$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for robust information coding 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06T-009/00
출원번호 US-0436102 (1995-05-08)
발명자 / 주소
  • Rhoads Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Klarquist Sparkman Campbell Leigh & Whinston
인용정보 피인용 횟수 : 495  인용 특허 : 165

초록

A digital signal is imperceptibly embedded into an input source signal, such as an image or video signal, to produce an encoded (sometimes termed "watermarked") signal. The principle of quasi-rotational symmetry is employed to facilitate detection of the embedded signal notwithstanding rotation of t

대표청구항

[ I claim:] [1.] In a method of steganographically processing an image signal to embed multi-bit information therein, an improvement comprising representing said information in the form of a plurality of partially overlapping quasi-rotationally symmetric patterns, and processing the image signal to

이 특허에 인용된 특허 (165)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Kahn Leonard R. (137 E. 36th St. New York NY 10016), Anti-copy system utilizing audible and inaudible protection signals.
  3. Blasbalg Herman L. (Baltimore MD), Anti-jam communications system.
  4. McGrew Stephen P. (149-B Josephine St. Santa Cruz CA 95060), Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns.
  5. Blonstein Stephen M. (San Jose CA) Allen James D. (Santa Clara CA) Boliek Martin P. (Palo Alto CA), Apparatus and method for compressing still images.
  6. Kanota Keiji (Kanagawa JPX) Inoue Hajime (Chiba JPX) Kubota Yukio (Kanagawa JPX), Apparatus and method for preventing unauthorized copying of video signals.
  7. Nakano Kenji (Kanagawa JPX), Apparatus and method for preventing unauthorized dubbing of a recorded signal.
  8. Cooper J. Carl (1373 Sydney Dr. Sunnyvale CA 94087), Apparatus and method for receiving audio signals transmitted as part of a television video signal.
  9. Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
  10. Maufe Barry G. (London GB2), Apparatus for marking a recorded signal.
  11. Limberg Allen L. (Ringoes NJ) Patel Chandrakant B. (Hopewell NJ) Liu Tianmin (Lawrenceville NJ), Apparatus for processing modified NTSC television signals, with digital signals buried therewithin.
  12. Gibson James J. (Princeton NJ), Apparatus for transmitting auxiliary signal in a TV channel.
  13. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  14. Bronfin Kenneth A. (New York NY) Mahrer Stephen M. (Mt. Holly NJ) Wilson W. Robin (New York NY) Davenport Francis A. (Haddonfield NJ), Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast p.
  15. Thomas William L. (Clearwater FL) Lu Daozheng (Dunedin FL), Audience measurement system utilizing ancillary codes and passive signatures.
  16. Lundy Rene R. (3016 SE. 39th Portland OR 97214) Tyler David L. (2939 SE. Taylor Portland OR 97214), Auditory subliminal message system and method.
  17. McDonald Neil A. (Witham GBX), Authenticator.
  18. Wright Christopher B. (San Francisco CA) Bristow Stephen (Los Altos Hills CA), Automated transaction system with modular printhead having print authentication feature.
  19. Haselwood Donald E. (Clearwater FL) Solar Carl M. (Largo FL), Automatic monitor for programs broadcast.
  20. Chen Homer H. (Monmouth County NJ) Civanlar Mehmet R. (Monmouth County NJ) Haskell Barin G. (Monmouth County NJ), Block transform coder for arbitrarily shaped image segments.
  21. Miwa Hirohide (Kawasaki JPX) Shiratori Eiichi (Kawasaki JPX), Broadcast acknowledgement method and system.
  22. Lert ; Jr. John G. (9549 La Jolla Shores Dr. La Jolla CA 92037) Lert Peter W. (9549 La Jolla Shores Dr. La Jolla CA 92037) Cornelius John F. (1828 Dora Dr. Cardiff by the Sea CA 92007), Broadcast program identification method and system.
  23. Labedz Gerald P. (Chicago IL) Bonta Jeffrey D. (Mount Prospect IL) Schaeffer Dennis R. (Buffalo Grove IL) Tell Daniel F. (Deerfield IL), Cellular voice and data radiotelephone system.
  24. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  25. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  26. Barnaby Bernard Sydney (Ware EN), Combined television/data transmission system.
  27. Johnson Keith O. (Pacifica CA) Pflaumer Michael W. (Berkeley CA), Compatible signal encode/decode system.
  28. Cook Gary M. (Pepperell MA), Computer remote control through a video signal.
  29. Allen James D. (Rochester NY), Confidential document reproduction method and apparatus.
  30. Adams Robert (Lake Oswego OR) Williams David M. (Portland OR) Richardson John (Portland OR) Perry Burt (Beaverton OR), Content programmer control of video and data display using associated data.
  31. Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Counterfeit proof ID card having a scrambled facial image.
  32. Leslie William M. (5873 Gullstrand St. San Diego CA 92122), Credit card security system.
  33. Hustig Charles H. (Hudson WI) Ward Jeffrey L. (Hudson WI) Moses Donald W. (Minneapolis MN) Bradford Robert S. (Woodland Hills CA), Data and voice communications system.
