$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for protecting content using watermarking 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G09C-005/00
  • H04L-009/00
출원번호 US-0920365 (1997-08-29)
발명자 / 주소
  • Leighton F. Thomson
대리인 / 주소
    Judson
인용정보 피인용 횟수 : 318  인용 특허 : 5

초록

A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multi

대표청구항

[ I claim:] [6.] An access control method, comprising the steps of:during a watermarking phase:generating a first digital string from an object sought to be protected to form a baseline watermark;generating a second digital string from given text;generating a watermark having a predetermined relatio

이 특허에 인용된 특허 (5)

  1. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  2. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  3. Shamir Adi (Rehovot ILX), Method and apparatus for protecting visual information with printed cryptographic watermarks.
  4. Schreiber William F. (Cambridge MA) Lippman Andrew B. (Salem MA) Adelson Edward H. (Cambridge MA) Netravali Aran N. (Westfield NJ), Receiver-compatible enhanced definition television system.
  5. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.

이 특허를 인용한 특허 (318)

  1. Yu, Hong Heather; Gelman, Alexander D.; Fish, Robert S., Active data hiding for secure electronic media distribution.
  2. Jin, Hongxia; Lotspiech, Jeffrey Bruce; Megiddo, Nimrod; Nelson, Michael Joseph, Adaptive traitor tracing.
  3. Wampler,James W.; Wampler,Scott D.; Vaitekunas,Jeffrey J., Advertising method for dynamic billboards.
  4. So, Vincent, Anti-piracy image display methods and systems.
  5. Pelly,Jason Charles; Tapson,Daniel Warren, Apparatus and method for detecting embedded watermarks.
  6. Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
  7. Petrovic, Rade, Apparatus and method for embedding and extracting information in analog signals using distributed signal features and replica modulation.
  8. Rade Petrovic, Apparatus and method for embedding and extracting information in analog signals using replica modulation.
  9. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation.
  10. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  11. Iwamura, Keiichi, Apparatus, computer medium, and method for embedding and extracting a first and second data into a watermark.
  12. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  13. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  14. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  15. Dan, Ephraim, Automated policy builder.
  16. John W. L. Ogilvie, Automatic broker tools and techniques.
  17. Ogilvie, John W. L., Automatic broker tools and techniques.
  18. Freddi, Remo; Mangiacotti, Antonio, Avoiding redundant printing.
  19. Vaitekunas,Jeffrey J.; Wampler,Scott D.; Wampler,James W., Business method for billboard advertising.
  20. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  21. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  22. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  23. Holub, Vojtech; Carrier, Thomas P.; Haaga, Donald, Construction of signal maps for images with encoded signals.
  24. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  25. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  26. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  27. Carlson, Gerard J.; Skurdal, Vincent C., Copy protecting documents.
  28. Tehranchi,Babak; Jones,Paul W., Copy protection for digital motion picture image data.
  29. Staring,Antonius A. M.; Epstein,Michael, Copy protection via multiple tests.
  30. Schmelzer, Richard A., Copyright detection and protection system and method.
  31. Schmelzer, Richard A., Copyright detection and protection system and method.
  32. Schmelzer, Richard A., Copyright detection and protection system and method.
  33. Schmelzer, Richard A., Copyright detection and protection system and method.
  34. Schmelzer, Richard A., Copyright detection and protection system and method.
  35. Schmelzer, Richard A., Copyright detection and protection system and method.
  36. Schmelzer, Richard A., Copyright detection and protection system and method.
  37. Schmelzer, Richard A.; Pellom, Bryan L., Copyright detection and protection system and method.
  38. Schmelzer,Richard A.; Pellom,Bryan L., Copyright detection and protection system and method.
  39. Thorwirth, Niels, Covert and robust mark for media identification.
  40. Thorwirth,Niels, Covert and robust mark for media identification.
  41. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., Dangerous condition detection with user feedback.
