$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for digital image signatures 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/00
  • G06T-009/00
출원번호 US-0923841 (1992-07-31)
발명자 / 주소
  • Powell Robert D.
  • Nitzberg Mark J.
출원인 / 주소
  • Corbis Corporation
대리인 / 주소
    Seed and Berry LLP
인용정보 피인용 횟수 : 633  인용 특허 : 0

초록

A method and system for embedding signatures within visual images in both digital representation and print or film. A signature is inseparably embedded within the visible image, the signature persisting through image transforms that include resizing as well as conversion to print or film and back to

대표청구항

[ We claim:] [1.] A method of image signature processing of an original image having pixels with pixel values, the pixel values including a plurality of pixel values intermediate to minimum and maximum pixel values, comprising:locating a plurality of candidate points from among the pixels of the ori

이 특허를 인용한 특허 (633)

  1. Duffield,David Jay; Hogue, Jr.,William Bennett, Anti-piracy coding of motion pictures.
  2. Myers, John Gardiner; Yang, Yanyan, Apparatus and method for detecting images within spam.
  3. Myers, John Gardiner; Yang, Yanyan, Apparatus and method for detecting images within spam.
  4. Myers, John Gardiner; Yang, Yanyan, Apparatus and method for detecting images within spam.
  5. Miyashita, Tomoyuki, Apparatus and method for embedding information in an image through requantization step width control.
  6. Yamadaji Shinji,JPX, Apparatus and method for embedding/unembedding supplemental information.
  7. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  8. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  9. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  10. Reed, Alastair M., Applying digital watermarks using dot gain correction.
  11. Rhoads,Geoffrey B., Arrangement for embedding subliminal data in imaging.
  12. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  13. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  14. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  15. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  16. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  17. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  18. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  19. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  20. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  21. Rhoads, Geoffrey B., Audio and video signal processing.
  22. Rhoads, Geoffrey B., Audio appliance and monitoring device responsive to watermark data.
  23. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  24. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  25. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  26. Rhoads Geoffrey B., Audio or video steganography.
  27. Rhoads Geoffrey B., Audio steganography.
  28. Rhoads, Geoffrey B., Audio steganography.
  29. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  30. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  31. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  32. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  33. Levy,Kenneth L.; Tian,Jun, Authenticating media signals by adjusting frequency characteristics to reference values.
  34. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  35. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  36. Rhoads, Geoffrey B., Authentication of identification documents.
  37. Rhoads,Geoffrey B., Authentication of identification documents.
  38. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  39. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  40. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  41. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  42. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  43. Rhoads, Geoffrey B., Authentication using a digital watermark.
  44. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  45. Rhoads, Geoffrey B., Background watermark processing.
  46. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Benchmarks for digital watermarking.
  47. Kondo, Tetsujiro; Watanabe, Yoshinori; Tanaka, Kenji, Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal.
  48. Kondo,Tetsujiro; Watanabe,Yoshinori; Tanaka,Kenji, Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal.
  49. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  50. Reed,Alastair M.; Rhoads,Geoffrey B., Color adaptive watermarking.
  51. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  52. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  53. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  54. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  55. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  56. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  57. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  58. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  59. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Confirming physical custody of objects.
  60. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  61. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  62. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  63. Rhoads,Geoffrey B., Content identification, and securing media content with steganographic encoding.
  64. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  65. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  66. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  67. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  68. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  69. Rhoads, Geoffrey B., Controlling use of audio or image content.
  70. Levy, Kenneth L.; Stewart, Steven W., Conveying auxilliary data through digital watermarking.
  71. Cookson, Christopher J., Copy protection control system.
  72. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  73. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  74. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  75. Rhoads,Geoffrey B., Counteracting geometric distortions in watermarking.
  76. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  77. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  78. Morimoto Norishige,JPX ; Maeda Junji,JPX, Data hiding and extraction methods.
  79. Numao, Masayuki; Shimizu, Shuichi; Morimoto, Norishige; Kobayashi, Mei, Data hiding and extraction methods.
  80. Powell Robert D. ; Nitzberg Mark J., Data hiding based on neighborhood attributes.
  81. Stach, John, Data hiding in media.
  82. Kobayashi Seiji,JPX ; Koide Akio,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data hiding method and data extraction method using statistical examination.
