US20040091111A1 - Digital watermarking and fingerprinting applications - Google Patents

Digital watermarking and fingerprinting applications Download PDF

Info

Publication number
US20040091111A1
US20040091111A1 US10/622,079 US62207903A US2004091111A1 US 20040091111 A1 US20040091111 A1 US 20040091111A1 US 62207903 A US62207903 A US 62207903A US 2004091111 A1 US2004091111 A1 US 2004091111A1
Authority
US
United States
Prior art keywords
content
cell phone
identifier
location information
geo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/622,079
Inventor
Kenneth Levy
Reed Stager
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digimarc Corp
Original Assignee
Digimarc Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digimarc Corp filed Critical Digimarc Corp
Priority to US10/622,079 priority Critical patent/US20040091111A1/en
Assigned to DIGIMARC CORPORATION reassignment DIGIMARC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEVY, KENNETH L., STAGER, REED R.
Publication of US20040091111A1 publication Critical patent/US20040091111A1/en
Priority to US11/567,128 priority patent/US8250660B2/en
Assigned to DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION) reassignment DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION) CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS Assignors: L-1 SECURE CREDENTIALING, INC. (FORMERLY KNOWN AS DIGIMARC CORPORATION)
Assigned to DIGIMARC CORPORATION (AN OREGON CORPORATION) reassignment DIGIMARC CORPORATION (AN OREGON CORPORATION) MERGER (SEE DOCUMENT FOR DETAILS). Assignors: DIGIMARC CORPORATION (A DELAWARE CORPORATION)
Priority to US13/590,951 priority patent/US20120317022A1/en
Priority to US13/590,940 priority patent/US20120310726A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00323Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a measuring, monitoring or signaling apparatus, e.g. for transmitting measured information to a central location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00281Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal
    • H04N1/00307Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal with a mobile telephone apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0084Digital still camera
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3253Position information, e.g. geographical position at time of capture, GPS data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Definitions

  • the invention relates to digital watermarking, digital fingerprinting, and the use of such technology for copy protection, digital asset management, access control, authentication, content monitoring, and a variety of other applications.
  • Digital watermarking is a process for modifying physical or electronic media content to embed a hidden machine-readable code into the media.
  • a media content signal such as an image or audio signal
  • a hidden, digital auxiliary code signal such that the auxiliary signal is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process.
  • digital watermarking is applied to media content signals such as images, audio signals, and video signals.
  • watermarking may also be applied to other types of media objects, including documents (e.g., through line, word or character shifting, through background patterns or tints, etc.), software, multi-dimensional graphics models, and surface textures of objects.
  • Digital watermarking systems typically have two primary components: an encoder that embeds the watermark in a host media signal, and a decoder that detects and reads the embedded watermark from a signal suspected of containing a watermark (a suspect signal).
  • the encoder embeds a watermark by subtly altering the host media signal.
  • the reading component analyzes a suspect signal to detect whether a watermark is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark.
  • fingerprinting in contrast to digital watermarking, does not embed auxiliary data in a media signal, but rather, derives a unique content signal identifier from the media signal itself.
  • the fingerprint or host signal characteristics used to determined a fingerprint
  • Fingerprints for a wide selection of media signals may be stored in a database and associated with information or actions to be taken upon detection or calculation of a fingerprint.
  • FIG. 1 shows a method of identifying songs with audio fingerprints.
  • FIG. 2 shows an improved method of identifying songs with fingerprints.
  • FIG. 3 shows a card creation process
  • FIG. 4 shows a card usage process
  • DAM digital asset management
  • US 2002-0052885 A1 which are each herein incorporated by reference, can be readily combined with these techniques.
  • I can search based upon the geo-location of the Eiffel tower, and find all of my pictures and my friends pictures that were taken near the Eiffel tower—or even taken in France—by simply combining geographic maps of countries (or, e.g., embedded geographic indicators) and location search capabilities.
  • geographic maps of countries or, e.g., embedded geographic indicators
  • location search capabilities See, e.g., assignee's US Published Patent Application Nos. US 2002-0122564 A1; US 2002-0154144 A1; and US 2002-0124024 A1, and pending patent application Ser. Nos. 10/423,489 and 10/423,834 for related methods and systems. Each of these patent documents is herein incorporated by reference.).
  • the camera preferably knows where it is located.
  • a simplistic solution is to put a GPS detector in the camera, but this is often too expensive.
  • a preferred inventive method and system combines the function of cell phones and/or GPS units, which know where they are, with a camera via a physical or wireless link, so that the camera can inexpensively (e.g., without itself needing to include a GPS receiver) embed location data.
  • the system can use a cell phone server so that the camera does not even require a GPS receiver.
  • position data is determined by a cell phone based on signals received from multiple cell sites (or towers), e.g., based on received cell site transmission strength and/or known cell site positions.
  • the location information is relayed (e.g., wirelessly) from the cell phone to the camera. Or the camera includes cell phone functionality, and communicates with the cell towers itself.).
  • position data is relayed to the cell phone from a cell site. For example, multiple cell sites can compare respective reception times or received signals for a first transmission from the cell phone. A reception time differential is determined for the first transmission and is then used to determine a location for the cell phone based on known locations of the cell sites.
  • the camera communicates with a GPS receiver to receive location information.
  • Embodiment 1 Location Based upon Cell Phone Tower(s)
  • a phone can easily enable video conferencing with video cameras and image sharing with MMS (multimedia messaging services).
  • a phone can also know where it is located within a cell network by having its signal strength as received at a plurality of cell towers calculated and/or compared (and/or a time delay of signal reception, especially with CDMA, or Code-Division Multiple Access as provided by Qualcomm Inc., where the system includes a master clock).
  • one cell tower employs signal direction detection, such as a circular array of sensors with strength varying in the circle, to determine the location of a cell phone. This location information can be sent to the cell phone for embedding into the image or video frame.
  • a cell phone determines its location, perhaps by comparing signals received by multiple cell sites, or by using a timing scheme to measure signals.
  • location information can be embedded by a network server into an image or other content, and then sent from a cell site to a cell phone during, e.g., multimedia messaging service (MMS) or video conferencing.
  • MMS multimedia messaging service
  • an image can be uploaded to the server from a cell phone, embedded with the cell phone's location information, and then downloaded back to the phone, even if not used for MMS or video conferencing. This means that the cell phone/camera do not need to include a watermark embedder.
  • the embedding process can include watermarking or out of band methods, such as header tagging.
  • the location of the cell phone and/or camera combination during the capture of the image can be redundantly embedded throughout the image, or more complex calculations can be done to embed the location of the image (or objects or areas depicted in an image) based upon the focal point of the camera, which includes a calculation including the cell phone/camera location, angle, focus length, and zoom, for example. Or, perhaps, only the location of the focal point of the center of the picture may be embedded, or the image can be broken into smaller section with each section containing local location information.
  • Embedding the complete location information in each section can embed the local (or area specific) location information.
  • the local location information can be embedded by embedding the central location and differential change of the focal point (or cell phone camera combination location) into a group of sections, and each section in that group contains an embedded differential code.
  • the location of that section can be calculated by adding the differential code times the differential change to the central location.
  • This group may be part of a complete picture.
  • the group may include a predetermined differential size, such that only the central location needs to be embedded in the group, along with each section having a differential code.
  • the cell phone and camera can be one device (as many cell phones now have cameras onboard) or separate, but physically (or wirelessly) connected devices. In either case, the connection, whether internal or external, between the cell phone and camera could be proprietary or based upon a standard such as USB or BlueTooth.
  • Location information can be shared between a cell phone and camera based upon using multimedia platforms, such as Qualcomm's BREW, or requiring a cell phone modification.
  • the cell phone preferably includes a control module (e.g., software or firmware) to help facilitate the cell phone to upload and then receive each embedded image.
  • a control module e.g., software or firmware
  • Embodiment 2 Linking Camera and GPS
  • a camera and location device such as cell phone or GPS unit
  • the camera and cell phone can act as described in embodiment 1 but via a wireless connection.
  • a GPS unit with wireless capabilities can be used with the camera to provide location information.
  • the consumer whom has a camera, and cell phone or GPS system does not need to buy a combination.
  • the consumer will not end up with a multitude of devices, or several GPS locators embedded within each device.
  • a server can determine a location and create bits to be embedded for a predetermined image size. For pseudo-random noise (PN) watermarking techniques, this may include multiplying a watermark payload, including error correction, by the PN sequence, and including an orientation and synchronization signal, if applicable.
  • the server can then download this watermark signal to a cell phone, which can, in turn, add it to the image or perform human visual modeling to reduce visibility of the watermark, preferably using an efficient human visual model.
  • PN pseudo-random noise
  • a picture location can have time and biometrics added to determine where, when and who (e.g., who's depicted in the picture and who took the picture).
  • the camera or server can identify people in the picture and who took the picture, via retinal or iris scanning in the eyepiece, fingerprint recognition in the shutter button, or face recognition using an image of the camera user.
  • a capture device that captures biometrics of the user and embeds the biometric data in images, audio or video captured by the device, see e.g., U.S. patent application Ser. No. 09/585,678, which is herein incorporated by reference.
  • Audio royalties can be based upon the usage, such as whether the content is played on the radio, or as background music during a radio or TV show, etc.
  • royalties include parties involved in both the performing and recording process (and can be extended to distribution and retail partners outside the area of copyright, as described below).
  • Video can be just as difficult, especially for ads where actors have to be properly compensated.
  • a watermark in the content includes IDs for all parties that should receive royalties
  • the system of determining who to pay during distribution, especially digital file sharing, is made easier.
  • Biometric analysis such as facial or voice recognition may be used to identify people in images, video and audio to assist in determining appropriate parties to which royalties are due.
  • a similar problem occurs for content bought from a retailer (or distribution service provider acting as a retailer) that is allowed to be super or re-distributed by the consumer, such as content that is allowed to be shared on a file sharing system with a billing methodology.
  • the retailer should be compensated, as well as copyright holders, whether or not, but optimally, if the file sharing system receives revenue from the content. For example, this can be audio shared on KazaA or VOD video shared with a SonicBlue Replay 4000TM PVR (where the retailer is the VOD service provider).
  • the file sharing system can identify the original retailer and compensate them.
  • the compensation can be per download, per rendering (e.g., per listening or viewing), or a percentage of royalty related to that song.
  • the retailer could be compensated with a percentage of revenue of the P2P provider related to the percentage of time that the retailer's song was downloaded. Similar royalties can relate to copyright owners, such as artists and record labels.
  • the digital watermarking system is a multi-step process (with each step sometimes having multiple sub-steps):
  • Each participant registers for a participant ID, and the ID is linked to the participant in a database (e.g., via a web based interface to a server or group of servers on the Internet or other computer network).
  • a database e.g., via a web based interface to a server or group of servers on the Internet or other computer network.
  • the detection system reads the participant IDs, links to the database to interpret them, and enables the correct response or billing action.
  • Each participant preferably carries the first step out only once.
  • the database can be centrally located with all participant IDs, centrally distributed, either mirrored or intelligently distributed, or local and updated (see, e.g., assignee's U.S. patent application Ser. No. 10/060,049 (published as US 2002-0162118 A1) and related PCT Application No. PCT/US02/02572 (published as WO 02/062009), each of which is herein incorporated by reference).
  • the second step needs to be only done once for each piece of content.
  • the watermark can be chosen from a multitude of watermarking methods depending upon the content format, desired robustness, payload size, embedder and detector computational complexity, and perceptibility.
  • the third step is preferably performed each time the content goes through a transaction.
  • the third step may not have to occur during a download, if the song has limited functionality for evaluation, but should occur when the song is purchased or enabled for longer evaluation.
  • the third step may involve several sub-steps. For example, the participant ID is extracted from the content. Then, the database is used to link the participant ID to the participant. Next, an appropriate action is enabled.
  • the appropriate action may include a multitude of actions and related sub-steps.
  • the appropriate action may be crediting an artist or retailer inside a P2P system or related billing system.
  • the participant is paid, either each time content is transacted (e.g., a micro-payment) or as a larger transaction based upon the time from the last payment (e.g., pay every month) or the amount credited (e.g., pay when credit reaches $100).
  • the appropriate action may include logging the participant ID so that it can be submitted to a collection agency, such as BMI, ASCAP, and SESAC, and used by these agencies to determine how to distribute royalties.
  • a record label for promotion and demography research, may use the system.
  • the system may be used to inter-participant trading value, such as within bartering systems.
  • Content fingerprints which are methods to identify content based upon the content itself, typically use a database to perform some processing to match incoming fingerprint to fingerprints stored in the database. The larger the database, the more processing required by the database, and the less accurate the system.
  • the novel solution is, for each station that is being monitored, the system only searches a database for content played on that station, such as songs played on that radio station during a predetermined period (e.g., a week, etc).
  • the radio and TV stations have play lists that can be provided to the monitoring services.
  • This system is applicable to radio and TV.
  • the detailed example is shown for audio, since these systems have currently shown to be more practical.
  • our inventive techniques can be applied to other types of content, such as video as well. (When considering video broadcast monitoring systems, or if audio fingerprinting systems are used to monitor TV stations, a TV play list will replaces a radio station song play list and the system works as described for radio broadcast monitoring.)
  • FIG. 1 shows a conventional method of identifying songs with fingerprints.
  • Step 300 calculates the fingerprint for the song or section of the song.
  • Step 310 compares the calculated fingerprint to the database 350 and finds the closest match.
  • This step may involve some type of distance calculation between the calculated fingerprints (sometimes including sub-fingerprints) and the database entries, which is computationally intensive and increases the likelihood of error as the database becomes larger. Even in fingerprint methods (potentially created in the future) that do not involve distance measurements, a larger database increases the likelihood of error. For example, if the fingerprint ID is erroneous due to background noise or a voice over, it is more likely to match a database ID in a larger database.
  • the third step involves identifying the song once the song's fingerprint is matched in the database.
  • FIG. 2 shows an inventive method of identifying songs with fingerprints, for systems such as radio monitoring, where a limited play list can be used to limit the database search space.
  • the first step 300 is identical to the currently used method, where the song's fingerprint is calculated.
  • Step 330 includes comparing the song's fingerprint to a database (or data repository), which is limited to a play list of the radio station (or equivalent audio service, such as an Internet streaming system).
  • the database used in step 330 is, e.g., preferably a selection of the songs from the radio station play list 340 , which is a subset of the complete database 350 .
  • the database used in step 330 may be local to the fingerprinting system, such as located on the same PC as calculating the fingerprint.
  • the local database should be updated as the radio station play list changes.
  • the database may be accessible via a network, such as the internet in a central database, or mirror or intelligently distributed database method.
  • the intelligently distributed database method is an initial step of limiting number of database entries, where, for example, US songs not played in Europe do not exist in the versions of the database in Europe.
  • the database can have only entries for songs included in the play list, or songs in the play list are highlighted as active.
  • the latter means only the active entries are changed when the play list is updated, whereas the former means the database entries for newly added songs have to be added and database entries for songs in the database not included in the new play list have to be deleted.
  • the play list does not need to include times that the song is played, just a total list of every song played for a period of time, such as that week or month.
  • the play list may have a likelihood or number of times each song is played to help the fingerprint system choose between two close matches.
  • the song identification step 320 is now more accurate, and most likely more efficient, since the database used in step 330 is smaller than the database used in step 310 .
  • My proposal in contrast, uses a digital watermark embedded in content that is used to measure contiguous time the content is rendered or viewed.
  • a playing or rendering system uses the measure to determine fair use, and can limit contiguous access to protected content within the system once the fair use limits have been exhausted.
  • a watermark is embedded in the content with a payload including a static copy protection bit or bits, a static content ID, and dynamic counter or time reference indicator that can be used to determine the length of content.
  • a rendering system used in locations requiring fair use such as schools or research institutions, include a watermark detector to measures contiguous time that protected content is played. If the time is too long, or the content is used in a manner failing outside of fair use's boundaries, the rendering system stops working because fair use has been violated.
  • the content ID is used to determine whether the play is contiguous and is not from different segments of protected content.
  • the protection bits can also be used to signal that the content is protected content.
  • the copy protection bit(s) and the time interval indicator comprise the same payload bits. Of course, in other implementations, the copy protection bit(s) and the time interval indicator are separate payload fields.).
  • This type of security can alternatively, and preferably, be provided via a secure driver's licenses or security card based upon digital watermarks.
  • the watermarks authenticate the card originality as well as the picture as matching the card data.
  • the debt could be accumulated and submitted every week or when it went above $100.
  • the retailer can saves money in terms of fixed fees for credit card transactions, as well as being able to negotiate a lower rate due to an increased number of larger transactions.
  • the retailer is assuming debt, and this amount can be based upon personal knowledge of the consumer (if legal) and/or past shopping history.
  • the card creation process receives, in step 400 , personal information from a customer.
  • a customer can obtain the customer's name, address, phone number, and credit card or bank information.
  • the personal information can be confirmed by a credit card company, as currently done with many currently used systems, such as when ordering on the Internet.
  • Step 410 includes obtaining the person's picture.
  • the picture can be directly captured (e.g., via a digital camera) or obtained from a photographic repository.
  • Step 420 includes creating and embedding a digital watermark.
  • a robust watermark to be embedded in the customer picture is preferably based upon the personal information; that is, a digital watermark payload is created and embedded in the picture that somehow links the picture to the information on the card or to information provided by the customer.
  • the payload may include, for example, a 20-bit MD5 hash of the name, address and phone number. The likelihood that these 20 bits are not unique for people who look similar is low enough to provide adequate security.
  • a fragile watermark can be added that can identify whether the card is original or a copy.
  • the card is printed in step 430 .
  • Most any printer can be used as most printers usually have minimal effects on watermarks, but the most secure system will include a list of recommended card printers. This list will include printers that most accurately represent the watermarks on the card.
  • the card usage process is employed, e.g., in step 440 , where, at a checkout, a card reader authenticates the card.
  • the card reader may be part of a kiosk with a window to place the card, may be a stand alone or tethered hand-held reader, or a device that the card is slid into and pulled out or automatically returned (i.e. a automatic scanner).
  • the reader will include an optical sensor to capture optical scan data representing the card or a portion of the card (e.g., the picture).
  • a digital watermark decoder analyses the scan data to decode the watermark and obtain the watermark payload.
  • the kiosk system may also be used to help link the user to previous buying habits and pricing. For example, the user may be able to look up how much they paid for milk a month ago, as well as how much milk they have bought in the last month. In addition, they may be able to look up warranty information for products bought at a store via the kiosk. Similarly, if the store allows online browsing, the kiosk can link to the online shopping. For example, the kiosk can link to a wish created while shopping online. This linking is facilitated, at least in part, by the decoded digital watermark. For example, the payload includes an identifier—perhaps a hash of a customer's personal information—which is used to link to information regarding the customer. (See, e.g., assignee's U.S. patent application Ser. No. 09/571,422, filed May 15, 2000, which is herein incorporated by reference, for additional watermark-based linking techniques.)
  • the kiosk system may sometimes need a unique ID for each user, a PIN and/or person's name can be used to guarantee that the ID is unique.
  • a seperate unique ID can be added to the image or background of the card based upon a central registration process during the creation of the card to obtain the unique ID.
  • a store employee can optionally look at the card and holder to make sure the picture matches the person.
  • a PIN personal identification number
  • biometric sample can be entered.
  • the ideal security system involves something you have (i.e. ID card), something you are (e.g., biometric sample like a fingerprint, voice print, retinal scan, etc.), and something you know (e.g., PIN or sequence).
  • the card is something you have. Comparing the picture (or biometric) to the card user is something you are, and requiring a PIN requires something you know.
  • the system is more secure than just requiring a card or fingerprint.
  • step 460 the retailer adds the price of the purchase to an account or data record associated with the customer, thus accumulating the customer's debt.
  • the retailer can accumulate debt for a pre-determined amount of time and/or up to a pre-determined amount.
  • the pre-determined amount can be dependent, e.g., upon a customer's past history of shopping at the store, her credit history, or her personal relationship with the retailer (subject, of course, to any applicable laws).
  • Pre-determined amounts can change over time, dependent upon the customer's usage patterns and how quickly she pays the store or her account.
  • the retailer is accumulating risk, balanced by saving expenses by dealing with many small transactions with credit card companies or banks. For example, a user may disappear and cancel a credit card before the retailer bills the credit card—which leaves the retailer out of money.
  • the pre-determined amounts can work similar to how credit cards increase a credit limit over time. For example, for the first 6 months, the system may submit every week or when an account reaches $50, which ever is first. Then, assuming the person continues spending money and paying their debt, the values can be increased to 10 days and $75, and so on.
  • step 470 the debt is submitted to the credit card company or other financial institution.
  • the debt could be billed to the user directly, or highlighted for the next time the user arrives for payment (especially if the retailer is part of a user's club or co-op where the user visits regularly).
  • This system saves the most money for retailers that have repeat customers who spend minimal amounts each visit, such as for a neighborhood market or convenience store, or hardware store.
  • This system can also be used with an Internet online retailer, since a PC and camera can securely read a watermarked card.
  • the pre-determined amounts can be updated by ratings of the Internet site from other user if the system involves trading, such as for Web sites like eBay.com.
  • This system could also use a driver's license, when the driver's license has digital watermarks authenticating the card, instead of a proprietary store card.
  • the fingerprint can be used with the described debt accumulation system.
  • the fingerprint can potentially along with the PIN, signature and/or even a security card with a watermark or magnetic strip (for something you have), could be used with the method for accumulating micro-payments.
  • the fingerprint and signature are something you are
  • the PIN (if included) is something you know
  • security card if included
  • One type of watermarking scheme is provided by Digimarc's (Tualatin, Oreg., USA) MediaBridgeTM technology.
  • Our logon cards are more secure than passwords since when people share them, a copy is not made.
  • These logon cards are more efficient than passwords because they don't need to be changed since they cannot be duplicated.
  • the logon card can be combined with existing cards, such as with modern plastic hotel room keys (that use a magnetic strip to open the door) or with personal membership cards. This combination reduces cost because several cards don't have to be created and monitored for loss.
  • our logon card system can be employed for consumers to use a wireless network—which works as follows.
  • a user shows there watermarked room key to a wireless access terminal.
  • the access terminal captures an image of the room key, decodes the watermark from captured image, check to see if the ID is valid (e.g., ensuring the that user is a current quest at the hotel), and then enables wireless access, if the ID iv valid.
  • the hotel or affiliated provider can maintain a database of unique ID.
  • the system can automatically bill usage to the user's room since the watermark is linked to the hotel room, even though the consumer can work as they wonder throughout the hotel (e.g., not locked in their room or a hotel business center).
  • This system can also work for in-room wired networks.
  • the room number can be known in this case due to the physical wire connected to the room, if the hotel is controlling the PCs in its business center and wireless network with the room key, it may be advantageous to have all the systems work identically.
  • the rooms can be wired with standard ethernet capabilities, where the physical wires don't have to be linked to a room (and the PC doesn't have to be identified so several people don't share a connection in one room).
  • a logon card given to the consumer when they are ready to use a PC controls login.
  • the logon card is shown to a camera on the PC to log them on, as described for the PCs in the hotel's business center.
  • the usage can be timed on the PC that the consumer is using (as identified by a watermark ID on the logon card), or by a master PC, which determines when the logon card was given to the consumer and when returned (by showing it to the master PC's camera when given and received).
  • a master PC which determines when the logon card was given to the consumer and when returned (by showing it to the master PC's camera when given and received).
  • the membership card can be watermarked with a unique ID that is used to log onto the computer and link to the member.
  • the card can also have security measures, if desired, such as fragile watermarks to locate copies and watermarks that link the picture to the personal data (via embedding a 20 bit hash of the user's name, for example).
  • the fragile watermark degrades when a reproduction of the originally watermarked item is made, enabling a watermark reader to differentiate reproductions from an original, watermarked object.
  • the system level details include that after the card is shown to the PC with the camera, the watermark ID is sent to a database that links the ID to a room number and identifies that the ID is active. If the ID is active, the consumer is allowed to logon, and the appropriate billing action is started. If the ID is not active, the logon is not allowed. They system should be secured by authenticating the card reading software to the database, and encrypting the watermark ID when sent within the PC or network. Session keys should be changed to be resistant to replay attack, as well known in the art of cryptography.
  • Authentication of surveillance video is important to verify in court that the surveillance video is authentic.
  • the Digital Signature Standard (DSS), or any digital signature can be used to authenticate the accuracy of every bit in each frame of surveillance video.
  • DSS Digital Signature Standard
  • the unique combination of private key usage, frame splitting and date-time addition can improve the authentication to guarantee that no frames were removed, that the frames were recorded at the appropriate date and time, and that the appropriate recorder performed the recording.
  • Location information can also be embedded in the video in the form of a digital watermark to improve authentication.
  • the system can use half of one frame and the other half of the next frame in the signature for each frame.
  • This system demonstrates that every bit of each frame is authentic and that no frames have been added (as before, as well as the fact that no frames have been removed).
  • the additional authentication that no frames have been removed is based on the fact that each frame signature includes bits from itself and another frame; thus, if any frame is removed the previous frame's signature will not match.
  • This system can be designed in many ways, such as using thirds of a frame, the previous frame and the next frame, as long as every bit of each frame is included somewhere in the signature and one frame is not completely included in one signature frame.
  • the signature frames can be saved in a separate file, as part of the video header, or as part of each frame header.
  • the complete group of signature frames can be encrypted with the private key to make sure no frames are removed.
  • the system for a fixed video, could consider all the frames as one large message, and perform a DSS on the complete message, as long as the message length does not exceed the limit set by the digital signature.
  • the date and time can be included as part of the frame signature to verify the date and time (and/or location) of the video.
  • the date time (and/or location) can be added to the robust hash calculation (by converting the date time stamp to bits and included as any additional frame bits) or appending the date time stamp to the robust hash payload and then encrypted with the private key.
  • the date time stamp can have frame or second accuracy (or maybe even minute accuracy).
  • each video recorder can share a system-level private key or have its owner recorder private key. If separate recorder private keys are used, the system can track the machine from which the video was recorded based upon the one-to-one relationship of the decryption public key and encryption private key. More specifically, as well known, if the wrong public key is used, the authentication process will fail; thus, the public key identifies the private key used, which, in turn, identifies the machine.
  • the authentication process includes using the public key to decrypt the digital signature and compare it to the robust hash calculation of the video frame data (and possibly date and time, if included as part of the hash and not a separate part of the payload). If they match, the video frame data is authentic. If the date time stamp is included as an appended part of the robust hash payload, the date time stamp can be read from the digital signature to verify the date and time.
  • every bit of the video is shown to be authentic, meaning that no bits have not been modified, removed or added.
  • the date and time of the video is known.
  • the recorder can be identified based upon the public decryption key.
  • the RSA algorithm rather than DSA algorithm can be chosen, as described at ⁇ http://www.rsasecurity.com/rsalabs/faq/3-4-1.html>, to make the authentication (referred to as verification in the referred web page) process faster than the signing process, but this is probably not advantageous for this system since the signing must be done in real time on the recorder and the authentication can be done offline.
  • each frame can be used, with some segment overlapping between frames. This has the advantage of demonstrating the location of any manipulation, as well as linking frames together, so frames cannot be removed.
  • the digital signature for each segment within each frame and for each segment started within the frame (and including some of the next or other frame), can be stored in the header of that frame or as a group of frames, and one needs to include a date time stamp.
  • the frame digital signature consists of many smaller signatures, and includes a date time stamp.
  • a reversible watermark is generally a watermark, which can be removed from content without degrading (or without significantly degrading) the content. In some cases, removing a watermark implies restoring content to its unmarked state. Suitable reversible watermarks are described, e.g., in assignee's pending U.S. patent application Ser. No. 10/319,404, filed Dec. 12, 2002 and Ser. No. 10/435,517, filed May 8, 2003, which are each hereby incorporated by reference.
  • auxiliary data encoding processes may be implemented in a programmable computer or a special purpose digital circuit.
  • auxiliary data decoding and fingerprint calculation may be implemented in software, firmware, hardware, or combinations of software, firmware and hardware.
  • the methods and processes described above may be implemented in programs executed from a system's memory (a computer readable medium, such as an electronic, optical or magnetic storage device).

