$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Graphics processing system employing embedded code signals 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/00
출원번호 US-0327426 (1994-10-21)
발명자 / 주소
  • Rhoads Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Klarquist Sparkman Campbell Leigh & Whinston
인용정보 피인용 횟수 : 550  인용 특허 : 0

초록

An identification code signal is impressed on a carrier to be identified (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned and the carrier thereby identified. The method and apparatus are characterized by robustness desp

대표청구항

[ I claim:] [1.] A steganographic method that includes changing values of input pixels corresponding to an input two-dimensional image to encode an N-bit auxiliary data signal therein, thereby yielding encoded output pixels defining an encoded output image, N being at least two, the method character

이 특허를 인용한 특허 (550)

  1. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Adaptive pattern recognition based control system and method.
  2. Hoffberg,Linda Irene; Hoffberg,Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  3. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  4. Bradley, Brett A., Adaptive prediction filtering for digital watermarking.
  5. Bradley,Brett A., Adaptive prediction filtering for digital watermarking.
  6. Bradley, Brett A., Adaptive prediction filtering for encoding/decoding digital signals in media content.
  7. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  8. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  9. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  10. Yamadaji Shinji,JPX, Apparatus and method for embedding/unembedding supplemental information.
  11. Louis H. Liang, Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters.
  12. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  13. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  14. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  15. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  16. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  17. Tian, Jun; Levy, Kenneth L.; Brunk, Hugh L., Assessing quality of service using digital watermark information.
  18. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  19. Rhoads, Geoffrey B., Audio and video signal processing.
  20. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  21. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  22. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  23. Kentish, William Edmund Cranstoun; Haynes, Nicolas John, Audio processing with time advanced inserted payload signal.
  24. Rhoads, Geoffrey B., Audio steganography.
  25. Sharma, Ravi K.; Bradley, Brett A.; Thagadur Shivappa, Shankar; Kamath, Ajith; Cushman, David A., Audio watermark encoding with reversing polarity and pairwise embedding.
  26. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  27. Wu, Judy Wailing; McTaggart, Robert Andrew, Authenticable anti-copy document and method to produce an authenticable anti-copy document with a combined void pantograph and faux watermark security features.
  28. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  29. Zeller,Claude; Mackay,Donald G.; Kilmartin,William; Cordery,Robert A.; Brosseau,William A.; Brunk,Hugh L.; Decker,Stephen K.; Tian,Jun, Authenticating printed objects using digital watermarks associated with multidimensional quality metrics.
  30. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  31. Rhoads,Geoffrey B., Authentication of identification documents.
  32. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  33. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  34. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  35. Rhoads, Geoffrey B., Authentication using a digital watermark.
  36. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  37. Rodriguez, Tony F.; Reed, Alastair M.; Sharma, Ravi K.; Alattar, Osama M.; Hannigan, Brett T.; Levy, Kenneth L.; Brunk, Hugh L.; Rhoads, Geoffrey B.; Gustafson, Ammon E., Automated methods for distinguishing copies from original printed objects.
  38. Anderson, Eric C.; Morris, Robert P., Automatically configuring a web-enabled portable device to access the internet.
  39. Anderson, Eric C.; Morris, Robert P., Automatically configuring a web-enabled portable device to access the internet.
  40. Anderson, Eric C.; Morris, Robert P., Automatically configuring a web-enabled portable device to access the internet.
  41. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Benchmarks for digital watermarking.
  42. Steinberg, Eran; Prilutsky, Yury, Camera network communication device.
  43. Steinberg, Eran; Prilutsky, Yury, Camera network communication device.
  44. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  45. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  46. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  47. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  48. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  49. Levy, Kenneth L.; Rhoads, Geoffrey B.; Brunk, Hugh L., Connected audio and other media objects.
  50. Nesvadba,Jan Alexis Daniel; Snijder,Freddy; Barbieri,Mauro, Content analysis apparatus.
  51. Levy, Kenneth L., Content identification and management in content distribution networks.
  52. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  53. Rhoads,Geoffrey B., Content identification, and securing media content with steganographic encoding.
  54. Conwell, William Y.; Bradley, Brett A.; Rhoads, Geoffrey B., Content identifiers.
  55. Rhoads,Geoffrey B.; Levy,Kenneth L., Content identifiers triggering corresponding responses.
  56. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  57. Rhoads, Geoffrey B.; Levy, Kenneth L., Content indexing and searching using content identifiers and associated metadata.