  83. Rhoads,Geoffrey B., Data hiding method and system for embedding and extracting information in signals.
  84. Stach,John, Data hiding through arrangement of objects.
  85. Pelly,Jason Charles; Tapson,Daniel Warren, Data processing apparatus and method of processing data.
  86. Moskowitz, Scott A., Data protection method and device.
  87. Moskowitz, Scott A., Data protection method and device.
  88. Moskowitz, Scott A., Data protection method and device.
  89. Moskowitz, Scott A., Data protection method and device.
  90. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  91. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  92. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  93. Osamu Kawamae JP; Toshifumi Takeuchi JP; Hiroshi Yoshiura JP; Takao Arai JP, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  94. Powell,Robert D.; Nitzberg,Mark, Decoding hidden data from imagery.
  95. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  96. Rhoads, Geoffrey B., Decoding steganographic messages embedded in media signals.
  97. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  98. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  99. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  100. Rhoads, Geoffrey B., Detecting hidden auxiliary code signals in media.
  101. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  102. Brundage, Trent J., Detecting media areas likely of hosting watermarks.
  103. Reed, Alastair M., Detection from two chrominance directions.
  104. Reed, Alastair M., Detection from two chrominance directions.
  105. Reed, Alastair M.; Cattone, Jeremy, Detection of out-of-phase low visibility watermarks.
  106. Levine Earl, Determination of a best offset to detect an embedded pattern.
  107. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  108. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  109. Nobuyoshi Miyahara JP; Yoichi Yagasaki JP, Device and method for processing image data, transmitting medium, and recording medium.
  110. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  111. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  112. Rhoads, Geoffrey B., Digital authentication with analog documents.
  113. Rhoads, Geoffrey B., Digital authentication with analog documents.
  114. Rhoads,Geoffrey B., Digital authentication with analog documents.
  115. Rhoads, Geoffrey B.; Carr, J. Scott; Perry, Burt W., Digital authentication with digital and analog documents.
  116. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  117. Masaki,Kenji, Digital image processing apparatus.
  118. Rhoads, Geoffrey B., Digital watermark decoding method.
  119. Reed, Alastair M.; Hannigan, Brett T., Digital watermark detection using predetermined color projections.
  120. Taguchi, Jun'ichi; Yoshiura, Hiroshi; Echizen, Isao; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Digital watermark image processing method.
  121. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  122. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  123. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  124. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  125. Levy, Kenneth L.; Stager, Reed R., Digital watermarking applications.
  126. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  127. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  128. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  129. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  130. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  131. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Digital watermarking methods and apparatus for use with audio and video content.
  132. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  133. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  134. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  135. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  136. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  137. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  138. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  139. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  140. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  141. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  142. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  143. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  144. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  145. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  146. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  147. Rhoads,Geoffrey B.; Carr,J. Scott, Digital watermarks.
  148. Geoffrey B. Rhoads, Digital watermarks and methods for security documents.
  149. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  150. Andelin, Victor L.; Levy, Kenneth L., Digitally watermarking documents associated with vehicles.
  151. Hein,William; Rhoads,Geoffrey B., Distributed system for responding to watermarked documents.
  152. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  153. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  154. Levine Earl, Efficient watermark method and apparatus for digital signals.
  155. Rhoads, Geoffrey B., Electronic commerce using optical input device.
  156. Brundage, Trent J.; Hannigan, Brett T., Electronic forms using indicia, sometimes hidden indicia.
  157. Maes, Maurice J. J. J-B.; Van Overveld, Cornelis W. A. M.; Rongen, Peter M. J., Embedding and detecting a watermark in images.
  158. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  159. Rhoads,Geoffrey B., Embedding auxiliary signals with multiple components into media signals.
  160. Pelly,Jason Charles, Embedding data in material.
  161. Alattar, Osama M.; Reed, Alastair M.; Brundage, Trent J., Embedding digital watermarks in spot colors.
  162. Brunk,Hugh L.; Alattar,Osama M., Embedding digital watermarks in spot colors.
  163. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  164. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  165. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  166. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  167. Chang, Kenneth H. P., Encoding and decoding a message within an image.
  168. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  169. Rhoads, Geoffrey B., Encoding and decoding in accordance with steganographically-conveyed data.