  42. Kerr,Roger S.; Tredwell,Timothy J.; Narayan,Badhri; Carroll Yacoby,Diane M., Data collection device.
  43. Szabo, Paul Imre; Thornewell, Peter M.; Michels, Timothy Scott, Data flow segment optimized for hot flows.
  44. Szabo, Paul Imre; Thornewell, Peter Michael; Michels, Timothy Scott, Data flow segment optimized for hot flows.
  45. Pelly,Jason Charles; Tapson,Daniel Warren, Data processing apparatus and method.
  46. Pelly,Jason Charles; Tapson,Daniel Warren, Data processing apparatus and method.
  47. Yamazaki, Takeshi; Iwamura, Keiichi, Data processing apparatus and method, and storage medium.
  48. Shinichi Fukuda JP, Data storage apparatus and data storage method with quality degrading features.
  49. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  50. Bradley, Brett A.; Kamath, Ajith M.; Filler, Tomas; Holub, Vojtech, Decoding 1D-barcodes in digital capture systems.
  51. Brundage, Trent J.; Holub, Vojtech; Cushman, David A., Detecting conflicts between multiple different encoded signals within imagery.
  52. Sharma, Ravi K.; Gustafson, Ammon E.; Rhoads, Geoffrey B., Digital watermark detection utilizing host carrier information.
  53. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  54. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  55. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  56. Mase,Katsuyoshi, Digital watermarking device, digital watermark insertion method and digital watermark detection method.
  57. Rodriguez, Tony F.; Stach, John, Digital watermarking methods, programs and apparatus.
  58. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  59. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  60. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  61. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  62. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  63. Marshall, Alan D., Digital watermarks.
  64. Yeung,Minerva M.; Thakkar,Shreekant S., Digital watermarks with values derived from remote platforms.
  65. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  66. Hughes, John R.; Hammerle, Eric, Dynamic cloning and reservation of detached idle connections.
  67. Wampler,Scott D., Dynamic device and method for dispensing machines.
  68. Wampler,Scott D.; Wampler,James W.; Vaitekunas,Jeffrey J., Dynamic device for billboard advertising.
  69. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed.
  70. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  71. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  72. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  73. Harrison, Jr., Shelton E., Electronic bond and guaranty process and business method.
  74. Harrison, Jr., Shelton E., Electronic bond and guaranty process and business method.
  75. Harrison, Jr.,Shelton E.; Smith,David L., Electronic bond and guaranty process and business method.
  76. Nakano, Hirotaka, Electronic watermark insertion device.
  77. Hirotaka Nakano JP, Electronic watermark system.
  78. Seiji Kobayashi JP; Shuichi Shimizu JP, Electronic watermarking system.
  79. He, Yuan; Luo, Lin; Su, Ming; Shao, Ling; Xiang, Zhe, Embedding and detecting watermarks based on embedded positions in document layout.
  80. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  81. Amorosa, Lorenzo; Freddi, Remo; Portaluri, Bruno, Enforcing reproduction rights for hard copies of documents.
  82. Zhao, Jian, Enhanced content distribution using advertisements.
  83. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  84. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  85. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  86. Holub, Vojtech; Filler, Tomas, Feature-based signal localization in digital capture systems.
  87. Holub, Vojtech; Filler, Tomas, Feature-based watermark localization in digital capture systems.
  88. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  89. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  90. Winograd, Joseph M., Forensic marking using a common customization function.
  91. Winograd, Joseph M., Forensic marking using a common customization function.
  92. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  93. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  94. Michels, Tim S.; Schmitt, Dave; Szabo, Paul I., Handling high throughput and low latency network data packets in a traffic management device.
  95. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; McNeil, Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  96. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; McNeil, Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  97. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Hebrank,John H.; McNeil,Laurie, High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes.
  98. Cai, Hao; Barthelow, Michael Thomas; Szabo, Paul Imre; Michels, Timothy Scott, Hot service flow hardware offloads based on service priority and resource usage.
  99. Cai, Hao; Barthelow, Michael Thomas; Szabo, Paul Imre; Michels, Timothy Scott, Hot service flow hardware offloads based on service priority and resource usage.
  100. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  101. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  102. Kerr,Roger S.; Tredwell,Timothy J.; Donaldson,Eric J.; Narayan,Badhri; Mohapatra,Sarat K., Illumination apparatus.
  103. So, Vincent, Image display methods and systems with sub-frame intensity compensation.
  104. Takahashi,Akihiko, Image signal analysis for watermark detection and decoding.
  105. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  106. Iwamura,Keiichi, Information processing system, information processing apparatus, and computer-readable recording medium.