  34. Becker Wolfgang (Neubiberg DEX) Hierweger Alexander (Rottach-Egern DEX) Merkle Hansjrgen (Munich DEX) Lob Erwin (Munich DEX) Lass Joseph (Munich DEX) Kaule Wittich (Emmering DEX), Data carrier having an optical authenticity feature and methods for producing and testing said data carrier.
  35. Leventer William (Long Island NY) Shulman Lawrence M. (East Patchogue NY), Data encoding for television.
  36. Leventer, William; Shulman, Lawrence M., Data encoding for television.
  37. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  38. Pullen Ian R. (Surbiton GBX) Sandbank Charles P. (Reigate GBX), Data transmission in active picture period.
  39. Montgomery Gerald D. (Mesa AZ) Norrish Jay B. (Mesa AZ), Data with video transmitter.
  40. Elsner Peter (Fritz-Baer-Str. 27 8000 Munich 71 DEX), Device for the identification of messages.
  41. Friedman Gary L. (Encino CA), Digital camera with apparatus for authentication of images produced from an image file.
  42. Sugiyama Takatoshi (Kanagawa JPX) Kubota Shuji (Kanagawa JPX) Morikura Masahiro (Kanagawa JPX) Enomoto Kiyoshi (Kanagawa JPX) Kato Shuzo (Kanagawa JPX), Digital communication system using superposed transmission of high speed and low speed digital signals.
  43. Moskowitz Scott A. (#503 City Fukazawa 3-5-10 Fukazawa Setagaya-ku Tokyo 158 JPX), Digital information commodities exchange.
  44. Moskowitz Scott A. (3-5-10 Fukazawa Setagaya-ku ; Tokyo 158 JPX), Digital information commodities exchange.
  45. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  46. Posner Ronald S. (Indian Harbor Beach FL) Burr ; Jr. Charles R. (Palm Bay FL) Campbell David K. (Melbourne Beach FL), Digitally-controlled analog encrypton.
  47. Petrie Glen W. (Los Gatos CA), Distributed type labeling for embedded data blocks.
  48. Froessl, Horst, Document and data handling and retrieval system.
  49. Philibert Alex C. (3001 Mockingbird Dr. Sierra Vista AZ 85635) Smith Jack W. (1831 Exeter Dr. Sierra Vista AZ 85635) Fox James W. (172 Andrea Dr. Sierra Vista AZ 85635), Document reproduction security system.
  50. Gotanda Motohiro (1802-10 Nakabyo ; Abiko-shi ; Chiba-ken JPX), Door lock control system.
  51. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  52. Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
  53. O\Grady William J. (Yonkers NY) Dubner Robert J. (Westwood NJ), Embedment of data in a video signal.
  54. Howard Jonathan M. (Easthampton NY), Encoding of transmitted program material.
  55. Gross Gary (Apt. 203 2721 Victoria Pk. Ave. Agincourt ; Ontario CAX M1T 3N6) Dale James (65 Huntley St. Toronto CAX M44 2L2), Encoding system.
  56. Normille James O. (Sunnyvale CA) Yeh Chia L. (Saratoga CA) Wright Daniel W. (Sunnyvale CA) Chu Ke-Chiang C. (Saratoga CA), Encoding/decoding moving images with forward and backward keyframes for forward and reverse display.
  57. Virga Richard (Danbury CT), Encryption device.
  58. Montgomery Gerald D. (Mesa AZ), Filter by-pass for transmitting an additional signal with a video signal.
  59. Chandler Donald G. (Pennington NJ) Batterman Eric P. (Cherry Hill NJ) Shah Govind (Princeton Junction NJ), Hexagonal, information encoding article, process and system.
  60. Hefti Aldo (Biasca CHX), Identification system.
  61. Milheiser Thomas A. (Littleton CO), Identification system.
  62. Shiang Lu P. (Beijing CNX) He Duanfeng (Beijing CNX), Identification system using computer generated moire.
  63. Resnikoff Howard L. (Winchester MA) Pollen David (Lexington MA) Linden David C. P. (Cambridge MA) Lawton Wayne M. (Somerville MA), Image coding apparatus and method utilizing separable transformations.
  64. Goldman Robert N. (Honolulu HI), Image dissecting document verification system.
  65. Funada Masahiro (Yokohama JPX) Kitamura Toshiyuki (Kawasaki JPX) Yamamoto Mitsuhiro (Kawasaki JPX) Ohta Eiji (Fujisawa JPX), Image processing apparatus which adds apparatus identification data to images.
  66. Suzuki Takashi (Tokyo JPX), Image processing with anti-forgery provision.
  67. Pack Seung K. (Seoul KRX) Chung Tae Y. (Seoul KRX), Image signal band compressing system for digital video tape recorder.
  68. Keene Leonard D. (Merrimack NH), In-station television program encoding and monitoring system and method.
  69. Broughton Robert S. (Beaverton OR) Laumeister William C. (San Jose CA), Interactive video method and apparatus.
  70. Hecht David L. (Palo Alto CA), Interleaved and interlaced sync codes and address codes for self-clocking glyph codes.
  71. Hiller Thomas L. (Glen Ellyn IL) Spanke Ronald A. (Wheaton IL) Stanaway ; Jr. John J. (Wheaton IL) Wierzbicki Alex L. (Bolingbrook IL) Zola Meyer J. (Oak Park IL), Intra-switch communications in narrow band ATM networks.