  170. Rhoads, Geoffrey B., Encoding and decoding media signals.
  171. Rhoads, Geoffrey B., Encoding and decoding methods in which decryption data is conveyed steganographically within audio or visual content.
  172. Powell,Robert D.; Nitzberg,Mark, Encoding hidden data.
  173. Reed, Alastair M., Encoding in two chrominance directions.
  174. Reed, Alastair M., Encoding in two chrominance directions.
  175. Davis,Bruce L.; Rhoads,Geoffrey B.; Seder,Phillip Andrew, Enhanced input peripheral.
  176. Reed, Alastair M.; Hannigan, Brett T.; Brundage, Trent J., Enhancing embedding of out-of-phase signals.
  177. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  178. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  179. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  180. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  181. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  182. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  183. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  184. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  185. Rhoads, Geoffrey B., Files and methods employing common information in both header and steganographic embedding.
  186. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  187. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  188. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  189. Reed, Alastair M.; Falkenstern, Kristyn R.; Berfanger, David; Bai, Yang, Full color visibility model using CSF which varies spatially with local luminance.
  190. Reed, Alastair M.; Falkenstern, Kristyn R.; Berfanger, David; Bai, Yang, Full color visibility model using CSF which varies spatially with local luminance.
  191. Reed, Alastair M.; Bai, Yang; Falkenstern, Kristyn R.; Berfanger, David, Full-color visibility model using CSF which varies spatially with local luminance.
  192. Lyons, Robert G.; Reed, Alastair M.; Stach, John F., Geometric enumerated watermark embedding for colors and inks.
  193. Curry Douglas N., Halftone patterns for trusted printing.
  194. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  195. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  196. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  197. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  198. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  199. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  200. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  201. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  202. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  203. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  204. Tao Bo, High redundancy system and method for watermarking digital image and video data.
  205. Alattar, Adnan M., Identification and protection of security documents.
  206. Alattar, Adnan M., Identification and protection of video.
  207. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  208. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  209. Jones, Robert L., Identification document with three dimensional image of bearer.
  210. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  211. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  212. David, Morgan William Amos; Stone, Jonathan James, Identifying material stored using a signature as a retrieval index.
  213. David, Morgan William Amos; Stone, Jonathan James, Identifying material using a watermark and a signature.
  214. Powell, Robert D.; Nitzberg, Mark J., Image capture and marking.
  215. Ikenoue Yoshikazu,JPX ; Kumashiro Hideo,JPX, Image forming apparatus and copy management system.
  216. Ikenoue,Yoshikazu; Kumashiro,Hideo; Nakatani,Munehiro, Image forming apparatus and copy management system.
  217. Patterson,Phillip R.; Clements,Lorie; Lofgren,Neil A.; Rhoads,Geoffrey B., Image management system and methods using digital watermarks.
  218. Powell Robert D. ; Nitzberg Mark J., Image marking with error correction.
  219. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  220. Sayuda,Hiroyuki, Image processing apparatus and image forming medium.
  221. Miyake, Nobutaka; Kusakabe, Minoru, Image processing apparatus and method.
  222. Ashikaga, Hideaki, Image processing apparatus, image processing method, and computer readable medium.
  223. Kondo, Tetsujiro; Tanaka, Kenji; Watanabe, Yoshinori, Image processing apparatus, image processing method, and providing medium.
  224. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  225. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  226. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  227. Kurokawa, Soichiro; Nagatsuma, Toshiyuki; Harada, Tsutomu, Image processor and image processing method.
  228. Kurokawa, Soichiro; Nagatsuma, Toshiyuki; Harada, Tsutomu, Image processor and image processing method.
  229. Rhoads,Geoffrey B., Image processor and image processing method.
  230. Ikenoue,Yoshikazu, Imaging forming apparatus and copy management system.
  231. Ikenoue,Yoshikazu, Imaging forming apparatus and copy management system.
  232. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Including a metric in a digital watermark for media authentication.
  233. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  234. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  235. Tao Bo, Information embedding and retrieval method and apparatus.
  236. Kadono Shinya,JPX, Information embedding method, information extracting method, information embedding apparatus, information extracting apparatus, and recording media.
  237. Kadono,Shinya, Information embedding method, information extracting method, information embedding apparatus, information extracting apparatus, and recording media.