  107. Felsher, David Paul, Information record infrastructure, system and method.
  108. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  109. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  110. Ahern, Keith Thomas, Invisible encoding of meta-information.
  111. Holub, Vojtech; Filler, Tomas, Localization of machine-readable indicia in digital capture systems.
  112. Kerr,Roger S.; Tredwell,Timothy J.; Narayan,Badhri; Donaldson,Eric J.; Mohapatra,Sarat K., Media holder having communication capabilities.
  113. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  114. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  115. Troyansky, Lidror; Carny, Ofir; Peled, Ariel, Method and a system for embedding textual forensic information.
  116. Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Method and apparatus for creating a unique audio signature.
  117. Wong, Ping Wah, Method and apparatus for digital watermarking of images.
  118. Wold, Erling H., Method and apparatus for identifying an unknown work.
  119. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  120. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  121. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Kvitek, Louis, Method and apparatus for identifying new media content.
  122. Vial, Jean-François, Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks.
  123. Takeshi Nakamura JP; Kazumi Sugaya JP; Yoshiaki Moriyama JP, Method and apparatus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
  124. Rhoads Geoffrey B. ; Davidson Clay ; Rodriguez Anthony, Method and apparatus for watermarking video images.
  125. Rhoads, Geoffrey B., Method and apparatus for watermarking video images.
  126. Schrempp, James B.; Edel, Alan; Ikezoy, Vanc, Method and apparatus to identify a work received by a processing system.
  127. Nakamura Takeshi,JPX ; Sugaya Kazumi,JPX ; Oriyama Yoshiaki,JPX, Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark.
  128. Diehl,Eric, Method and device for controlling multimedia data watermark.
  129. Kee,Thomas E.; Kearny,Ryan C.; DeCaprio,Donald Joseph; Saether,Christian D., Method and system for automatically updating content stored on servers connected by a network.
  130. Christian D. Saether ; David E. Sloat, Method and system for automatically updating the version of a set of files stored on content servers.
  131. Kee, Thomas E.; Kearny, Ryan C.; DeCaprio, Donald Joseph; Saether, Christian D., Method and system for automatically updating the version of a set of files stored on content servers.
  132. Skene,Bryan D.; Tennican,Scott P.; Kee,Thomas E., Method and system for balancing load distribution on a wide area network.
  133. Skene, Bryan D.; Thornewell, Peter M., Method and system for enabling persistent access to virtual servers by an LDNS server.
  134. Skene,Bryan D.; Thornewell,Peter M., Method and system for enabling persistent access to virtual servers by an LDNS server.
  135. Nishimoto,Kyoko; Kumagai,Yukiko, Method and system for generating data of an application with a picture.
  136. Schrempp, James B.; Wold, Erling H., Method and system for modifying communication flows at a port level.
  137. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Method and system for music distribution.
  138. Tennican, Scott P.; Skene, Bryan D., Method and system for network load balancing with a compound data structure.
  139. Tennican,Scott P.; Skene,Bryan D., Method and system for network load balancing with a compound data structure.
  140. Gilde, Robert George; Harms, Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  141. Gilde, Robert George; Harms, Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  142. Gilde,Robert George; Harms,Steven Lee, Method and system for optimizing a network by independently scaling control segments and data flow.
  143. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  144. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  145. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  146. Richard R. Masters, Method and system for storing load balancing information with an HTTP cookie.
  147. Macy, William W.; Holliman, Matthew J.; Yeung, Minerva Ming-Yee, Method for robust watermarking of content.
  148. Jin,Hongxia; Lotspiech,Jeffrey Bruce, Method for tracing traitors and preventing piracy of digital content in a broadcast encryption system.
  149. Hisayoshi Moriwaki JP; Takashi Kohashi JP; Yuji Kimura JP; Akira Ogino JP; Nozomu Ikeda JP, Method of adding information to video signal and information adding device.
  150. Mizobe Tatsuji,JPX ; Sawaguchi Takashi,JPX, Method of configuring access and security code.
  151. Sarfati, Jean-Claude; Meric, Jerome, Method of downloading of data to an MPEG receiver/decoder and MPEG transmission system for implementing the same.