  58. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  59. Adams, Robert; Williams, David M.; Richardson, John; Perry, Burt, Content programmer control of video and data display using associated data.
  60. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  61. Stefik,Mark J., Content rendering device with usage rights.
  62. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  63. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  64. Samtani, Rajan; Meyer, Joel R.; Sharma, Ravi K., Content serialization by varying content properties, including varying master copy watermark properties.
  65. Rhoads, Geoffrey B., Controlling use of audio or image content.
  66. Rhoads, Geoffrey B., Controlling use of audio or image content.
  67. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  68. Gasper John, Copy restrictive color-negative photographic print media.
  69. Gasper John ; Sutton James Edward, Copy restrictive documents.
  70. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  71. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  72. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  73. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  74. Jones,Clive; Hollinshead,Richard, Data encoding/decoding device and apparatus using the same.
  75. Morimoto Norishige,JPX ; Maeda Junji,JPX, Data hiding and extraction methods.
  76. Ramaswamy, Arun; Srinivasan, Venugopal, Data insertion apparatus and methods for use with compressed audio/video data.
  77. Ramaswamy, Arun; Srinivasan, Venugopal, Data insertion apparatus and methods for use with compressed audio/video data.
  78. Ramaswamy, Arun; Srinivasan, Venugopal, Data insertion apparatus and methods for use with compressed audio/video data.
  79. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  80. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  81. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  82. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  83. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  84. Rhoads, Geoffrey B., Detecting hidden auxiliary code signals in media.
  85. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  86. Brundage, Trent J., Detecting media areas likely of hosting watermarks.
  87. Srinivasan,Venugopal, Detection of signal modifications in audio streams with embedded code.
  88. Levine Earl, Determination of a best offset to detect an embedded pattern.
  89. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  90. Stach, John; Kamath, Ajith M., Differential modulation for robust signaling and synchronization.
  91. Stach, John; Kamath, Ajith M., Differential modulation for robust signaling and synchronization.
  92. Rhoads, Geoffrey B., Digital authentication with analog documents.
  93. Rhoads, Geoffrey B., Digital authentication with analog documents.
  94. Rhoads,Geoffrey B., Digital authentication with analog documents.
  95. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  96. Ramaswamy, Arun; Srinivasan, Venugopal, Digital data insertion apparatus and methods for use with compressed audio/video data.
  97. Ramaswamy, Arun; Srinivasan, Venugopal, Digital data insertion apparatus and methods for use with compressed audio/video data.
  98. Lee,Chong U.; Lam,Katherine S.; Nicolas,Julien J.; Atrero,Edward, Digital hidden data transport (DHDT).
  99. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  100. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  101. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  102. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  103. Lee, Chong U.; Lam, Katherine S.; Nicolas, Julien J.; Atrero, Edward, Digital system for embedding a pseudo-randomly modulated auxiliary data sequence in digital samples.
  104. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  105. Levy, Kenneth L.; Stager, Reed R., Digital watermarking applications.
  106. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  107. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  108. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Digital watermarking methods and apparatus for use with audio and video content.
  109. Rodriguez, Tony F.; Brundage, Trent J., Digital watermarking methods, systems and apparatus.
  110. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  111. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  112. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  113. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  114. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  115. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  116. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  117. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  118. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  119. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  120. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  121. Rhoads,Geoffrey B.; Carr,J. Scott, Digital watermarks.
  122. Rodriguez, Tony F.; Haynes, Mark E.; Brunk, Hugh L.; Rhoads, Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  123. Yeung,Minerva M.; Thakkar,Shreekant S., Digital watermarks with values derived from remote platforms.
  124. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  125. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  126. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  127. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  128. Andelin, Victor L.; Levy, Kenneth L., Digitally watermarking documents associated with vehicles.
  129. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  130. Lofgren, Neil E.; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermarking holograms for identity documents.
  131. Naito, Kikuo; Seto, Kunio; Ohshima, Hideaki; Mitani, Shigeyuki; Noguchi, Toshiyuki, Display and control of permitted data processing based on control information extracted from the data.
  132. Naito,Kikuo; Seto,Kunio; Ohshima,Hideaki; Mitani,Shigeyuki; Noguchi,Toshiyuki, Display and control of permitted data processing based on control information extracted from the data.