  238. Shu, Yu-Chen; Hwang, Wen-Liang, Information hiding with similar structures.
  239. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  240. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  241. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  242. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  243. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett Alan; Rhoads,Geoffrey B., Integrating digital watermarks in multimedia content.
  244. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  245. Rhoads, Geoffrey B., Internet linking from audio.
  246. Rhoads,Geoffrey B., Internet linking from image content.
  247. Dumoulin Charles Lucian ; Darrow Robert David, Introducing reduced data set information into a primary image data set.
  248. Dumoulin, Charles Lucian; Darrow, Robert David, Introducing reduced dataset information into a primary image dataset.
  249. Johnson,Andrew; Biggar,Michael, Invisible digital watermarks.
  250. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  251. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  252. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  253. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  254. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  255. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  256. Curry Douglas N., Line screen having extended dynamic tone range for embedding machine readable data in halftone images.
  257. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  258. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  259. Hawes, Jonathan L., Linking documents through digital watermarking.
  260. Rhoads Geoffrey B., Linking of computers based on optical sensing of digital data.
  261. Rhoads, Geoffrey B., Linking of computers based on steganographically embedded digital data.
  262. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  263. Reed, Alastair M.; Berkley, Jr., Lou H., Low visibility watermark using time decay fluorescence.
  264. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  265. Reed, Alastair M.; Rodriguez, Tony F., Machine-readable security features for printed objects.
  266. Tian,Jun; Levy,Kenneth L.; Brunk,Hugh L., Measuring quality of service of broadcast multimedia signals using digital watermark analyses.
  267. Weiss,David, Media bridge method and apparatus.
  268. Rathus, Spencer A.; Nevid, Jeffrey S., Method and apparatus for accessing electronic data via a familiar printed medium.
  269. Rathus, Spencer A.; Nevid, Jeffrey S., Method and apparatus for accessing electronic data via a familiar printed medium.
  270. Rathus, Spencer A.; Nevid, Jeffrey S., Method and apparatus for accessing electronic data via a familiar printed medium.
  271. Rathus, Spencer A.; Nevid, Jeffrey S., Method and apparatus for accessing electronic data via a familiar printed medium.
  272. Rathus, Spencer A.; Nevid, Jeffrey S.; Fichner-Rathus, Lois, Method and apparatus for accessing electronic data via a familiar printed medium.
  273. Rathus, Spencer A.; Nevid, Jeffrey S.; Fichner-Rathus, Lois, Method and apparatus for accessing electronic data via a familiar printed medium.
  274. Rathus, Spencer A.; Nevid, Jeffrey S.; Fichner-Rathus, Lois, Method and apparatus for accessing electronic data via a familiar printed medium.
  275. Rathus, Spencer A.; Nevid, Jeffrey S.; Fichner-Rathus, Lois, Method and apparatus for accessing electronic data via a familiar printed medium.
  276. Rhoads, Geoffrey B., Method and apparatus for associating identifiers with content.
  277. Rhoads, Geoffrey B., Method and apparatus for associating identifiers with content.
  278. Rhoads,Geoffrey B., Method and apparatus for associating identifiers with content.
  279. Rhoads,Geoffrey B., Method and apparatus for associating identifiers with content.
  280. Levy, Kenneth L., Method and apparatus for automatic ID management.
  281. Shabbir A. Khan ; Saeed A. Rajput ; Basit Hussain, Method and apparatus for binding electronic impressions made by digital identities to documents.
  282. Todd Martin Peter,GBX, Method and apparatus for coding information by inserting codes in strongly featured image regions.
  283. Levy, Kenneth L., Method and apparatus for content management.
  284. Levy, Kenneth L., Method and apparatus for content management.
  285. Levy, Kenneth L., Method and apparatus for content management.
  286. Haritaoglu, Ismail, Method and apparatus for detecting near duplicate videos using perceptual video signatures.
  287. Haritaoglu, Ismail, Method and apparatus for detecting near-duplicate videos using perceptual video signatures.
  288. Knox, Keith T.; Fan, Zhigang; Schneider, Eric J., Method and apparatus for detecting photocopier tracking signatures.
  289. Knox, Keith T.; Fan, Zhigang; Schneider, Erie J., Method and apparatus for detecting photocopier tracking signatures.