  152. Schwenk, Joerg; Ueberberg, Johannes, Method of inserting manipulation-proof digital fingerprints into electronic documents.
  153. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  154. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  155. Chang, Shih-Fu; Meng, Horace J., Methods and architecture for indexing and editing compressed video over the world wide web.
  156. Bai, Yang, Methods and arrangements for identifying objects.
  157. Bai, Yang; Evans, Eric D.; Filler, Tomas, Methods and arrangements for identifying objects.
  158. Yona, Shlomo, Methods and system for simultaneous multiple rules checking.
  159. Baxter,Craig A.; Ciaccia,John Charles; Esch,Rodney J., Methods and systems for negotiable-instrument fraud prevention.
  160. Bollay, Benn, Methods and systems for optimizing network traffic using preemptive acknowledgment signals.
  161. Thornewell, Peter M.; Baker, Christopher R., Methods for DNSSEC proxying and deployment amelioration and systems thereof.
  162. Dabell, Steven D.; Johnson, C. Stuart; Steensland, Ronald Lee, Methods for acquiring hyper transport timing and devices thereof.
  163. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  164. Jain, Amit; Martynenko, Konstantin; Costlow, Jeff; Holmes, David, Methods for dynamically constructing a service principal name and devices thereof.
  165. Holub, Vojtech; Filler, Tomas, Methods for estimating watermark signal strength, an embedding process using the same, and related arrangements.
  166. Rovniaguin, Dmitry; Dan, Ephraim; Talmor, Ron, Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof.
  167. Rovniaguin, Dmitry; Dan, Ephraim; Talmor, Ron, Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof.
  168. Amdahl, Saxon, Methods for managing progressive image delivery and devices thereof.
  169. Koenning, Christian; Smith, Ian; Hansen, David, Methods for network traffic presteering and devices thereof.
  170. Jiang, Paul; Jain, Amit; Asami, Satoshi; Amdahl, Saxon, Methods for optimizing HTTP header based authentication and devices thereof.
  171. Walker, Anthony; Bellhart, Michael, Methods for optimizing service of content requests and devices thereof.
  172. Wojcik, Frank, Methods for policy-based network traffic queue management and devices thereof.
  173. Thornewell, Peter M.; Zheng, Songbo; Moshiri, Nojan; Kushi, David; Cano, Charles, Methods for preserving flow state during virtual machine migration and devices thereof.
  174. Ferguson, Jc; Donohue, Bruce L., Methods for securing one or more license entitlement grants and devices thereof.
  175. Amdahl, Saxon; Majee, Sumandra; Shukla, Rajendra, Methods for traffic rate control and devices thereof.
  176. Szabo, Paul Imre; Thornewell, Peter Michael; Michels, Timothy Scott; Cai, Hao, Minimize SYN-flood issues with flow cache while maintaining performance.
  177. Cai, Hao; Szabo, Paul Imre; Thornewell, Peter M.; Michels, Timothy Scott, Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance.
  178. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  179. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  180. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  181. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protection.
  182. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protections.
  183. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  184. Hunter, Charles Eric; Hebrank, John H., Music distribution systems.
  185. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  186. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  187. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Sparks,Kelly C.; Hebrank,John H., Music distribution systems.
  188. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Sparks,Kelly C.; Hebrank,John H., Music distribution systems.
  189. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  190. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Play list generation method and apparatus.
  191. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Playlist generation method and apparatus.
  192. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  193. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  194. Jonathan Scott Carr ; Burt W. Perry ; Geoffrey B. Rhoads, Printing and validation of self validating security documents.
  195. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  196. Maes,Maurice Jerome Justin Jean Baptiste; Staring,Antonius Adriaan Maria; Talstra,Johan Cornelis, Processing copy protection signals.
  197. Carr,J. Scott; Bradley,Brett Alan; Rhoads,Geoffrey B., Processing methods combining multiple frames of image data.
  198. Nelson,David J., Projector with enhanced security camcorder defeat.
  199. Epstein,Michael A.; McDermott,Robert M., Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers.
  200. Chang, Shih-Fu; Wang, Jun; Sajda, Paul; Pohlmeyer, Eric; Hanna, Barbara; Jangraw, David, Rapid image annotation via brain state decoding and visual pattern mining.