  133. Patrick O'Neal Nunally, Document authentication using a mark that is separate from document information.
  134. Moore,Keith E., Document authentication using the physical characteristics of underlying physical media.
  135. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  136. Rhoads,Geoffrey B., Documents and apparatus to encode documents.
  137. Rhoads,Geoffrey B., Documents, articles and authentication of documents and articles.
  138. Gramelspacher, Michael S.; Koplar, Edward J., Dual channel encoding and detection.
  139. Levine Earl, Efficient watermark method and apparatus for digital signals.
  140. Rhoads, Geoffrey B., Electronic commerce using optical input device.
  141. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  142. Pelly,Jason Charles; Tapson,Daniel; Keating,Stephen Mark, Embedding data in material.
  143. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  144. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  145. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  146. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  147. Rhoads, Geoffrey B., Encoding and decoding media signals.
  148. Davis,Bruce L.; Rhoads,Geoffrey B.; Seder,Phillip Andrew, Enhanced input peripheral.
  149. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  150. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  151. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  152. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  153. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  154. Blesser, Barry, Feedback and simulation regarding detectability of a watermark message.
  155. Brunk,Hugh L.; Zeller,Claude, Halftone watermarking and related applications.
  156. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  157. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  158. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  159. Alattar, Adnan M., Identification and protection of video.
  160. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  161. Brundage, Trent J.; Sher-Jan, Mahmood; Hannigan, Brett T.; Durst, Jr., Robert T., Identification document and related methods.
  162. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  163. Jones, Robert L., Identification document with three dimensional image of bearer.
  164. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  165. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  166. Yoichi Takaragi JP, Image processing apparatus and method and storing medium.
  167. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  168. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  169. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  170. Dorrell,Andrew James; Tonnison,Alan Valev, Image protection.
  171. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  172. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  173. Nakagawa, Toshiyuki; Maeda, Mitsuru; Ohira, Tadashi, Information processing method and apparatus.
  174. Felsher, David Paul, Information record infrastructure, system and method.
  175. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  176. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  177. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  178. Hoffberg, Steven Mark, Intelligent electronic appliance system and method.
  179. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  180. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  181. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  182. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  183. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  184. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  185. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  186. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  187. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  188. Hawes, Jonathan L., Linking documents through digital watermarking.
  189. Rhoads, Geoffrey B.; Rodriguez, Tony F., Location-based arrangements employing mobile devices.
  190. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  191. Stebbings, David W., METHOD FOR MINIMIZING PIRATING AND/OR UNAUTHORIZED COPYING AND/OR UNAUTHORIZED ACCESS OF/TO DATA ON/FROM DATA MEDIA INCLUDING COMPACT DISCS AND DIGITAL VERSATILE DISCS, AND SYSTEM AND DATA MEDIA FOR .
  192. Chupp, Christopher E.; Gramelspacher, Michael S.; Lorden, Gary A., Mark-based content modulation and detection.
  193. Chupp, Christopher E.; Gramelspacher, Michael S.; Lorden, Gary A., Mark-based content modulation and detection.
  194. Brunk,Hugh L., Measuring digital watermark strength using error correction coding metrics.
  195. Tian,Jun; Levy,Kenneth L.; Brunk,Hugh L., Measuring quality of service of broadcast multimedia signals using digital watermark analyses.
  196. Weiss,David, Media bridge method and apparatus.
  197. Levy, Kenneth L., Media methods and systems.
  198. Hoffberg, Steven; Hoffberg-Borghesani, Linda, Media recording device with packet data interface.
  199. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  200. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  201. Steinberg,Eran; Prilutsky,Yury, Method and apparatus for controlled camera useability.
  202. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  203. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  204. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  205. Srinivasan, Venugopal, Method and apparatus for embedding watermarks.
  206. Srinivasan,Venugopal, Method and apparatus for embedding watermarks.
  207. Moon, Young-ho; Shim, Woo-sung; Park, Sung-bum; Choi, Dai-woong; Choi, Jong-bum; Yoon, Jae-won; Kim, Jung-hyeon, Method and apparatus for encoding and decoding image using image separation based on bit location.
  208. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  209. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  210. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  211. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  212. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  213. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  214. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  215. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  216. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  217. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  218. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  219. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  220. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  221. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  222. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  223. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  224. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  225. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  226. Glass Randal ; Salganicoff Marcos ; von Seelen Ulf Cahn, Method and apparatus for securely transmitting and authenticating biometric data over a network.
  227. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  228. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  229. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  230. Chen Chiahong ; Hill Mark Edward, Method and apparatus for updating checksums of data structures.