  290. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  291. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  292. Barton James M., Method and apparatus for embedding authentication information within digital data.
  293. Barton James M., Method and apparatus for embedding authentication information within digital data.
  294. Barton James M., Method and apparatus for embedding authentication information within digital data.
  295. Barton, James M., Method and apparatus for embedding authentication information within digital data.
  296. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  297. Sun, Qibin; Wu, Jiankang; Deng, Huijie Robert, Method and apparatus for embedding digital information in digital multimedia data.
  298. Moroo, Jun; Noda, Tsugio, Method and apparatus for embedding information in imaged data, printed material, and computer product.
  299. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  300. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  301. Bender Walter ; Morimoto Norishige,JPX ; Gruhl Daniel, Method and apparatus for logo hiding in images.
  302. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  303. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  304. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  305. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  306. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  307. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  308. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  309. Todor Cooklev, Method and apparatus for wavelet-based digital watermarking.
  310. Levy,Kenneth L, Method and apparatus to protect media existing in an insecure format.
  311. Vorbr��ggen,Jan C.; Kubbilun,Wolfgang; Koch,Eckhard; Kubbilun,Ingo A.; Bickenbach,Hans Joachim; Belke,Marcus, Method and device for confirming the authenticity of a document and a safe for storing data.
  312. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  313. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  314. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  315. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  316. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  317. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  318. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  319. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  320. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  321. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  322. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  323. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  324. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  325. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  326. Maes, Maurice Jerome Justin Jean-Baptiste; Depovere, Geert Florimond Gerard; Kalker, Antonius Adrianus Cornelis Maria, Method and system for embedding extra information, method and system for decoding.
  327. Yoshiura, Hiroshi; Echizen, Isao; Taguchi, Junichi; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Method and system for embedding information into contents.
  328. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  329. Rhoads, Geoffrey B., Method and system for encoding image and audio content.
  330. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  331. Goodman, Daniel I., Method and system for real-time control of document printing.
  332. Goodman, Daniel I., Method and system for real-time control of document printing.
  333. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  334. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  335. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  336. Bloom, Jeffrey A.; Cox, Ingemar J.; Miller, Matthew L., Method for data preparation and watermark insertion.
  337. Manasse, Mark S., Method for duplicate detection and suppression.
  338. Anzai,Kousuke; Echizen,Isao; Yoshiura,Hiroshi; Eikawa,Shinobu, Method for embedding information and extracting the same.
  339. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  340. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  341. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  342. Miller Matthew L., Method for inserting a watermark signal into data.
  343. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  344. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  345. Michael G. Bantum, Method for transparent marking of digital images for storage, retrieval and processing within a computer database.
  346. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  347. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  348. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  349. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  350. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  351. Khanna, Sanjeev; Zane, Jr., Francis Xavier, Methods and apparatus for watermarking maps and other structured data.
  352. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  353. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  354. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  355. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  356. Powell Robert D. ; Nitzberg Mark J., Methods and systems for embedding data in images.
  357. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  358. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  359. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  360. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  361. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  362. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  363. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  364. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  365. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  366. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  367. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  368. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  369. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  370. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  371. Rhoads,Geoffrey B., Methods for audio watermarking and decoding.
  372. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  373. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  374. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  375. Rhoads,Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  376. Rhoads, Geoffrey B., Methods for detecting alteration of audio.
  377. Rhoads Geoffrey B., Methods for detecting alteration of audio and images.
  378. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  379. Rhoads, Geoffrey B., Methods for encoding security documents.
  380. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  381. Rhoads Geoffrey B., Methods for identifying equipment used in counterfeiting.
  382. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  383. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  384. Rhoads, Geoffrey B., Methods for marking images.
  385. Rhoads,Geoffrey B., Methods for marking images.
  386. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  387. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  388. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  389. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  390. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  391. Rhoads Geoffrey B., Methods for optimizing watermark detection.
  392. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  393. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  394. Rhoads, Geoffrey B., Methods for watermark decoding.
  395. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  396. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  397. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  398. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  399. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  400. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  401. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  402. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  403. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  404. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  405. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  406. Bloom, Jeffrey Adam; Zou, Dekun, Modifying a coded bitstream.
  407. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  408. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  409. Sandford ; II Maxwell T. ; Handel Theodore G. ; Ettinger J. Mark, Modular error embedding.