  201. Chang, Shih-Fu; Wang, Jun; Sajda, Paul; Pohlmeyer, Eric; Hanna, Barbara; Jangraw, David, Rapid image annotation via brain state decoding and visual pattern mining.
  202. Fukuda, Shinichi, Recording and reproducing apparatus, recording and reproducing method, and data processing apparatus.
  203. Bellwood, Thomas Alexander; Deen, Robert Glenn; Jin, Hongxia; Lotspiech, Jeffrey Bruce; Nin, Sigfredo Ismael; Rutkowski, Matthew Francis, Recording keys in a broadcast-encryption-based system.
  204. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  205. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  206. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  207. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., Remote sensors for detecting alert conditions and notifying a central station.
  208. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John; Fallon, James; Summer, Robert, Remote sensors for detecting alert conditions and notifying a central station.
  209. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John; Fallon, James; Summer, Robert, Remote sensors for detecting alert conditions and notifying a central station.
  210. Jin, Hongxia; Lotspiech, Jeffrey Bruce; Nin, Sigfredo Ismael, Renewable traitor tracing.
  211. Driessen, James Leonard, Retail point of sale (RPOS) apparatus for internet merchandising.
  212. Driessen,James Leonard, Retail point of sale (RPOS) apparatus for internet merchandising.
  213. Driessen, James Leonard; Aker, Joshua, SCART-card (secure consumer advantaged retail trading).
  214. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  215. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Secure and efficient content screening in a networked environment.
  216. Iu, Siu-Leong; Chu, Wai, Secure oblivious watermarking using key-dependent mapping functions.
  217. Jin, Hongxia; Lotspiech, Jeffrey Bruce, Security classes in a media key block.
  218. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  219. Sharma, Ravi K.; Gustafson, Ammon E.; Rhoads, Geoffrey B., Signal processing utilizing host carrier information.
  220. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  221. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  222. Szabo, Paul I., Simplified method for processing multiple connections from the same client.
  223. Szabo, Paul I.; Amdahl, Saxon Carl, Smart prefetching of data over a network.
  224. Szabo, Paul I.; Amdahl, Saxon Carl, Smart prefetching of data over a network.
  225. Winograd, Joseph M., Social media viewing system.
  226. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  227. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  228. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  229. Evans,Douglas B.; Conwell,William Y., Substituting images in copies based on digital watermarks.
  230. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  231. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  232. Wadhwa, Rohit; Garg, Man Mohan; Syedmohammed, Harish Thampi, System and method for applying watermarks.
  233. Wadhwa,Rohit; Garg,Man Mohan; Syedmohammed,Harish Thampi, System and method for applying watermarks.
  234. Zhou, Dennis; Jain, Amit, System and method for combining an access control system with a traffic management system.
  235. Hoffberg, Steven M., System and method for determining contingent relevance.
  236. John Man Kwong Kwan, System and method for digitally marking a file.
  237. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  238. Kwan, John Man Kwong, System and method for digitally marking a file with a removable mark.
  239. Chang, Shih-Fu; Zavesky, Eric, System and method for dynamically and interactively searching media data.
  240. Hunter, Charles Eric; Ballou, Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D., System and method for emergency notification content delivery.
  241. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Hebrank, John H.; Fallon, James; Summer, Robert D.; McNeil, Laurie, System and method for emergency notification content delivery.
  242. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Hebrank,John H.; Fallon,James; Summer,Robert D.; McNeil,Laurie, System and method for emergency notification content delivery.
  243. Chang, Shih-Fu; Zhang, Dongqing, System and method for extracting text captions from video and generating video summaries.
  244. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  245. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  246. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  247. Chen, Jonathan; Amdahl, Saxon; Shigapov, Andrey, System and method for handling TCP performance in network access with driver initiated application tunnel.
  248. Amir, Idan; Gruner, Eyal; Zilber, Boaz, System and method for identifying security breach attempts of a website.
  249. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  250. Wang, Yong; Chang, Shih-Fu, System and method for motion estimation and mode decision for low-complexity H.264 decoder.
  251. Thirasuttakorn, Nat; Haworth, Jason; Burns, Brandon; Smith, Ian Michael, System and method for on the fly protocol conversion in obtaining policy enforcement information.