  72. Maddox James A. (R.F.D. 2 ; Church St. Georgetown CT 06829) Maddox Jeffery R. (R.F.D. 2 ; Church St. Georgetown CT 06829), Labels and label readers.
  73. Maufe Barry G. (London GB2), Marked recorded signals.
  74. Conanan Virgilio D. (475 Graphic Blvd. New Milford NJ 07646), Method and apparatus for adaptively superimposing bursts of texts over audio signals and decoder thereof.
  75. Samyn Johan (Roeselare BEX), Method and apparatus for checking the authenticity of documents.
  76. Schwartz Edward L. (Sunnyvale CA), Method and apparatus for compressing and decompressing images of documents.
  77. Rushforth Craig K. (Kaysville UT) Xie Zhenhua (Salt Lake City UT) Short Robert T. (Salt Lake City UT), Method and apparatus for decoding multiple bit sequences that are transmitted simultaneously in a single channel.
  78. Diehl Eric (Strasbourg FRX) Hamon Joel (Lipsheim FRX), Method and apparatus for device control by data transmission in TV lines.
  79. Aijala Victor A. (Arnold MD) Cohen Gerald B. (Gaithersburg MD) Jensen James M. (Columbia MD) Lynch Wendell D. (Silver Spring MD) Urbi Juan C. (Laurel MD), Method and apparatus for encoding/decoding broadcast or recorded segments and monitoring audience exposure thereto.
  80. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  81. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  82. Gormish Michael J. (Stanford CA) Peairs Mark (Menlo Park CA) Stork David G. (Stanford CA), Method and apparatus for placing data onto plain paper.
  83. Hujink Hendrik W. (Aalten NLX), Method and apparatus for producing admission tickets.
  84. Shamir Adi (Rehovot ILX), Method and apparatus for protecting visual information with printed cryptographic watermarks.
  85. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for protection of signal copy.
  86. Cobbley David A. (Portland OR) Throckmorton John A. (Lake Oswego OR), Method and apparatus for providing broadcast information with indexing.
  87. Callahan Sean M. (Cupertino CA), Method and apparatus for real-time lossless compression and decompression of image data.
  88. Rabbani Majid (Pittsford NY), Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system.
  89. Greenberg, Burton L., Method and apparatus for the automatic identification and verification of commercial broadcast programs.
  90. Greenberg Burton L. (28 E. 10th St. New York NY 10003), Method and apparatus for the automatic identification and verification of television broadcast programs.
  91. Greenberg Burton L. (New York NY), Method and apparatus for the processing of encoded data in conjunction with an audio broadcast.
  92. Banker Robert O. (Cumming GA) Bacon Kinney C. (Lawrenceville GA) Bagley Julius B. (Marietta GA), Method and apparatus for tuning data channels in a subscription television system having in-band data transmissions.
  93. Krause Edward A. (San Diego CA) Tom Adam (La Jolla CA) Liu Vincent (San Gabriel CA), Method and apparatus for vector coding of video transform coefficients.
  94. Copriviza Robert C. (Tarzana CA) Dubin Arnold M. (Calabasas CA) Ackerman Edward B. (Encino CA) Wood Jackson B. (Tarzana CA) Eakins Jeffrey S. (Claremont CA) Harmon David D. (Torrance CA), Method and apparatus for video signal encoding, decoding and monitoring.
  95. Kafri Oded (Beersheba ILX) Keren Eliezer (Arad ILX), Method and apparatus of encryption of optical images.
  96. Aoki Yutaka (Fujisawa JPX) Gohda Yuji (Himeji FL JPX) Rackley Darwin P. (Boca Raton FL), Method and means for fast writing of run length coded bit strings into bit mapped memory and the like.
  97. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
  98. Kondo Kazuhiro (Kokubunji JPX) Suzuki Toshiro (Tama JPX), Method and system for transmitting variable rate speech signal.
  99. Leighton Frank T. (15 Charlesden Pk. Newtonville MA 02160) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for authenticating objects identified by images or other identifying information.
  100. Kunt Murat (Grandvaux CHX) Bign Joseph (Renens CHX) Duc Benot (Ecublens CHX), Method for the marking of documents.
  101. Greenblatt, Richard D., Method of and apparatus for integrated voice (audio) communication simultaneously with "under voice" user-transparent digital data between telephone instruments.
  102. Gassmann Gerhard-Gnter (Esslingen-Berkheim DEX), Method of and system for transmitting two different messages on a carrier wave over a single transmission channel of pre.
  103. Pommier Daniel (Mordelles FRX), Method of digital sound broadcasting in television channels with spectrum interlacing.
  104. Butera Bill (Emmendingen DEX), Method of encoding and decoding the video data of an image sequence.
  105. Best Robert J. (San Jose CA), Method of providing identification, other digital data and multiple audio tracks in video systems.
  106. Rothfjell Rolf E. (Kalix SEX), Method of securing simple codes.
  107. Blthgen Bjrn (Celle DEX), Method of transmitting audio information and additional information in digital form.
  108. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  109. Tow Robert F. (Palo Alto CA), Methods and means for embedding machine readable digital data in halftone images.
