$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital watermark embedding and decoding using encryption keys 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0819716 (2004-04-06)
발명자 / 주소
  • Rhoads,Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Digimarc Corporation
인용정보 피인용 횟수 : 120  인용 특허 : 66

초록

Digital watermarks are embedded and decoded from host media signals like images and audio using encryption keys. The encryption keys are used to encrypt different components of the digital watermark message. The encryption keys can be used to scramble the digital watermark and components of it in a

대표청구항

I claim: 1. A method of embedding a digital watermark in a host media signal, the method comprising: receiving a message comprising variable symbols for embedding in the host media signal, the message having two or more message components; encrypting message components with different encryption key

이 특허에 인용된 특허 (66)

  1. Kahn Leonard R. (137 E. 36th St. New York NY 10016), Anti-copy system utilizing audible and inaudible protection signals.
  2. Nakano Kenji (Kanagawa JPX), Apparatus and method for preventing unauthorized dubbing of a recorded signal.
  3. Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
  4. Hisashi Inoue JP; Shiro Iwasaki JP; Mikio Shimazu JP; Shuichi Ojima JP; Takashi Katsura JP; Akio Miyazaki JP; Eiichi Hatae JP, Apparatus for and method of embedding and extracting digital information and medium having program for carrying out the method recorded thereon.
  5. Bronfin Kenneth A. (New York NY) Mahrer Stephen M. (Mt. Holly NJ) Wilson W. Robin (New York NY) Davenport Francis A. (Haddonfield NJ), Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast p.
  6. Schwab Barry H. (Bloomfield MI) Hussey James W. (Canton MI), Bilateral anti-copying device for video systems.
  7. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  8. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  9. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  10. Numao, Masayuki; Shimizu, Shuichi; Morimoto, Norishige; Kobayashi, Mei, Data hiding and extraction methods.
  11. Kobayashi Seiji,JPX ; Koide Akio,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data hiding method and data extraction method using statistical examination.
  12. Shimizu Shuichi,JPX, Data hiding method and system using statistical properties.
  13. Saito Makoto,JPX, Digital content management system using electronic watermark.
  14. Matsumoto Seiji,JPX ; Furukawa Masamichi,JPX, Digital copy control method, digital recording medium, digital recording medium producing apparatus, digital reproducing apparatus and digital recording apparatus.
  15. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  16. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  17. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  18. Schuyler Reynier Quackenbush ; Amy Ruth Reibman ; David Hilton Shur ; James H. Snyder, Electronic watermarking in the compressed domain utilizing perceptual coding.
  19. Iwamura, Keiichi, Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method.
  20. Junya Watanabe JP, Electronic watermarking system capable of providing image data with high secrecy.
  21. Iwamura, Keiichi, Embedding information in digital image data.
  22. Teruhiko Kori JP; Tadashi Ezaki JP; Akira Ogino JP; Yuji Kimura JP, Encrypted data reproducing transmitting and processing method and apparatus with separately encrypted control data.
  23. Bhaskaran Vasudev ; Ratnakar Viresh, Fragile watermarks for detecting tampering in images.
  24. Ikenoue Yoshikazu,JPX ; Kumashiro Hideo,JPX, Image forming apparatus and copy management system.
  25. Owada Mitsuru,JPX ; Nagashima Yoshitake,JPX ; Kimura Takeo,JPX, Image processing apparatus and method for synthesizing first and second image data.
  26. Kawakami Haruko (Yokohama JPX) Sekizawa Hidekazu (Yokohama JPX) Yamamoto Naofumi (Tokyo JPX), Image processing apparatus using pattern generating circuits to process a color image.
  27. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  28. Linnartz Johan P. M. G.,NLX, Marking a digitally encoded video and/or audio signal.
  29. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  30. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  31. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  32. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  33. Rabbani Majid (Pittsford NY), Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system.
  34. Ray, Lawrence A.; Honsinger, Chris W., Method and apparatus for transaction card security utilizing embedded image data.
  35. Michael A. Epstein, Method and apparatus for use of a time-dependent watermark for the purpose of copy protection.
  36. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  37. Linnartz Johan P. M. G.,NLX, Method and system for transferring content information and supplemental information relating thereto.
  38. Nakamura Takao,JPX ; Ogawa Hiroshi,JPX ; Takashima Yoichi,JPX, Method for embedding and reading watermark-information in digital form, and apparatus thereof.
  39. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  40. Cox, Ingemar J.; Miller, Matthew L., Method for increasing the functionality of a media player/recorder device.
  41. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  42. Gassmann Gerhard-Gnter (Esslingen-Berkheim DEX), Method of and system for transmitting two different messages on a carrier wave over a single transmission channel of pre.
  43. Blthgen Bjrn (Celle DEX), Method of transmitting audio information and additional information in digital form.
  44. Hong Heather Yu ; Min Wu ; Xin Li ; Alexander D. Gelman, Methods and apparatus for multi-layer data hiding.
  45. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  46. Lee Chong U. (San Diego CA) Moallemi Kamran (Del Mar CA) Hinderling Jurg (San Diego CA), Post-compression hidden data transport.
  47. Schreiber William F. (Cambridge MA) Lippman Andrew B. (Salem MA) Adelson Edward H. (Cambridge MA) Netravali Aran N. (Westfield NJ), Receiver-compatible enhanced definition television system.
  48. Levine Earl ; Brownell Jason S., Robust watermark method and apparatus for digital signals.
  49. Moore Steven Jerome, Security check method and apparatus.
  50. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  51. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  52. Rhoads, Geoffrey B., Steganography decoding methods employing error information.
  53. Geoffrey B. Rhoads, Steganography using dynamic codes.
  54. Spannenburg Sijbrand (Nt Petten NLX), Support provided with a machine detectable copying security element.
  55. Schilling Donald L. (Sands Point NY), Synchronous spread-spectrum communications system and method.
  56. Schober Gary W. (Edison NJ) Chadwick Raymond B. (Kearny NJ) Ashley Francis R. (South Plainfield NJ), System and method for identifying a television program.
  57. Erickson John S., System and method for managing copyrighted electronic media.
  58. Chen Brian ; Wornell Gregory W., System method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  59. Brian Chen ; Gregory W. Wornell, System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators.
  60. Chen Brian ; Wornell Gregory W., System, method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  61. Jungo Charles (Gilbert AZ) Montgomery Gerald D. (Mesa AZ) Schur Christopher J. (Payson AZ), Transmitting a secondary signal with dynamic injection level control.
  62. Steele Raymond (Hazlet NJ) Wong Wai C. (Aberdeen NJ) Xydeas Costas S. (Loughborough GB2), Transmitting data on the phase of speech.
  63. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  64. Kondo Kazunobu,JPX ; Yamauchi Kenichi,JPX ; Kobayashi Eiko,JPX, Vector quantizer and vector quantization method.
  65. Shirochi Yoshiki (Chiba JPX) Yamashita Keitaro (Tokyo JPX), Video signal recording apparatus with rerecording inhibit circuit.
  66. Girod Bernd,DEX ; Hartung Frank H. D.,DEX, Watermarking method and apparatus for compressed digital video.