Abstract

Methods and systems include: (1) steganographically embedding location information in images, where the location information is obtained from remote sources like a cell phone network or remote GPS receiver; (2) steganographically embedding participant IDs in content to ensure proper billing and royalty tracking; (3) providing a fingerprint database which is limited to a play list for a particular broadcast network over a predetermined period; (4) providing fair-use content management based upon digital watermark-tracked usage; (5) providing micro-payments based upon watermarked ID cards for retailers; or (6) providing watermarked logon cards, such as watermarked hotel room keys, to better provide internet logon access control.

Description

    RELATED APPLICATION DATA
  • This application claims the benefit of U.S. Provisional Patent Application No. 60/396,893, filed Jul. 16, 2002, which is herein incorporated by reference.[0001]
  • TECHNICAL FIELD
  • The invention relates to digital watermarking, digital fingerprinting, and the use of such technology for copy protection, digital asset management, access control, authentication, content monitoring, and a variety of other applications. [0002]
  • BACKGROUND
  • Digital watermarking is a process for modifying physical or electronic media content to embed a hidden machine-readable code into the media. In digital watermarking, a media content signal, such as an image or audio signal, is modified to embed a hidden, digital auxiliary code signal such that the auxiliary signal is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media content signals such as images, audio signals, and video signals. However, watermarking may also be applied to other types of media objects, including documents (e.g., through line, word or character shifting, through background patterns or tints, etc.), software, multi-dimensional graphics models, and surface textures of objects. [0003]
  • Digital watermarking systems typically have two primary components: an encoder that embeds the watermark in a host media signal, and a decoder that detects and reads the embedded watermark from a signal suspected of containing a watermark (a suspect signal). The encoder embeds a watermark by subtly altering the host media signal. The reading component analyzes a suspect signal to detect whether a watermark is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark. [0004]
  • Several particular watermarking techniques have been developed. The reader is presumed to be familiar with the literature in this field. Particular techniques for embedding and detecting imperceptible watermarks in media signals are detailed, e.g., in the assignee's co-pending U.S. patent application Ser. No. 09/503,881 and U.S. Pat. No. 6,122,403, which are each hereby incorporated by reference. [0005]
  • Another technology referred to as fingerprinting, in contrast to digital watermarking, does not embed auxiliary data in a media signal, but rather, derives a unique content signal identifier from the media signal itself. For some applications where the signal undergoes a transformation in normal use, such as compression, transmission, or digital to analog to digital conversion, the fingerprint (or host signal characteristics used to determined a fingerprint) preferably remains relatively unchanged, allowing unique identification of the content signal. Fingerprints for a wide selection of media signals may be stored in a database and associated with information or actions to be taken upon detection or calculation of a fingerprint.[0006]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows a method of identifying songs with audio fingerprints. [0007]
  • FIG. 2 shows an improved method of identifying songs with fingerprints. [0008]
  • FIG. 3 shows a card creation process. [0009]
  • FIG. 4 shows a card usage process.[0010]
  • DETAILED DESCRIPTION
  • Efficient Embedding of Location Information in Cameras in Combination with Cell Phones and GPS Units [0011]
  • Background and Summary of Efficient Embedding of Location Information [0012]
  • As background, we believe that digital asset management (DAM) systems will mature when the process of entering metadata about content managed in the system is mostly automated—as the searching capabilities are already pretty good and easy to use. Location information associated with media content, e.g., a geo-location of where an image was taken or locations depicted in the image, is a good example of such metadata. Other metadata may include, e.g., day, time, people depicted in an image, subject matter or descriptive words (“1998 Disneyland Trip”), events, authorship, copyright information, capture device particulars, etc., etc. [0013]
  • We believe that most DAM systems fail, when they do so, due to the time and effort needed to enter metadata into the system, not because the systems are too difficult to use. [0014]
  • We can simplify this effort. For example, it would be ideal if location information is automatically embedded in consumer images, automatically used to categorize images in DAM systems, and used when searching to find images from similar locations—thus, increasing the usage of the consumer based image DAM systems. This will allow consumers to search their images, as well as other's images assuming the consumer is part of an image sharing or subscription service, based upon location. (The file-sharing techniques and systems described in assignee's U.S. patent application Ser. No. 09/620,019, filed Jul. 20, 2000 and U.S. Published Patent Application No. US 2002-0052885 A1 which are each herein incorporated by reference, can be readily combined with these techniques.) For example, I can search based upon the geo-location of the Eiffel tower, and find all of my pictures and my friends pictures that were taken near the Eiffel tower—or even taken in France—by simply combining geographic maps of countries (or, e.g., embedded geographic indicators) and location search capabilities. (See, e.g., assignee's US Published Patent Application Nos. US 2002-0122564 A1; US 2002-0154144 A1; and US 2002-0124024 A1, and pending patent application Ser. Nos. 10/423,489 and 10/423,834 for related methods and systems. Each of these patent documents is herein incorporated by reference.). [0015]
  • To automatically embed location information from a camera into the picture, the camera preferably knows where it is located. A simplistic solution is to put a GPS detector in the camera, but this is often too expensive. [0016]
  • A preferred inventive method and system combines the function of cell phones and/or GPS units, which know where they are, with a camera via a physical or wireless link, so that the camera can inexpensively (e.g., without itself needing to include a GPS receiver) embed location data. In fact, the system can use a cell phone server so that the camera does not even require a GPS receiver. [0017]
  • In one implementation, position data is determined by a cell phone based on signals received from multiple cell sites (or towers), e.g., based on received cell site transmission strength and/or known cell site positions. (The location information is relayed (e.g., wirelessly) from the cell phone to the camera. Or the camera includes cell phone functionality, and communicates with the cell towers itself.). Alternatively, position data is relayed to the cell phone from a cell site. For example, multiple cell sites can compare respective reception times or received signals for a first transmission from the cell phone. A reception time differential is determined for the first transmission and is then used to determine a location for the cell phone based on known locations of the cell sites. Or cell phone transmissions as received by multiple cell sites, are compared to determine a position of the cell phone, as in triangulation methods. This position data is then communicated from a cell site (or tower) to cell phone. The communicated position data is optionally encrypted or otherwise scrambled to enhance security. [0018]
  • In another implementation, the camera communicates with a GPS receiver to receive location information. [0019]
  • Detailed Description of Efficient Embedding of Location Information [0020]
  • Embodiment 1—Location Based upon Cell Phone Tower(s) [0021]
  • Currently, many cell phones are including still and/or video cameras. These cell phones can easily enable video conferencing with video cameras and image sharing with MMS (multimedia messaging services). A phone can also know where it is located within a cell network by having its signal strength as received at a plurality of cell towers calculated and/or compared (and/or a time delay of signal reception, especially with CDMA, or Code-Division Multiple Access as provided by Qualcomm Inc., where the system includes a master clock). In alternative position determining technique, one cell tower employs signal direction detection, such as a circular array of sensors with strength varying in the circle, to determine the location of a cell phone. This location information can be sent to the cell phone for embedding into the image or video frame. (See assigned U.S. Published Patent Application No. 2003-0040326 A1 for related details on determining a cell phone location. This patent document is herein incorporated by reference.). In other cases, a cell phone determines its location, perhaps by comparing signals received by multiple cell sites, or by using a timing scheme to measure signals. Alternatively, location information can be embedded by a network server into an image or other content, and then sent from a cell site to a cell phone during, e.g., multimedia messaging service (MMS) or video conferencing. In fact, an image can be uploaded to the server from a cell phone, embedded with the cell phone's location information, and then downloaded back to the phone, even if not used for MMS or video conferencing. This means that the cell phone/camera do not need to include a watermark embedder. [0022]
  • The embedding process can include watermarking or out of band methods, such as header tagging. The location of the cell phone and/or camera combination during the capture of the image can be redundantly embedded throughout the image, or more complex calculations can be done to embed the location of the image (or objects or areas depicted in an image) based upon the focal point of the camera, which includes a calculation including the cell phone/camera location, angle, focus length, and zoom, for example. Or, perhaps, only the location of the focal point of the center of the picture may be embedded, or the image can be broken into smaller section with each section containing local location information. [0023]
  • Embedding the complete location information in each section can embed the local (or area specific) location information. Alternatively, the local location information can be embedded by embedding the central location and differential change of the focal point (or cell phone camera combination location) into a group of sections, and each section in that group contains an embedded differential code. Thus, the location of that section can be calculated by adding the differential code times the differential change to the central location. This group may be part of a complete picture. The group may include a predetermined differential size, such that only the central location needs to be embedded in the group, along with each section having a differential code. [0024]
  • The cell phone and camera can be one device (as many cell phones now have cameras onboard) or separate, but physically (or wirelessly) connected devices. In either case, the connection, whether internal or external, between the cell phone and camera could be proprietary or based upon a standard such as USB or BlueTooth. [0025]
  • Location information can be shared between a cell phone and camera based upon using multimedia platforms, such as Qualcomm's BREW, or requiring a cell phone modification. [0026]
  • If a network server does the embedding, the cell phone preferably includes a control module (e.g., software or firmware) to help facilitate the cell phone to upload and then receive each embedded image. As such, this system requires minimal cost to implement. [0027]
  • Embodiment 2—Linking Camera and GPS [0028]
  • In a consumer device world which is moving from physically connected to wireless networking, such as via BlueTooth or IEEE 802.11b (a.k.a. WiFi), a camera and location device, such as cell phone or GPS unit, do not have to be physically connected. The camera and cell phone can act as described in embodiment 1 but via a wireless connection. Alternatively, a GPS unit with wireless capabilities can be used with the camera to provide location information. [0029]
  • As such, the consumer whom has a camera, and cell phone or GPS system, does not need to buy a combination. Thus, the consumer will not end up with a multitude of devices, or several GPS locators embedded within each device. [0030]
  • In some of the above embodiments, a server can determine a location and create bits to be embedded for a predetermined image size. For pseudo-random noise (PN) watermarking techniques, this may include multiplying a watermark payload, including error correction, by the PN sequence, and including an orientation and synchronization signal, if applicable. The server can then download this watermark signal to a cell phone, which can, in turn, add it to the image or perform human visual modeling to reduce visibility of the watermark, preferably using an efficient human visual model. Of course, an image does not need to be uploaded, thus saving bandwidth and consumer expense, while the cell phone requires less CPU power to embed the watermark. [0031]
  • In addition, in both embodiments, a picture location can have time and biometrics added to determine where, when and who (e.g., who's depicted in the picture and who took the picture). The camera or server can identify people in the picture and who took the picture, via retinal or iris scanning in the eyepiece, fingerprint recognition in the shutter button, or face recognition using an image of the camera user. For a description of a capture device that captures biometrics of the user and embeds the biometric data in images, audio or video captured by the device, see e.g., U.S. patent application Ser. No. 09/585,678, which is herein incorporated by reference. [0032]
  • Watermarked Participant IDs Used for Proper Billing [0033]
  • Background and Summary for Participant IDs [0034]
  • In distribution of content, especially digital content, it is sometimes difficult to determine which parties require royalty payments. Audio royalties can be based upon the usage, such as whether the content is played on the radio, or as background music during a radio or TV show, etc. In addition, royalties include parties involved in both the performing and recording process (and can be extended to distribution and retail partners outside the area of copyright, as described below). There are often at least two copyrights associated with a particular piece of music, e.g., performance and recording. Video can be just as difficult, especially for ads where actors have to be properly compensated. [0035]
  • If a watermark in the content includes IDs for all parties that should receive royalties, the system of determining who to pay during distribution, especially digital file sharing, is made easier. Biometric analysis, such as facial or voice recognition may be used to identify people in images, video and audio to assist in determining appropriate parties to which royalties are due. [0036]
  • A similar problem occurs for content bought from a retailer (or distribution service provider acting as a retailer) that is allowed to be super or re-distributed by the consumer, such as content that is allowed to be shared on a file sharing system with a billing methodology. The retailer should be compensated, as well as copyright holders, whether or not, but optimally, if the file sharing system receives revenue from the content. For example, this can be audio shared on KazaA or VOD video shared with a SonicBlue Replay 4000™ PVR (where the retailer is the VOD service provider). [0037]
  • If the content includes a retailer (or distributor/VOD) ID, then the file sharing system can identify the original retailer and compensate them. The compensation can be per download, per rendering (e.g., per listening or viewing), or a percentage of royalty related to that song. More specifically, the retailer could be compensated with a percentage of revenue of the P2P provider related to the percentage of time that the retailer's song was downloaded. Similar royalties can relate to copyright owners, such as artists and record labels. [0038]
  • Detailed Description for Participant IDs [0039]
  • The digital watermarking system is a multi-step process (with each step sometimes having multiple sub-steps): [0040]
  • 1. Each participant registers for a participant ID, and the ID is linked to the participant in a database (e.g., via a web based interface to a server or group of servers on the Internet or other computer network). [0041]
  • 2. The content is embedded with the appropriate participant IDs. [0042]
  • 3. The detection system reads the participant IDs, links to the database to interpret them, and enables the correct response or billing action. [0043]
  • Each participant preferably carries the first step out only once. The database can be centrally located with all participant IDs, centrally distributed, either mirrored or intelligently distributed, or local and updated (see, e.g., assignee's U.S. patent application Ser. No. 10/060,049 (published as US 2002-0162118 A1) and related PCT Application No. PCT/US02/02572 (published as WO 02/062009), each of which is herein incorporated by reference). [0044]
  • The second step needs to be only done once for each piece of content. The watermark can be chosen from a multitude of watermarking methods depending upon the content format, desired robustness, payload size, embedder and detector computational complexity, and perceptibility. [0045]
  • The third step is preferably performed each time the content goes through a transaction. For example, the third step may not have to occur during a download, if the song has limited functionality for evaluation, but should occur when the song is purchased or enabled for longer evaluation. [0046]
  • The third step may involve several sub-steps. For example, the participant ID is extracted from the content. Then, the database is used to link the participant ID to the participant. Next, an appropriate action is enabled. [0047]
  • The appropriate action may include a multitude of actions and related sub-steps. The appropriate action may be crediting an artist or retailer inside a P2P system or related billing system. The participant is paid, either each time content is transacted (e.g., a micro-payment) or as a larger transaction based upon the time from the last payment (e.g., pay every month) or the amount credited (e.g., pay when credit reaches $100). [0048]
  • The appropriate action may include logging the participant ID so that it can be submitted to a collection agency, such as BMI, ASCAP, and SESAC, and used by these agencies to determine how to distribute royalties. A record label, for promotion and demography research, may use the system. Or the system may be used to inter-participant trading value, such as within bartering systems. [0049]
  • Improved Broadcast Monitoring Based upon Reduced Fingerprint Database Size [0050]
  • Background and Summary for Improved Broadcast Monitoring [0051]
  • Content fingerprints, which are methods to identify content based upon the content itself, typically use a database to perform some processing to match incoming fingerprint to fingerprints stored in the database. The larger the database, the more processing required by the database, and the less accurate the system. [0052]
  • Content fingerprinting methods can be used to monitor broadcasts, such as radio and TV. A dilemma is as follows. To monitor more stations, the system may need a large database of songs, which causes the system to be slower and less accurate. However, when monitoring fewer stations, the system is less economically attractive as a business because, once the fingerprinting system is developed and implemented, it is cheaper to monitor more stations as the only added cost is another radio receiver. [0053]
  • The novel solution is, for each station that is being monitored, the system only searches a database for content played on that station, such as songs played on that radio station during a predetermined period (e.g., a week, etc). The radio and TV stations have play lists that can be provided to the monitoring services. [0054]
  • Detailed Description for Improved Broadcast Monitoring [0055]
  • This system is applicable to radio and TV. The detailed example is shown for audio, since these systems have currently shown to be more practical. However, our inventive techniques can be applied to other types of content, such as video as well. (When considering video broadcast monitoring systems, or if audio fingerprinting systems are used to monitor TV stations, a TV play list will replaces a radio station song play list and the system works as described for radio broadcast monitoring.) [0056]
  • FIG. 1 shows a conventional method of identifying songs with fingerprints. Step [0057] 300 calculates the fingerprint for the song or section of the song.
  • [0058] Step 310 compares the calculated fingerprint to the database 350 and finds the closest match. This step may involve some type of distance calculation between the calculated fingerprints (sometimes including sub-fingerprints) and the database entries, which is computationally intensive and increases the likelihood of error as the database becomes larger. Even in fingerprint methods (potentially created in the future) that do not involve distance measurements, a larger database increases the likelihood of error. For example, if the fingerprint ID is erroneous due to background noise or a voice over, it is more likely to match a database ID in a larger database.
  • The third step involves identifying the song once the song's fingerprint is matched in the database. [0059]
  • FIG. 2 shows an inventive method of identifying songs with fingerprints, for systems such as radio monitoring, where a limited play list can be used to limit the database search space. The [0060] first step 300 is identical to the currently used method, where the song's fingerprint is calculated.
  • [0061] Step 330 includes comparing the song's fingerprint to a database (or data repository), which is limited to a play list of the radio station (or equivalent audio service, such as an Internet streaming system). The database used in step 330 is, e.g., preferably a selection of the songs from the radio station play list 340, which is a subset of the complete database 350.
  • The database used in [0062] step 330 may be local to the fingerprinting system, such as located on the same PC as calculating the fingerprint. The local database should be updated as the radio station play list changes. Alternatively, the database may be accessible via a network, such as the internet in a central database, or mirror or intelligently distributed database method. The intelligently distributed database method is an initial step of limiting number of database entries, where, for example, US songs not played in Europe do not exist in the versions of the database in Europe.
  • Wherever the database is located, the database can have only entries for songs included in the play list, or songs in the play list are highlighted as active. The latter means only the active entries are changed when the play list is updated, whereas the former means the database entries for newly added songs have to be added and database entries for songs in the database not included in the new play list have to be deleted. [0063]
  • The play list does not need to include times that the song is played, just a total list of every song played for a period of time, such as that week or month. The play list may have a likelihood or number of times each song is played to help the fingerprint system choose between two close matches. [0064]
  • As such, the [0065] song identification step 320 is now more accurate, and most likely more efficient, since the database used in step 330 is smaller than the database used in step 310.
  • Fair-Use via Watermark Continuity Measurements [0066]
  • Background and Summary for Fair-Use via Watermark Continuity Measurements [0067]
  • United States Copyright law, as well as other copyright laws, such as in Europe and Asia, provide fair use safe harbors. Fair use usually enables certain people to use certain amounts of content without requiring to pay the copyright owner. For example, in the US, a teacher can use a short segment of a movie if certain fair use criteria are met. [0068]