  231. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  232. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  233. Lucas, Keith; Van Rassel, William, Method and apparatus for video watermarking.
  234. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  235. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  236. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  237. Adams Robert ; Williams David M. ; Richardson John ; Perry Burt, Method and system for configuring a display.
  238. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  239. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  240. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  241. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  242. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  243. Chupp, Christopher E.; Gramelspacher, Michael S.; Chounard, II, Jesse J.; Withers, James G.; Barsoum, Yousri H.; Reynolds, Michael C., Method and system for enhanced modulation of video signals.
  244. Chupp, Christopher E.; Gramelspacher, Michael S.; Chounard, II, Jesse J.; Withers, James G.; Barsoum, Yousri H.; Reynolds, Michael C., Method and system for enhanced modulation of video signals.
  245. Chupp, Christopher E.; Gramelspacher, Michael S.; Chounard, II, Jesse J.; Withers, James G.; Barsoum, Yousri H.; Reynolds, Michael C., Method and system for enhanced modulation of video signals.
  246. Chupp,Christopher E.; Gramelspacher,Michael S.; Chounard, II,Jesse J.; Withers,James G.; Barsoum,Yousri H.; Reynolds,Michael C., Method and system for enhanced modulation of video signals.
  247. Chupp,Christopher E.; Gramelspacher,Michael S.; Chounard, II,Jesse J.; Withers,James G.; Barsoum,Yousri H.; Reynolds,Michael C., Method and system for enhanced modulation of video signals.
  248. Chupp,Christopher E.; Gramelspacher,Michael S.; Chounard, II,Jesse J.; Withers,James G.; Barsoum,Yousri H.; Reynolds,Michael C., Method and system for enhanced modulation of video signals.
  249. Anderson, Eric C.; Morris, Robert P.; Petersen, Lynn Erich, Method and system for hosting entity-specific photo-sharing websites for entity-specific digital cameras.
  250. Anderson, Eric C.; Morris, Robert Paul; Petersen, Lynn Erich, Method and system for hosting entity-specific photo-sharing websites for entity-specific digital cameras.
  251. Anderson, Eric C.; Morris, Robert Paul; Petersen, Lynn Erich, Method and system for hosting entity-specific photo-sharing websites for entity-specific digital cameras.
  252. Anderson, Eric C; Morris, Robert P; Petersen, Lynn Erich, Method and system for hosting entity-specific photo-sharing websites for entity-specific digital cameras.
  253. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  254. Goodman, Daniel I., Method and system for real-time control of document printing.
  255. Goodman, Daniel I., Method and system for real-time control of document printing.
  256. Lao, Guillermo, Method and system for subscription digital rights management.
  257. Lao, Guillermo, Method and system for subscription digital rights management.
  258. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  259. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  260. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  261. Lord William P. ; Abdel-Mottaleb Mohamed ; Epstein Michael, Method for confirming the integrity of an image transmitted with a loss.
  262. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  263. Srinivasan, Venugopal, Method for encoding an input signal.
  264. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  265. Cox, Ingemar J., Method for linking an electronic media work to perform an action.
  266. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  267. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  268. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  269. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  270. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  271. Macy, William W.; Holliman, Matthew J.; Yeung, Minerva Ming-Yee, Method for robust watermarking of content.
  272. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  273. Cox, Ingemar J., Method for tagging an electronic media work to perform an action.
  274. Cox, Ingemar J., Method for taking action based on a request related to an electronic media work.
  275. Cox, Ingemar J., Method for taking action with respect to an electronic media work.
  276. Cox, Ingemar J., Method for using extracted features from an electronic work.
  277. Lee,Jung Soo; Choi,Jong Uk, Method of embedding/detecting digital watermark and apparatus for using thereof.
  278. Lee,Jung Soo; Choi,Jong Uk; Lee,Han Ho, Method of inserting/detecting digital watermark and apparatus for using thereof.
  279. Ishikawa, Mark M.; Piccionelli, Gregory A., Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network.
  280. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  281. Srinivasan, Venugopal; Nelson, Dan; Ramaswamy, Arun, Methods and apparatus for embedding and recovering an image for use with video content.
  282. Srinivasan, Venugopal; Nelson, Dan; Ramaswamy, Arun, Methods and apparatus for embedding and recovering an image for use with video content.
  283. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  284. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  285. Srinivasan, Venugopal, Methods and apparatus for embedding codes in compressed audio data streams.