  110. van der Gracht Peter K. (Burnaby CAX) Donaldson Robert W. (Vancouver CAX), Modem for pseudo noise communication on A.C. lines.
  111. Goldman Robert N. (Kailua HI), Non-counterfeitable document system.
  112. Borror Alan L. (Andover MA) Ellis Ernest W. (Carlisle MA) Faramarzpour Faramarz (Sudbury MA) MacKenzie Hugh R. (Belmont MA) McGowan Donald A. (Stoneham MA), Optical storage identification card and read/write system.
  113. Ruell Hartwig (Fuerstenfeldbruck DEX), Personal authentication system.
  114. Montgomery Gerald D. (Mesa AZ) Norrish Jay B. (Mesa AZ), Processor for receiving data from a video signal.
  115. Schmidt Johan M. (Eindhoven NLX) Voorman Johannes O. (Eindhoven NLX), Radio broadcasting system with transmitter identification.
  116. Schreiber William F. (Cambridge MA) Lippman Andrew B. (Salem MA) Adelson Edward H. (Cambridge MA) Netravali Aran N. (Westfield NJ), Receiver-compatible enhanced definition television system.
  117. Melen Roger D. (Los Altos Hills CA), Record document authentication by microscopic grain structure and method.
  118. Betts William L. (St. Petersburg FL) Zuranski Edward S. (Largo FL), Secondary channel for digital modems using spread spectrum subliminal induced modulation.
  119. Margolin George D. (Newport Beach CA), Secure identification card and system.
  120. Goldman Robert N. (Kailua HI), Secure transaction card and verification system.
  121. Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
  122. Rourke John L. (Fairport NY) Wing Peter D. (Webster NY) Ratcliffe ; II Jack F. (Pittsford NY) Valliere Paul J. (Fairport NY), Security system for electronic printing systems.
  123. Miyata Kunio (Tokyo JPX), Security system with imaging function.
  124. Best Stuart J. (Hayes GB2) Willard Reginald A. (Hayes GB2), Signal identification.
  125. Best Stuart J. (Harlington GB2) Johnson Nigel (Windlesham GB2) Sandford Adrian M. (Hayes GB2), Signal identification system.
  126. Montgomery Gerald D. (Mesa AZ) Norrish Jay B. (Mesa AZ), Signal processors for transparent and simultaneous transmission and reception of a data signal in a video signal.
  127. Bain Walter F. (Lovettsville VA), Signaling system.
  128. Hyatt Gilbert P. (7841 Jennifer Circle La Palma CA 90623), Signature filter system.
  129. Moses Donald W. (1590 Murphy Pkwy. Eagan MN 55122-1753), Simultaneous transmission of data and audio signals by means of perceptual coding.
  130. Moses Donald W. (1590 Murphy Pkwy. Eagan MN 55122-1753), Simultaneous transmission of data and audio signals by means of perceptual coding.
  131. Moses Donald W. (Minneapolis MN) Hustig Charles (Hudson WI) Ballard C. Ray (Venice FL), Simultaneous transmission of two information signals within a band-limited communications channel.
  132. Maxemchuk Nicholas F. (Mountainside NJ), Spread spectrum arrangement for (de)multiplexing speech signals and nonspeech signals.
  133. Ishigaki Yukinobu (Tokyo JPX), Spread spectrum communication system.
  134. Iwasaki Yoshiki (Yokohama JPX), Spread spectrum communication system.
  135. DeJean Jean P. (Cincinnati OH) Lu Daozheng (Buffalo Grove IL) Weissman Robert (Westport CT), Spread spectrum digital data transmission over TV video.
  136. Werner Jean-Jacques (Holmdel NJ), Spread-spectrum identification signal for communications system.
  137. Butler Robert J. (Oyster Bay NY) Schlameuss Ronald G. (Hempstead NY), Station signature system.
  138. Hilton Howard E. (Snohomish WA), Statistically based continuous autocalibration method and apparatus.
  139. Causse D\Agraives Bertrand (Ispra ITX) Mathieu Janny (Nancy FRX) Jamar Patrick (Nancy FRX), Surface texture reading access checking system.
  140. Weinblatt Lee S. (797 Winthrop Rd. Teaneck NJ 07666), Survey of radio audience.
  141. Tyrrell Raymond E. (Raleigh NC) Bishop O. Lamar (Raleigh NC) Powell William E. (Raleigh NC) Krisher Dale L. (Raleigh NC) Stephenson William H. (Raleigh NC) Briscoe M. Rodney (Raleigh NC) Thorne Hal A, Synchronous optical transmission system.
  142. Schilling Donald L. (Sands Point NY), Synchronous spread-spectrum communications system and method.
  143. Schober Gary W. (Edison NJ) Chadwick Raymond B. (Kearny NJ) Ashley Francis R. (South Plainfield NJ), System and method for identifying a television program.
  144. Myhrvold Nathan P. (Bellevue WA) Yuval Gideon A. (Mercer Island WA) Kim William E. (Redmond WA), System and method for inserting and recovering an add-on data signal for transmission with a video signal.
