$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Security system for photographic identification 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/00
출원번호 US-0763847 (1996-12-04)
발명자 / 주소
  • Rhoads Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Klarquist Sparkman Campbell Leigh & Whinston, LLP
인용정보 피인용 횟수 : 325  인용 특허 : 0

초록

Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent

대표청구항

[ The invention claimed is:] [1.] A method of correlating, with a photograph, information about an individual whose image appears in the photograph, the method comprising:steganographically encoding into a photograph multi-bit information that pertains to said individual, said encoding serving to ad

이 특허를 인용한 특허 (325)

  1. Bradley, Brett A., Adaptive prediction filtering for digital watermarking.
  2. Bradley,Brett A., Adaptive prediction filtering for digital watermarking.
  3. Bradley, Brett A., Adaptive prediction filtering for encoding/decoding digital signals in media content.
  4. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  5. Rhoads, Geoffrey B., Analyzing audio, including analyzing streaming audio signals.
  6. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  7. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  8. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  9. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  10. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  11. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  12. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  13. Louis H. Liang, Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters.
  14. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  15. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  16. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  17. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  18. Hawes, Jonathan L., Associating media through encoding.
  19. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  20. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  21. Rhoads, Geoffrey B., Audio steganography.
  22. Levy,Kenneth L.; Tian,Jun, Authenticating media signals by adjusting frequency characteristics to reference values.
  23. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  24. Brundage, Trent J.; Hannigan, Brett T., Authentication methods and systems including embedded auxiliary data.
  25. Rhoads,Geoffrey B., Authentication of identification documents.
  26. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  27. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  28. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  29. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  30. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  31. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  32. Ross, David Justin, Authentication query strategizer and results compiler.
  33. Rhoads, Geoffrey B., Authentication using a digital watermark.
  34. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  35. Shen,Bo; Jam,Mehrban, Barcode data communication methods, barcode embedding methods, and barcode systems.
  36. Hein, III, William C.; McKinley, Tyler J., Batch identifier registration and embedding in media signals.
  37. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Benchmarks for digital watermarking.
  38. Ellingson, Eric E., Bi-directional image capture methods and apparatuses.
  39. Musgrave Clyde, Biometric watermarks.
  40. Ellingson, Eric E., Capturing and encoding unique user attributes in media signals.
  41. Ellingson,Eric E., Capturing and encoding unique user attributes in media signals.
  42. Deguillaume, Frédéric; Voloshynovskiy, Sviatoslav; Pun, Thierry, Character and vector graphics watermark for structured electronic documents security.
  43. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  44. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  45. Levy, Kenneth L.; LaBrec, Brian; Jones, Robert, Color laser engraving and digital watermarking.
  46. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio and other media objects.
  47. Holub, Vojtech; Carrier, Thomas P.; Haaga, Donald, Construction of signal maps for images with encoded signals.
  48. Levy, Kenneth L., Content identification and management in content distribution networks.
  49. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  50. Rhoads,Geoffrey B., Content identification, and securing media content with steganographic encoding.
  51. Saito, Makoto, Controlling database copyrights.
  52. Saito, Makoto, Controlling database copyrights.
  53. Saito, Makoto, Controlling database copyrights.
  54. Rhoads, Geoffrey B., Controlling use of audio or image content.
  55. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  56. Gasper John, Copy restrictive color-negative photographic print media.
  57. Gasper John ; Sutton James Edward, Copy restrictive documents.
  58. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  59. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  60. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  61. Yang James Yung Chien, Credit card with driver's license or identification.
  62. Saito, Makoto, Data copyright management.
  63. Saito, Makoto, Data copyright management.
  64. Saito, Makoto, Data copyright management system.
  65. Saito,Makoto, Data copyright management system.
  66. Saito, Makoto, Data management.
  67. Saito, Makoto, Data management system.
  68. Saito, Makoto, Data management system.
  69. Saito, Makoto, Data management system.
  70. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  71. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  72. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  73. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  74. Brundage, Trent J.; Holub, Vojtech; Cushman, David A., Detecting conflicts between multiple different encoded signals within imagery.