  • In our digital world it is easy to obtain content and hard to determine fair use, so fair use is sometimes ignored. In addition, there are content security systems that are being built that violate fair use. As such, a technical method that enables calculation or determination of fair use is desirable. [0069]
  • One prior technique to provide fair-use is disclosed in U.S. Pat. No. 5,765,152 (Erickson), which is herein incorporated by reference. In one embodiment of the Erickson patent, media content is bundled in a container including minimum permissions (e.g., to allow fair use of the content). The media content can be handled only according to the minimum permissions. [0070]
  • My proposal, in contrast, uses a digital watermark embedded in content that is used to measure contiguous time the content is rendered or viewed. A playing or rendering system uses the measure to determine fair use, and can limit contiguous access to protected content within the system once the fair use limits have been exhausted. [0071]
  • Detailed Description for Fair-Use via Watermark Continuity Measurements [0072]
  • Before content distribution, a watermark is embedded in the content with a payload including a static copy protection bit or bits, a static content ID, and dynamic counter or time reference indicator that can be used to determine the length of content. A rendering system used in locations requiring fair use, such as schools or research institutions, include a watermark detector to measures contiguous time that protected content is played. If the time is too long, or the content is used in a manner failing outside of fair use's boundaries, the rendering system stops working because fair use has been violated. The content ID is used to determine whether the play is contiguous and is not from different segments of protected content. (The protection bits can also be used to signal that the content is protected content. In some implementations, the copy protection bit(s) and the time interval indicator comprise the same payload bits. Of course, in other implementations, the copy protection bit(s) and the time interval indicator are separate payload fields.). [0073]
  • Micro-Payment via Watermark Security Cards [0074]
  • Background and Summary for Micro-Payments [0075]
  • In a secure payment system “Pay by Touch” by Indivos Inc. of Oakland, Calif., payments are made based upon a person's fingerprint (from a person's finger, not to be confused with a song's fingerprint as described above). The system involves a quick sign-up process, which includes the calculation and storage of the person's fingerprint. A checkout procedure involves a customer placing her finger on a touch pad at the checkout and entering a phone number or ZIP code. The reader compares the fingerprint scan to the images on file and calls up the appropriate account number. After the transaction authorization, the customer must also sign the sales slip. [0076]
  • This type of security can alternatively, and preferably, be provided via a secure driver's licenses or security card based upon digital watermarks. The watermarks authenticate the card originality as well as the picture as matching the card data. The debt could be accumulated and submitted every week or when it went above $100. By submitting larger amounts, the retailer can saves money in terms of fixed fees for credit card transactions, as well as being able to negotiate a lower rate due to an increased number of larger transactions. However, the retailer is assuming debt, and this amount can be based upon personal knowledge of the consumer (if legal) and/or past shopping history. [0077]
  • Detailed Description for Micro-Payment Improvements [0078]
  • Two processes are discussed: one for the creation of a customer card and one for the usage of the card at a point of sale. [0079]
  • As shown in FIG. 3, the card creation process receives, in [0080] step 400, personal information from a customer. For example, a retailer can obtain the customer's name, address, phone number, and credit card or bank information. The personal information can be confirmed by a credit card company, as currently done with many currently used systems, such as when ordering on the Internet.
  • [0081] Step 410 includes obtaining the person's picture. The picture can be directly captured (e.g., via a digital camera) or obtained from a photographic repository.
  • [0082] Step 420 includes creating and embedding a digital watermark. A robust watermark to be embedded in the customer picture is preferably based upon the personal information; that is, a digital watermark payload is created and embedded in the picture that somehow links the picture to the information on the card or to information provided by the customer. The payload may include, for example, a 20-bit MD5 hash of the name, address and phone number. The likelihood that these 20 bits are not unique for people who look similar is low enough to provide adequate security. In addition, within the picture or background of the card, a fragile watermark can be added that can identify whether the card is original or a copy.
  • The card is printed in [0083] step 430. Most any printer can be used as most printers usually have minimal effects on watermarks, but the most secure system will include a list of recommended card printers. This list will include printers that most accurately represent the watermarks on the card.
  • As shown in FIG. 4, the card usage process is employed, e.g., in [0084] step 440, where, at a checkout, a card reader authenticates the card. The card reader may be part of a kiosk with a window to place the card, may be a stand alone or tethered hand-held reader, or a device that the card is slid into and pulled out or automatically returned (i.e. a automatic scanner). Typically, the reader will include an optical sensor to capture optical scan data representing the card or a portion of the card (e.g., the picture). A digital watermark decoder analyses the scan data to decode the watermark and obtain the watermark payload.
  • If the reader is part of a kiosk, the kiosk system may also be used to help link the user to previous buying habits and pricing. For example, the user may be able to look up how much they paid for milk a month ago, as well as how much milk they have bought in the last month. In addition, they may be able to look up warranty information for products bought at a store via the kiosk. Similarly, if the store allows online browsing, the kiosk can link to the online shopping. For example, the kiosk can link to a wish created while shopping online. This linking is facilitated, at least in part, by the decoded digital watermark. For example, the payload includes an identifier—perhaps a hash of a customer's personal information—which is used to link to information regarding the customer. (See, e.g., assignee's U.S. patent application Ser. No. 09/571,422, filed May 15, 2000, which is herein incorporated by reference, for additional watermark-based linking techniques.) [0085]
  • Since the ID created from the hash may not be entirely unique and the kiosk system may sometimes need a unique ID for each user, a PIN and/or person's name can be used to guarantee that the ID is unique. Alternatively, a seperate unique ID can be added to the image or background of the card based upon a central registration process during the creation of the card to obtain the unique ID. [0086]
  • In [0087] step 450, a store employee can optionally look at the card and holder to make sure the picture matches the person. Optionally, in addition to or instead of comparing the picture to the person, a PIN (personal identification number) or biometric sample can be entered. The ideal security system involves something you have (i.e. ID card), something you are (e.g., biometric sample like a fingerprint, voice print, retinal scan, etc.), and something you know (e.g., PIN or sequence). The card is something you have. Comparing the picture (or biometric) to the card user is something you are, and requiring a PIN requires something you know. Thus, if both optional steps are included, where each step involves minimal cost, the system is more secure than just requiring a card or fingerprint.
  • In [0088] step 460, the retailer adds the price of the purchase to an account or data record associated with the customer, thus accumulating the customer's debt. The retailer can accumulate debt for a pre-determined amount of time and/or up to a pre-determined amount. The pre-determined amount can be dependent, e.g., upon a customer's past history of shopping at the store, her credit history, or her personal relationship with the retailer (subject, of course, to any applicable laws). Pre-determined amounts can change over time, dependent upon the customer's usage patterns and how quickly she pays the store or her account.
  • As such, the retailer is accumulating risk, balanced by saving expenses by dealing with many small transactions with credit card companies or banks. For example, a user may disappear and cancel a credit card before the retailer bills the credit card—which leaves the retailer out of money. [0089]
  • The pre-determined amounts can work similar to how credit cards increase a credit limit over time. For example, for the first 6 months, the system may submit every week or when an account reaches $50, which ever is first. Then, assuming the person continues spending money and paying their debt, the values can be increased to 10 days and $75, and so on. [0090]
  • At the correct time in [0091] step 470, based upon the previously described rules, the debt is submitted to the credit card company or other financial institution.
  • Alternatively, rather than using a credit card company, the debt could be billed to the user directly, or highlighted for the next time the user arrives for payment (especially if the retailer is part of a user's club or co-op where the user visits regularly). [0092]
  • This system saves the most money for retailers that have repeat customers who spend minimal amounts each visit, such as for a neighborhood market or convenience store, or hardware store. [0093]
  • This system can also be used with an Internet online retailer, since a PC and camera can securely read a watermarked card. In fact, the pre-determined amounts can be updated by ratings of the Internet site from other user if the system involves trading, such as for Web sites like eBay.com. [0094]
  • This system could also use a driver's license, when the driver's license has digital watermarks authenticating the card, instead of a proprietary store card. Similarly, instead of the card, the fingerprint can be used with the described debt accumulation system. The fingerprint can potentially along with the PIN, signature and/or even a security card with a watermark or magnetic strip (for something you have), could be used with the method for accumulating micro-payments. In this system, the fingerprint and signature (if included) are something you are, the PIN (if included) is something you know, and security card (if included) is something you have. Thus, if the optional parts are required, the system has maximum security. [0095]
  • Digimarc MediaBridge Enabled Physical Internet Access Logon Cards [0096]
  • Background and Summary for Access Logon Cards [0097]
  • Many Internet cafés and hotels with wireless networks and/or central Internet-ready PCs use passwords to stop unauthorized people from using an Internet link, as well as to track usage. However, it is easy for users to share the passwords, as well as it is expensive to maintain because the system requires a hotel to change, remember, and provide the current password. [0098]
  • A logon card including a digital watermark embedded therein that can be read by a PC optical camera, can enable Internet access in computers with cameras. One type of watermarking scheme is provided by Digimarc's (Tualatin, Oreg., USA) MediaBridge™ technology. Our logon cards are more secure than passwords since when people share them, a copy is not made. These logon cards are more efficient than passwords because they don't need to be changed since they cannot be duplicated. The logon card can be combined with existing cards, such as with modern plastic hotel room keys (that use a magnetic strip to open the door) or with personal membership cards. This combination reduces cost because several cards don't have to be created and monitored for loss. [0099]
  • Detailed Description for Access Logon Cards [0100]
  • Detailed examples involving a hotel and Internet café are one efficient way to explain this system. [0101]
  • For a hotel with a magnetically coded room keys, if every room key is pre-watermarked with a unique ID, when the key is given to the user and coded for their room, the watermark ID can be linked to the room. Then, if the consumer wants to use a computer in the business center of the hotel, for example, rather than requiring a password, the user shows his/her watermarked room key to the web camera on the PC in the business center, and the computer is unlocked so the consumer can use it. Since the room key is linked to the room, the computer usage can be automatically billed to the user's room. [0102]
  • Similarly, our logon card system can be employed for consumers to use a wireless network—which works as follows. A user shows there watermarked room key to a wireless access terminal. The access terminal captures an image of the room key, decodes the watermark from captured image, check to see if the ID is valid (e.g., ensuring the that user is a current quest at the hotel), and then enables wireless access, if the ID iv valid. (The hotel or affiliated provider can maintain a database of unique ID. IDs can be flagged valid or invalid, or even removed from the database if they have expired.) Thus, consumers with wireless network cards do not need encryption codes that can easily be shared and hard to find at the front desk to use the hotel's wireless network internet connection, they only need a PC with a camera. In turn, the hotel doesn't need to maintain the encryption system. [0103]
  • Once again, the system can automatically bill usage to the user's room since the watermark is linked to the hotel room, even though the consumer can work as they wonder throughout the hotel (e.g., not locked in their room or a hotel business center). [0104]
  • This system can also work for in-room wired networks. Although, the room number can be known in this case due to the physical wire connected to the room, if the hotel is controlling the PCs in its business center and wireless network with the room key, it may be advantageous to have all the systems work identically. In addition, with our logon card system, the rooms can be wired with standard ethernet capabilities, where the physical wires don't have to be linked to a room (and the PC doesn't have to be identified so several people don't share a connection in one room). [0105]
  • In an Internet café example, a logon card given to the consumer when they are ready to use a PC controls login. The logon card is shown to a camera on the PC to log them on, as described for the PCs in the hotel's business center. The usage can be timed on the PC that the consumer is using (as identified by a watermark ID on the logon card), or by a master PC, which determines when the logon card was given to the consumer and when returned (by showing it to the master PC's camera when given and received). With either billing method, even if the consumer shares the logon card, they are still billed since it can identify them. [0106]
  • In addition, if an Internet café wants to have a membership card, where a consumer gets 5 free hours with every 20 hours used, for example, the membership card can be watermarked with a unique ID that is used to log onto the computer and link to the member. The card can also have security measures, if desired, such as fragile watermarks to locate copies and watermarks that link the picture to the personal data (via embedding a 20 bit hash of the user's name, for example). The fragile watermark degrades when a reproduction of the originally watermarked item is made, enabling a watermark reader to differentiate reproductions from an original, watermarked object. [0107]
  • The system level details include that after the card is shown to the PC with the camera, the watermark ID is sent to a database that links the ID to a room number and identifies that the ID is active. If the ID is active, the consumer is allowed to logon, and the appropriate billing action is started. If the ID is not active, the logon is not allowed. They system should be secured by authenticating the card reading software to the database, and encrypting the watermark ID when sent within the PC or network. Session keys should be changed to be resistant to replay attack, as well known in the art of cryptography. [0108]
  • In the Internet café system, which uses a master PC to monitor the amount of time the card is checked-out, the PC that the consumer uses only needs to verify that the watermark ID is active or authentic to enable logon. [0109]
  • See, e.g., assignee's U.S. patent application Ser. Nos. 10/382,359 and 09/571,422, which are each herein incorporated by reference, for related techniques and/or environments. [0110]
  • Surveillance Video Authentication [0111]
  • Background and Summary for Surveillance Video Authentication [0112]
  • Authentication of surveillance video, such as that captured by closed circuit TV (CCTV), is important to verify in court that the surveillance video is authentic. The Digital Signature Standard (DSS), or any digital signature (by definition, including the private key encryption of a robust hash), can be used to authenticate the accuracy of every bit in each frame of surveillance video. The unique combination of private key usage, frame splitting and date-time addition can improve the authentication to guarantee that no frames were removed, that the frames were recorded at the appropriate date and time, and that the appropriate recorder performed the recording. Location information can also be embedded in the video in the form of a digital watermark to improve authentication. [0113]
  • Detailed Description for Surveillance Video Authentication [0114]
  • The DSS, as described in Spec “Federal Information Processing Standard (FIPS 186) Digital Signature Standard (DSS)” available at <http://www.itl.nist.gov/fipspubs/fip186.htm> and uses the secure hash algorithm (SHA-1) as described at <http://www.itl.nist.gov/fipspubs/fip180-1.htm>, or any other digital signature based upon a robust hash and public key cryptography, is used to demonstrate that no bits in each frame have been modified. The signature for each frame is saved as a signature frame in a separate file or part of the video header, with the whole signature saved in the video header or each signature frame saved in each corresponding video frame's header. The system also demonstrates that no frames have been added because the correct signature cannot be calculated. [0115]
  • As an alternative and inventive option, the system can use half of one frame and the other half of the next frame in the signature for each frame. This system demonstrates that every bit of each frame is authentic and that no frames have been added (as before, as well as the fact that no frames have been removed). The additional authentication that no frames have been removed is based on the fact that each frame signature includes bits from itself and another frame; thus, if any frame is removed the previous frame's signature will not match. This system can be designed in many ways, such as using thirds of a frame, the previous frame and the next frame, as long as every bit of each frame is included somewhere in the signature and one frame is not completely included in one signature frame. The signature frames can be saved in a separate file, as part of the video header, or as part of each frame header. [0116]
  • Alternatively, the complete group of signature frames can be encrypted with the private key to make sure no frames are removed. Similarly, the system, for a fixed video, could consider all the frames as one large message, and perform a DSS on the complete message, as long as the message length does not exceed the limit set by the digital signature. [0117]
  • Additionally, the date and time (and/or geo-location associated with the video or area depicted in the video) can be included as part of the frame signature to verify the date and time (and/or location) of the video. The date time (and/or location) can be added to the robust hash calculation (by converting the date time stamp to bits and included as any additional frame bits) or appending the date time stamp to the robust hash payload and then encrypted with the private key. The date time stamp can have frame or second accuracy (or maybe even minute accuracy). [0118]
  • Furthermore, each video recorder can share a system-level private key or have its owner recorder private key. If separate recorder private keys are used, the system can track the machine from which the video was recorded based upon the one-to-one relationship of the decryption public key and encryption private key. More specifically, as well known, if the wrong public key is used, the authentication process will fail; thus, the public key identifies the private key used, which, in turn, identifies the machine. [0119]
  • As discussed in the DSS or well known in the state of art for cryptography and digital signatures, the authentication process includes using the public key to decrypt the digital signature and compare it to the robust hash calculation of the video frame data (and possibly date and time, if included as part of the hash and not a separate part of the payload). If they match, the video frame data is authentic. If the date time stamp is included as an appended part of the robust hash payload, the date time stamp can be read from the digital signature to verify the date and time. [0120]
  • As such, if every additional option is used, every bit of the video is shown to be authentic, meaning that no bits have not been modified, removed or added. In addition, the date and time of the video is known. Finally, the recorder can be identified based upon the public decryption key. [0121]
  • Alternatively, the RSA algorithm, rather than DSA algorithm can be chosen, as described at <http://www.rsasecurity.com/rsalabs/faq/3-4-1.html>, to make the authentication (referred to as verification in the referred web page) process faster than the signing process, but this is probably not advantageous for this system since the signing must be done in real time on the recorder and the authentication can be done offline. [0122]
  • Furthermore, small segments (like 128×128 pixels) of each frame can be used, with some segment overlapping between frames. This has the advantage of demonstrating the location of any manipulation, as well as linking frames together, so frames cannot be removed. The digital signature for each segment within each frame and for each segment started within the frame (and including some of the next or other frame), can be stored in the header of that frame or as a group of frames, and one needs to include a date time stamp. In other words, the frame digital signature consists of many smaller signatures, and includes a date time stamp. [0123]
  • The digital signatures could be included in reversible watermarks within the frame content for each frame segment, rather in header data. A reversible watermark is generally a watermark, which can be removed from content without degrading (or without significantly degrading) the content. In some cases, removing a watermark implies restoring content to its unmarked state. Suitable reversible watermarks are described, e.g., in assignee's pending U.S. patent application Ser. No. 10/319,404, filed Dec. 12, 2002 and Ser. No. 10/435,517, filed May 8, 2003, which are each hereby incorporated by reference. [0124]
  • CONCLUDING REMARKS
  • Having described and illustrated the principles of the technology with reference to specific implementations, it will be recognized that the technology can be implemented in many other, different, forms. [0125]
  • To provide a comprehensive disclosure without unduly lengthening the specification, applicants incorporate by reference the patents and patent applications referenced above. [0126]
  • The methods, processes, and systems described above may be implemented in hardware, software or a combination of hardware and software. For example, the auxiliary data encoding processes may be implemented in a programmable computer or a special purpose digital circuit. Similarly, auxiliary data decoding and fingerprint calculation may be implemented in software, firmware, hardware, or combinations of software, firmware and hardware. The methods and processes described above may be implemented in programs executed from a system's memory (a computer readable medium, such as an electronic, optical or magnetic storage device). [0127]
  • The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated. [0128]

