$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Controlling video or image presentation according to encoded content classification information within the video or image data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G09C-005/00
출원번호 US-0950006 (1997-10-14)
우선권정보 GB0008192 (1997-04-23)
발명자 / 주소
  • Chapman Sydney George,GBX
  • Jones Julian Hamilton,GBX
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Scully, Scott, Murphy & PresserUnderweiser, Esq.
인용정보 피인용 횟수 : 81  인용 특허 : 8

초록

The use of invisible digital watermark codes by a controller which operates in response to the watermark codes provides reliable control since the codes are more difficult for unauthorized persons to detect and remove than other embedded codes would be.

대표청구항

[ What is claimed is:] [1.]1. A controller for controlling displaying on a display means of received video or image data which has been encoded with invisible digital watermarks integrated within the received video or image data and representing a content classification for the video or image data,

이 특허에 인용된 특허 (8)

  1. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  2. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  3. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  4. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  5. Nadan, Joseph S., Restricted information distribution system apparatus and methods.
  6. Gniewek John J. (Tucson AZ) Graves David C. (Tucson AZ), Rewritable media protectable as written-once-only media and system and method for use therewith.
  7. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  8. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.

이 특허를 인용한 특허 (81)

  1. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  2. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  3. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  4. Geoffrey B. Rhoads ; Bruce L. Davis ; J. Scott Carr, Controlling operation of a device using a re-configurable watermark detector.
  5. Seigo Ito JP; Yasuhiro Ishibashi JP; Fumitaka Sato JP, Data recording/reproducing apparatus, data recording/reproducing method applied to the apparatus, and computer program product used in data processing apparatus.
  6. Ohmura, Akira, Digital camera capable of embedding an electronic watermark into image data.
  7. Nakajima,Yasumasa; Mogami,Kazuto, Digital camera, and system for detecting falsification of an image.
  8. Terada,Koichi; Fujii,Yukio; Fujikawa,Yoshifumi; Iwagaki,Taruhi, Digital content protection using invisible and visible watermarks.
  9. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detecting strategies.
  10. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  11. Seder,Phillip Andrew, Digital watermarking systems.
  12. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  13. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  14. Lester, James L.; Sorotokin, Peter, Document origin designator.
  15. Lester, James L.; Sorotokin, Peter, Document origin designator.
  16. Iwamura,Keiichi, Extracting embedded information from digital image data.
  17. Zhang, Li; Yang, Liping; Pan, Yue; Liu, Dong, File classification management system and method used in operating systems.
  18. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  19. Andrews, III, Hoyet Harrison; Rosove, Stuart Filip; Rodriguez, Tony F., Geographic-based signal detection.
  20. Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D., Image anonymization.
  21. Narayanaswami,Chandrasekhar; Kirkpatrick,Edward Scott, Image capturing system and method for automatically watermarking recorded parameters for providing digital image verification.
  22. Nakamura,Suehiro; Oka,Michio, Image display unit and display terminal using the same.
  23. Ishii, Masaki, Image processing apparatus, method, program and recording medium for extracting embedded information.
  24. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementation of media content alteration.
  25. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing audio substitution options in media works.
  26. Ogawa,Shigeho; Watanabe,Hiromasa, Information playback apparatus method and recording medium.
  27. Egawa, Akihiro; Takeshita, Jun; Enokizono, Yasunori, Information processing apparatus.
  28. Kori,Teruhiko; Otsuka,Masaya, Information signal copy managing method, information signal recording method, information signal output apparatus, and recording medium.
  29. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Media markup system for content alteration in derivative works.
  30. Karkanias, Chris Demetrios; Hodges, Stephen E.; Berry, Emma L.; Browne, Georgina E.; Williams, Hilary Lyndsay; Wood, Kenneth R.; Smyth, Samuel Gavin; Butler, David Alexander, Memory training via visual journal.
  31. J?ndel, Magnus; Larsson, Mathias, Method and a device for encryption of images.
  32. Yang, Ivan; Orr, Stephen; Morrison, Andrew, Method and apparatus for controlling display of content signals.
  33. Srinivasan, Vikram; Kundu, Malay; Migdal, Joshua; Farrow, Matthew, Method and apparatus for random-access review of point of sale transactional video.
  34. Eveleens,Jan; Lokhoff,Gerardus Cornelis Petrus; Maandonks,Arnoldus Johannes Lucas Maria, Method and device communicating a command.