  75. Rhoads, Geoffrey B., Digital authentication with analog documents.
  76. Rhoads, Geoffrey B., Digital authentication with analog documents.
  77. Rhoads,Geoffrey B., Digital authentication with analog documents.
  78. Saito, Makoto, Digital content management system and apparatus.
  79. Saito, Makoto, Digital content management system and apparatus.
  80. Saito, Makoto, Digital content management system and apparatus.
  81. Saito Makoto,JPX, Digital content management system using electronic watermark.
  82. Prokoski,Francine J., Digital imaging system for evidentiary use.
  83. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  84. Levy, Kenneth L., Digital watermarking for workflow by tracking content or content identifiers with respect to time.
  85. Rodriguez, Tony F.; Stach, John, Digital watermarking methods, programs and apparatus.
  86. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  87. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  88. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  89. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  90. Seder,Phillip Andrew, Digital watermarking systems.
  91. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  92. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  93. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  94. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  95. Rodriguez, Tony F.; Haynes, Mark E.; Brunk, Hugh L.; Rhoads, Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  96. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  97. Lofgren, Neil; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermaking holograms for use with smart cards.
  98. Andelin, Victor L.; Levy, Kenneth L., Digitally watermarking documents associated with vehicles.
  99. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  100. Lofgren, Neil E.; Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott, Digitally watermarking holograms for identity documents.
  101. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  102. Martin, Brian, Dynamic digital watermark.
  103. Martin, Brian, Dynamic digital watermark.
  104. Martin, Brian, Dynamic digital watermark.
  105. Martin, Brian, Dynamic digital watermark.
  106. Takahashi,Akihiko, Electronic image-capturing apparatus having function for verifying user.
  107. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  108. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  109. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  110. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  111. Rhoads,Geoffrey B., Embedding information related to a subject of an identification document in the identification document.
  112. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  113. Oakeson, Kenneth L., Encoding information within text printed on a page using differing gray or color levels.
  114. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  115. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  116. Davis,Bruce L.; Rhoads,Geoffrey B.; Seder,Phillip Andrew, Enhanced input peripheral.
  117. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  118. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  119. Alattar, Adnan M., Identification and protection of security documents.
  120. Alattar, Adnan M., Identification and protection of video.
  121. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  122. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over-the-counter card issuing.
  123. Brundage, Trent J.; Sher-Jan, Mahmood; Hannigan, Brett T.; Durst, Jr., Robert T., Identification document and related methods.
  124. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  125. Jones, Robert L., Identification document with three dimensional image of bearer.
  126. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  127. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  128. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  129. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  130. Brunk, Hugh L.; Bradley, Brett Alan; Hannigan, Brett T., Including a metric in a digital watermark for media authentication.
  131. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  132. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  133. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  134. Usuda, Hiroshi, Information providing system.
  135. Felsher, David Paul, Information record infrastructure, system and method.
  136. Kimura, Tetsuya; Shimizu, Tadashi; Ito, Kensuke; Onishi, Takeshi, Information terminal device, method, and computer readable medium storing program.
  137. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  138. Rodriguez, Tony F., Internet and database searching with handheld devices.
  139. Rhoads,Geoffrey B., Internet linking from audio and image content.
  140. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  141. Theodossiou,George; Jones,Robert, Laser etched security features for identification documents and methods of making same.
  142. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  143. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  144. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  145. Hawes, Jonathan L., Linking documents through digital watermarking.
  146. Rodriguez, Tony F., Machine-readable features for objects.
  147. Weiss,David, Media bridge method and apparatus.
  148. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  149. Lubin, Jeffrey; Polyzois, Christos Alkivladis, Method and apparatus for analog insertion of low frequency watermarks.
  150. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating area biometric scanners.
  151. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating area biometric scanners.
  152. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  153. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  154. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating biometric scanners.
  155. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating swipe biometric scanners.
  156. Ivanov, Vladimir Iankov; Baras, John S., Method and apparatus for authenticating swipe biometric scanners.
  157. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  158. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  159. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  160. Isnardi, Michael A., Method and apparatus for embedding data in encoded digital bitstreams.
  161. Cousins,Steve B.; Breidenbach,Jeff; Jagannathan,Rangaswamy, Method and apparatus for embedding encrypted images of signatures and other data on checks.
  162. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  163. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  164. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  165. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  166. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  167. Ray Lawrence A. ; Honsinger Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  168. Ray, Lawrence A.; Honsinger, Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  169. Cox,Ingemar J.; Miller,Matthew L.; Rayner,Douglas F., Method and device for inserting and authenticating a digital signature in digital data.