  145. Vasilik Kenneth E. (Scotts Valley CA), System and methods for improved storage and processing of BITMAP images.
  146. Mabey Kent W. (West Jordan UT) Boska Joseph M. (Columbia MD) Richards Stephen L. (Gallatin MO), System and methods for monitoring TV viewing system including a VCR and/or a cable converter.
  147. Sherman Robert (1555 Rising Glen Rd. Los Angeles CA 90069), System for communication using a broadcast audio signal.
  148. Balkanski Alexandre (Palo Alto CA) Purcell Stephen C. (Mountain View CA) Kirkpatrick ; Jr. James W. (San Jose CA) Bonomi Mauro (Palo Alto CA) Hsu Wen-Chang (Saratoga CA), System for compression and decompression of video data using discrete cosine transform and coding techniques.
  149. Tetrick Kenneth H. (Minneapolis MN) McCoy Randall L. (St. Paul MN), System for forming picture, alphanumeric and micrographic images on the surface of a plastic card.
  150. Dlugos Daniel F. (Huntington CT), System for printing encrypted messages with bar-code representation.
  151. Saito Tutomu (Yokohama JPX) Iwamoto Akito (Kamakura JPX), System for recording an image having a facial image and ID information.
  152. Soltesz John A. (1082 Broadway Ave. Masury OH 44438), System for the secure storage and transmission of data.
  153. Warner, Paul, System for transmitting data simultaneously with audio.
  154. Jungo Charles (Gilbert AZ) Montgomery Gerald (Mesa AZ) Gerdes Richard C. (Scottsdale AZ), System for transparent transmission and reception of a secondary data signal with a video signal in the video band.
  155. Clark John I. (Milford CT), System having a character generator for printing encrypted messages.
  156. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  157. Greenberg Burton L. (28 E. 10th St. New York NY 10003), Television program transmission verification method and apparatus.
  158. Thibadeau Robert (Pittsburgh PA) Newcomer Joseph M. (Pittsburgh PA) Touretzky David (Pittsburgh PA), Television receiver location identification.
  159. Collier Christopher J. (Carshalton Beeches GB2) Murray Robert J. (Horley GB2), Transmission system for sending two signals simultaneously on the same communications channel.
  160. Jungo Charles (Gilbert AZ) Montgomery Gerald D. (Mesa AZ) Schur Christopher J. (Payson AZ), Transmitting a secondary signal with dynamic injection level control.
  161. Gerdes Richard C. (Scottsdale AZ) Jungo Charles (Gilbert AZ) Montgomery Gerald (Mesa AZ), Transmitting data with video.
  162. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  163. Thomas William L. (Clearwater FL) Kempter Paul C. (Palm Harbor FL) Harkness David H. (Wilton CT), Universal broadcast code and multi-level encoded signal monitoring system.
  164. Dubner Robert J. (Westwood NJ), Video effects system able to intersect a 3-D image with a 2-D image.
  165. Waggener William N. (Sarasota FL), Video system for conveying digital and analog information.

이 특허를 인용한 특허 (495)

  1. Yu, Hong Heather; Gelman, Alexander D.; Fish, Robert S., Active data hiding for secure electronic media distribution.
  2. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  3. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  4. Louis H. Liang, Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters.
  5. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  6. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  7. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  8. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  9. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  10. Rhoads, Geoffrey B., Audio steganography.
  11. Wu, Shuguang; Xiao, Jun, Augmented information display.
  12. Rodriguez, Tony F.; Rhoads, Geoffrey B., Authenticating identification and security documents.
  13. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents.
  14. Rodriguez, Tony F., Authenticating identification and security documents and other objects.
  15. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Sharma, Ravi K., Authenticating identification and security documents and other objects.
  16. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  17. Rhoads,Geoffrey B., Authentication of identification documents.
  18. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  19. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  20. Tye Timothy T., Code point translation for computer text, using state tables.
  21. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  22. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  23. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  24. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  25. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  26. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  27. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  28. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  29. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  30. Stefik,Mark J., Content rendering device with usage rights.
  31. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  32. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  33. Frederick,John W.; Voltz,Christopher D., Copy protection for analog video signals from computing devices.
  34. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  35. Gasper John, Copy restrictive color-negative photographic print media.
  36. Gasper John ; Sutton James Edward, Copy restrictive documents.
  37. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  38. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  39. Thorwirth, Niels, Covert and robust mark for media identification.
  40. Thorwirth,Niels, Covert and robust mark for media identification.
  41. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  42. Sharma,Ravi K., Curve fitting for synchronizing readers of hidden auxiliary data.
  43. Numao, Masayuki; Shimizu, Shuichi; Morimoto, Norishige; Kobayashi, Mei, Data hiding and extraction methods.
  44. Yu, Hong Heather, Data hiding in digital multimedia.
  45. Moskowitz, Scott A., Data protection method and device.
  46. Moskowitz, Scott A., Data protection method and device.
  47. Moskowitz, Scott A., Data protection method and device.
  48. Moskowitz, Scott A., Data protection method and device.
  49. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  50. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  51. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  52. Nobuyoshi Miyahara JP; Yoichi Yagasaki JP, Device and method for processing image data, transmitting medium, and recording medium.
