摘要:
A method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers. It provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source.
摘要:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In an application, the auxiliary signal is formed as an array of elements selected from a set of print structures (106) with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Robust and fragile watermarks are used in Image Replacement Documents for a variety of applications. Digital watermarks act as on-board mediators in authentication of a variety of printed documents. Finally, digital watermarks are used to help manage quality of the scanners used in imaging systems.
摘要:
Driver's licenses and other security documents include one or more machine-readable features, each conveying plural bits of information. These features are used in a variety of ways to increase security, and/or to enhance functionality. In one embodiment, data encoded on a driver's license is used at airport check-in, to link to a state DMV database and obtain information by which the document, and its custodian, can be authenticated. In like fashion, a license can be used to authenticate a bearer and/or his/her age prior to the sale of alcohol or tobacco products. In other embodiments, different elements of a driver's license (e.g., the substrate, photo, text data, and machine-readable data) are logically bound together (e.g., interlinked through payloads conveyed by different machine-readable features) as a deterrent against counterfeiting. Driver's licenses can be similarly logically bound to personal checks and other documents. Many other arrangements are also disclosed.
摘要:
A system and method for maintaining the scalability and promoting reliability of file sharing including embedding data (300) within the data file (302), reading the emdedded data (304), decoding (306) and acting on the embedded data (308). The embedded data (300) may include a watermark and be liked to other copy management systems such as those proposed in DVD and SDMI.
摘要:
Media objects are transformed into active, connected objects via identifiers embedded into them or their containers. In the context of a user's playback experience, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server. The server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc. The linking process applies to broadcast objects as well as objects transmitted over networks (1251, 1252) in streaming and compressed formats.
摘要:
The invention provides a method of forensic digital watermarking (102) that randomly selects an orientation and/or embedding protocol for a forensic digital watermark (102) signal to be embedded in the content signal (100). It then embeds the forensic digital watermark (102) signal at the selected orientation in the content signal (100). The embedding applies a different orientation to the digital forensic watermark (102) for each instance of embedding a forensic watermark. This thwarts averaging and over-embedding attacks and enables generational forensic tracking.
摘要:
A watermarked media signal (20) is transmarked to adapt the watermark to the robustness and perceptibility constraints of the new environment (34). A first watermark is detected (22) in the media signal and the message information from the first watermark is embedded into a second watermark (44), before the media signal undergoes a transformation process. The second watermark (44) is adapted to survive the transformation process. In addition, a watermark embedding command is included in a set of rendering commands used during the process of creating a media object to specify how the media object is to be rendered. The watermark embedding command includes an identifier used to link to customer or related content information, the customer's web site, the intensity at which to embed the watermark, areas not to embed, batch processing options, printing preferences for images, watermark embedding methods to use on different media types, formats or different parts of the media object, and desired rendering quality.
摘要:
Techniques are detailed for steganographically embedding auxiliary data (1030) within electronic content (e.g., audio, video, still imagery, etc.) (1020) in manners that are computationally simple, yet highly inconspicuous (1010). The embedded data can convey copyright or other ownership information, or may be used for device control purposes (e.g., preventing unauthorized reproduction). A number of countermeasures against removal of the auxiliary data are contemplated, including keying use of the content to the presence of such data. The embedded data may be made dependent on the media encoded, e.g., by modifying the embedded data in accordance with characteristics from the media. Encryption can also advantageously be employed (1040). Playback devices may be equipped to track IDs from previously-accessed content, and enforce usage rules. Some embodiments employ multiple watermarks to advantage, e.g., a robust watermark is encoded prior to distribution and indicates the content is protected, and a second watermark is encoded by the playback device and serves to uniquely link that content to that device. Some applications benefit from scrambling of content, in a manner that leaves certain information (e.g., from a header) unscrambled and freely accessible.