  286. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  287. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  288. Srinivasan, Venugopal, Methods and apparatus for embedding watermarks.
  289. Peiffer, John C.; Hicks, Michael A.; Wright, David H.; Mears, Paul M.; Srinivasan, Venugopal; Lu, Daozheng; Kempter, Paul C., Methods and apparatus for identifying a digital audio signal.
  290. Peiffer, John C.; Hicks, Michael A.; Wright, David H.; Mears, Paul M.; Srinivasan, Venugopal; Lu, Daozheng; Kempter, Paul C., Methods and apparatus for identifying a digital audio signal.
  291. Srinivasan, Venugopal; Peiffer, John C., Methods and apparatus for mixing compressed digital bit streams.
  292. Srinivasan, Venugopal; Peiffer, John C., Methods and apparatus for mixing compressed digital bit streams.
  293. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  294. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  295. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  296. Rhoads, Geoffrey B., Methods and arrangements for composing information-carrying artwork.
  297. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  298. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  299. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  300. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  301. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  302. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  303. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  304. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  305. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  306. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  307. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  308. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  309. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  310. Davis,Bruce L.; Rhoads,Geoffrey B., Methods and tangible objects employing machine readable data.
  311. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  312. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  313. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  314. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  315. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  316. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  317. Rhoads,Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  318. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  319. Rhoads, Geoffrey B., Methods for encoding security documents.
  320. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  321. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  322. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  323. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  324. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  325. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  326. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  327. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  328. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  329. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  330. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  331. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  332. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  333. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  334. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  335. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  336. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  337. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  338. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  339. Rhoads, Geoffrey B.; Conwell, William Y., Methods of interacting with audio and ambient music.
  340. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  341. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  342. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  343. Selzer, Gary M., Modified action rules.
  344. Stebbings, David W., Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs.
  345. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  346. Srinivasan, Venugopal, Multi-band spectral audio encoding.
  347. Gurijala, Aparna R.; Bai, Yang; Sharma, Ravi K.; Bradley, Brett A., Multi-mode audio recognition and auxiliary data encoding and decoding.
  348. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  349. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  350. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  351. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  352. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  353. Rhoads, Geoffrey B., Music methods and systems.
  354. Rhoads, Geoffrey B, Network linking methods and apparatus.
  355. Rodriguez, Tony F.; Brundage, Trent J., Noise influenced watermarking methods and apparatus.
  356. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  357. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  358. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  359. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  360. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  361. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  362. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  363. Wang, Jian; Dang, Yingnong; Chen, Liyong, Positionally encoded document image analysis and labeling.
  364. Rhoads,Geoffrey; Alattar,Adnam M.; Sharma,Ravi K., Pre-filteriing to increase watermark signal-to-noise ratio.
  365. Rhoads, Geoffrey B., Printer driver separately applying watermark and information.
  366. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  367. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  368. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  369. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  370. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  371. Levy, Kenneth L., Recoverable digital content degradation.
  372. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  373. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  374. Rhoads, Geoffrey B., Redundantly embedding auxiliary data in source signals.
  375. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  376. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  377. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  378. Levy, Kenneth L.; Rhoads, Geoffrey B.; Hiatt, R. Stephen, Rights management system and methods.
  379. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  380. Earl Levine, Robust watermark method and apparatus for digital signals.
  381. Levine Earl ; Brownell Jason S., Robust watermark method and apparatus for digital signals.
  382. Poorvi L. Vora, Robust watermarking for digital objects.
  383. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  384. Levine Earl, Secure watermark method and apparatus for digital signals.
  385. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  386. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  387. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  388. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  389. Bradley, Brett A., Self-orienting watermarks.
  390. Bradley,Brett A., Self-orienting watermarks.
  391. Hannigan, Brett T.; Levy, Kenneth L., Signal hiding employing feature modification.
  392. Rhoads, Geoffrey B.; Carr, J. Scott, Signal processing of audio and video data, including assessment of embedded data.
  393. Rhoads, Geoffrey B.; Carr, J. Scott, Signal processing of audio and video data, including deriving identifying information.
  394. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  395. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  396. Srinivasan,Venugopal, Spectral audio encoding.
  397. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  398. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  399. Brundage, Trent J.; Rhoads, Geoffrey B., Steganographic encoding.