  53. Johan P. M. G. Linnartz NL; Maurice J. J. J-B. Maes NL; Antonius A. C. M. Kalker NL; Geert F. G. Depovere NL; Peter M. J. Rongen NL; Christianus W. F. Vriens NL; Marten E. Van Dijk NL, Device for optically scanning a record carrier.
  54. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Digital anti-counterfeiting software method and apparatus.
  55. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Digital anti-counterfeiting software method and apparatus.
  56. Rhoads, Geoffrey B., Digital authentication with analog documents.
  57. Rhoads, Geoffrey B., Digital authentication with analog documents.
  58. Rhoads,Geoffrey B., Digital authentication with analog documents.
  59. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  60. Furon,Teddy; Duhamel,Pierre, Digital data watermarking system using novel watermark insertion and detection methods.
  61. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  62. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  63. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  64. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  65. Rhoads, Geoffrey B., Digital watermark decoding method.
  66. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  67. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  68. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  69. Geoffrey B. Rhoads, Digital watermarks and methods for security documents.
  70. Stach,John; Brundage,Trent J., Digital watermarks for unmanned vehicle navigation.
  71. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  72. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  73. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  74. Patrick O'Neal Nunally, Document authentication using a mark that is separate from document information.
  75. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  76. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  77. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  78. Kloor, Harry Thomas, Dual transaction authorization system and method.
  79. Pelly,Jason Charles; Tapson,Daniel; Keating,Stephen Mark, Embedding data in material.
  80. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  81. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  82. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  83. Mark D. Conover ; Fleming M. Oliver, Embedding watermarks into compressed video data.
  84. Chang Kenneth H. P., Encoding and decoding a message within an image.
  85. Chang, Kenneth H. P., Encoding and decoding a message within an image.
  86. Chang, Kenneth H. P., Encoding and recording a message within an image.
  87. Cheng,Szeming; Yu,Hong Heather; Xiong,Zixiang, Enhanced method for digital data hiding.
  88. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  89. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  90. Reed,Alastair M.; Hannigan,Brett T., Generating super resolution digital images.
  91. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  92. Dietl, Josef, Hybrid digital signature workflow.
  93. Alattar, Adnan M., Identification and protection of security documents.
  94. Alattar, Adnan M., Identification and protection of video.
  95. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  96. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  97. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  98. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  99. Holmes, Jon A., Identifying and tracking digital images with customized metadata.
  100. Holmes, Jon A., Identifying and tracking digital images with customized metadata.
  101. Holmes, Jon A., Identifying and tracking digital images with customized metadata.
  102. Joseph E. Decker, Identity verification methods.
  103. Nakano Hirotaka,JPX ; Hashimoto Masahiro,JPX ; Manabe Koji,JPX, Image data encoding system and image inputting apparatus.
  104. Okano, Hirokazu, Image encryption method and device.
  105. Patterson,Phillip R.; Clements,Lorie; Lofgren,Neil A.; Rhoads,Geoffrey B., Image management system and methods using digital watermarks.
  106. Eihiro Sakaki JP; Hiroyuki Yamazaki JP, Image processing apparatus and method and storage medium.
  107. Sakaki Eihiro,JPX ; Yamazaki Hiroyuki,JPX, Image processing apparatus and method and storage medium.
  108. Sakaki, Eihiro; Yamazaki, Hiroyuki, Image processing apparatus and method and storage medium.
  109. Yoichi Takaragi JP, Image processing apparatus and method and storing medium.
  110. Furihata, Hirobumi; Nose, Takashi, Image processing circuit, and display panel driver and display device mounting the circuit.
  111. Furihata, Hirobumi; Nose, Takashi, Image processing circuit, and display panel driver and display device mounting the circuit.
  112. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  113. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  114. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  115. Felsher, David Paul, Information record infrastructure, system and method.
  116. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  117. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  118. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  119. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  120. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  121. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  122. Wu, Kuang-Shyr; Hsu, Tao-I, Invisible electronic signature.
  123. Mintzer Frederick Cole ; Yeung Minerva Ming-Yee, Invisible image watermark for image verification.
  124. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  125. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  126. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  127. Hawes, Jonathan L., Linking documents through digital watermarking.
  128. Wilensky Gregg D., Locating and aligning embedded images.
  129. Linnartz Johan P. M. G.,NLX, Marking a digitally encoded video and/or audio signal.
  130. Stone, Jonathan James; Pelly, Jason Charles; Keating, Stephen Mark; Collins, Andrew; Tapson, Daniel, Material distribution apparatus.
  131. Tian,Jun; Levy,Kenneth L.; Brunk,Hugh L., Measuring quality of service of broadcast multimedia signals using digital watermark analyses.
  132. Weiss,David, Media bridge method and apparatus.
  133. Kamath, Ajith M., Messaging by writing an image into a spectrogram.
  134. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  135. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  136. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  137. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  138. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  139. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  140. Srinivasan, Venugopal, Method and apparatus for embedding watermarks.
  141. Srinivasan,Venugopal, Method and apparatus for embedding watermarks.
  142. Shin, Sung-Hyuk; Reznik, Alexander; Zhang, Guodong; Chitrapu, Prabhakar R, Method and apparatus for enhancing security of wireless communications.
