Abstract:
Image identifier information specific to image data to be input to an image duplication apparatus is embedded in the image data as a steganography in advance. Meanwhile, on the side of an image duplication apparatus, a duplication control apparatus comprised therein decodes the steganography contained in image data, detects the image identifier information, compares the detected image identifier information with pre-assigned license information and permits a duplication operation such as printing onto a print medium or storing into a storage medium if the aforementioned two kinds of information are identical.
Abstract:
A method for tracking media signals in multimedia content is provided by uniquely identifying the multimedia content with a digital watermark identifier. A video channel is preferably embedded with a first watermark identifier. The first identifier uniquely identifies the multimedia content or the content family. A second digital watermark is embedded in an audio channel of the multimedia content. The second digital watermark uniquely identifies a user or user device. When the multimedia content is found in an unauthorized or unexpected channel, the content can be traced back to its misappropriating source via the user identifier.
Abstract:
The present invention relates to methods and apparatus employing digital watermarking and/or steganography. In one implementation a printer includes watermarking capabilities to facilitate image management. Other implementations are detailed herein as well.
Abstract:
Although a copying machine which has finally output a forged print can be specified by the forgery tracking function, a copying machine which has output an original used for copying or a scanner used to read the images of bills or securities cannot be specified. For this purpose, history information embedded in input image data is extracted. When the history information is extracted, information unique to the apparatus is added to the history information. When no history information is extracted, history information containing information unique to the apparatus is generated. The generated or updated history information is embedded in the image data.
Abstract:
Electronic content data that is copied without authorization can be traced back to its source using steganographically encoded information. Such arrangements are useful, e.g., where electronic content is rendered to an audience—one of whom may be making an illicit recording. In such embodiments, the encoding may be performed as the content is made available to the consumer, e.g., allowing data identifying time and place of rendering to be encoded. The specification details a variety of other steganographic techniques and applications, including conveying different messages using different parts of an image, and conveying record control information with electronic content.
Abstract:
A method for secure distribution of digital content, the method including the steps of dividing a unit of digital content into at least first and second portions, storing the first portion on a first computerized apparatus, digitally watermarking the second portion, and combining the first portion and the digitally watermarked second portion, thereby forming a watermarked version of the digital content.
Abstract:
Methods and apparatus to provide security for audio or image content are provided. In one embodiment, a method includes receiving audio or image content and steganographically encoding auxiliary information in the audio or image content. The auxiliary information carries or links to permitted usage rights that are associated with the audio or image content.
Abstract:
After a digital content is loaded into an information terminal such as a PC, ID information unique to a viewer or a user of the PC is imprinted into the content. The ID information is imprinted into a predetermined location of the content or alternatively, it may be imprinted over the entire content in the form of a spatial frequency. The content with an ID added thereto is then enabled to be used in the terminal.
Abstract:
Structure and methodology for creating a content-informative audit trail derived from text, vector information and imagery, and taking the form of a reduced-size data extraction from a document-job data-stream, such as a data-stream which exists in the context of a document printing, copying, scanning, e-mailing, and faxing job, etc. Selected, reduced-content components of a subject document data-stream are extracted according to various extraction approaches, and extracted information is stored in a appropriate storage site for later review to give an indication of just what printing, scanning, copying, etc activity has taken place with respect to different identified documents.
Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.