  170. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  171. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  172. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  173. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  174. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  175. Lubow, Allen, Method and system for generating and linking composite images.
  176. Goodman, Daniel I., Method and system for real-time control of document printing.
  177. Goodman, Daniel I., Method and system for real-time control of document printing.
  178. Conwell, William Y., Method and systems for processing text found in images.
  179. Prpic,Eva; Baker,Katherine J., Method for accrediting event participants.
  180. Saito, Makoto, Method for controlling database copyrights.
  181. Saito,Makoto, Method for controlling database copyrights.
  182. Saito,Makoto, Method for controlling database copyrights.
  183. Lubow,Allen, Method for identifying and authenticating goods using codes, barcodes and radio frequency identification.
  184. Cox, Ingemar J.; Miller, Matthew L., Method for increasing the functionality of a media player/recorder device.
  185. Ingemar J. Cox ; Matthew L. Miller, Method for increasing the functionality of a media player/recorder device or an application program.
  186. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  187. Rhoads, Geoffrey B., Method for monitoring internet dissemination of image, video, and/or audio files.
  188. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  189. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  190. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  191. Patton,David L.; Tsaur,Allen K.; DeAngelo,Joseph A.; Waitz,Aaron S., Method for printing and verifying authentication documents.
  192. Massarksy Yefim, Method for saving, accessing and reprinting a digitized photographic image.
  193. Yoda,Akira, Method for secure delivery of digital image data using an embedded watermark based on a receiving indentity.
  194. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  195. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  196. Waltham, Richard, Method of labelling an article.
  197. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  198. Liu, Chao, Method of videotext information encryption and security transmission in a network.
  199. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  200. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  201. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  202. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  203. Geoffrey B. Rhoads, Methods and devices for recognizing banknotes and responding accordingly.
  204. Rhoads, Geoffrey B., Methods and products employing biometrics and steganography.
  205. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  206. Geoffrey B. Rhoads, Methods and systems for watermark processing of line art images.
  207. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  208. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  209. Davis,Bruce L.; Rhoads,Geoffrey B., Methods and tangible objects employing machine readable data.
  210. Carr, J. Scott; Bradley, Brett Alan; Rhoads, Geoffrey B., Methods combining multiple frames of image data.
  211. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  212. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  213. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  214. Rhoads, Geoffrey B., Methods for encoding security documents.
  215. Rhoads Geoffrey B., Methods for identifying equipment used in counterfeiting.
  216. Rhoads, Geoffrey B., Methods for identifying equipment used in counterfeiting.
  217. Simske, Steven J., Methods for making an authenticating system.
  218. Rhoads, Geoffrey B., Methods for steganographic encoding media.
  219. Rhoads, Geoffrey B.; Conwell, William Y., Methods of interacting with audio and ambient music.
  220. Conwell, William Y., Methods of processing text found in images.
  221. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  222. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  223. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  224. Davis, Bruce L.; Rhoads, Geoffrey B., Methods, objects and apparatus employing machine readable data.
  225. Hoffberg, Steven M., Multifactorial optimization system and method.
  226. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  227. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  228. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  229. Rhoads, Geoffrey B, Network linking methods and apparatus.
  230. Rhoads, Geoffrey B., Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network.
  231. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  232. Wang, Ynjiun Paul, Portable electronic charge and authorization devices and methods therefor.
  233. Rhoads,Geoffrey; Alattar,Adnam M.; Sharma,Ravi K., Pre-filteriing to increase watermark signal-to-noise ratio.
  234. Jonathan Scott Carr ; Burt W. Perry ; Geoffrey B. Rhoads, Printing and validation of self validating security documents.
  235. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  236. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  237. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  238. Knowlton Kenneth Charles ; Miliefsky Gary Steven, Protection mechanism for visual link objects.
  239. Robert J. Holt ; David J. Haas, Reflective badge security identification system.
  240. Powell, Arthur L.; Rodriguez, Tony F.; Long, Scott M., Scanner with control logic for resolving package labeling.
  241. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  242. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  243. Rhoads, Geoffrey B.; Rodriguez, Tony F., Secure documents with hidden signals, and related methods and systems.