이 특허를 인용한 특허 (120)

  1. Oh,Sang heun; Kim,Byung jun; Park,Sung wook, Apparatus for and method of embedding watermark into original information, transmitting watermarked information, and reconstructing the watermark.
  2. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  3. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  4. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  5. Radhakrishnan, Regunathan; Smithers, Michael; McGrath, David S., Audio data hiding based on perceptual masking and detection based on code multiplexing.
  6. Radhakrishnan, Regunathan; Smithers, Michael; McGrath, David S., Audio data hiding based on perceptual masking and detection based on code multiplexing.
  7. Rhoads, Geoffrey B., Background watermark processing.
  8. Ellingson, Eric E., Bi-directional image capture methods and apparatuses.
  9. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  10. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  11. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  12. Levy, Kenneth L., Content identification and management in content distribution networks.
  13. Rhoads, Geoffrey B., Controlling use of audio or image content.
  14. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  15. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  16. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  17. Brundage, Trent J.; Brunk, Hugh L., Digital watermark key generation.
  18. Brundage, Trent J.; Brunk, Hugh L., Digital watermark key generation.
  19. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  20. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  21. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  22. Levy, Kenneth L., Digital watermarking for workflow by tracking content or content identifiers with respect to time.
  23. Rodriguez, Tony F.; Brundage, Trent J., Digital watermarking image signals on-chip.
  24. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  25. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  26. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  27. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  28. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  29. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  30. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  31. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  32. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  33. Davis, Bruce L.; Rhoads, Geoffrey B., Embedding and reading codes on objects.
  34. Zandifar, Ali; Liu, Che-Bin; Xiao, Jing, Embedding data in images.
  35. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  36. Rhoads, Geoffrey B., Encoding and decoding media signals.
  37. Lyon, Geoff; Pradhan, Salil; Deolalikar, Vinay; Caban, Alipio; Ortiz, Lester, Encrypting a text unit from package information for package authentication.
  38. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  39. Zandifar, Ali; Liu, Che-Bin; Xiao, Jing, Extracting data from images.
  40. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  41. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  42. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  43. Rhoads, Geoffrey B.; Rodriguez, Tony F., Gestural techniques with wireless mobile phone devices.
  44. Zandifar, Ali; Liu, Che-Bin, Identifying embedded data in an image.
  45. Zandifar, Ali; Xiao, Jing, Identifying steganographic data in an image.
  46. Hardy, Stephen James; Fletcher, Peter Alleine; Larkin, Kieran Gerard; Gibson, Ian Richard, Image database key generation method.
  47. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  48. Myers, Charles G., Imaging systems with data encryption and embedding capabalities.
  49. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  50. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  51. Rhoads, Geoffrey B.; Rodriguez, Tony F., Interactive systems and methods employing wireless mobile devices.
  52. Rodriguez, Tony F., Internet and database searching with handheld devices.
  53. Rodriguez, Tony F.; Stewart, Steven W., Internet and database searching with handheld devices.
  54. Rhoads, Geoffrey B.; Rodriguez, Tony F., Location-based arrangements employing mobile devices.
  55. Rodriguez, Tony F., Machine-readable features for objects.
  56. Levy, Kenneth L., Media methods and systems.
  57. Brundage, Trent J.; Brunk, Hugh L., Message encoding.
  58. Brundage, Trent J.; Brunk, Hugh L., Message key generation.
  59. Brundage, Trent J.; Brunk, Hugh L., Message key generation.
  60. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  61. Rhoads, Geoffrey B., Method and apparatus for associating identifiers with content.
  62. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  63. Chen, Xuemin, Method and system for supporting watermark embedding in multimedia system-on-chips.
