child.
  248. Ruman, Marcille Faye; Jackson, Kelly Wade; Dreyer, Adam Howard; Kammrath, Aster Ellen; Brown, Larry Edgerton; Luo, Yan, Systems and methods for managing the toilet training process of a child.
  249. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  250. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  251. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  252. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  253. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  254. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  255. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  256. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  257. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  258. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  259. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  260. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  261. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  262. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  263. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  264. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  265. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  266. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  267. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  268. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  269. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  270. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  271. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  272. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  273. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  274. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  275. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  276. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  277. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  278. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  279. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  280. Martin, Thomas J., Three-way call detection using steganography.
  281. Martin,Thomas J., Three-way call detection using steganography.
  282. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  283. Bruckstein, Alfred M.; Richardson, Thomas J., Transform domain image watermarking method and system.
  284. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  285. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  286. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  287. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  288. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  289. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  290. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  291. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  292. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  293. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  294. Anoop Bhattacharjya ; Hakan Ancin, User verification by zero-knowledge interactive proof.
  295. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  296. Rhoads,Geoffrey B., Video steganography.
  297. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  298. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  299. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  300. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  301. Rhoads, Geoffrey B., Watermark embedder and reader.
  302. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  303. Levy, Kenneth L., Watermark embedding functions adapted for transmission channels.
  304. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  305. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로