Abstract:
A forensic marking system and method for identifying the printing device on which a medium was printed. Encoded forensic markings which identify the device but are of low perceptibility to the human eye are superimposed on the printed image. The markings have a color, size, density, and repetition pattern that only minimally affect print quality while providing highly accurate identification of the printing device, even if the printed medium contains high-density image content.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
In an image processing apparatus, an antenna is arranged in a traveling member of a scanner, a reader/writer receives a radio wave from a radio tag added to an original via the antenna when the reader/writer reads an image from the original, a demodulation circuit generates a demodulated signal, a radio tag identification number identifying and judging unit, which has received the demodulated signal, identifies a type of the radio tag, and when it is judged that the original is a forgery prevention object original, a forgery prevention processing unit applies forgery prevention processing to the original.
Abstract:
The present invention provides a method for identifying copyrighted content on a network to help ensure legal uses of the copyrighted content. The method includes searching a network for steganographically embedded content based on predetermined information; comparing data extracted from located content to the predetermined information; and, if the extracted data matches the predetermined information, verifying with a database whether the located content has been licensed for on-line uses.
Abstract:
Electronic content data that is copied without authorization can be traced back to its source using steganographically encoded information. Such arrangements are useful, e.g., where electronic content is rendered to an audiencenullone of whom may be making an illicit recording. In such embodiments, the encoding may be performed as the content is made available to the consumer, e.g., allowing data identifying time and place of rendering to be encoded. The specification details a variety of other steganographic techniques and applications, including conveying different messages using different parts of an image, and conveying record control information with electronic content.
Abstract:
An image capture device is provided with processing circuitry that steganographically embeds plural-bit auxiliary data within the captured image data. The embedding may be accomplished by adding a low level noise signal to the image data, where the noise signal has the auxiliary data encoded therein. Image data output by the device thus conveys auxiliary data that can be used for a variety of purposes.
Abstract:
The present method concerns inserting manipulation-proof digital fingerprints into electronic documents making it possible to detect manipulations by purchasers or groups of purchasers. According to the present invention based on a predefined number of copies and a maximum number of copying hackers per document, a location or an area for the digital fingerprint of the customer is defined for each copy. All the locations or areas defined in the document for digital fingerprints are subject in their totality to an enclosed finite geometric ordering system, in which intersections of the digital fingerprints occur at defined locations or areas. By analyzing the intersection points not found by the hackers, the hackers involved in the manipulation can be uniquely determined. The method described is suitable, in particular, for identifying copies of documents which are subject to copyright protection.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
An automated monitoring service downloads image files (including, e.g, graphic and video files) and audio files from various Internet sites, and checks these files for the presence of embedded digital watermark data. When found, such data is decoded and used to identify the proprietor of each watermarked file. The proprietors are alerted to the results of the monitoring operation, often apprising such proprietors of unknown distribution of their image/video/audio properties. Digital watermarks carry control flags used to control viewing or playback depending on content classification.
Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.