Claims (34)

What is claimed is:
1. A method of steganographically embedding geo-location information in an image captured by a camera associated with cell phone, said method comprises steps of:
determining geo-location information based on attributes associated with a cell phone network; and
steganographically embedding the geo-location information in the image.
2. The method of claim 1, wherein the cell phone network comprises a signal tower, and the attributes are associated with the tower.
3. The method of claim 2, wherein the cell phone communicates a signal, and wherein the attributes comprise strength of the signal as received by the tower and a direction associated with the signal.
4. The method of claim 1, wherein the cell phone network comprises a plurality of towers, and wherein the cell phone communicates a signal, the attributes comprising an evaluation of the signal as received by the plurality of towers.
5. The method of claim 4, wherein the evaluation considers relative reception timing of the signal as received by each of the plurality of towers.
6. The method of claim 4, wherein the evaluation involves triangulation.
7. The method of claim 1, wherein the cell phone comprises a steganographic embedder, and uses the embedder to steganographically embed the geo-location information in the image.
8. The method of claim 1, wherein the cell phone network comprises a steganographic embedder located remotely from the cell phone, and wherein the embedder steganographically embeds the geo-location information in the image.
9. The method of claim 8, further comprising communicating the embedded image to the cell phone.
10. The method of claim 1, wherein the steganographic embedding comprises digital watermarking.
11. A method of steganographically embedding geo-location information in an image captured by a camera which is integrated with cell phone, wherein the cell phone comprises a wireless interface, said method comprises steps of:
communicating with a global positioning system (GPS) receiver, which is remotely located from the cell phone via the wireless interface;
receiving geo-location information from the GPS receiver; and
steganographically embedding the geo-location information in the image.
12. The method of claim 11, wherein the geo-location information and image are communicated to a cell phone network server which includes a steganographic embedder, and wherein the cell phone network server performs said step of steganographically embedding the geo-location information in the image.
13. A method of providing internet access for a computer user comprising:
issuing the user a digitally watermarked object, wherein the digitally watermarked object comprises a digital watermark embedded therein, the digital watermark comprising an identifier;
associating the identifier with the user via a data repository;
receiving optical scan data corresponding to a portion of the object, the portion comprising the digital watermark;
decoding the digital watermark from the scan data to obtain the identifier;
verifying that the identifier is valid; and
enabling internet access for the user when the identifier is valid.
14. The method of claim 13, wherein the object comprises at least one of a hotel room key and an object provided by a hotel.
15. The method of claim 14, further comprising associating a bill for internet access with the user via the identifier.
16. A method of accumulating financial charges attributable to a customer so as to minimize transaction fees, the customer possession a digitally watermarked object, the digitally watermarked object comprising a digital watermark including an identifier, said method comprising:
receiving scan data associated with the digitally watermarked object;
analyzing the scan data to obtain the identifier from the object;
accessing a data record that is associated with the identifier;
updating the data record to reflect a monetary amount owed for a transaction;
accumulating a plurality of such monetary amounts in the data record; and
forwarding the accumulated amounts for payment at least when one of the following occur: a predetermined amount for the accumulated amount is reached, and after a predetermined amount of time.
17. The method of claim 16, wherein the aggregated monetary amounts are forwarded to the customer for payment.
18. The method of claim 16, wherein the aggregated monetary amounts are forwarded to a credit agency for payment.
19. The method of claim 18, wherein the credit agency comprises at least one of a bank and credit card company.
20. The method of claim 16, wherein the identifier comprises information personal to the customer.
21. The method of claim 20, wherein the identifier comprises a hash of the personal information.
22. The method of claim 16, wherein the identifier is combined with information provided by the customer to access the data record that is associated with the identifier.
23. The method of claim 16, wherein the digital watermark further comprises a biometric, and said method comprises comparing a biometric sample of the customer to the biometric carried by the digital watermark.
24. A method to regulate protected content while allowing fair use of the content, wherein the content includes a digital watermark embedded therein, the digital watermark including at least a copy protection indicator and a time interval indicator, said method comprising:
recognizing the content as protected content by reference to the copy protection indicator; and
upon recognition of the content as protected content, measuring the amount of content rendered by reference to the time interval indicator, and disabling rendering after a predetermined amount of content has been rendered, the predetermined amount corresponding to fair use of the content.
25. A method for providing royalty payments for content distributed via a network, said method comprising:
receiving registration information from a participant who requires royalty payments for content to be distributed;
assigning a unique identifier to the participant;
steganographically embedding the content with the identifier; and
associating a royalty payment action with the identifier in a data repository.
26. The method of claim 25, wherein the royalty payment action is initiated when a rendering device decodes the steganographic embedding and obtains the identifier during a transaction, the identifier being provided to the data repository and in response, said method comprises performing the royalty payment action, wherein the transaction exceeds evaluation of the content.
27. The method of claim 26, wherein the network comprises a peer-to-peer file-sharing network.
28. The method of claim 27, wherein the royalty payment action comprises determining a percentage of revenue that corresponds to an amount of times the content undergoes a transaction.
30. A method of monitoring a content item which is to be broadcast through a broadcasting network, the content item to be identified by a fingerprint of the content derived from the content itself, said method comprising:
maintaining a limited list of content items, the list consisting of those content items that are to be broadcast by the broadcasting network during a predetermined time period, the limited list of content items being respectively associated with one or more fingerprints derived from the content items themselves;
deriving a fingerprint from a content item monitored from the broadcast network; and
interrogating the limited list of content items with the fingerprint to identify the monitored content item.
31. A method of authenticating video comprising at least a first frame and a second frame, said method comprising:
determining a time stamp associated with the video; and
providing a digital signature of the video, wherein the digital signature comprises data corresponding to at least a portion of the first frame and data corresponding to at least a portion of the second frame, said digital signature further comprising data corresponding to the time stamp.
32. The method of claim 31, further comprising providing geo-location information associated with the video, wherein the digital signature further comprises data corresponding to the geo-location information.
33. The method of claim 31, wherein the first frame and the second frame are adjacent frames.
34. The method of claim 31, wherein the digital signature is carried via a reversible digital watermark.
35. The method of claim 31, wherein the digital signature is carried via a file header.
US10/622,079 2002-07-16 2003-07-16 Digital watermarking and fingerprinting applications Abandoned US20040091111A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10/622,079 US20040091111A1 (en) 2002-07-16 2003-07-16 Digital watermarking and fingerprinting applications
US11/567,128 US8250660B2 (en) 2002-07-16 2006-12-05 Digital watermarking applications
US13/590,951 US20120317022A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications
US13/590,940 US20120310726A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US39689302P 2002-07-16 2002-07-16
US10/622,079 US20040091111A1 (en) 2002-07-16 2003-07-16 Digital watermarking and fingerprinting applications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/567,128 Division US8250660B2 (en) 2002-07-16 2006-12-05 Digital watermarking applications

Publications (1)

Publication Number Publication Date
US20040091111A1 true US20040091111A1 (en) 2004-05-13

Family

ID=32233282

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/622,079 Abandoned US20040091111A1 (en) 2002-07-16 2003-07-16 Digital watermarking and fingerprinting applications
US11/567,128 Expired - Fee Related US8250660B2 (en) 2002-07-16 2006-12-05 Digital watermarking applications
US13/590,951 Abandoned US20120317022A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications
US13/590,940 Abandoned US20120310726A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications

Family Applications After (3)

Application Number Title Priority Date Filing Date
US11/567,128 Expired - Fee Related US8250660B2 (en) 2002-07-16 2006-12-05 Digital watermarking applications
US13/590,951 Abandoned US20120317022A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications
US13/590,940 Abandoned US20120310726A1 (en) 2002-07-16 2012-08-21 Digital Watermarking Applications

Country Status (1)

Country Link
US (4) US20040091111A1 (en)