  410. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  411. Antonellis,Darcy; Bartley,Jeffrey J.; Elo,Margit Elisabeth; Gagnon,Jean Pierre; Hogue, Jr.,William B.; Price,Edward J., Motion picture anti-piracy coding.
  412. Levy, Kenneth L.; Stewart, Steven W., Multi-channel digital watermarking.
  413. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  414. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  415. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  416. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  417. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  418. Rhoads, Geoffrey B., Music methods and systems.
  419. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  420. Rhoads, Geoffrey B, Network linking methods and apparatus.
  421. Rhoads,Geoffrey B., Network linking using index modulated on data.
  422. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  423. Ray,Lawrence A., Optimal templates for image data embedding.
  424. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  425. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  426. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  427. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  428. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  429. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  430. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  431. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  432. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  433. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  434. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  435. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  436. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  437. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  438. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  439. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  440. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  441. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  442. Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
  443. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  444. Decoux, Eric; Vuistiner, Dave, Pattern for coding a numerical information item on a surface and marking and reading methods.
  445. Reed, Alastair M.; Rogers, Eliot, Perceptability model applied to watermark signals.
  446. Hannigan, Brett T.; Bradley, Brett A.; Reed, Alastair M., Perceptual modeling of media signals based on local contrast and directional edges.
  447. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett A., Perceptual modeling of media signals based on local contrast and directional edges.
  448. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett A., Perceptual modeling of media signals for data hiding.
  449. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett Alan, Perceptual modeling of media signals for data hiding.
  450. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett Alan, Perceptual modeling of media signals for data hiding.
  451. Davis Derek L., Peripheral device preventing post-scan modification.
  452. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  453. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  454. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  455. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  456. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  457. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  458. Rhoads, Geoffrey B., Processing scanned security documents notwithstanding corruptions such as rotation.
  459. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  460. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  461. Braudaway, Gordon Wesley; Mintzer, Frederick Cole, Protecting images with an image watermark.
  462. Braudaway,Gordon Wesley; Mintzer,Frederick Cole, Protecting images with an image watermark.
  463. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  464. Knowlton Kenneth Charles ; Miliefsky Gary Steven, Protection mechanism for visual link objects.
  465. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  466. Jones, Robert L.; Reed, Alastair M., Readers to analyze security features on objects.
  467. Levy, Kenneth L., Recoverable digital content degradation.
  468. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  469. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  470. Rhoads,Geoffrey B.; MacIntosh,Brian T., Registering with computer systems.
  471. Hiroyuki Kimura JP; Takao Arai JP; Toshifumi Takeuchi JP, Reproducing method and apparatus, for a video signal having copy control information.
  472. Earl Levine, Robust watermark method and apparatus for digital signals.
  473. Levine Earl ; Brownell Jason S., Robust watermark method and apparatus for digital signals.
  474. Poorvi L. Vora, Robust watermarking for digital objects.
  475. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  476. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  477. Davis Derek L., Secure compressed imaging.
  478. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  479. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  480. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  481. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  482. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  483. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  484. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  485. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  486. Levine Earl, Secure watermark method and apparatus for digital signals.
  487. Coppersmith Don ; Mintzer Frederick Cole ; Tresser Charles P. ; Wu Chai Wah ; Yeung Minerva Ming-Yee, Secured signal modification and verification with privacy control.
  488. Coppersmith,Don; Mintzer,Frederick C.; Tresser,Charles P.; Weber,Samuel M.; Wu,Chai Wah; Yeung,Minerva Ming Yee, Secured signal modification and verification with privacy control.
  489. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  490. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  491. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  492. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  493. Geoffrey B. Rhoads, Security documents with hidden digital data.
  494. Jones,Robert L.; Reed,Alastair M., Security features for objects and method regarding same.
  495. Curry Douglas N., Selectively accented serpentine halftone patterns for embedding human readable information in images.
  496. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  497. Bradley, Brett A., Self-orienting watermarks.
  498. Bradley,Brett A., Self-orienting watermarks.
  499. Reed, Alastair M.; Sharma, Ravi K., Signal decoding methods, apparatus and systems.
  500. Rhoads, Geoffrey B.; Carr, J. Scott, Signal processing of audio and video data, including assessment of embedded data.
