$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method, and product for information embedding using an ensemble of non-intersecting embedding generators 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0082632 (1998-05-21)
발명자 / 주소
  • Chen Brian
  • Wornell Gregory W.
출원인 / 주소
  • Massachusetts Institute of Technology
대리인 / 주소
    Wolf, Greenfield & Sacks, P.C.
인용정보 피인용 횟수 : 163  인용 특허 : 20

초록

A system, method, and product are provided to (1) embed a watermark signal into a host signal, thereby generating a composite signal, (2) optionally enable the composite signal to be transmitted over a communication channel, and (3) optionally extract the watermark signal from the transmitted compos

대표청구항

[ What is claimed is:] [1.]1. A method for watermarking a host signal with a watermark signal, the watermark signal comprising watermark-signal components, each having one of a plurality of watermark-signal values, and the host signal comprising host-signal components, each having one of a plurality

이 특허에 인용된 특허 (20)

  1. Petrovic Rade ; Winograd Joseph M. ; Jemili Kanaan ; Metois Eric, Apparatus and method for encoding and decoding information in analog signals.
  2. Wolosewicz Jack ; Jemili Kanaan, Apparatus and method for encoding and decoding information in analog signals.
  3. Henderson P. Michael, Cable modem optimized for high-speed data transmission from the home to the cable head.
  4. Malone Thomas W. ; Crowston Kevin ; Lee Jintae ; Pentland Brian ; Dellarocas Chrysanthos, Computer system for displaying representations of processes.
  5. Malone Thomas W. ; Crowston Kevin ; Lee Jintae ; Pentland Brian ; Dellarocas Chrysanthos, Computerized handbook of processes.
  6. Gasper John ; Sutton James Edward, Copy restrictive documents.
  7. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  8. Linnartz Johan P. M. G.,NLX, Detecting a watermark embedded in an information signal.
  9. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  10. Bender Walter (Auburndale MA) Morimoto Norishige (Tokyo JPX) Gruhl Daniel (Cambridge MA), Method and apparatus for data hiding in images.
  11. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  12. Berry Richard E. (Georgetown TX) Richards Thomas Neil (Raleigh NC), Method and system for integration of multimedia presentations within an object oriented user interface.
  13. Leighton F. Thomson, Method for protecting content using watermarking.
  14. Yamazaki Satoshi (Tokyo JPX), Method of preventing forgery of diffraction grating pattern and forgery-proof diffraction grating pattern recording stru.
  15. Bodeep George E. (Point Pleasant NJ) Darcie Thomas E. (Middletown NJ) Lu Xiaolin (Matawan NJ), Network apparatus and method for providing two way broadband communications.
  16. Sandford ; II Maxwell T. ; Handel Theodore G., Reference palette embedding.
  17. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  18. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  19. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  20. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.

이 특허를 인용한 특허 (163)