  244. Schwab, Barry H., Secure identification system.
  245. Schwab,Barry H., Secure identification system.
  246. Ross, David Justin; Cornell, Bill G., Secure, confidential authentication with private data.
  247. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  248. Cobben, Johannes I. M.; Elenbaas, Abraham, Security feature comprising a perforation pattern.
  249. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  250. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  251. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  252. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  253. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  254. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  255. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in sound based on steganographic encoding.
  256. Daniel, Isaac S., System and method for confirming mail delivery using an interactive electronic card.
  257. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  258. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  259. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  260. Hoffberg, Steven M., System and method for determining contingent relevance.
  261. John Man Kwong Kwan, System and method for digitally marking a file.
  262. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  263. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  264. Poder, Daniel; Eckel, Robert Andrew, System and method for digitally watermarking digital facial portraits.
  265. Lubow,Allen, System and method for embedding characters in a bar of a bar code.
  266. Lubow,Allen, System and method for generating a combined bar code image.
  267. Miu, Stephen, System and method for identity management.
  268. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  269. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  270. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  271. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  272. Bolle,Rudolf M.; Dorai,Chitra; Noronha,Sunil J.; Ratha,Nalini K., System and method for multi-party validation, authentication and/or authorization via biometrics.
  273. Wolcott, Dana W.; McIntyre, Dale F.; Parulski, Kenneth A., System and method for providing a configured camera, image products, and services.
  274. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  275. Wolcott, Dana W.; McIntyre, Dale F.; Parulski, Kenneth A., System and method for providing customized product configuration and service plan options for a camera device.
  276. Wolcott, Dana W.; McIntyre, Dale F.; Parulski, Kenneth A., System and method for providing image products and/or services.
  277. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  278. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  279. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  280. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  281. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  282. Olligschlaeger, Andreas M., System and method for three-way call detection.
  283. Olligschlaeger, Andreas M., System and method for three-way call detection.
  284. Olligschlaeger, Andreas M., System and method for three-way call detection.
  285. Olligschlaeger, Andreas M., System and method for three-way call detection.
  286. Lubow,Allen, System and method for validating a digital image and corresponding data.
  287. Saravanan, Thiagarajan, System and method for verifying liveliness.
  288. Saravanan, Thiagarajan, System and method for verifying liveliness.
  289. Saravanan, Thiagarajan, System and method to streamline identity verification at airports and beyond.
  290. Saravanan, Thiagarajan, System and method to streamline identity verification at airports and beyond.
  291. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  292. Sansone, Ronald P., System for metering and auditing the dots or drops or pulses produced by a digital printer.
  293. Sansone, Ronald P.; Martin, Judith A., System for metering and auditing the dots or drops or pulses produced by a digital printer in printing an arbitrary graphic.
  294. Merry,Trevor; Buzuloiu,Ileana, System for producing a printable security device image and detecting latent source image(s) therefrom.
  295. Zagami, Anthony, System for verification and association of documents and digital images.
  296. Anisimovich, Konstantin; Zuev, Konstantin; Lubenets, Andrey, System of automated document processing.
  297. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  298. Brewington,Grace T., Systems and methods for providing hardcopy secure documents and for validation of such documents.
  299. Howard,James V.; Frazier,Francis, Systems and methods for recognition of individuals using multiple biometric searches.
  300. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  301. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  302. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  303. Delp, Edward J.; Lin, Eugene T., Temporal synchronization of video and audio signals.
  304. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  305. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  306. Martin, Thomas J., Three-way call detection using steganography.
  307. Martin,Thomas J., Three-way call detection using steganography.
  308. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  309. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  310. Durst, Jr., Robert T., Uniquely linking security elements in identification documents.
  311. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  312. Ross, David Justin, Verification engine for user authentication.
  313. Ross, David Justin, Verification engine for user authentication.
  314. Rhoads,Geoffrey B., Video steganography.
  315. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  316. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  317. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  318. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  319. Levy, Kenneth L., Watermark embedding functions adapted for transmission channels.
  320. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B., Watermark holograms.
  321. Levy, Kenneth L., Watermark payload encryption for media including multiple watermarks.
  322. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  323. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  324. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
  325. Tian, Jun; Decker, Stephen K., Wavelet based feature modulation watermarks and related applications.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로