  501. Rhoads, Geoffrey B.; Carr, J. Scott, Signal processing of audio and video data, including deriving identifying information.
  502. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  503. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  504. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  505. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  506. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  507. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  508. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  509. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  510. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  511. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  512. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  513. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  514. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  515. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  516. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  517. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  518. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  519. Rhoads, Geoffrey B., Steganographic image processing.
  520. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  521. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  522. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  523. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  524. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  525. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  526. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  527. Rhoads, Geoffrey B., Steganographic system with changing operations.
  528. Kita, Kazumasa; Yoshiura, Hiroshi; Kurosu, Yutaka; Tanaka, Miki; Eikawa, Shinobu; Kaji, Tomoyuki, Steganographic system, method, program and storage medium therefor.
  529. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  530. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  531. Geoffrey B. Rhoads, Steganography using dynamic codes.
  532. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  533. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  534. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  535. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  536. Xin, Xin; Li, Zhu; Katsaggelos, Aggelos K., System and method for compact descriptor for visual search.
  537. John Man Kwong Kwan, System and method for digitally marking a file.
  538. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  539. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  540. Numao Masayuki,JPX ; Shimizu Shuichi,JPX ; Morimoto Norishige,JPX ; Kobayashi Mei,JPX, System and method for hiding and extracting message data in multimedia data.
  541. Sansone, Ronald P., System and method for issuing electronic tickets.
  542. Craft, David John, System and methods for embedding additional data in compressed data streams.
  543. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  544. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  545. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  546. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  547. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  548. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  549. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  550. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  551. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  552. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  553. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  554. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  555. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  556. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  557. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  558. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  559. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  560. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  561. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  562. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  563. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  564. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  565. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  566. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  567. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  568. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  569. Rhoads, Geoffrey B.; Lofgren, Neil E.; Patterson, Philip R., Systems and methods using identifying data derived or extracted from video, audio or images.
  570. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  571. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  572. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  573. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  574. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  575. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  576. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  577. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  578. Rhoads, Geoffrey B., Tile-based digital watermarking techniques.
  579. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  580. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  581. Levy, Kenneth L., Transmarking of multimedia signals.
  582. Levy,Kenneth L., Transmarking of multimedia signals.
  583. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  584. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  585. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  586. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  587. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  588. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  589. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  590. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  591. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  592. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  593. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  594. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  595. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  596. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  597. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  598. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  599. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  600. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  601. Rhoads,Geoffrey B., Video steganography.
  602. Rhoads,Geoffrey B., Video steganography.
  603. Rhoads, Geoffrey B., Video steganography or encoding.
  604. Echizen, Isao; Yoshiura, Hiroshi; Nakamura, Masafumi; Arai, Takao; Takeuchi, Toshifumi, Water-mark embedding method and system.
  605. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  606. Reed,Allister; Hannigan,Brett, Watermark detection using adaptive color projections.
  607. Rhoads, Geoffrey B., Watermark embedder and reader.
  608. Rhoads, Geoffrey B., Watermark embedder and reader.
  609. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  610. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  611. Geoffrey B. Rhoads, Watermark enabled video objects.
  612. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  613. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  614. Rhoads, Geoffrey B., Watermark encoding using arbitrary features.
  615. Echizen,Isao; Yoshiura,Hiroshi; Kimura,Hiroyuki; Fukushima,Akio; Anzai,Kousuke, Watermark information detection method.
  616. Levy, Kenneth L., Watermark payload encryption for media including multiple watermarks.
  617. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  618. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  619. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  620. Rhoads, Geoffrey B.; Carr, J. Scott, Watermarking enhanced to withstand anticipated corruptions.
  621. Rhoads, Geoffrey B., Watermarking methods and media.
  622. Tian, Jun; Decker, Stephen K.; Brunk, Hugh L., Watermarking recursive hashes into frequency domain regions.
  623. Wu Min ; Liu Bede, Watermarking scheme for image authentication.
  624. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  625. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
  626. Tian, Jun; Decker, Stephen K., Wavelet based feature modulation watermarks and related applications.
  627. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  628. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  629. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  630. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  631. Rhoads,Geoffrey B., Wireless methods and devices employing steganography.
  632. Rhoads Geoffrey B., Wireless telephony with steganography.
  633. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로