  1. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  2. Baeck, Seung Kwon; Park, Tae Jin; Sung, Jong Mo; Lee, Yong Ju; Lee, Tae Jin; Choi, Jin Soo, Apparatus and method for hiding and extracting data using pilot code sequence.
  3. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  4. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  5. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  6. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  7. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  8. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  9. Rhoads, Geoffrey B., Audio and video signal processing.
  10. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  11. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  12. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  13. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Categorizer of content in digital signals.
  14. Venkatesan,Ramarathnam; Johnson,Mark C., Content recognizer via probabilistic mirror distribution.
  15. Venkatesan,Ramarathnam; Johnson,Mark C., Content recognizer via probabilistic mirror distribution.
  16. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Content-recognition facilitator.
  17. Rhoads,Geoffrey B., Counteracting geometric distortions in watermarking.
  18. Yu, Hong Heather, Data hiding in digital multimedia.
  19. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  20. McKinley, Tyler J.; Sharma, Ravi K., Decoding information to allow access to computerized systems.
  21. Mihcak, M Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  22. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  23. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  24. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  25. Mihcak,M Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  26. Mihcak,M Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  27. Mihcak,M. Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  28. Mihcak,M. Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  29. Mihcak,M. Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  30. Mihcak,M. Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  31. Mihcak,Mehmet Kivanc; Venkatesan,Ramarathnam; Jakubowski,Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  32. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  33. Brundage, Trent J., Detecting media areas likely of hosting watermarks.
  34. Reed, Alastair M., Detection from two chrominance directions.
  35. Reed, Alastair M., Detection from two chrominance directions.
  36. Reed, Alastair M.; Cattone, Jeremy, Detection of out-of-phase low visibility watermarks.
  37. Kozat, S. Serdar; Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Digital goods representation based upon matrix invariances.
  38. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Digital signal watermaker.
  39. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  40. Sharma, Ravi K.; Gustafson, Ammon E.; Rhoads, Geoffrey B., Digital watermark detection utilizing host carrier information.
  41. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  42. Nakamura, Takao; Ogawa, Hiroshi; Tomioka, Atsuki; Takashima, Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
  43. Nakamura, Takao; Ogawa, Hiroshi; Tomioka, Atsuki; Takashima, Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
  44. Nakamura, Takao; Ogawa, Hiroshi; Tomioka, Atsuki; Takashima, Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
  45. Nakamura, Takao; Ogawa, Hiroshi; Tomioka, Atsuki; Takashima, Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
  46. Nakamura,Takao; Ogawa,Hiroshi; Tomioka,Atsuki; Takashima,Youichi, Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program.
  47. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  48. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  49. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  50. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  51. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  52. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  53. Reed, Alastair M.; Sharma, Ravi K., Digital watermarking methods, apparatus and systems.
  54. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet, Digital watermarking of low bit rate video.
  55. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  56. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  57. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  58. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  59. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  60. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  61. Jones,Robert L.; Reed,Alastair M., Emerging security features for identification documents.
  62. Reed, Alastair M., Encoding in two chrominance directions.
  63. Reed, Alastair M., Encoding in two chrominance directions.
  64. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Enhanced metadata and content delivery using watermarks.
  65. Reed, Alastair M.; Hannigan, Brett T.; Brundage, Trent J., Enhancing embedding of out-of-phase signals.
  66. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  67. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  68. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Hash value computer of content of digital signals.
  69. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  70. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  71. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  72. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  73. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  74. Alattar, Osama M.; Alattar, Adnan M., Hierarchical watermark detector.
  75. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  76. Sato, Hajime, Image processing apparatus, image processing method and storage.
  77. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  78. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  79. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  80. Kori,Teruhiko; Otsuka,Masaya, Information signal copy managing method, information signal recording method, information signal output apparatus, and recording medium.
  81. Ogawa, Nobuyuki; Kagamibashi, Shunji; Tsuji, Atsuo; Tominaga, Kiyoshi; Masuda, Wataru; Nakamura, Yoshimitsu; Tada, Haruhiko; Kobayashi, Hideto, Information signal edition apparatus, information signal edition method, and information edition program.
  82. Reed, Alastair M.; Berkley, Jr., Lou H., Low visibility watermark using time decay fluorescence.
  83. Reed,Alastair M.; Berkley, Jr.,Lou H., Low visibility watermark using time decay fluorescence.
  84. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  85. Reed, Alastair M.; Rodriguez, Tony F., Machine-readable security features for printed objects.
  86. Burstyn,Herschel Clement; Riddle,George Herbert Needham; Shapiro,Leon; Staebler,David Lloyd, Method and apparatus for film anti-piracy.
  87. Donescu, Ioana, Method and device for inserting and decoding a watermark in digital data.
  88. August,Katherine Grace; Shaer,Norman R.; Sizer, II,Theodore, Method and system for capture of location specific media related information and delivery through communications network.
  89. Ota,Yasuji; Suzuki,Masanao; Tsuchinaga,Yoshiteru; Tanaka,Masakiyo; Sasaki,Shigeru, Method and system for embedding and extracting data from encoded voice code.
  90. Donescu,Ioana; Nguyen,Eric; Onno,Patrice, Method for determining a partition in order to insert a watermark, and associated insertion and decoding methods.
  91. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  92. Rimai, Donald S.; Lawniczak, Gary P.; Blish, Nelson A., Method of making a panoramic print.
  93. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  94. Bai, Yang, Methods and arrangements for identifying objects.
  95. Bai, Yang; Evans, Eric D.; Filler, Tomas, Methods and arrangements for identifying objects.
  96. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  97. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  98. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  99. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  100. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  101. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  102. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  103. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  104. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  105. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  106. Hannigan, Brett T.; Bradley, Brett A.; Reed, Alastair M., Perceptual modeling of media signals based on local contrast and directional edges.
  107. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett A., Perceptual modeling of media signals based on local contrast and directional edges.
  108. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett A., Perceptual modeling of media signals for data hiding.
  109. Hannigan, Brett T.; Reed, Alastair M.; Bradley, Brett Alan, Perceptual modeling of media signals for data hiding.
  110. Hannigan,Brett T.; Reed,Alastair M.; Bradley,Brett Alan, Perceptual modeling of media signals for data hiding.
  111. Meyer, Thomas W.; Meyer, Josslyn Motha, Process, system, and apparatus for embedding data in compressed audio, image video and other media files and the like.
  112. Bradley, Brett A.; Stach, John, Quantization-based data embedding in mapped data.
  113. Bradley, Brett Alan; Stach, John, Quantization-based data embedding in mapped data.
  114. Bradley,Brett A.; Stach,John, Quantization-based data embedding in mapped data.
  115. Stach, John; Brunk, Hugh L.; Sharma, Ravi K., Quantization-based data hiding employing calibration and locally adaptive quantization.
  116. Stach,John; Brunk,Hugh L.; Sharma,Ravi K., Quantization-based data hiding employing calibration and locally adaptive quantization.
  117. Venkatesan, Ramarathnam; Malkin, Michael T., Randomized signal transforms and their applications.
  118. Venkatesan, Ramarathnam; Malkin, Michael T., Randomized signal transforms and their applications.
  119. Jones, Robert L.; Reed, Alastair M., Readers to analyze security features on objects.
  120. McCallam,Dennis Hain; Newland,Ronald Kenneth, Real-time recovery of compromised information.
  121. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Recognizer of audio-content in digital signals.
  122. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Recognizer of content of digital signals.
  123. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Recognizer of content of digital signals.
  124. Venkatesan, Ramarathnam; Mihcak, M. Kivanc, Robust and stealthy video watermarking.
  125. Venkatesan, Ramarathnam; Mihcak, M. Kivanc, Robust and stealthy video watermarking into regions of successive frames.
  126. Venkatesan,Ramarathnam; Mihcak,M. Kivanc, Robust and stealthy video watermarking into regions of successive frames.
  127. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Robust recognizer of perceptually similar content.
  128. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Robust recognizer of perceptually similar content.
  129. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Robust recognizer of perceptually similar content.
  130. Jones,Robert L.; Reed,Alastair M., Security features for objects and method regarding same.
  131. Reed, Alastair M.; Sharma, Ravi K., Signal decoding methods, apparatus and systems.
  132. Sharma, Ravi K.; Gustafson, Ammon E.; Rhoads, Geoffrey B., Signal processing utilizing host carrier information.
  133. McCallam, Dennis Hain, Steady state computer intrusion and misuse detection.
  134. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  135. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  136. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  137. Hugh L. Brunk ; Ravi K. Sharma, Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes.
  138. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  139. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  140. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  141. Meyer, Thomas W.; Meyer, Josslyn M., System and method for embedding supplementary data into digital media files.
  142. Venkatesan,Ramarathnam; Koon,Say Ming William, System and method for hashing digital images.
  143. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  144. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  145. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  146. McCallam, Dennis Hain; Newland, Ronald Kenneth, System and method for real-time network-based recovery following an information warfare attack.
  147. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  148. Olligschlaeger, Andreas M., System and method for three-way call detection.
  149. Olligschlaeger, Andreas M., System and method for three-way call detection.
  150. Olligschlaeger, Andreas M., System and method for three-way call detection.
  151. Olligschlaeger, Andreas M., System and method for three-way call detection.
  152. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  153. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  154. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  155. Martin, Thomas J., Three-way call detection using steganography.
  156. Martin,Thomas J., Three-way call detection using steganography.
  157. Rhoads,Geoffrey B.; Davidson,Clayton L.; Rodriguez,Tony F., Transform domain watermarking of image signals.
  158. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  159. Sharma,Ravi K.; Gustafson,Ammon E., Watermark detection utilizing regions with higher probability of success.
  160. Rhoads, Geoffrey B., Watermark embedder and reader.
  161. Celik, Mehmet U., Watermark placement in watermarking of time varying media signals.
  162. Alattar, Adnan M.; Stach, John; Tian, Jun, Watermarking of data invariant to distortion.
  163. Venkatesan,Ramarathnam; Mihcak,M. Kivanc; Kesal,Mustafa, Watermarking via quantization of statistics of overlapping regions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로