  400. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  401. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  402. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  403. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  404. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  405. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  406. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  407. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  408. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  409. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  410. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  411. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  412. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  413. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  414. Feola, Christopher J.; Jennings, IV, James C., System and method for associating historical information with sensory data and distribution thereof.
  415. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  416. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  417. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  418. Hoffberg, Steven M., System and method for determining contingent relevance.
  419. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  420. Wang,Xin, System and method for document distribution.
  421. Farkash, Eyal, System and method for embedding data in video.
  422. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  423. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  424. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  425. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  426. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  427. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  428. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  429. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  430. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  431. Wang, Xin, System and method for protection of digital works.
  432. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  433. Carro,Fernando Incertis, System and method for providing telephonic voice response information related to items marked on physical documents.
  434. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  435. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  436. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  437. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  438. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  439. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  440. Cox, Ingemar J., System and method for taking action with respect to an electronic media work.
  441. Cox, Ingemar J., System and method for taking action with respect to an electronic media work and logging event information related thereto.
  442. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  443. Olligschlaeger, Andreas M., System and method for three-way call detection.
  444. Olligschlaeger, Andreas M., System and method for three-way call detection.
  445. Olligschlaeger, Andreas M., System and method for three-way call detection.
  446. Olligschlaeger, Andreas M., System and method for three-way call detection.
  447. Wang,Xin, System and method for transferring the right to decode messages.
  448. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  449. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  450. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  451. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  452. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  453. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  454. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  455. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  456. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  457. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  458. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  459. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  460. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  461. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  462. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  463. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  464. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  465. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  466. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  467. Geyzel, Zeev; Dorrendorf, Leonid, System for embedding data.
  468. Carro, Fernando Incertis, System for providing telephonic voice response information related to items marked on physical documents.
  469. Cox, Ingemar J., System for taking action based on a request related to an electronic media work.
  470. Cox, Ingemar J., System for taking action with respect to a media work.
  471. Cox, Ingemar J., System for taking action with respect to a media work.
  472. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  473. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  474. Cox, Ingemar J., System for using extracted features from an electronic work.
  475. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  476. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  477. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  478. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  479. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  480. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  481. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  482. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  483. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  484. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  485. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  486. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  487. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  488. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  489. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  490. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  491. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  492. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  493. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  494. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  495. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  496. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  497. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  498. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  499. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  500. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  501. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  502. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  503. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  504. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  505. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  506. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  507. Delp, Edward J.; Lin, Eugene T., Temporal synchronization of video and audio signals.
  508. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  509. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  510. Martin, Thomas J., Three-way call detection using steganography.
  511. Martin,Thomas J., Three-way call detection using steganography.
  512. Rhoads, Geoffrey B., Tile-based digital watermarking techniques.
  513. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  514. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  515. Anderson, Eric C., Transmission bandwidth and memory requirements reduction in a portable image capture device.
  516. Zink Scott E. ; Baker Daniel G., Transparent embedment of data in a video signal.
  517. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  518. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  519. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  520. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  521. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  522. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  523. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  524. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  525. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  526. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  527. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  528. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  529. Rhoads,Geoffrey B.; Rodriguez,Tony F.; McKinley,Tyler J.; Miller,Marc D.; Hierholzer,Kirstin, User control and activation of watermark enabled objects.
  530. Levy, Kenneth L., Using object identifiers with content distribution.
  531. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  532. Sharma, Ravi K.; Rhoads, Geoffrey B.; Bradley, Brett A., Variable message coding protocols for encoding auxiliary data in media signals.
  533. Sharma, Ravi K.; Rhoads, Geoffrey B.; Bradley, Brett A., Variable message coding protocols for encoding auxiliary data in media signals.
  534. Sharma,Ravi K.; Rhoads,Geoffrey B.; Bradley,Brett A., Variable message coding protocols for encoding auxiliary data in media signals.
  535. Rhoads,Geoffrey B., Video steganography.
  536. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  537. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  538. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  539. Levy, Kenneth L.; Perry, Burt W., Watermark and fingerprint systems for media.
  540. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  541. Rhoads, Geoffrey B., Watermark embedder and reader.
  542. Levy, Kenneth L., Watermark embedding functions adapted for transmission channels.
  543. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B., Watermark holograms.
  544. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  545. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  546. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  547. Hannigan, Brett T.; Levy, Kenneth L., Watermarking employing the time-frequency domain.
  548. Rhoads, Geoffrey B.; Carr, J. Scott, Watermarking enhanced to withstand anticipated corruptions.
  549. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  550. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로