Cited By (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040009763A1 (en) * 2002-06-20 2004-01-15 Stone Chris L. Secure tracking system and method for video program content
US20040073916A1 (en) * 2002-10-15 2004-04-15 Verance Corporation Media monitoring, management and information system
US20040125208A1 (en) * 2002-09-30 2004-07-01 Malone Michael F. Forensic communication apparatus and method
US20040153647A1 (en) * 2003-01-31 2004-08-05 Rotholtz Ben Aaron Method and process for transmitting video content
US20040153648A1 (en) * 2003-01-31 2004-08-05 Rotholtz Ben Aaron Method and process for transmitting video content
US20040181531A1 (en) * 2003-03-12 2004-09-16 Clark Becker Speed pass system
US20050177853A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. System and Methodology for Distributed Delivery of Online Content in Response to Client Selections from an Online Catalog
US20050177745A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. Distributed System and Methodology for Delivery of Media Content
US20050177624A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. Distributed System and Methodology for Delivery of Media Content to Clients having Peer-to-peer Connectivity
EP1617671A1 (en) * 2004-07-15 2006-01-18 Siemens Aktiengesellschaft Mobile communication terminal with multimedia data recording and method therefor
US20060106883A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for expiring digital assets based on an assigned expiration date
US20060155754A1 (en) * 2004-12-08 2006-07-13 Steven Lubin Playlist driven automated content transmission and delivery system
US20060171539A1 (en) * 2005-01-24 2006-08-03 Winningstad C N Wireless event authentication system
US20060184960A1 (en) * 2005-02-14 2006-08-17 Universal Music Group, Inc. Method and system for enabling commerce from broadcast content
US20060195205A1 (en) * 2005-02-21 2006-08-31 Sony Corporation Data processing method, portable player and computer
US20070092104A1 (en) * 2005-10-26 2007-04-26 Shinhaeng Lee Content authentication system and method
US20070109449A1 (en) * 2004-02-26 2007-05-17 Mediaguide, Inc. Method and apparatus for automatic detection and identification of unidentified broadcast audio or video signals
US20070110044A1 (en) * 2004-11-17 2007-05-17 Matthew Barnes Systems and Methods for Filtering File System Input and Output
US20070112784A1 (en) * 2004-11-17 2007-05-17 Steven Blumenau Systems and Methods for Simplified Information Archival
US20070130127A1 (en) * 2004-11-17 2007-06-07 Dale Passmore Systems and Methods for Automatically Categorizing Digital Assets
US20070130218A1 (en) * 2004-11-17 2007-06-07 Steven Blumenau Systems and Methods for Roll-Up of Asset Digital Signatures
US20070150517A1 (en) * 2002-09-30 2007-06-28 Myport Technologies, Inc. Apparatus and method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval
US20070168409A1 (en) * 2004-02-26 2007-07-19 Kwan Cheung Method and apparatus for automatic detection and identification of broadcast audio and video signals
US20070208685A1 (en) * 2004-11-17 2007-09-06 Steven Blumenau Systems and Methods for Infinite Information Organization
EP1848148A1 (en) * 2006-04-21 2007-10-24 Vodafone Holding GmbH Method for creating user profiles and method for providing information on objects
US20070266032A1 (en) * 2004-11-17 2007-11-15 Steven Blumenau Systems and Methods for Risk Based Information Management
US20080002854A1 (en) * 2003-10-08 2008-01-03 Verance Corporation Signal continuity assessment using embedded watermarks
WO2008048356A2 (en) * 2006-03-03 2008-04-24 Catcher Holdings, Inc. Device and method for digitally watermarking an image with gps data
US20080147557A1 (en) * 2005-10-03 2008-06-19 Sheehy Dennis G Display based purchase opportunity originating from in-store identification of sound recordings
CN100428259C (en) * 2006-11-02 2008-10-22 华为技术有限公司 Method and system of preventing digital watermark losing in content adapting and digital copyright center
US20080320598A1 (en) * 2003-01-02 2008-12-25 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US20090006337A1 (en) * 2005-12-30 2009-01-01 Mediaguide, Inc. Method and apparatus for automatic detection and identification of unidentified video signals
US7496670B1 (en) * 1997-11-20 2009-02-24 Amdocs (Israel) Ltd. Digital asset monitoring system and method
US20090120694A1 (en) * 2007-11-12 2009-05-14 Suryaprakash Kompalli Associating Auxilliary Data With Digital Ink
US20090125609A1 (en) * 2005-01-07 2009-05-14 Roku, Llc Method, apparatus, system and computer readable medium for providing a universal media interface to control a universal media apparatus
US20090136081A1 (en) * 2007-11-27 2009-05-28 Rajesh Mamidwar Method And System For Utilizing GPS Information To Secure Digital Media
US20090174779A1 (en) * 2005-01-24 2009-07-09 Moderator Systems, Inc. Wireless even authentication system
US20090208000A1 (en) * 2008-02-19 2009-08-20 Fujitsu Limited Signature management method and signature management device
US20100332339A1 (en) * 2009-06-30 2010-12-30 Ebay Inc. System and method for location based mobile commerce
US20110069229A1 (en) * 2009-07-24 2011-03-24 Lord John D Audio/video methods and systems
US7941379B1 (en) * 2009-06-25 2011-05-10 Symantec Corporation Systems and methods for using geo-location information in sensitive internet transactions
US8005258B2 (en) 2005-04-26 2011-08-23 Verance Corporation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US8144944B2 (en) 2007-08-14 2012-03-27 Olympus Corporation Image sharing system and method
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US8280103B2 (en) 2005-04-26 2012-10-02 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US8340348B2 (en) 2005-04-26 2012-12-25 Verance Corporation Methods and apparatus for thwarting watermark detection circumvention
US8451086B2 (en) 2000-02-16 2013-05-28 Verance Corporation Remote control signaling using audio watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8549307B2 (en) 2005-07-01 2013-10-01 Verance Corporation Forensic marking using a common customization function
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
EP2708267A1 (en) * 2008-11-25 2014-03-19 Fox Factory, Inc. Methods and apparatus for virtual competition
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8745404B2 (en) 1998-05-28 2014-06-03 Verance Corporation Pre-processed information embedding system
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US8806215B2 (en) 2007-12-07 2014-08-12 Broadcom Corporation Method and system for robust watermark insertion and extraction for digital set-top boxes
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
US20140281557A1 (en) * 2013-03-14 2014-09-18 Motorola Mobility Llc Digital rights tagging system and method
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US8879735B2 (en) 2012-01-20 2014-11-04 Digimarc Corporation Shared secret arrangements and optical data transfer
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US9008315B2 (en) 2012-01-20 2015-04-14 Digimarc Corporation Shared secret arrangements and optical data transfer
US20150205877A1 (en) * 2005-12-21 2015-07-23 Digimarc Corporation Rules driven pan id metadata routing system and network
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US20160088367A1 (en) * 2014-09-19 2016-03-24 Institute For Information Industry Program event detection method, apparatus, and program data transmission system
US9300678B1 (en) * 2015-08-03 2016-03-29 Truepic Llc Systems and methods for authenticating photographic image data
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9330427B2 (en) 2010-11-04 2016-05-03 Digimarc Corporation Smartphone-based methods and systems
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9557162B2 (en) 2009-10-28 2017-01-31 Digimarc Corporation Sensor-based mobile search, related methods and systems
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
CN107004247A (en) * 2014-12-18 2017-08-01 诺基亚技术有限公司 For the method and apparatus for the position watermark video for issuing all rights are reserved
US10361866B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
US10360668B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Methods for requesting and authenticating photographic image data
US10375050B2 (en) 2017-10-10 2019-08-06 Truepic Inc. Methods for authenticating photographic image data
US10472013B2 (en) 2008-11-25 2019-11-12 Fox Factory, Inc. Seat post
US10515231B2 (en) * 2013-11-08 2019-12-24 Symcor Inc. Method of obfuscating relationships between data in database tables
US10546585B2 (en) 2017-12-29 2020-01-28 Comcast Cable Communications, Llc Localizing and verifying utterances by audio fingerprinting
US10550909B2 (en) 2008-08-25 2020-02-04 Fox Factory, Inc. Methods and apparatus for suspension lock out and signal generation
US10591015B2 (en) 2009-03-19 2020-03-17 Fox Factory, Inc. Methods and apparatus for suspension adjustment
US10670106B2 (en) 2009-01-07 2020-06-02 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10677309B2 (en) 2011-05-31 2020-06-09 Fox Factory, Inc. Methods and apparatus for position sensitive suspension damping
US10721066B2 (en) 2002-09-30 2020-07-21 Myport Ip, Inc. Method for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval
US10723409B2 (en) 2009-01-07 2020-07-28 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10742340B2 (en) 2005-10-26 2020-08-11 Cortica Ltd. System and method for identifying the context of multimedia content elements displayed in a web-page and providing contextual filters respective thereto
US10748038B1 (en) 2019-03-31 2020-08-18 Cortica Ltd. Efficient calculation of a robust signature of a media unit
US10759247B2 (en) 2011-09-12 2020-09-01 Fox Factory, Inc. Methods and apparatus for suspension set up
US10781879B2 (en) 2009-01-07 2020-09-22 Fox Factory, Inc. Bypass for a suspension damper
US10789535B2 (en) 2018-11-26 2020-09-29 Cartica Ai Ltd Detection of road elements
US20200334672A1 (en) * 2010-04-08 2020-10-22 The Western Union Company Money transfer smart phone methods and systems
US10839694B2 (en) 2018-10-18 2020-11-17 Cartica Ai Ltd Blind spot alert
US10846544B2 (en) 2018-07-16 2020-11-24 Cartica Ai Ltd. Transportation prediction system and method
US10843753B2 (en) 2010-07-02 2020-11-24 Fox Factory, Inc. Lever assembly for positive lock adjustable seat post
US10848590B2 (en) 2005-10-26 2020-11-24 Cortica Ltd System and method for determining a contextual insight and providing recommendations based thereon
US10859133B2 (en) 2012-05-10 2020-12-08 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10902049B2 (en) 2005-10-26 2021-01-26 Cortica Ltd System and method for assigning multimedia content elements to users
US20210049036A1 (en) * 2019-08-13 2021-02-18 Facebook Technologies, Llc Capability Space
US10930289B2 (en) 2011-04-04 2021-02-23 Digimarc Corporation Context-based smartphone sensor logic
US10949773B2 (en) 2005-10-26 2021-03-16 Cortica, Ltd. System and methods thereof for recommending tags for multimedia content elements based on context
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing
US11019161B2 (en) 2005-10-26 2021-05-25 Cortica, Ltd. System and method for profiling users interest based on multimedia content analysis
US11029685B2 (en) 2018-10-18 2021-06-08 Cartica Ai Ltd. Autonomous risk assessment for fallen cargo
US11032017B2 (en) 2005-10-26 2021-06-08 Cortica, Ltd. System and method for identifying the context of multimedia content elements
US11037284B1 (en) 2020-01-14 2021-06-15 Truepic Inc. Systems and methods for detecting image recapture
US11037015B2 (en) 2015-12-15 2021-06-15 Cortica Ltd. Identification of key points in multimedia data elements
US11049094B2 (en) 2014-02-11 2021-06-29 Digimarc Corporation Methods and arrangements for device to device communication
US11061933B2 (en) 2005-10-26 2021-07-13 Cortica Ltd. System and method for contextually enriching a concept database
US11126869B2 (en) 2018-10-26 2021-09-21 Cartica Ai Ltd. Tracking after objects
US11132548B2 (en) 2019-03-20 2021-09-28 Cortica Ltd. Determining object information that does not explicitly appear in a media unit signature
US11170647B2 (en) 2019-02-07 2021-11-09 Cartica Ai Ltd. Detection of vacant parking spaces
US11168758B2 (en) 2009-01-07 2021-11-09 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11173765B2 (en) 2009-01-07 2021-11-16 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11195043B2 (en) 2015-12-15 2021-12-07 Cortica, Ltd. System and method for determining common patterns in multimedia content elements based on key points
US11216498B2 (en) 2005-10-26 2022-01-04 Cortica, Ltd. System and method for generating signatures to three-dimensional multimedia data elements
US11279199B2 (en) 2012-01-25 2022-03-22 Fox Factory, Inc. Suspension damper with by-pass valves
US11279198B2 (en) 2009-10-13 2022-03-22 Fox Factory, Inc. Methods and apparatus for controlling a fluid damper
US11285963B2 (en) 2019-03-10 2022-03-29 Cartica Ai Ltd. Driver-based prediction of dangerous events
US11299233B2 (en) 2009-01-07 2022-04-12 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11306798B2 (en) 2008-05-09 2022-04-19 Fox Factory, Inc. Position sensitive suspension damping with an active valve
US11361014B2 (en) 2005-10-26 2022-06-14 Cortica Ltd. System and method for completing a user profile
US11386139B2 (en) 2005-10-26 2022-07-12 Cortica Ltd. System and method for generating analytics for entities depicted in multimedia content
US11392738B2 (en) 2018-10-26 2022-07-19 Autobrains Technologies Ltd Generating a simulation scenario
US11403336B2 (en) 2005-10-26 2022-08-02 Cortica Ltd. System and method for removing contextually identical multimedia content elements
US11413924B2 (en) 2009-03-19 2022-08-16 Fox Factory, Inc. Methods and apparatus for selective spring pre-load adjustment
US11449584B1 (en) 2019-03-28 2022-09-20 Amazon Technologies, Inc. Generating authenticable digital content
US11472252B2 (en) 2016-04-08 2022-10-18 Fox Factory, Inc. Electronic compression and rebound control
US11499601B2 (en) 2009-01-07 2022-11-15 Fox Factory, Inc. Remotely operated bypass for a suspension damper
US11519477B2 (en) 2009-01-07 2022-12-06 Fox Factory, Inc. Compression isolator for a suspension damper
US11537636B2 (en) 2007-08-21 2022-12-27 Cortica, Ltd. System and method for using multimedia content as search queries
US11590988B2 (en) 2020-03-19 2023-02-28 Autobrains Technologies Ltd Predictive turning assistant
US11593662B2 (en) 2019-12-12 2023-02-28 Autobrains Technologies Ltd Unsupervised cluster generation
US11604847B2 (en) 2005-10-26 2023-03-14 Cortica Ltd. System and method for overlaying content on a multimedia content element based on user interest
US11613261B2 (en) 2018-09-05 2023-03-28 Autobrains Technologies Ltd Generating a database and alerting about improperly driven vehicles
US11619278B2 (en) 2009-03-19 2023-04-04 Fox Factory, Inc. Methods and apparatus for suspension adjustment
US11620327B2 (en) 2005-10-26 2023-04-04 Cortica Ltd System and method for determining a contextual insight and generating an interface with recommendations based thereon
US11643005B2 (en) 2019-02-27 2023-05-09 Autobrains Technologies Ltd Adjusting adjustable headlights of a vehicle
US11694088B2 (en) 2019-03-13 2023-07-04 Cortica Ltd. Method for object detection using knowledge distillation
US11704292B2 (en) 2019-09-26 2023-07-18 Cortica Ltd. System and method for enriching a concept database
US11708878B2 (en) 2010-01-20 2023-07-25 Fox Factory, Inc. Remotely operated bypass for a suspension damper
US11727056B2 (en) 2019-03-31 2023-08-15 Cortica, Ltd. Object detection based on shallow neural network that processes input images
US11741687B2 (en) 2019-03-31 2023-08-29 Cortica Ltd. Configuring spanning elements of a signature generator
US11758004B2 (en) 2005-10-26 2023-09-12 Cortica Ltd. System and method for providing recommendations based on user profiles
US11760387B2 (en) 2017-07-05 2023-09-19 AutoBrains Technologies Ltd. Driving policies determination
US11770260B1 (en) * 2019-03-28 2023-09-26 Amazon Technologies, Inc. Determining authenticity of digital content
US11827215B2 (en) 2020-03-31 2023-11-28 AutoBrains Technologies Ltd. Method for training a driving related object detector
US11859690B2 (en) 2009-10-13 2024-01-02 Fox Factory, Inc. Suspension system
US11899707B2 (en) 2017-07-09 2024-02-13 Cortica Ltd. Driving policies determination
US11908242B2 (en) 2019-03-31 2024-02-20 Cortica Ltd. Efficient calculation of a robust signature of a media unit
US11904863B2 (en) 2018-10-26 2024-02-20 AutoBrains Technologies Ltd. Passing a curve
US11920655B2 (en) 2020-06-16 2024-03-05 Fox Factory, Inc. Methods and apparatus for suspension adjustment

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7720924B2 (en) * 2003-12-12 2010-05-18 Syniverse Icx Corporation System providing methodology for the restoration of original media quality in messaging environments
WO2005069186A1 (en) * 2003-12-29 2005-07-28 United States Postal Service Methods and systems for providing secondary address information
US20070162761A1 (en) 2005-12-23 2007-07-12 Davis Bruce L Methods and Systems to Help Detect Identity Fraud
EP2040469A4 (en) * 2006-06-19 2009-09-30 Panasonic Corp Information burying device and detecting devie
US9654447B2 (en) 2006-08-29 2017-05-16 Digimarc Corporation Customized handling of copied content based on owner-specified similarity thresholds
US8707459B2 (en) 2007-01-19 2014-04-22 Digimarc Corporation Determination of originality of content
US8738749B2 (en) 2006-08-29 2014-05-27 Digimarc Corporation Content monitoring and host compliance evaluation
US8407220B2 (en) * 2006-09-28 2013-03-26 Augme Technologies, Inc. Apparatuses, methods and systems for ambiguous code-triggered information querying and serving on mobile devices
US9179200B2 (en) 2007-03-14 2015-11-03 Digimarc Corporation Method and system for determining content treatment
US10242415B2 (en) 2006-12-20 2019-03-26 Digimarc Corporation Method and system for determining content treatment
US8904184B2 (en) * 2008-12-10 2014-12-02 At&T Intellectual Property I, Lp Certification of authenticity of media signals
US8479009B2 (en) * 2010-09-17 2013-07-02 International Business Machines Corporation Wearable time-bracketed video authentication
US9965756B2 (en) 2013-02-26 2018-05-08 Digimarc Corporation Methods and arrangements for smartphone payments
US9402099B2 (en) * 2011-10-14 2016-07-26 Digimarc Corporation Arrangements employing content identification and/or distribution identification data
CN103368736B (en) * 2012-04-06 2016-04-20 汉王科技股份有限公司 Business information encryption, decryption method and device
WO2014056185A1 (en) * 2012-10-12 2014-04-17 Empire Technology Development Llc Notarization based on currency transactions
US9830588B2 (en) * 2013-02-26 2017-11-28 Digimarc Corporation Methods and arrangements for smartphone payments
US9589124B2 (en) 2014-05-29 2017-03-07 Comcast Cable Communications, Llc Steganographic access controls
US10045092B2 (en) 2015-10-16 2018-08-07 Disney Enterprises, Inc. Device-resident content protection
EP3301673A1 (en) * 2016-09-30 2018-04-04 Nxp B.V. Audio communication method and apparatus
JP6953865B2 (en) * 2017-07-28 2021-10-27 富士フイルムビジネスイノベーション株式会社 Information processing system
CN111212262B (en) * 2019-12-05 2021-02-12 任子行网络技术股份有限公司 Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar

Citations (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3742463A (en) * 1970-03-02 1973-06-26 Nielsen A C Co Data storage and transmission system
US3810156A (en) * 1970-06-15 1974-05-07 R Goldman Signal identification system
US4071698A (en) * 1977-01-10 1978-01-31 Franklin V. Barger, Jr. Telephone system for audio demonstration and marketing of goods or services
US4432096A (en) * 1975-08-16 1984-02-14 U.S. Philips Corporation Arrangement for recognizing sounds
US4450531A (en) * 1982-09-10 1984-05-22 Ensco, Inc. Broadcast signal recognition system and method
US4495526A (en) * 1981-10-28 1985-01-22 Societe Scome-France Method and apparatus for identifying sound recordings
US4499601A (en) * 1982-10-18 1985-02-12 Matthews Gordon H Method and apparatus for automatically detecting and playing desired audio segments over a broadcast receiver.
US4511917A (en) * 1981-10-20 1985-04-16 Hans Olof Kohler Determining agreement between an analysis signal and at least one reference signal
US4639779A (en) * 1983-03-21 1987-01-27 Greenberg Burton L Method and apparatus for the automatic identification and verification of television broadcast programs
US4677466A (en) * 1985-07-29 1987-06-30 A. C. Nielsen Company Broadcast program identification method and apparatus
US4739398A (en) * 1986-05-02 1988-04-19 Control Data Corporation Method, apparatus and system for recognizing broadcast segments
US4805020A (en) * 1983-03-21 1989-02-14 Greenberg Burton L Television program transmission verification method and apparatus
US4807031A (en) * 1987-10-20 1989-02-21 Interactive Systems, Incorporated Interactive video method and apparatus
US4843562A (en) * 1987-06-24 1989-06-27 Broadcast Data Systems Limited Partnership Broadcast information classification system and method
US4918730A (en) * 1987-06-24 1990-04-17 Media Control-Musik-Medien-Analysen Gesellschaft Mit Beschrankter Haftung Process and circuit arrangement for the automatic recognition of signal sequences
US4931871A (en) * 1988-06-14 1990-06-05 Kramer Robert A Method of and system for identification and verification of broadcasted program segments
US5019899A (en) * 1988-11-01 1991-05-28 Control Data Corporation Electronic data encoding and recognition system
US5200822A (en) * 1991-04-23 1993-04-06 National Broadcasting Company, Inc. Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast programs
US5210820A (en) * 1990-05-02 1993-05-11 Broadcast Data Systems Limited Partnership Signal recognition system and method
US5214792A (en) * 1989-09-27 1993-05-25 Alwadish David J Broadcasting system with supplemental data transmission and storge
US5276629A (en) * 1990-06-21 1994-01-04 Reynolds Software, Inc. Method and apparatus for wave analysis and event recognition
US5303393A (en) * 1990-11-06 1994-04-12 Radio Satellite Corporation Integrated radio satellite response system and method
US5410598A (en) * 1986-10-14 1995-04-25 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5481294A (en) * 1993-10-27 1996-01-02 A. C. Nielsen Company Audience measurement system utilizing ancillary codes and passive signatures
US5485518A (en) * 1993-09-30 1996-01-16 Yellowstone Environmental Science, Inc. Electronic media program recognition and choice
US5486686A (en) * 1990-05-30 1996-01-23 Xerox Corporation Hardcopy lossless data storage and communications for electronic document processing systems
US5491838A (en) * 1993-04-08 1996-02-13 Digital D.J. Inc. Broadcast system with associated data capabilities
US5504518A (en) * 1992-04-30 1996-04-02 The Arbitron Company Method and system for recognition of broadcast segments
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5708478A (en) * 1996-06-26 1998-01-13 Sun Microsystems, Inc. Computer system for enabling radio listeners/television watchers to obtain advertising information
US5721827A (en) * 1996-10-02 1998-02-24 James Logan System for electrically distributing personalized information
US5732216A (en) * 1996-10-02 1998-03-24 Internet Angles, Inc. Audio message exchange system
US5737025A (en) * 1995-02-28 1998-04-07 Nielsen Media Research, Inc. Co-channel transmission of program signals and ancillary signals
US5740244A (en) * 1993-04-09 1998-04-14 Washington University Method and apparatus for improved fingerprinting and authenticating various magnetic media
US5751854A (en) * 1992-08-03 1998-05-12 Ricoh Company, Ltd. Original-discrimination system for discriminating special document, and image forming apparatus, image processing apparatus and duplicator using the original-discrimination system
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5875249A (en) * 1997-01-08 1999-02-23 International Business Machines Corporation Invisible image watermark for image verification
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5893095A (en) * 1996-03-29 1999-04-06 Virage, Inc. Similarity engine for content-based retrieval of images
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5892536A (en) * 1996-10-03 1999-04-06 Personal Audio Systems and methods for computer enhanced broadcast monitoring
US5901224A (en) * 1996-10-21 1999-05-04 Xerox Corporation Quasi-reprographics with variable embedded data with applications to copyright management, and distribution control
US5903892A (en) * 1996-05-24 1999-05-11 Magnifi, Inc. Indexing of media content on a network
US5902353A (en) * 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US5905248A (en) * 1990-09-11 1999-05-18 Metrologic Instruments, Inc. System and method for carrying out information-related transactions using web documents embodying transaction enabling applets automatically launched and executed in response to reading URL-encoded symbols pointing thereto
US5905800A (en) * 1996-01-17 1999-05-18 The Dice Company Method and system for digital watermarking
US6021432A (en) * 1994-10-31 2000-02-01 Lucent Technologies Inc. System for processing broadcast stream comprises a human-perceptible broadcast program embedded with a plurality of human-imperceptible sets of information
US6028960A (en) * 1996-09-20 2000-02-22 Lucent Technologies Inc. Face feature analysis for automatic lipreading and character animation
US6031464A (en) * 1996-05-08 2000-02-29 Tsutomu Matsumoto Security system based on certification
US6058430A (en) * 1996-04-19 2000-05-02 Kaplan; Kenneth B. Vertical blanking interval encoding of internet addresses for integrated television/internet devices
US6061719A (en) * 1997-11-06 2000-05-09 Lucent Technologies Inc. Synchronized presentation of television programming and web content
US6169541B1 (en) * 1998-05-28 2001-01-02 International Business Machines Corporation Method, apparatus and system for integrating television signals with internet access
US6181817B1 (en) * 1997-11-17 2001-01-30 Cornell Research Foundation, Inc. Method and system for comparing data objects using joint histograms
US6182018B1 (en) * 1998-08-25 2001-01-30 Ford Global Technologies, Inc. Method and apparatus for identifying sound in a composite sound signal
US6185318B1 (en) * 1997-08-22 2001-02-06 International Business Machines Corporation System and method for matching (fingerprint) images an aligned string-based representation
US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
US6199076B1 (en) * 1996-10-02 2001-03-06 James Logan Audio program player including a dynamic program selection controller
US6199048B1 (en) * 1995-06-20 2001-03-06 Neomedia Technologies, Inc. System and method for automatic access of a remote computer over a network
US6201879B1 (en) * 1996-02-09 2001-03-13 Massachusetts Institute Of Technology Method and apparatus for logo hiding in images
US6219793B1 (en) * 1996-09-11 2001-04-17 Hush, Inc. Method of using fingerprints to authenticate wireless communications
US6219787B1 (en) * 1997-12-22 2001-04-17 Texas Instruments Incorporated Method and apparatus for extending security model to native code
US6226672B1 (en) * 1997-05-02 2001-05-01 Sony Corporation Method and system for allowing users to access and/or share media libraries, including multimedia collections of audio and video information via a wide area network
US20020010826A1 (en) * 2000-07-14 2002-01-24 Victor Company Of Japan, Ltd. Digital memory card and apparatus for reproducing data therefrom
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US20020021805A1 (en) * 1999-01-06 2002-02-21 Schumann Robert Wilhelm Digital content distribution system and method
US20020021822A1 (en) * 2000-06-29 2002-02-21 Kurato Maeno Image transmission device and storage medium with program for realizing its function, image display device and storage medium with program for realizing its function, and image transmission/reception system
US20020023020A1 (en) * 1999-09-21 2002-02-21 Kenyon Stephen C. Audio identification system and method
US20020023148A1 (en) * 1999-04-21 2002-02-21 Airclic, Inc. Method for managing printed medium activated revenue sharing domain name system schemas
US20020023218A1 (en) * 2000-08-15 2002-02-21 Lawandy Nabil M. Method and apparatus for reading digital watermarks with a hand-held reader device
US20020028000A1 (en) * 1999-05-19 2002-03-07 Conwell William Y. Content identifiers triggering corresponding responses through collaborative processing
US20020032864A1 (en) * 1999-05-19 2002-03-14 Rhoads Geoffrey B. Content identifiers triggering corresponding responses
US20020032698A1 (en) * 2000-09-14 2002-03-14 Cox Ingemar J. Identifying works for initiating a work-based action, such as an action on the internet
US20020040433A1 (en) * 2000-05-19 2002-04-04 Tetsujiro Kondo Communication apparatus, communication method, and recording medium used therewith
US20020052885A1 (en) * 2000-05-02 2002-05-02 Levy Kenneth L. Using embedded data with file sharing
US6386453B1 (en) * 1996-11-25 2002-05-14 Metrologic Instruments, Inc. System and method for carrying out information-related transactions
US6389055B1 (en) * 1998-03-30 2002-05-14 Lucent Technologies, Inc. Integrating digital data with perceptible signals
US20020059580A1 (en) * 2000-07-21 2002-05-16 Kalker Antonius Adrianus Cornelis Maria Content monitoring
US6397334B1 (en) * 1998-12-17 2002-05-28 International Business Machines Corporation Method and system for authenticating objects and object data
US6505160B1 (en) * 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US6523175B1 (en) * 1999-08-02 2003-02-18 Nielsen Media Research, Inc. Methods and apparatus for identifying the source of a user selected signal via an intermediate frequency probe
US6522769B1 (en) * 1999-05-19 2003-02-18 Digimarc Corporation Reconfiguring a watermark detector
US20030037010A1 (en) * 2001-04-05 2003-02-20 Audible Magic, Inc. Copyright detection and protection system and method
US6526449B1 (en) * 1998-09-11 2003-02-25 Digital Convergence Corporation Method and apparatus for controlling a computer from a remote location
US6542933B1 (en) * 1999-04-05 2003-04-01 Neomedia Technologies, Inc. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US6542927B2 (en) * 1995-07-27 2003-04-01 Digimarc Corporation Linking of computers based on steganographically embedded digital data
US6546113B1 (en) * 1999-03-02 2003-04-08 Leitch Technology International Inc. Method and apparatus for video watermarking
US6553129B1 (en) * 1995-07-27 2003-04-22 Digimarc Corporation Computer system linked by using information in data objects
US6674876B1 (en) * 2000-09-14 2004-01-06 Digimarc Corporation Watermarking in the time-frequency domain
US20040078575A1 (en) * 2002-01-29 2004-04-22 Morten Glenn A. Method and system for end to end securing of content for video on demand
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US20050043018A1 (en) * 1997-07-29 2005-02-24 Sony Corporation Information processing apparatus and method, information processing system, and transmission medium
US20060101269A1 (en) * 1996-07-02 2006-05-11 Wistaria Trading, Inc. Method and system for digital watermarking
US7047413B2 (en) * 2001-04-23 2006-05-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US20070028113A1 (en) * 1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions
US7346472B1 (en) * 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals

Family Cites Families (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
DE3851724T2 (en) 1987-07-08 1995-05-04 Matsushita Electric Ind Co Ltd Method and device for protecting copy signals.
GB8809346D0 (en) 1988-04-20 1988-05-25 Emi Plc Thorn Improvements relating to marked recorded signals
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US6408082B1 (en) 1996-04-25 2002-06-18 Digimarc Corporation Watermark detection using a fourier mellin transform
US6614914B1 (en) 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US6449377B1 (en) 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US5832119C1 (en) 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US5841886A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6882738B2 (en) 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US5612943A (en) 1994-07-05 1997-03-18 Moses; Robert W. System for carrying transparent digital data within an audio signal
US6560349B1 (en) 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
SE504085C2 (en) 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
FR2732532B1 (en) 1995-03-29 1997-06-20 Lahmi Paul David SECURE PROCESS FOR REPRODUCING SENSITIVE DOCUMENTS
US6738495B2 (en) 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US20090097695A9 (en) * 1995-05-08 2009-04-16 Rhoads Geoffrey B Personal document authentication system using watermarking
US6590996B1 (en) 2000-02-14 2003-07-08 Digimarc Corporation Color adaptive watermarking
US6760463B2 (en) 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7095871B2 (en) 1995-07-27 2006-08-22 Digimarc Corporation Digital asset management and linking media signals with related data using watermarks
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US7047241B1 (en) 1995-10-13 2006-05-16 Digimarc Corporation System and methods for managing digital creative works
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5991876A (en) 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system
US6307949B1 (en) 1996-05-07 2001-10-23 Digimarc Corporation Methods for optimizing watermark detection
US7107451B2 (en) 1996-07-02 2006-09-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US6463416B1 (en) * 1996-07-15 2002-10-08 Intelli-Check, Inc. Authentication system for identification documents
US20020120925A1 (en) * 2000-03-28 2002-08-29 Logan James D. Audio and video program recording, editing and playback systems using metadata
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5825892A (en) 1996-10-28 1998-10-20 International Business Machines Corporation Protecting images with an image watermark
US6233684B1 (en) 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6266419B1 (en) 1997-07-03 2001-07-24 At&T Corp. Custom character-coding compression for encoding and watermarking media content
US6611599B2 (en) * 1997-09-29 2003-08-26 Hewlett-Packard Development Company, L.P. Watermarking of digital object
ATE222040T1 (en) 1997-10-08 2002-08-15 Macrovision Corp METHOD AND APPARATUS FOR INSERTING A ONE-TIME COPY WATERMARK FOR VIDEO RECORDING
US5949055A (en) 1997-10-23 1999-09-07 Xerox Corporation Automatic geometric image transformations using embedded signals
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6173271B1 (en) * 1997-11-26 2001-01-09 California Institute Of Technology Television advertising automated billing system
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6411392B1 (en) 1998-04-15 2002-06-25 Massachusetts Institute Of Technology Method and apparatus for data hiding in printed images
US7372976B2 (en) 1998-04-16 2008-05-13 Digimarc Corporation Content indexing and searching using content identifiers and associated metadata
US6233347B1 (en) 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators
JP3156667B2 (en) 1998-06-01 2001-04-16 日本電気株式会社 Digital watermark insertion system, digital watermark characteristic table creation device
US6332194B1 (en) 1998-06-05 2001-12-18 Signafy, Inc. Method for data preparation and watermark insertion
JP3925584B2 (en) 1998-06-09 2007-06-06 ソニー株式会社 Replication generation management method and recording / reproducing system
US6154571A (en) 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6611812B2 (en) * 1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs
US6868497B1 (en) 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
US6920567B1 (en) 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US8271336B2 (en) * 1999-11-22 2012-09-18 Accenture Global Services Gmbh Increased visibility during order management in a network-based supply chain environment
US20040044627A1 (en) * 1999-11-30 2004-03-04 Russell David C. Methods, systems and apparatuses for secure transactions
US7426750B2 (en) * 2000-02-18 2008-09-16 Verimatrix, Inc. Network-based content distribution system
CA2299946A1 (en) 2000-03-03 2001-09-03 Destiny Software Productions Inc. Digital media distribution method and system
US7127744B2 (en) 2000-03-10 2006-10-24 Digimarc Corporation Method and apparatus to protect media existing in an insecure format
AU4434801A (en) * 2000-04-05 2001-10-15 Sony United Kingdom Limited Electronic media distribution
CA2305249A1 (en) * 2000-04-14 2001-10-14 Branko Sarcanin Virtual safe
US20010047515A1 (en) * 2000-05-26 2001-11-29 Freeplay Music, Inc. System and method for accessing authorized recordings
EP1287474B1 (en) 2000-06-05 2016-02-03 Sealedmedia Limited Digital rights management
US20020092019A1 (en) * 2000-09-08 2002-07-11 Dwight Marcus Method and apparatus for creation, distribution, assembly and verification of media
GB2366969A (en) 2000-09-14 2002-03-20 Phocis Ltd Copyright protection for digital content distributed over a network
FR2816153B1 (en) 2000-10-27 2002-12-20 Canon Kk METHOD FOR PRE-CHECKING THE DETECTABILITY OF A MARKING SIGNAL
US20020077988A1 (en) * 2000-12-19 2002-06-20 Sasaki Gary D. Distributing digital content
US20020105665A1 (en) * 2001-02-08 2002-08-08 Eastman Kodak Company Method of interating imaging products/services with non-imaging products/services in a single kiosk
US20020112243A1 (en) * 2001-02-12 2002-08-15 World Theatre Video distribution system
US7200575B2 (en) * 2001-02-27 2007-04-03 Hewlett-Packard Development Company, L.P. Managing access to digital content
US20020128917A1 (en) * 2001-03-06 2002-09-12 Electronic Data Systems Corporation Method and apparatus for processing financial transactions
US7805338B2 (en) * 2001-03-26 2010-09-28 Usa Technologies, Inc. Method of constructing a digital content play list for transmission and presentation on a public access electronic terminal
US7440922B1 (en) * 2001-05-04 2008-10-21 West Corporation System, method, and business method for settling micropayment transactions to a pre-paid instrument
US7565353B2 (en) * 2001-05-21 2009-07-21 Mudalla Technology, Inc. Trusted transactional internet kiosk
US8275709B2 (en) * 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US8099364B2 (en) * 2001-05-31 2012-01-17 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
AU2002364080A1 (en) * 2001-12-20 2003-07-09 Arcama Limited Partners Global sales by referral network
US20030135434A1 (en) * 2002-01-14 2003-07-17 Ravi Jain System and method for micro-payments
US7130444B2 (en) 2002-11-12 2006-10-31 Eastman Kodak Company Method of authenication for steganographic signals undergoing degradations
WO2004072790A2 (en) 2003-02-07 2004-08-26 Warner Bros. Entertainment Inc. System and method for the assertion and identification of rights information in an analog video signal
GB2404489A (en) 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3742463A (en) * 1970-03-02 1973-06-26 Nielsen A C Co Data storage and transmission system
US3810156A (en) * 1970-06-15 1974-05-07 R Goldman Signal identification system
US4432096A (en) * 1975-08-16 1984-02-14 U.S. Philips Corporation Arrangement for recognizing sounds
US4071698A (en) * 1977-01-10 1978-01-31 Franklin V. Barger, Jr. Telephone system for audio demonstration and marketing of goods or services
US4511917A (en) * 1981-10-20 1985-04-16 Hans Olof Kohler Determining agreement between an analysis signal and at least one reference signal
US4495526A (en) * 1981-10-28 1985-01-22 Societe Scome-France Method and apparatus for identifying sound recordings
US4450531A (en) * 1982-09-10 1984-05-22 Ensco, Inc. Broadcast signal recognition system and method
US4499601A (en) * 1982-10-18 1985-02-12 Matthews Gordon H Method and apparatus for automatically detecting and playing desired audio segments over a broadcast receiver.
US4639779A (en) * 1983-03-21 1987-01-27 Greenberg Burton L Method and apparatus for the automatic identification and verification of television broadcast programs
US4805020A (en) * 1983-03-21 1989-02-14 Greenberg Burton L Television program transmission verification method and apparatus
US4677466A (en) * 1985-07-29 1987-06-30 A. C. Nielsen Company Broadcast program identification method and apparatus
US4739398A (en) * 1986-05-02 1988-04-19 Control Data Corporation Method, apparatus and system for recognizing broadcast segments
US5410598A (en) * 1986-10-14 1995-04-25 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4843562A (en) * 1987-06-24 1989-06-27 Broadcast Data Systems Limited Partnership Broadcast information classification system and method
US4918730A (en) * 1987-06-24 1990-04-17 Media Control-Musik-Medien-Analysen Gesellschaft Mit Beschrankter Haftung Process and circuit arrangement for the automatic recognition of signal sequences
US4807031A (en) * 1987-10-20 1989-02-21 Interactive Systems, Incorporated Interactive video method and apparatus
US4931871A (en) * 1988-06-14 1990-06-05 Kramer Robert A Method of and system for identification and verification of broadcasted program segments
US5019899A (en) * 1988-11-01 1991-05-28 Control Data Corporation Electronic data encoding and recognition system
US5214792A (en) * 1989-09-27 1993-05-25 Alwadish David J Broadcasting system with supplemental data transmission and storge
US5210820A (en) * 1990-05-02 1993-05-11 Broadcast Data Systems Limited Partnership Signal recognition system and method
US5486686A (en) * 1990-05-30 1996-01-23 Xerox Corporation Hardcopy lossless data storage and communications for electronic document processing systems
US5400261A (en) * 1990-06-21 1995-03-21 Reynolds Software, Inc. Method and apparatus for wave analysis and event recognition
US5276629A (en) * 1990-06-21 1994-01-04 Reynolds Software, Inc. Method and apparatus for wave analysis and event recognition
US5905248A (en) * 1990-09-11 1999-05-18 Metrologic Instruments, Inc. System and method for carrying out information-related transactions using web documents embodying transaction enabling applets automatically launched and executed in response to reading URL-encoded symbols pointing thereto
US5303393A (en) * 1990-11-06 1994-04-12 Radio Satellite Corporation Integrated radio satellite response system and method
US5200822A (en) * 1991-04-23 1993-04-06 National Broadcasting Company, Inc. Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast programs
US5504518A (en) * 1992-04-30 1996-04-02 The Arbitron Company Method and system for recognition of broadcast segments
US5612729A (en) * 1992-04-30 1997-03-18 The Arbitron Company Method and system for producing a signature characterizing an audio broadcast signal
US5621454A (en) * 1992-04-30 1997-04-15 The Arbitron Company Method and system for recognition of broadcast segments
US5751854A (en) * 1992-08-03 1998-05-12 Ricoh Company, Ltd. Original-discrimination system for discriminating special document, and image forming apparatus, image processing apparatus and duplicator using the original-discrimination system
US5491838A (en) * 1993-04-08 1996-02-13 Digital D.J. Inc. Broadcast system with associated data capabilities
US5740244A (en) * 1993-04-09 1998-04-14 Washington University Method and apparatus for improved fingerprinting and authenticating various magnetic media
US5485518A (en) * 1993-09-30 1996-01-16 Yellowstone Environmental Science, Inc. Electronic media program recognition and choice
US5481294A (en) * 1993-10-27 1996-01-02 A. C. Nielsen Company Audience measurement system utilizing ancillary codes and passive signatures
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6021432A (en) * 1994-10-31 2000-02-01 Lucent Technologies Inc. System for processing broadcast stream comprises a human-perceptible broadcast program embedded with a plurality of human-imperceptible sets of information
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
US5737025A (en) * 1995-02-28 1998-04-07 Nielsen Media Research, Inc. Co-channel transmission of program signals and ancillary signals
US6199048B1 (en) * 1995-06-20 2001-03-06 Neomedia Technologies, Inc. System and method for automatic access of a remote computer over a network
US6553129B1 (en) * 1995-07-27 2003-04-22 Digimarc Corporation Computer system linked by using information in data objects
US6542927B2 (en) * 1995-07-27 2003-04-01 Digimarc Corporation Linking of computers based on steganographically embedded digital data
US6505160B1 (en) * 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US5905800A (en) * 1996-01-17 1999-05-18 The Dice Company Method and system for digital watermarking
US6201879B1 (en) * 1996-02-09 2001-03-13 Massachusetts Institute Of Technology Method and apparatus for logo hiding in images
US5893095A (en) * 1996-03-29 1999-04-06 Virage, Inc. Similarity engine for content-based retrieval of images
US6058430A (en) * 1996-04-19 2000-05-02 Kaplan; Kenneth B. Vertical blanking interval encoding of internet addresses for integrated television/internet devices
US6031464A (en) * 1996-05-08 2000-02-29 Tsutomu Matsumoto Security system based on certification
US5903892A (en) * 1996-05-24 1999-05-11 Magnifi, Inc. Indexing of media content on a network
US5708478A (en) * 1996-06-26 1998-01-13 Sun Microsystems, Inc. Computer system for enabling radio listeners/television watchers to obtain advertising information
US20060101269A1 (en) * 1996-07-02 2006-05-11 Wistaria Trading, Inc. Method and system for digital watermarking
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6219793B1 (en) * 1996-09-11 2001-04-17 Hush, Inc. Method of using fingerprints to authenticate wireless communications
US6028960A (en) * 1996-09-20 2000-02-22 Lucent Technologies Inc. Face feature analysis for automatic lipreading and character animation
US5902353A (en) * 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US6199076B1 (en) * 1996-10-02 2001-03-06 James Logan Audio program player including a dynamic program selection controller
US5732216A (en) * 1996-10-02 1998-03-24 Internet Angles, Inc. Audio message exchange system
US5721827A (en) * 1996-10-02 1998-02-24 James Logan System for electrically distributing personalized information
US5892536A (en) * 1996-10-03 1999-04-06 Personal Audio Systems and methods for computer enhanced broadcast monitoring
US5901224A (en) * 1996-10-21 1999-05-04 Xerox Corporation Quasi-reprographics with variable embedded data with applications to copyright management, and distribution control
US6386453B1 (en) * 1996-11-25 2002-05-14 Metrologic Instruments, Inc. System and method for carrying out information-related transactions
US5875249A (en) * 1997-01-08 1999-02-23 International Business Machines Corporation Invisible image watermark for image verification
US6226672B1 (en) * 1997-05-02 2001-05-01 Sony Corporation Method and system for allowing users to access and/or share media libraries, including multimedia collections of audio and video information via a wide area network
US20050043018A1 (en) * 1997-07-29 2005-02-24 Sony Corporation Information processing apparatus and method, information processing system, and transmission medium
US6185318B1 (en) * 1997-08-22 2001-02-06 International Business Machines Corporation System and method for matching (fingerprint) images an aligned string-based representation
US6061719A (en) * 1997-11-06 2000-05-09 Lucent Technologies Inc. Synchronized presentation of television programming and web content
US6181817B1 (en) * 1997-11-17 2001-01-30 Cornell Research Foundation, Inc. Method and system for comparing data objects using joint histograms
US6219787B1 (en) * 1997-12-22 2001-04-17 Texas Instruments Incorporated Method and apparatus for extending security model to native code
US6389055B1 (en) * 1998-03-30 2002-05-14 Lucent Technologies, Inc. Integrating digital data with perceptible signals
US6169541B1 (en) * 1998-05-28 2001-01-02 International Business Machines Corporation Method, apparatus and system for integrating television signals with internet access
US6182018B1 (en) * 1998-08-25 2001-01-30 Ford Global Technologies, Inc. Method and apparatus for identifying sound in a composite sound signal
US6526449B1 (en) * 1998-09-11 2003-02-25 Digital Convergence Corporation Method and apparatus for controlling a computer from a remote location
US6397334B1 (en) * 1998-12-17 2002-05-28 International Business Machines Corporation Method and system for authenticating objects and object data
US20020021805A1 (en) * 1999-01-06 2002-02-21 Schumann Robert Wilhelm Digital content distribution system and method
US7162642B2 (en) * 1999-01-06 2007-01-09 Digital Video Express, L.P. Digital content distribution system and method
US6546113B1 (en) * 1999-03-02 2003-04-08 Leitch Technology International Inc. Method and apparatus for video watermarking
US6542933B1 (en) * 1999-04-05 2003-04-01 Neomedia Technologies, Inc. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US20020023148A1 (en) * 1999-04-21 2002-02-21 Airclic, Inc. Method for managing printed medium activated revenue sharing domain name system schemas
US20020028000A1 (en) * 1999-05-19 2002-03-07 Conwell William Y. Content identifiers triggering corresponding responses through collaborative processing
US6522769B1 (en) * 1999-05-19 2003-02-18 Digimarc Corporation Reconfiguring a watermark detector
US20020032864A1 (en) * 1999-05-19 2002-03-14 Rhoads Geoffrey B. Content identifiers triggering corresponding responses
US6523175B1 (en) * 1999-08-02 2003-02-18 Nielsen Media Research, Inc. Methods and apparatus for identifying the source of a user selected signal via an intermediate frequency probe
US20020023020A1 (en) * 1999-09-21 2002-02-21 Kenyon Stephen C. Audio identification system and method
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US20070028113A1 (en) * 1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions
US20020052885A1 (en) * 2000-05-02 2002-05-02 Levy Kenneth L. Using embedded data with file sharing
US20020040433A1 (en) * 2000-05-19 2002-04-04 Tetsujiro Kondo Communication apparatus, communication method, and recording medium used therewith
US20020021822A1 (en) * 2000-06-29 2002-02-21 Kurato Maeno Image transmission device and storage medium with program for realizing its function, image display device and storage medium with program for realizing its function, and image transmission/reception system
US20020010826A1 (en) * 2000-07-14 2002-01-24 Victor Company Of Japan, Ltd. Digital memory card and apparatus for reproducing data therefrom
US20020059580A1 (en) * 2000-07-21 2002-05-16 Kalker Antonius Adrianus Cornelis Maria Content monitoring
US20020023218A1 (en) * 2000-08-15 2002-02-21 Lawandy Nabil M. Method and apparatus for reading digital watermarks with a hand-held reader device
US7346472B1 (en) * 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US6674876B1 (en) * 2000-09-14 2004-01-06 Digimarc Corporation Watermarking in the time-frequency domain
US20020032698A1 (en) * 2000-09-14 2002-03-14 Cox Ingemar J. Identifying works for initiating a work-based action, such as an action on the internet
US20030037010A1 (en) * 2001-04-05 2003-02-20 Audible Magic, Inc. Copyright detection and protection system and method
US7047413B2 (en) * 2001-04-23 2006-05-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US20040078575A1 (en) * 2002-01-29 2004-04-22 Morten Glenn A. Method and system for end to end securing of content for video on demand