  143. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  144. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  145. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  146. Eberhart, Russell C.; Shi, Yuhui, Method and apparatus for evolving a neural network.
  147. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  148. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  149. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  150. Larkin, Kieran Gerard, Method and apparatus for highly efficient representation and compression of images.
  151. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  152. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  153. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  154. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  155. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  156. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a dynamically-updating pay-for-service web site.
  157. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a pay-for-service web site.
  158. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  159. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  160. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  161. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  162. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  163. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  164. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  165. Rhoads Geoffrey B. ; Davidson Clay ; Rodriguez Anthony, Method and apparatus for watermarking video images.
  166. Rhoads, Geoffrey B., Method and apparatus for watermarking video images.
  167. Honsinger, Chris W., Method and computer program for embedding and extracting an embedded message from a digital image.
  168. Eveleens,Jan; Lokhoff,Gerardus Cornelis Petrus; Maandonks,Arnoldus Johannes Lucas Maria, Method and device communicating a command.
  169. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  170. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  171. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  172. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  173. Donescu,Ioana, Method and device for processing and watermarking a set of coefficients representing a digital image.
  174. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  175. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  176. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  177. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  178. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  179. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  180. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  181. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  182. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  183. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  184. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  185. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  186. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  187. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  188. Goodman, Daniel I., Method and system for real-time control of document printing.
  189. Goodman, Daniel I., Method and system for real-time control of document printing.
  190. Lao, Guillermo, Method and system for subscription digital rights management.
  191. Lao, Guillermo, Method and system for subscription digital rights management.
  192. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  193. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  194. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  195. de Queiroz,Ricardo L, Method for authentication of JPEG image data.
  196. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  197. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  198. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  199. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  200. Bloom, Jeffrey A.; Cox, Ingemar J.; Miller, Matthew L., Method for data preparation and watermark insertion.
  201. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  202. Kemp, Thomas, Method for generating an audio signature based on time domain features.
  203. Westerman, Larry Alan; Zeng, Wenjun, Method for inconspicuously adding tracking data in coded images.
  204. Cox, Ingemar J., Method for linking an electronic media work to perform an action.
  205. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  206. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  207. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  208. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  209. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  210. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  211. Cox, Ingemar J., Method for tagging an electronic media work to perform an action.
  212. Cox, Ingemar J., Method for taking action based on a request related to an electronic media work.
  213. Cox, Ingemar J., Method for taking action with respect to an electronic media work.
  214. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method for updating personal financial information on a web site.
  215. Cox, Ingemar J., Method for using extracted features from an electronic work.
  216. Kazunori Nakano JP; Junichi Taguchi JP; Hiroshi Yoshiura JP; Isao Echizen JP; Yutaka Kurosu JP, Method of authenticating digital-watermark pictures.
  217. Dimsdle,Jeffrey William, Method of differential-phase/absolute-amplitude QAM.
  218. Schwenk, Joerg; Ueberberg, Johannes, Method of inserting manipulation-proof digital fingerprints into electronic documents.
  219. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  220. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  221. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  222. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  223. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  224. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  225. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  226. Srinivasan, Venugopal; Peiffer, John C., Methods and apparatus for mixing compressed digital bit streams.
  227. Srinivasan, Venugopal; Peiffer, John C., Methods and apparatus for mixing compressed digital bit streams.
  228. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  229. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  230. Keeney, Richard A.; Olson, Thor A., Methods and apparatus for securely transmitting and processing digital image data.
  231. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  232. Geoffrey B. Rhoads, Methods and devices for recognizing banknotes and responding accordingly.
  233. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  234. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  235. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  236. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  237. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  238. Rhoads, Geoffrey B., Methods for encoding security documents.
  239. Rhoads Geoffrey B., Methods for identifying equipment used in counterfeiting.
  240. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  241. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  242. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  243. Holmes,Jon A., Methods for linking photographs to data related to the subjects of the photographs.
  244. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  245. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  246. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  247. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  248. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  249. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  250. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  251. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  252. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  253. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  254. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  255. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  256. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  257. Taniguchi,Masaaki; Shimizu,Shuhichi; Kamijoh,Kohichi; Sugihara,Ryoh, Methods, apparatus and systems for an electronic watermark having resistance to scaling.
  258. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  259. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  260. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  261. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  262. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  263. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  264. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  265. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  266. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  267. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  268. Telesco, William J., Methods, systems, and computer program products for tokenized domain name resolution.
  269. Bloom, Jeffrey Adam; Zou, Dekun, Modifying a coded bitstream.
  270. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  271. Zou, Dekun; Bloom, Jeffrey Adam; Yin, Peng; Divorra Escoda, Oscar, Modifying a coded bitstream.
  272. Watson,Matthew Aubrey; Truman,Michael Mead; Vernon,Stephen Decker; Crockett,Brett Graham, Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information.
  273. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  274. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  275. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  276. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  277. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  278. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  279. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  280. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  281. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  282. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  283. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  284. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  285. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  286. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  287. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  288. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  289. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  290. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  291. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  292. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  293. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  294. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  295. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  296. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  297. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  298. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  299. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  300. Boykin,Patrick Oscar; Boscolo,Riccardo, Perceptual encryption and decryption of movies.