  252. Masters, Richard R., System and method for performing application level persistence.
  253. Masters, Richard R., System and method for performing application level persistence.
  254. Masters, Richard Roderick, System and method for performing application level persistence.
  255. Masters, Richard Roderick, System and method for performing application level persistence.
  256. Masters,Richard R., System and method for performing application level persistence.
  257. Thirasuttakorn, Nat, System and method for performing message-based load balancing.
  258. Amdahl, Saxon; Hawthorne, Jonathan, System and method for post shaping TCP packetization.
  259. Hars, Laszlo, System and method for protecting digital media.
  260. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  261. Costlow, Jeff J., System and method for proxying HTTP single sign on across network domains.
  262. Chen, Jonathan, System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device.
  263. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  264. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  265. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  266. Levy, Yuval; Talmor, Ron; Serfaty, Beni, System and method for selectively storing web objects in a cache memory based on policy decisions.
  267. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Summer, Robert D.; Sparks, Kelly C.; Sykes, Ollin B.; Hebrank, John H., System and method permitting customers to order products from multiple participating merchants.
  268. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  269. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  270. Schrempp, James B., System for distributing decoy content in a peer to peer network.
  271. Kobayashi, Seiji; Chen, Dean D.; Ohshima, Yoshiaki; Shimizu, Shuichi; Morimoto, Norishige, System for embedding additional information in audio data.
  272. Wold, Erling, System for identifying content of digital data.
  273. Wold, Erling, System for identifying content of digital data.
  274. Wold, Erling, System for identifying content of digital data.
  275. Wold, Erling, System for identifying content of digital data.
  276. Wold, Erling, System for identifying content of digital data.
  277. Wold, Erling, System for identifying content of digital data.
  278. Chen Brian ; Wornell Gregory W., System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  279. Hunter, Charles E.; Ballou, Jr., Bernard L.; Hebrank, John H., Systems and methods for distribution of entertainment and advertising content.
  280. Baumann, William R.; Lewites, Saul, Systems and methods for idle driven scheduling.
  281. Kennedy, Lyndon; Chang, Shih-Fu, Systems and methods for image archaeology.
  282. Szabo, Paul I.; Thirasuttakorn, Nat; Bollay, Benn, Systems and methods for managing server resources.
  283. Lunt,Teresa F.; Franklin,Matthew K., Systems and methods for policy based printing.
  284. Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  285. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
  286. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  287. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  288. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  289. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  290. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  291. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  292. Kerr,Roger S.; Tredwell,Timothy J.; DuMont,Christopher L.; Carroll Yacoby,Diane M.; Jones,Paul W.; Stwertka,Peter M., Tracking an image-recording medium using a watermark and associated memory.
  293. Stwertka,Peter M.; Greenlaw,James F.; Carroll Yacoby,Diane M., Tracking an image-recording medium using an identifying mark and film encodement.
  294. Jin, Hongxia; Lotspiech, Jeffrey Bruce; Varna, Avinash Laxmisha, Traitor detection for multilevel assignment.
  295. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  296. Bruckstein, Alfred M.; Richardson, Thomas J., Transform domain image watermarking method and system.
  297. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  298. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  299. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  300. Paek, Seungyup; Benitez, Ana; Chang, Shih-Fu; Puri, Atul; Huang, Qian; Li, Chung-Sheng; Smith, John R.; Bergman, Lawrence, Video description system and method.
  301. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  302. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  303. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  304. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  305. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  306. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  307. Sharma,Ravi K.; Gustafson,Ammon E., Watermark detection utilizing regions with higher probability of success.
  308. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  309. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  310. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  311. Levy, Kenneth L., Watermark payload encryption for media including multiple watermarks.
  312. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  313. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  314. Hannigan, Brett T.; Levy, Kenneth L., Watermarking a carrier on which an image will be placed or projected.
  315. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
  316. Chang,Shih Fu; Meng,Jianhao, Watermarking of digital image data.
  317. Natarajan, Balas K., Watermarking of digital object.
  318. Levy, Kenneth L.; Sharma, Ravi K.; Shen, Lance Lixin; Stach, John, Watermarking systems and methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로