  64. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., Method for enhancing content using persistent content identification.
  65. Srinivasan, Venugopal; Topchy, Alexander, Methods and apparatus to perform audio watermark detection and extraction.
  66. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  67. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  68. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  69. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  70. Mohanty, Saraju P., Methods and devices for enrollment and verification of biometric information in identification documents.
  71. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices involving imagery and gestures.
  72. Hannigan, Brett T; Sharma, Ravi K; Rodriguez, Tony F, Methods and related toy and game applications using encoded information.
  73. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  74. Rhoads, Geoffrey B., Methods and systems for interacting with physical objects.
  75. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and systems for user-association of visual stimuli with corresponding responses.
  76. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  77. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  78. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  79. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  80. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  81. Rhoads, Geoffrey B., Methods for steganographic encoding media.
  82. Vestergaard, Steven Erik; Tsui, Che-Wai, Methods for watermarking media data.
  83. Vestergaard, Steven Erik; Tsui, Che-Wai, Methods for watermarking media data.
  84. Vestergaard, Steven Erik; Tsui, Che-Wai, Methods for watermarking media data.
  85. Vestergaard, Steven Erik; Tsui, Che-Wai, Methods for watermarking media data.
  86. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  87. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  88. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  89. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  90. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  91. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  92. Rhoads, Geoffrey B, Network linking methods and apparatus.
  93. Rodriguez, Tony F.; Brundage, Trent J., Noise influenced watermarking methods and apparatus.
  94. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  95. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  96. Bytnar, Michael R.; Sylla, Craig J., Processing metadata in wagering game systems.
  97. Stach,John; Brunk,Hugh L.; Sharma,Ravi K., Quantization-based data hiding employing calibration and locally adaptive quantization.
  98. Peled,Ariel; Tirosh,Oren; Litai,Assaf; Baratz,Arik; Troyansky,Lidror, Secure distribution of digital content.
  99. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  100. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  101. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in sound based on steganographic encoding.
  102. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  103. Duffield,David Jay; Vizireanu,Ion; Derrenberger,Mike Arthur; Nijim,Yousef Wasef, System and method for adaptive marking and coding of film prints.
  104. Rhoads, Geoffrey B.; Davis, Bruce L.; Hein, III, William C.; Rosenthol, Joshua A.; MacIntosh, Brian T.; Levy, Kenneth L., System for linking from objects to remote resources.
  105. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  106. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  107. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  108. Carrott, Richard F., Transactional security over a network.
  109. Carrott, Richard F., Transactional security over a network.
  110. Carrott, Richard F., Transactional security over a network.
  111. Carrott, Richard F., Transactional security over a network.
  112. Carrott, Richard F., Transactional security over a network.
  113. Levy, Kenneth L.; Perry, Burt W., Watermark and fingerprint systems for media.
  114. Davidson, Clayton L.; Kumar, Aruna B., Watermark decoding from streaming media.
  115. Levy, Kenneth L., Watermark embedding functions adapted for transmission channels.
  116. Sharma, Ravi K., Watermark synchronization signals conveying payload data.
  117. Cordery, Robert A.; Schmidt, Erik, Watermarking images with wavepackets encoded by intensity and/or phase variations.
  118. Tewfik, Ahmed; Zhu, Bin; Swanson, Mitch, Watermarking using multiple watermarks and keys, including keys dependent on the host signal.
  119. Sharma, Ravi K.; Alattar, Adnan M.; Ahmed, Farid; Rhoads, Geoffrey B., Wavelet domain watermarks.
  120. Rhoads, Geoffrey B.; Rodriguez, Tony F., Wireless mobile phone methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로