  35. Vinati,Felice; Vinati,Samuele; Vinati,Matteo, Method and device for controlling the time which a user spends connected to a data communication network.
  36. Mishra, Pankaj; Bugalia, Nishant, Method and electronic device for controlling display device using watermark.
  37. August,Katherine Grace; Shaer,Norman R.; Sizer, II,Theodore, Method and system for capture of location specific media related information and delivery through communications network.
  38. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  39. Epstein, Michael; Pasieka, Michael, Method and system for preventing unauthorized playback of broadcasted digital data streams.
  40. Buxton, Mark J., Method and system for providing content-specific conditional access to digital content.
  41. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  42. Cvetkovic, Slobodan; Alasia, Thomas C.; Alasia, Alfred J., Method for constructing a composite image incorporating a hidden authentication image.
  43. Vinati,Samuele; Vinati,Felice; Berardinelli,Ivan, Method for controlling access to a data communication network, with user identification.
  44. Hirasawa, Shigeki; Morioka, Michio; Kuwabara, Tadashi; Ozaki, Tomochika; Yagawa, Yuichi; Yajima, Akio, Method of sending and receiving information and system using such method.
  45. Putnam, Jon S., Method, system and program product for broadcast advertising and other broadcast content performance verification utilizing digital artifacts.
  46. Putnam, Jon S., Method, system and program product for broadcast error protection of content elements utilizing digital artifacts.
  47. Nash-Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  48. Putnam, Jon S., Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts.
  49. Putnam, Jon S., Method, system and program product for the insertion and retrieval of identifying artifacts in transmitted lossy and lossless data.
  50. Davis, Bruce L.; Rodriguez, Tony F., Methods employing topical subject criteria in video processing.
  51. Davis, Bruce L.; Rodriguez, Tony F., Methods employing topical subject criteria in video processing.
  52. Davis, Bruce L.; Rodriguez, Tony F., Methods employing topical subject criteria in video processing.
  53. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  54. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  55. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  56. Rodriguez, Tony F., Narrowcasting from public displays, and related methods.
  57. Rodriguez, Tony F., Narrowcasting from public displays, and related methods.
  58. Rodriguez, Tony F., Narrowcasting from public displays, and related methods.
  59. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, Object authentication using encoded images digitally stored on the object.
  60. Evans, C. Shane; Choudhry, Kareem A.; Toll, Roderick M.; Hildebrandt, Jonathan D., Parental controls for entertainment content.
  61. Evans, C. Shane; Choudhry, Kareem A; Toll, Roderick M.; Hildebrandt, Jonathan D., Parental controls for entertainment content.
  62. Evans,C. Shane; Choudhry,Kareem A.; Toll,Roderick M.; Hildebrandt,Jonathan D., Parental controls for entertainment content.
  63. Forler,Joseph Wayne, Program signal blocking system.
  64. Fujihara, Shiro, Receiving apparatus, transmitting apparatus, and communication system which utilize a watermark insertion technique.
  65. Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Reconfiguring a watermark detector.
  66. Davis, III, Charles Frederick Lee; Thompson, William M., Remote dynamic indication of supervisory control and monitoring.
  67. Davis, III, Charles Frederick Lee; Thompson, William M., Remote dynamic indication of supervisory control and monitoring.
  68. Otero, Cesar, Steganographic image on portable device.
  69. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  70. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  71. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, System and method for decoding digital encoded images.
  72. Alasia,Alfred V.; Alasia,Alfred J.; Alasia,Thomas C.; Cvetkovic,Slobodan, System and method for decoding digital encoded images.
  73. Hayes,Patrick H.; Bordner,Elissa K., System and method for enabling a remote control to automatically and dynamically set-up a V-chip.
  74. Nash Putnam,Jon, System and method for insertion and retrieval of microthreads in transmitted data.
  75. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan; Ilic, Igor, System and method for network-based object authentication.
  76. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, Systems and methods for authenticating objects using multiple-level image encoding and decoding.
  77. Emigh, Aaron T., Trust representation by similarity.
  78. Poornachandran, Rajesh; Aissi, Selim, Trusted graphics rendering for safer browsing on mobile devices.
  79. Davis, Bruce L.; Rodriguez, Tony F., Watermarking and electronic program guides.
  80. Davis,Bruce L.; Rodriguez,Tony F., Watermarking to control video recording.
  81. Davis, Bruce L.; Rodriguez, Tony F., Watermarking to set video usage permissions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로