Cited By (284)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7496670B1 (en) * 1997-11-20 2009-02-24 Amdocs (Israel) Ltd. Digital asset monitoring system and method
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US8745404B2 (en) 1998-05-28 2014-06-03 Verance Corporation Pre-processed information embedding system
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US8451086B2 (en) 2000-02-16 2013-05-28 Verance Corporation Remote control signaling using audio watermarks
US8791789B2 (en) 2000-02-16 2014-07-29 Verance Corporation Remote control signaling using audio watermarks
US8601504B2 (en) 2002-06-20 2013-12-03 Verance Corporation Secure tracking system and method for video program content
US20040009763A1 (en) * 2002-06-20 2004-01-15 Stone Chris L. Secure tracking system and method for video program content
US10237067B2 (en) 2002-09-30 2019-03-19 Myport Technologies, Inc. Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval
US8687841B2 (en) 2002-09-30 2014-04-01 Myport Technologies, Inc. Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval
US6996251B2 (en) 2002-09-30 2006-02-07 Myport Technologies, Inc. Forensic communication apparatus and method
US9159113B2 (en) 2002-09-30 2015-10-13 Myport Technologies, Inc. Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
US7778438B2 (en) 2002-09-30 2010-08-17 Myport Technologies, Inc. Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval
US9070193B2 (en) 2002-09-30 2015-06-30 Myport Technologies, Inc. Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval
US20040125208A1 (en) * 2002-09-30 2004-07-01 Malone Michael F. Forensic communication apparatus and method
US8068638B2 (en) 2002-09-30 2011-11-29 Myport Technologies, Inc. Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval
US8983119B2 (en) 2002-09-30 2015-03-17 Myport Technologies, Inc. Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval
US9589309B2 (en) 2002-09-30 2017-03-07 Myport Technologies, Inc. Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
US20060115111A1 (en) * 2002-09-30 2006-06-01 Malone Michael F Apparatus for capturing information as a file and enhancing the file with embedded information
US8135169B2 (en) 2002-09-30 2012-03-13 Myport Technologies, Inc. Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval
US8509477B2 (en) 2002-09-30 2013-08-13 Myport Technologies, Inc. Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval
US9832017B2 (en) 2002-09-30 2017-11-28 Myport Ip, Inc. Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval
US9922391B2 (en) 2002-09-30 2018-03-20 Myport Technologies, Inc. System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval
US7184573B2 (en) 2002-09-30 2007-02-27 Myport Technologies, Inc. Apparatus for capturing information as a file and enhancing the file with embedded information
US7778440B2 (en) 2002-09-30 2010-08-17 Myport Technologies, Inc. Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval
US10721066B2 (en) 2002-09-30 2020-07-21 Myport Ip, Inc. Method for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval
US20070150517A1 (en) * 2002-09-30 2007-06-28 Myport Technologies, Inc. Apparatus and method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval
US8806517B2 (en) 2002-10-15 2014-08-12 Verance Corporation Media monitoring, management and information system
US9648282B2 (en) 2002-10-15 2017-05-09 Verance Corporation Media monitoring, management and information system
US7788684B2 (en) 2002-10-15 2010-08-31 Verance Corporation Media monitoring, management and information system
US20040073916A1 (en) * 2002-10-15 2004-04-15 Verance Corporation Media monitoring, management and information system
US20080320598A1 (en) * 2003-01-02 2008-12-25 Yaacov Ben-Yaacov Method and system for tracking and managing rights for digital music
US20040153647A1 (en) * 2003-01-31 2004-08-05 Rotholtz Ben Aaron Method and process for transmitting video content
US7302057B2 (en) * 2003-01-31 2007-11-27 Realnetworks, Inc. Method and process for transmitting video content
US20040153648A1 (en) * 2003-01-31 2004-08-05 Rotholtz Ben Aaron Method and process for transmitting video content
US20040181531A1 (en) * 2003-03-12 2004-09-16 Clark Becker Speed pass system
US20080002854A1 (en) * 2003-10-08 2008-01-03 Verance Corporation Signal continuity assessment using embedded watermarks
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US20110231867A1 (en) * 2004-02-11 2011-09-22 Alio, Inc. System and methodology for distributed delivery of online content in response to client selections from an online catalog
US20050177745A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. Distributed System and Methodology for Delivery of Media Content
US20050177624A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. Distributed System and Methodology for Delivery of Media Content to Clients having Peer-to-peer Connectivity
US20050177853A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. System and Methodology for Distributed Delivery of Online Content in Response to Client Selections from an Online Catalog
US8229751B2 (en) * 2004-02-26 2012-07-24 Mediaguide, Inc. Method and apparatus for automatic detection and identification of unidentified Broadcast audio or video signals
US20070109449A1 (en) * 2004-02-26 2007-05-17 Mediaguide, Inc. Method and apparatus for automatic detection and identification of unidentified broadcast audio or video signals
US9430472B2 (en) 2004-02-26 2016-08-30 Mobile Research Labs, Ltd. Method and system for automatic detection of content
US20070168409A1 (en) * 2004-02-26 2007-07-19 Kwan Cheung Method and apparatus for automatic detection and identification of broadcast audio and video signals
US8468183B2 (en) 2004-02-26 2013-06-18 Mobile Research Labs Ltd. Method and apparatus for automatic detection and identification of broadcast audio and video signals
EP1617671A1 (en) * 2004-07-15 2006-01-18 Siemens Aktiengesellschaft Mobile communication terminal with multimedia data recording and method therefor
US7814062B2 (en) 2004-11-17 2010-10-12 Iron Mountain Incorporated Systems and methods for expiring digital assets based on an assigned expiration date
US20060106884A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for storing meta-data separate from a digital asset
US20060106883A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for expiring digital assets based on an assigned expiration date
US20070110044A1 (en) * 2004-11-17 2007-05-17 Matthew Barnes Systems and Methods for Filtering File System Input and Output
US20070208685A1 (en) * 2004-11-17 2007-09-06 Steven Blumenau Systems and Methods for Infinite Information Organization
US7617251B2 (en) 2004-11-17 2009-11-10 Iron Mountain Incorporated Systems and methods for freezing the state of digital assets for litigation purposes
US7680801B2 (en) 2004-11-17 2010-03-16 Iron Mountain, Incorporated Systems and methods for storing meta-data separate from a digital asset
US7716191B2 (en) 2004-11-17 2010-05-11 Iron Mountain Incorporated Systems and methods for unioning different taxonomy tags for a digital asset
US7756842B2 (en) 2004-11-17 2010-07-13 Iron Mountain Incorporated Systems and methods for tracking replication of digital assets
US8429131B2 (en) 2004-11-17 2013-04-23 Autonomy, Inc. Systems and methods for preventing digital asset restoration
US20060106834A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for freezing the state of digital assets for litigation purposes
US20060106814A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for unioning different taxonomy tags for a digital asset
US7792757B2 (en) 2004-11-17 2010-09-07 Iron Mountain Incorporated Systems and methods for risk based information management
US20070130127A1 (en) * 2004-11-17 2007-06-07 Dale Passmore Systems and Methods for Automatically Categorizing Digital Assets
US7809699B2 (en) 2004-11-17 2010-10-05 Iron Mountain Incorporated Systems and methods for automatically categorizing digital assets
US20060106885A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for tracking replication of digital assets
US20060106811A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for providing categorization based authorization of digital assets
US20070112784A1 (en) * 2004-11-17 2007-05-17 Steven Blumenau Systems and Methods for Simplified Information Archival
US20070130218A1 (en) * 2004-11-17 2007-06-07 Steven Blumenau Systems and Methods for Roll-Up of Asset Digital Signatures
US20060106754A1 (en) * 2004-11-17 2006-05-18 Steven Blumenau Systems and methods for preventing digital asset restoration
US7958148B2 (en) 2004-11-17 2011-06-07 Iron Mountain Incorporated Systems and methods for filtering file system input and output
US20070266032A1 (en) * 2004-11-17 2007-11-15 Steven Blumenau Systems and Methods for Risk Based Information Management
US20060155754A1 (en) * 2004-12-08 2006-07-13 Steven Lubin Playlist driven automated content transmission and delivery system
US20090125609A1 (en) * 2005-01-07 2009-05-14 Roku, Llc Method, apparatus, system and computer readable medium for providing a universal media interface to control a universal media apparatus
US7894519B2 (en) * 2005-01-24 2011-02-22 Moderator Systems, Inc. Wireless event authentication system
US7483485B2 (en) * 2005-01-24 2009-01-27 Moderator Systems, Inc. Wireless event authentication system
US20060171539A1 (en) * 2005-01-24 2006-08-03 Winningstad C N Wireless event authentication system
US20090174779A1 (en) * 2005-01-24 2009-07-09 Moderator Systems, Inc. Wireless even authentication system
US20060184960A1 (en) * 2005-02-14 2006-08-17 Universal Music Group, Inc. Method and system for enabling commerce from broadcast content
US20060195205A1 (en) * 2005-02-21 2006-08-31 Sony Corporation Data processing method, portable player and computer
US7809677B2 (en) * 2005-02-21 2010-10-05 Sony Corporation Data processing method, portable player and computer
US8005258B2 (en) 2005-04-26 2011-08-23 Verance Corporation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US8340348B2 (en) 2005-04-26 2012-12-25 Verance Corporation Methods and apparatus for thwarting watermark detection circumvention
US8280103B2 (en) 2005-04-26 2012-10-02 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US8811655B2 (en) 2005-04-26 2014-08-19 Verance Corporation Circumvention of watermark analysis in a host content
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US8538066B2 (en) 2005-04-26 2013-09-17 Verance Corporation Asymmetric watermark embedding/extraction
US8549307B2 (en) 2005-07-01 2013-10-01 Verance Corporation Forensic marking using a common customization function
US9009482B2 (en) 2005-07-01 2015-04-14 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US20080147557A1 (en) * 2005-10-03 2008-06-19 Sheehy Dennis G Display based purchase opportunity originating from in-store identification of sound recordings
US11604847B2 (en) 2005-10-26 2023-03-14 Cortica Ltd. System and method for overlaying content on a multimedia content element based on user interest
US11657079B2 (en) 2005-10-26 2023-05-23 Cortica Ltd. System and method for identifying social trends
US10949773B2 (en) 2005-10-26 2021-03-16 Cortica, Ltd. System and methods thereof for recommending tags for multimedia content elements based on context
US11620327B2 (en) 2005-10-26 2023-04-04 Cortica Ltd System and method for determining a contextual insight and generating an interface with recommendations based thereon
US11238066B2 (en) 2005-10-26 2022-02-01 Cortica Ltd. Generating personalized clusters of multimedia content elements based on user interests
US10902049B2 (en) 2005-10-26 2021-01-26 Cortica Ltd System and method for assigning multimedia content elements to users
US10848590B2 (en) 2005-10-26 2020-11-24 Cortica Ltd System and method for determining a contextual insight and providing recommendations based thereon
US11922293B2 (en) 2005-10-26 2024-03-05 Cortica Ltd. Computing device, a system and a method for parallel processing of data streams
US11216498B2 (en) 2005-10-26 2022-01-04 Cortica, Ltd. System and method for generating signatures to three-dimensional multimedia data elements
US20070092104A1 (en) * 2005-10-26 2007-04-26 Shinhaeng Lee Content authentication system and method
US11361014B2 (en) 2005-10-26 2022-06-14 Cortica Ltd. System and method for completing a user profile
US10742340B2 (en) 2005-10-26 2020-08-11 Cortica Ltd. System and method for identifying the context of multimedia content elements displayed in a web-page and providing contextual filters respective thereto
US11758004B2 (en) 2005-10-26 2023-09-12 Cortica Ltd. System and method for providing recommendations based on user profiles
US11019161B2 (en) 2005-10-26 2021-05-25 Cortica, Ltd. System and method for profiling users interest based on multimedia content analysis
US11032017B2 (en) 2005-10-26 2021-06-08 Cortica, Ltd. System and method for identifying the context of multimedia content elements
US11386139B2 (en) 2005-10-26 2022-07-12 Cortica Ltd. System and method for generating analytics for entities depicted in multimedia content
WO2007050792A1 (en) * 2005-10-26 2007-05-03 Olympus Corporation Content authentication system and method
US11403336B2 (en) 2005-10-26 2022-08-02 Cortica Ltd. System and method for removing contextually identical multimedia content elements
US11061933B2 (en) 2005-10-26 2021-07-13 Cortica Ltd. System and method for contextually enriching a concept database
US20080263041A1 (en) * 2005-11-14 2008-10-23 Mediaguide, Inc. Method and Apparatus for Automatic Detection and Identification of Unidentified Broadcast Audio or Video Signals
US10685061B2 (en) 2005-12-21 2020-06-16 Digimarc Corporation Content metadata directory services
US10191996B2 (en) * 2005-12-21 2019-01-29 Digimarc Corporation Rules driven pan ID metadata routing system and network
US20150205877A1 (en) * 2005-12-21 2015-07-23 Digimarc Corporation Rules driven pan id metadata routing system and network
US20090006337A1 (en) * 2005-12-30 2009-01-01 Mediaguide, Inc. Method and apparatus for automatic detection and identification of unidentified video signals
WO2008048356A3 (en) * 2006-03-03 2009-04-16 Catcher Holdings Inc Device and method for digitally watermarking an image with gps data
WO2008048356A2 (en) * 2006-03-03 2008-04-24 Catcher Holdings, Inc. Device and method for digitally watermarking an image with gps data
EP1848148A1 (en) * 2006-04-21 2007-10-24 Vodafone Holding GmbH Method for creating user profiles and method for providing information on objects
CN100428259C (en) * 2006-11-02 2008-10-22 华为技术有限公司 Method and system of preventing digital watermark losing in content adapting and digital copyright center
US8144944B2 (en) 2007-08-14 2012-03-27 Olympus Corporation Image sharing system and method
US11537636B2 (en) 2007-08-21 2022-12-27 Cortica, Ltd. System and method for using multimedia content as search queries
US20090120694A1 (en) * 2007-11-12 2009-05-14 Suryaprakash Kompalli Associating Auxilliary Data With Digital Ink
US8681129B2 (en) 2007-11-12 2014-03-25 Hewlett-Packard Development Company, L.P. Associating auxiliary data with digital ink
US8270664B2 (en) 2007-11-27 2012-09-18 Broadcom Corporation Method and system for utilizing GPS information to secure digital media
US20090136081A1 (en) * 2007-11-27 2009-05-28 Rajesh Mamidwar Method And System For Utilizing GPS Information To Secure Digital Media
US8705791B2 (en) 2007-11-27 2014-04-22 Broadcom Corporation Method and system for utilizing GPS information to secure digital media
EP2066129A1 (en) * 2007-11-27 2009-06-03 Broadcom Corporation Method and system for utilizing GPS information to secure digital media
US8806215B2 (en) 2007-12-07 2014-08-12 Broadcom Corporation Method and system for robust watermark insertion and extraction for digital set-top boxes
US8909921B2 (en) * 2008-02-19 2014-12-09 Fujitsu Limited Signature management method and signature management device
US20090208000A1 (en) * 2008-02-19 2009-08-20 Fujitsu Limited Signature management method and signature management device
US11306798B2 (en) 2008-05-09 2022-04-19 Fox Factory, Inc. Position sensitive suspension damping with an active valve
US8681978B2 (en) 2008-06-24 2014-03-25 Verance Corporation Efficient and secure forensic marking in compressed domain
US8346567B2 (en) 2008-06-24 2013-01-01 Verance Corporation Efficient and secure forensic marking in compressed domain
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US11162555B2 (en) 2008-08-25 2021-11-02 Fox Factory, Inc. Methods and apparatus for suspension lock out and signal generation
US10550909B2 (en) 2008-08-25 2020-02-04 Fox Factory, Inc. Methods and apparatus for suspension lock out and signal generation
US11875887B2 (en) 2008-11-25 2024-01-16 Fox Factory, Inc. Methods and apparatus for virtual competition
US10029172B2 (en) 2008-11-25 2018-07-24 Fox Factory, Inc. Methods and apparatus for virtual competition
US11021204B2 (en) 2008-11-25 2021-06-01 Fox Factory, Inc. Seat post
US10537790B2 (en) 2008-11-25 2020-01-21 Fox Factory, Inc. Methods and apparatus for virtual competition
US10472013B2 (en) 2008-11-25 2019-11-12 Fox Factory, Inc. Seat post
US11043294B2 (en) 2008-11-25 2021-06-22 Fox Factoory, Inc. Methods and apparatus for virtual competition
US11257582B2 (en) 2008-11-25 2022-02-22 Fox Factory, Inc. Methods and apparatus for virtual competition
US11897571B2 (en) 2008-11-25 2024-02-13 Fox Factory, Inc. Seat post
EP2708267A1 (en) * 2008-11-25 2014-03-19 Fox Factory, Inc. Methods and apparatus for virtual competition
US11869651B2 (en) 2008-11-25 2024-01-09 Fox Factory, Inc. Methods and apparatus for virtual competition
US10723409B2 (en) 2009-01-07 2020-07-28 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11519477B2 (en) 2009-01-07 2022-12-06 Fox Factory, Inc. Compression isolator for a suspension damper
US11890908B2 (en) 2009-01-07 2024-02-06 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11549565B2 (en) 2009-01-07 2023-01-10 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11408482B2 (en) 2009-01-07 2022-08-09 Fox Factory, Inc. Bypass for a suspension damper
US11168758B2 (en) 2009-01-07 2021-11-09 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10670106B2 (en) 2009-01-07 2020-06-02 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11794543B2 (en) 2009-01-07 2023-10-24 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11866120B2 (en) 2009-01-07 2024-01-09 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10781879B2 (en) 2009-01-07 2020-09-22 Fox Factory, Inc. Bypass for a suspension damper
US11173765B2 (en) 2009-01-07 2021-11-16 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11299233B2 (en) 2009-01-07 2022-04-12 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11499601B2 (en) 2009-01-07 2022-11-15 Fox Factory, Inc. Remotely operated bypass for a suspension damper
US11660924B2 (en) 2009-01-07 2023-05-30 Fox Factory, Inc. Method and apparatus for an adjustable damper
US11655873B2 (en) 2009-03-19 2023-05-23 Fox Factory, Inc. Methods and apparatus for suspension adjustment
US11619278B2 (en) 2009-03-19 2023-04-04 Fox Factory, Inc. Methods and apparatus for suspension adjustment
US11413924B2 (en) 2009-03-19 2022-08-16 Fox Factory, Inc. Methods and apparatus for selective spring pre-load adjustment
US10591015B2 (en) 2009-03-19 2020-03-17 Fox Factory, Inc. Methods and apparatus for suspension adjustment
US7941379B1 (en) * 2009-06-25 2011-05-10 Symantec Corporation Systems and methods for using geo-location information in sensitive internet transactions
US8886569B2 (en) * 2009-06-30 2014-11-11 Ebay Inc. System and method for location based mobile commerce
US20100332339A1 (en) * 2009-06-30 2010-12-30 Ebay Inc. System and method for location based mobile commerce
US9940969B2 (en) 2009-07-24 2018-04-10 Digimarc Corporation Audio/video methods and systems
CN102473172A (en) * 2009-07-24 2012-05-23 数字标记公司 Improved audio/video methods and systems
US20110069229A1 (en) * 2009-07-24 2011-03-24 Lord John D Audio/video methods and systems
EP2457181A1 (en) * 2009-07-24 2012-05-30 Digimarc Corporation Improved audio/video methods and systems
EP2457181A4 (en) * 2009-07-24 2013-01-23 Digimarc Corp Improved audio/video methods and systems
US8773589B2 (en) 2009-07-24 2014-07-08 Digimarc Corporation Audio/video methods and systems
US11279198B2 (en) 2009-10-13 2022-03-22 Fox Factory, Inc. Methods and apparatus for controlling a fluid damper
US11859690B2 (en) 2009-10-13 2024-01-02 Fox Factory, Inc. Suspension system
US9557162B2 (en) 2009-10-28 2017-01-31 Digimarc Corporation Sensor-based mobile search, related methods and systems
US11708878B2 (en) 2010-01-20 2023-07-25 Fox Factory, Inc. Remotely operated bypass for a suspension damper
US20200334672A1 (en) * 2010-04-08 2020-10-22 The Western Union Company Money transfer smart phone methods and systems
US11847638B2 (en) * 2010-04-08 2023-12-19 The Western Union Company Money transfer smart phone methods and systems
US10843753B2 (en) 2010-07-02 2020-11-24 Fox Factory, Inc. Lever assembly for positive lock adjustable seat post
US11866110B2 (en) 2010-07-02 2024-01-09 Fox Factory, Inc. Lever assembly for positive lock adjustable seat post
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
US9330427B2 (en) 2010-11-04 2016-05-03 Digimarc Corporation Smartphone-based methods and systems
US10930289B2 (en) 2011-04-04 2021-02-23 Digimarc Corporation Context-based smartphone sensor logic
US11796028B2 (en) 2011-05-31 2023-10-24 Fox Factory, Inc. Methods and apparatus for position sensitive suspension damping
US10677309B2 (en) 2011-05-31 2020-06-09 Fox Factory, Inc. Methods and apparatus for position sensitive suspension damping
US10759247B2 (en) 2011-09-12 2020-09-01 Fox Factory, Inc. Methods and apparatus for suspension set up
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9847976B2 (en) 2012-01-20 2017-12-19 Digimarc Corporation Shared secret arrangements and optical data transfer
US8879735B2 (en) 2012-01-20 2014-11-04 Digimarc Corporation Shared secret arrangements and optical data transfer
US9008315B2 (en) 2012-01-20 2015-04-14 Digimarc Corporation Shared secret arrangements and optical data transfer
US11279199B2 (en) 2012-01-25 2022-03-22 Fox Factory, Inc. Suspension damper with by-pass valves
US11760150B2 (en) 2012-01-25 2023-09-19 Fox Factory, Inc. Suspension damper with by-pass valves
US11629774B2 (en) 2012-05-10 2023-04-18 Fox Factory, Inc. Method and apparatus for an adjustable damper
US10859133B2 (en) 2012-05-10 2020-12-08 Fox Factory, Inc. Method and apparatus for an adjustable damper
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US20140281557A1 (en) * 2013-03-14 2014-09-18 Motorola Mobility Llc Digital rights tagging system and method
US9294451B2 (en) * 2013-03-14 2016-03-22 Google Technology Holdings LLC Digital rights tagging system and method
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US10515231B2 (en) * 2013-11-08 2019-12-24 Symcor Inc. Method of obfuscating relationships between data in database tables
US11049094B2 (en) 2014-02-11 2021-06-29 Digimarc Corporation Methods and arrangements for device to device communication
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US20160088367A1 (en) * 2014-09-19 2016-03-24 Institute For Information Industry Program event detection method, apparatus, and program data transmission system
CN107004247A (en) * 2014-12-18 2017-08-01 诺基亚技术有限公司 For the method and apparatus for the position watermark video for issuing all rights are reserved
US10607312B2 (en) 2014-12-18 2020-03-31 Nokia Technologies Oy Method and apparatus for publishing locational copyrighted watermarking video
CN107004247B (en) * 2014-12-18 2021-05-11 诺基亚技术有限公司 Method and device for issuing copyright-reserved position watermark video
US20180025462A1 (en) * 2014-12-18 2018-01-25 Nokia Technologies Oy Method and Apparatus for Publishing Locational Copyrighted Watermarking Video
EP3234904A4 (en) * 2014-12-18 2018-06-20 Nokia Technologies Oy Method and apparatus for publishing locational copyrighted watermarking video
US9300678B1 (en) * 2015-08-03 2016-03-29 Truepic Llc Systems and methods for authenticating photographic image data
US9621565B2 (en) 2015-08-03 2017-04-11 Truepic Llc Systems and methods for authenticating photographic image data
US11734456B2 (en) 2015-08-03 2023-08-22 Truepic Inc. Systems and methods for authenticating photographic image data
US11334687B2 (en) 2015-08-03 2022-05-17 Truepic Inc. Systems and methods for authenticating photographic image data
US10095877B2 (en) 2015-08-03 2018-10-09 Truepic Inc. Systems and methods for authenticating photographic image data
EP3332505A4 (en) * 2015-08-03 2018-12-12 TRUEPIC Inc. Systems and methods for authenticating photographic image data
US10733315B2 (en) 2015-08-03 2020-08-04 Truepic Inc. Systems and methods for authenticating photographic image data
US11195043B2 (en) 2015-12-15 2021-12-07 Cortica, Ltd. System and method for determining common patterns in multimedia content elements based on key points
US11037015B2 (en) 2015-12-15 2021-06-15 Cortica Ltd. Identification of key points in multimedia data elements
US11472252B2 (en) 2016-04-08 2022-10-18 Fox Factory, Inc. Electronic compression and rebound control
US11760387B2 (en) 2017-07-05 2023-09-19 AutoBrains Technologies Ltd. Driving policies determination
US11899707B2 (en) 2017-07-09 2024-02-13 Cortica Ltd. Driving policies determination
US11159504B2 (en) 2017-10-10 2021-10-26 Truepic Inc. Methods for authenticating photographic image data
US10375050B2 (en) 2017-10-10 2019-08-06 Truepic Inc. Methods for authenticating photographic image data
US11632363B2 (en) 2017-10-10 2023-04-18 Truepic Inc. Methods for authenticating photographic image data
US10546585B2 (en) 2017-12-29 2020-01-28 Comcast Cable Communications, Llc Localizing and verifying utterances by audio fingerprinting
US10846544B2 (en) 2018-07-16 2020-11-24 Cartica Ai Ltd. Transportation prediction system and method
US10726533B2 (en) 2018-08-13 2020-07-28 Truepic Inc. Methods for requesting and authenticating photographic image data
US10361866B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
US10360668B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Methods for requesting and authenticating photographic image data
US11403746B2 (en) 2018-08-13 2022-08-02 Truepic Inc. Methods for requesting and authenticating photographic image data
US11646902B2 (en) 2018-08-13 2023-05-09 Truepic Inc. Methods for requesting and authenticating photographic image data
US11613261B2 (en) 2018-09-05 2023-03-28 Autobrains Technologies Ltd Generating a database and alerting about improperly driven vehicles
US11718322B2 (en) 2018-10-18 2023-08-08 Autobrains Technologies Ltd Risk based assessment
US10839694B2 (en) 2018-10-18 2020-11-17 Cartica Ai Ltd Blind spot alert
US11417216B2 (en) 2018-10-18 2022-08-16 AutoBrains Technologies Ltd. Predicting a behavior of a road used using one or more coarse contextual information
US11029685B2 (en) 2018-10-18 2021-06-08 Cartica Ai Ltd. Autonomous risk assessment for fallen cargo
US11282391B2 (en) 2018-10-18 2022-03-22 Cartica Ai Ltd. Object detection at different illumination conditions
US11087628B2 (en) 2018-10-18 2021-08-10 Cartica Al Ltd. Using rear sensor for wrong-way driving warning
US11685400B2 (en) 2018-10-18 2023-06-27 Autobrains Technologies Ltd Estimating danger from future falling cargo
US11673583B2 (en) 2018-10-18 2023-06-13 AutoBrains Technologies Ltd. Wrong-way driving warning
US11373413B2 (en) 2018-10-26 2022-06-28 Autobrains Technologies Ltd Concept update and vehicle to vehicle communication
US11170233B2 (en) 2018-10-26 2021-11-09 Cartica Ai Ltd. Locating a vehicle based on multimedia content
US11244176B2 (en) 2018-10-26 2022-02-08 Cartica Ai Ltd Obstacle detection and mapping
US11700356B2 (en) 2018-10-26 2023-07-11 AutoBrains Technologies Ltd. Control transfer of a vehicle
US11904863B2 (en) 2018-10-26 2024-02-20 AutoBrains Technologies Ltd. Passing a curve
US11392738B2 (en) 2018-10-26 2022-07-19 Autobrains Technologies Ltd Generating a simulation scenario
US11270132B2 (en) 2018-10-26 2022-03-08 Cartica Ai Ltd Vehicle to vehicle communication and signatures
US11126869B2 (en) 2018-10-26 2021-09-21 Cartica Ai Ltd. Tracking after objects
US10789535B2 (en) 2018-11-26 2020-09-29 Cartica Ai Ltd Detection of road elements
US11170647B2 (en) 2019-02-07 2021-11-09 Cartica Ai Ltd. Detection of vacant parking spaces
US11643005B2 (en) 2019-02-27 2023-05-09 Autobrains Technologies Ltd Adjusting adjustable headlights of a vehicle
US11285963B2 (en) 2019-03-10 2022-03-29 Cartica Ai Ltd. Driver-based prediction of dangerous events
US11755920B2 (en) 2019-03-13 2023-09-12 Cortica Ltd. Method for object detection using knowledge distillation
US11694088B2 (en) 2019-03-13 2023-07-04 Cortica Ltd. Method for object detection using knowledge distillation
US11132548B2 (en) 2019-03-20 2021-09-28 Cortica Ltd. Determining object information that does not explicitly appear in a media unit signature
US11770260B1 (en) * 2019-03-28 2023-09-26 Amazon Technologies, Inc. Determining authenticity of digital content
US11449584B1 (en) 2019-03-28 2022-09-20 Amazon Technologies, Inc. Generating authenticable digital content
US10846570B2 (en) 2019-03-31 2020-11-24 Cortica Ltd. Scale inveriant object detection
US11481582B2 (en) 2019-03-31 2022-10-25 Cortica Ltd. Dynamic matching a sensed signal to a concept structure
US11908242B2 (en) 2019-03-31 2024-02-20 Cortica Ltd. Efficient calculation of a robust signature of a media unit
US11488290B2 (en) 2019-03-31 2022-11-01 Cortica Ltd. Hybrid representation of a media unit
US11741687B2 (en) 2019-03-31 2023-08-29 Cortica Ltd. Configuring spanning elements of a signature generator
US10748038B1 (en) 2019-03-31 2020-08-18 Cortica Ltd. Efficient calculation of a robust signature of a media unit
US11727056B2 (en) 2019-03-31 2023-08-15 Cortica, Ltd. Object detection based on shallow neural network that processes input images
US11275971B2 (en) 2019-03-31 2022-03-15 Cortica Ltd. Bootstrap unsupervised learning
US20210049036A1 (en) * 2019-08-13 2021-02-18 Facebook Technologies, Llc Capability Space
US11704292B2 (en) 2019-09-26 2023-07-18 Cortica Ltd. System and method for enriching a concept database
US11593662B2 (en) 2019-12-12 2023-02-28 Autobrains Technologies Ltd Unsupervised cluster generation
US11544835B2 (en) 2020-01-14 2023-01-03 Truepic Inc. Systems and methods for detecting image recapture
US11037284B1 (en) 2020-01-14 2021-06-15 Truepic Inc. Systems and methods for detecting image recapture
US11590988B2 (en) 2020-03-19 2023-02-28 Autobrains Technologies Ltd Predictive turning assistant
US11827215B2 (en) 2020-03-31 2023-11-28 AutoBrains Technologies Ltd. Method for training a driving related object detector
US11920655B2 (en) 2020-06-16 2024-03-05 Fox Factory, Inc. Methods and apparatus for suspension adjustment
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing

Also Published As

Publication number Publication date
US20070098172A1 (en) 2007-05-03
US20120310726A1 (en) 2012-12-06
US8250660B2 (en) 2012-08-21
US20120317022A1 (en) 2012-12-13

Similar Documents

Publication Publication Date Title
US8250660B2 (en) Digital watermarking applications
EP1312030B1 (en) Authentication watermarks for packaged products
US6823075B2 (en) Authentication watermarks for printed objects and related applications
US8160968B2 (en) Digital media methods
US8307213B2 (en) Method and system for digital watermarking
US7770013B2 (en) Digital authentication with digital and analog documents
US9843846B2 (en) Watermark and fingerprint systems for media
JP4598279B2 (en) Method and system for using digital watermarks in music and other media
US6442285B2 (en) Controlling operation of a device using a re-configurable watermark detector
US8256665B2 (en) Methods and systems for interacting with physical objects
US7007166B1 (en) Method and system for digital watermarking
US8005259B2 (en) Watermarking systems and methods
US20100322035A1 (en) Audio-Based, Location-Related Methods
US20120158550A1 (en) Music methods and systems
US20070109266A1 (en) Enhanced Input Peripheral
AU2001277147A1 (en) Authentication watermarks for printed objects and related applications

Legal Events

Date Code Title Description
AS Assignment

Owner name: DIGIMARC CORPORATION, OREGON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEVY, KENNETH L.;STAGER, REED R.;REEL/FRAME:014828/0600;SIGNING DATES FROM 20031110 TO 20031114

AS Assignment

Owner name: DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION),

Free format text: CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS;ASSIGNOR:L-1 SECURE CREDENTIALING, INC. (FORMERLY KNOWN AS DIGIMARC CORPORATION);REEL/FRAME:021785/0796

Effective date: 20081024

Owner name: DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION), OREGON

Free format text: CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS;ASSIGNOR:L-1 SECURE CREDENTIALING, INC. (FORMERLY KNOWN AS DIGIMARC CORPORATION);REEL/FRAME:021785/0796

Effective date: 20081024

Owner name: DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION),O

Free format text: CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS;ASSIGNOR:L-1 SECURE CREDENTIALING, INC. (FORMERLY KNOWN AS DIGIMARC CORPORATION);REEL/FRAME:021785/0796

Effective date: 20081024

AS Assignment

Owner name: DIGIMARC CORPORATION (AN OREGON CORPORATION), OREGON

Free format text: MERGER;ASSIGNOR:DIGIMARC CORPORATION (A DELAWARE CORPORATION);REEL/FRAME:024369/0582

Effective date: 20100430

Owner name: DIGIMARC CORPORATION (AN OREGON CORPORATION),OREGO

Free format text: MERGER;ASSIGNOR:DIGIMARC CORPORATION (A DELAWARE CORPORATION);REEL/FRAME:024369/0582

Effective date: 20100430

Owner name: DIGIMARC CORPORATION (AN OREGON CORPORATION), OREG

Free format text: MERGER;ASSIGNOR:DIGIMARC CORPORATION (A DELAWARE CORPORATION);REEL/FRAME:024369/0582

Effective date: 20100430

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION