최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0012992 (2001-12-07) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 122 인용 특허 : 337 |
Two or more digital watermarks, with different characteristics, are embedded in a document. The characteristics are chosen so that the watermarks will be affected in different manners if the document is subsequently copied or reproduced. The detection process or mechanism reads two or more of the wa
Two or more digital watermarks, with different characteristics, are embedded in a document. The characteristics are chosen so that the watermarks will be affected in different manners if the document is subsequently copied or reproduced. The detection process or mechanism reads two or more of the watermarks and compares their characteristics. While wear and handling may change the characteristics of the digital watermarks in a document, the relationship between the characteristics of the multiple digital watermarks in a document will nevertheless give an indication as to whether a document is an original or a copy of an original. Document wear can be independently assessed and used as an aid in interpreting the detected watermark characteristics.
1. A method of steganographically encoding an object with auxiliary information, characterized by adding first and second data to the object to thereby steganographically encode same, the first data having a relatively higher likelihood of withstanding a corruption operation, the second data having
1. A method of steganographically encoding an object with auxiliary information, characterized by adding first and second data to the object to thereby steganographically encode same, the first data having a relatively higher likelihood of withstanding a corruption operation, the second data having a relatively lower likelihood of withstanding said corruption option, wherein said corruption operation comprises compression and subsequent decompression by a lossy process. 2. The method of claim 1 that further includes performing compression and subsequent decompression operations on said object, and thereafter successfully detecting the first data but not successfully detecting the second data.3. The method of claim 1 wherein said corruption operation comprises MPEG compression and decompression.4. The method of claim 1 wherein the object represents a motion picture.5. The method of claim 1 wherein the object represents audio.6. The method of claim 1 wherein the first and second data are added at the same time.7. The method of claim 1 wherein said object is a printed document, and the corruption operation comprises reproduction.8. A computer storage medium having stored thereon a digital object processed in accordance with the method of claim 1.9. A method to analyze an image of a printed object to determine whether the printed object is a copy or an original, the printed object comprising first steganographic data embedded therein and second steganographic data embedded therein, wherein the first steganographic data comprises a first characteristic and the second steganographic data comprises a second characteristic, said method comprising: machine-reading the first Steganographic data and the second steganographic data from the image to evaluate the first and second characteristics; comparing a condition of the first characteristic relative to a condition of the second characteristic; and based on said comparing step, determining whether the printed object is a copy or an original. 10. The method of claim 9, wherein the first characteristic is designed to change differently relative to the second characteristic when subjected to distortion.11. The method of claim 10, wherein the distortion comprises a color transformation.12. The method of claim 10, wherein the distortion comprises compression.13. The method of claim 10, wherein the distortion comprises a print operation.14. A method comprising: receiving a set of sampled data;analyzing said set of sampled data for a first watermark and a second watermark;determining, based on a signal comparison of the first and second watermarks, whether the set of sampled data corresponds to an original, or a degraded reproduction of an original; and controlling operation of equipment in accordance with said determination, wherein the first and second watermarks are designed to change differently when subjected to distortion.15. A method comprising: sensing a first parameter related to a first steganographic watermark from a printed document;sensing a second parameter related to a second steganographic watermark from the printed document; andby reference to at least a comparison of the first and second parameters, assessing whether the document is likely an original document, wherein the first and second steganographic watermarks are designed to change differently when subjected to a corruption process.16. The method of claim 15, wherein the corruption process comprises a color transformation.17. The method of claim 15, wherein the corruption process comprises compression.18. The method of claim 15, wherein the corruption process comprises a print operation.19. The method of claim 15, wherein the corruption process comprises image capture.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.