  301. Holmes, Jon A., Photography system.
  302. Holmes, Jon A., Photography system to organize digital photographs and information regarding the subjects therein.
  303. Holmes, Jon A., Photography system to organize digital photographs and information regarding the subjects therein.
  304. Holmes, Jon A., Photography system to organize digital photographs and information regarding the subjects therein.
  305. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  306. Chang,Kenneth H. P., Print user interface system and its applications.
  307. Jonathan Scott Carr ; Burt W. Perry ; Geoffrey B. Rhoads, Printing and validation of self validating security documents.
  308. Sakaki, Eihiro; Yamazaki, Hiroyuki, Processing apparatus and method and storage medium.
  309. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  310. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  311. Knowlton Kenneth Charles ; Miliefsky Gary Steven, Protection mechanism for visual link objects.
  312. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  313. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  314. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  315. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  316. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  317. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  318. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  319. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  320. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  321. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  322. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  323. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  324. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  325. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  326. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  327. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  328. Levine,Earl; Wiser,Philip R., Server-side watermark data writing method and apparatus for digital signals.
  329. Stach, John; Brunk, Hugh L.; Sharma, Ravi K., Signal embedding and detection using circular structures in a transform domain of a media signal.
  330. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  331. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  332. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  333. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  334. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  335. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  336. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  337. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  338. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  339. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  340. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  341. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  342. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  343. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  344. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  345. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  346. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  347. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  348. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  349. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  350. Hoffberg, Steven M., System and method for determining contingent relevance.
  351. Alasia,Alfred, System and method for digital image encoding.
  352. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  353. John Man Kwong Kwan, System and method for digitally marking a file.
  354. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  355. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  356. Wang,Xin, System and method for document distribution.
  357. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  358. Numao Masayuki,JPX ; Shimizu Shuichi,JPX ; Morimoto Norishige,JPX ; Kobayashi Mei,JPX, System and method for hiding and extracting message data in multimedia data.
  359. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  360. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  361. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  362. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  363. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  364. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  365. Abraitis, John; Bozzi, Steve; Collins, Chris; Meehan, Richard Sean; Metayer, Frank, System and method for processing a form.
  366. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  367. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  368. Wang, Xin, System and method for protection of digital works.
  369. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  370. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  371. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  372. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  373. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  374. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  375. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  376. Cox, Ingemar J., System and method for taking action with respect to an electronic media work.
  377. Cox, Ingemar J., System and method for taking action with respect to an electronic media work and logging event information related thereto.
  378. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  379. Olligschlaeger, Andreas M., System and method for three-way call detection.
  380. Olligschlaeger, Andreas M., System and method for three-way call detection.
  381. Olligschlaeger, Andreas M., System and method for three-way call detection.
  382. Olligschlaeger, Andreas M., System and method for three-way call detection.
  383. Wang,Xin, System and method for transferring the right to decode messages.
  384. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  385. Gotschim, Christian Peter; Qiao, Yue; Wang, Jeff, System and method of automating multidimensional scaling for psychophysics.
  386. Gotschim, Christian Peter; Qiao, Yue; Wang, Jeff, System and method of automating multidimensional scaling for psychophysics.
  387. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  388. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  389. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  390. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  391. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  392. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  393. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  394. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  395. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  396. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  397. de Queiroz, Ricardo L., System for authentication of JPEG image data.
  398. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  399. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  400. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  401. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  402. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  403. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  404. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  405. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  406. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  407. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  408. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  409. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  410. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  411. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  412. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  413. Cox, Ingemar J., System for taking action based on a request related to an electronic media work.
  414. Cox, Ingemar J., System for taking action with respect to a media work.
  415. Cox, Ingemar J., System for taking action with respect to a media work.
  416. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  417. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  418. Cox, Ingemar J., System for using extracted features from an electronic work.
  419. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  420. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  421. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  422. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  423. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  424. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  425. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  426. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  427. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  428. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  429. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  430. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  431. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  432. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  433. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  434. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  435. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  436. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  437. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  438. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  439. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  440. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  441. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  442. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  443. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  444. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  445. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  446. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  447. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  448. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  449. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  450. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  451. Moskowitz,Scott A., Systems, methods and devices for trusted transactions.
  452. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  453. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  454. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  455. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  456. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  457. Martin, Thomas J., Three-way call detection using steganography.
  458. Martin,Thomas J., Three-way call detection using steganography.
  459. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  460. Bruckstein, Alfred M.; Richardson, Thomas J., Transform domain image watermarking method and system.
  461. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  462. Zink Scott E. ; Baker Daniel G., Transparent embedment of data in a video signal.
  463. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  464. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  465. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  466. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  467. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  468. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  469. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  470. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  471. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  472. Zou, Han; Yu, Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  473. Zou, Han; Yu, Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  474. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  475. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  476. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  477. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  478. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  479. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  480. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  481. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  482. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  483. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  484. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  485. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  486. Rhoads,Geoffrey B., Video steganography.
  487. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  488. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  489. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  490. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  491. Rhoads, Geoffrey B., Watermark embedder and reader.
  492. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  493. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  494. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  495. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로