Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-02-28
2006-02-28
Barrón, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C380S046000
Reexamination Certificate
active
07007166
ABSTRACT:
A method for applying a digital watermark to a content signal is disclosed. In accordance with such a method, a watermarking key is identified. The watermarking key includes a binary sequence and information describing application of that binary sequence to the content signal. The digital watermark is then encoded within the content signal at one or more locations determined by the watermarking key.
REFERENCES:
patent: 4038596 (1977-07-01), Lee
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4789928 (1988-12-01), Fujisaki
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4980782 (1990-12-01), Ginkel
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5243515 (1993-09-01), Lee
patent: 5287407 (1994-02-01), Holmes
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5363448 (1994-11-01), Koopman et al.
patent: 5365586 (1994-11-01), Indeck et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5394324 (1995-02-01), Clearwater
patent: 5408505 (1995-04-01), Indeck et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5428606 (1995-06-01), Moskowitz
patent: 5487168 (1996-01-01), Geiner et al.
patent: 5493677 (1996-02-01), Balogh et al.
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5568570 (1996-10-01), Rabbani
patent: 5606609 (1997-02-01), Houser et al.
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5617119 (1997-04-01), Briggs et al.
patent: 5636292 (1997-06-01), Rhoads
patent: 5640569 (1997-06-01), Miller et al.
patent: 5659726 (1997-08-01), Sandford, II et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5687236 (1997-11-01), Moskowitz et al.
patent: 5734752 (1998-03-01), Knox
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5748783 (1998-05-01), Rhoads
patent: 6330672 (2001-12-01), Shur
Alfred J. Menezes, Handbook of Applied Cryptography, 1997, CRC Press LLC, p. 175.
Smith, et al., “Modulation and Information Hiding in Images,” Springer Verlag, First International Workshop, Cambridge, U.K., May 30 to Jun. 1, 1996, pp. 207-227.
Kutter, et al., “Digital Signature of Color Images Using Amplitude Modulation,” SPIE-EI97, vol. 3022, pp. 518-527.
Puate, et al., “Using Fractal Compression Scheme to Embed a Digital Signature into an Image,” SPIE-96 Proceedings, vol. 2915, Mar. 1997, pp. 108-118.
Boney, et al., “Digital Watermarks for Audio Signals,” 1996 IEEE Int. Conf. on Multimedia Computing and Systems, Jun. 17-23, Hiroshima, Japan, pp. 473-480.
Boney, et al., “Digital Watermarks for Audio Signals,” Proceedings of EUSIPCO-96, 8th European Signal Processing Conference, Trieste, Italy, Sep. 10-13, 1996, 5 pages.
Swanson, et al., “Transparent Robust Image Watermarking,” Proc. of the 1996 IEEE Int. Conf. on Image Processing, vol. III, 1996, pp. 211-214.
Swanson, et al., “Robust Data Hiding for Images,” 7th IEEE Digital Signal Processing Workshop, Sep. 1-4, 1996, Loen, Norway, pp. 37-40.
Cox, et al., “Secure Spread Spectrum Watermarkings for Multimedia,” NEC Research Institute, Technical Report 95-10, 1995, 33 pages.
Zhao, et al., “Embedding Robust Labels into Images for Copyright Protection,” Proceedigns of the KnowRight'95 Conference, pp. 242-251.
Kock, et al., “Towards Robust and Hidden Image Copyright Labeling,” 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Jun. 1995, 4 pages.
Langelaar, et al., “Copy Protection for Multimedia Data based on Labeling Techniques,” Dept. of Electrical Engineering, Information Theory Group, Delft Univ. of Tech., Delft, The Netherlands, Jul. 1996, 9 pages.
Van Schyndel, et al., “A Digital Watermark,” IEEE International Computer Processing Conference, Austin, TX, Nov. 13-16, 1994, pp. 86-90.
Van Schyndel, et al., “Towards A Robust Digital Watermark,” Second Asian Image Processing Conference, Singapore, Dec. 6-8, 1995, vol. 2, pp. 504-508.
Tirkel, et al., “A Two-Dimensional Digital Watermark,” DICTA'95, University of Queensland, Brisbane, Dec. 5-8, 1995, 7 pages.
Tirkel, A.Z., “Image Watermarking—A Spread Spectrum Application,” ISSSSTA'96, Sep. 1996, Mainz, Germany, 6 pages.
Ruanaidh, et al., “Watermarking Digital Images for Copyright Protection,” IEF Proceedings, vol. 143, No. 4, Aug. 1996, pp. 250-256.
Hartung, et al., “Digital Watermarking of Raw and Compressed Video,” SPIE vol. 2952, EOS Series, Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, Oct. 1996, pp. 205-213.
Press, et al., “Numerical Recipes in C,” Cambridge University Press, 1988, 12. Fourier Transform Spectral Methods, pp. 398-470.
Pohlmann, Ken C., “Principles of Digital Audio,” Third Edition, 1995, pp. 32-37, 40-48, 138, 147-149, 332, 333, 364, 499-501, 508-509, 564-571.
Pohlmann, Ken C., “Principles of Digital Audio,” Second Edition, 1991, pp. 1-9, 19-25, 30-33, 41-48, 54-57, 86-107, 375-387.
Schneier, B., “Applied Cryptography,” John Wiley & Sons, Inc., New York, 1994, particularly the following sections: 4.1 Subliminal Channel, pp. 66-68, 16.6 Subliminal Channel, pp 387-392, Ch. I pp 1-16, Ch. 2 pp 17-41, Ch. 3 pp 42-57, Ch. 12.1 pp 273-275, Ch 14.1 pp 321-324.
Kahn, D., “The Code Breakers,” The Macmillan Company, 1969, particularly the following sections on steganography pp. xiii, 81-83, 513, 515, 522-526, 873.
Brealey, et al., “Principles of Corporate Finance, Appendix A—Using Option-Valuation Models,” 1984, pp. 448-449.
Copeland, et al., “Real Options: A Practitioner's Guide,” 2001, pp. 106-107, 201-202, 204-208.
Sarkar, M. “An Assessment of Pricing Mechanisms for the Internet—A Regulatory Imperative,” presented at MIT Workshop on Internet Economics, Mar. 1995. http://www.press.umich.edu/jep/works/SarkAssess.html on Mar. 12, 2001.
Crawford, D.W., “Pricing Network Usage: A Market for Bandwidth or Market Communication?” presented at MIT Workshop on Internet Economics, Mar. 1995. http://www.press.umich.edu/jep/works/CrawMarket.html on Mar. 12, 2001.
Low, S.H., Equilibrium Allocation and Pricing of Variable Resources Among User-Suppliers (1988). http://citeseer.nj.nec.com/366503.html.
Cooperman Marc
Moskowitz Scott A.
Barrón Jr. Gilberto
Lanier Benjamin E.
Wistaria Trading, Inc.
LandOfFree
Method and system for digital watermarking does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for digital watermarking, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for digital watermarking will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3660428