Optimization methods for the insertion, protection, and...

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000

Reexamination Certificate

active

07095874

ABSTRACT:
The implementations of digital watermarks can be optimally suited to particular transmission, distribution and storage mediums given the nature of digitally-sampled audio, video and other multimedia works. Watermark application parameters can be adapted to the individual characteristics of a given digital sample stream. Watermark information can be either carried in individual samples or in relationships between multiple samples, such as in a waveform shape. More optimal models may be obtained to design watermark systems that are tamper-resistant given the number and breadth of existent digitized sample options with different frequency and time components. The highest quality of a given content signal may be maintained as it is mastered, with the watermark suitably hidden, taking into account usage of digital filters and error correction. The quality of the underlying content signals can be used to identify and highlight advantageous locations for the insertion of digital watermarks. The watermark is integrated as closely as possible to the content signal, at a maximum level to force degradation of the content signal when attempts are made to remove the watermarks.

REFERENCES:
patent: 3984624 (1976-10-01), Waggener
patent: 3986624 (1976-10-01), Cates, Jr. et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4528588 (1985-07-01), Lofberg
patent: 4672605 (1987-06-01), Hustig et al.
patent: 4748668 (1988-05-01), Shamir et al.
patent: 4876617 (1989-10-01), Best et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4939515 (1990-07-01), Adelson
patent: 4972471 (1990-11-01), Gross et al.
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4980782 (1990-12-01), Ginkel
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5113437 (1992-05-01), Best et al.
patent: 5161210 (1992-11-01), Druyvesteyn et al.
patent: 5243423 (1993-09-01), DeJean et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5319735 (1994-06-01), Preuss et al.
patent: 5363448 (1994-11-01), Koopman et al.
patent: 5365586 (1994-11-01), Indeck et al.
patent: 5379345 (1995-01-01), Greenberg
patent: 5412718 (1995-05-01), Narashimahalu et al.
patent: 5428606 (1995-06-01), Moskowitz
patent: 5450490 (1995-09-01), Jensen et al.
patent: 5493677 (1996-02-01), Balogh et al.
patent: 5506795 (1996-04-01), Yamakawa
patent: 5530751 (1996-06-01), Morris
patent: 5530759 (1996-06-01), Braudaway et al.
patent: 5568570 (1996-10-01), Rabbani
patent: 5579124 (1996-11-01), Aijala et al.
patent: 5583488 (1996-12-01), Sala et al.
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5617119 (1997-04-01), Briggs et al.
patent: 5636292 (1997-06-01), Rhoads
patent: 5646997 (1997-07-01), Barton
patent: 5664018 (1997-09-01), Leighton
patent: 5680462 (1997-10-01), Miller et al.
patent: 5687236 (1997-11-01), Moskowitz et al.
patent: 5689587 (1997-11-01), Bender et al.
patent: 5696828 (1997-12-01), Koopman, Jr.
patent: 5721788 (1998-02-01), Powell et al.
patent: 5740244 (1998-04-01), Indeck et al.
patent: 5745569 (1998-04-01), Moskowitz
patent: 5748783 (1998-05-01), Rhoads
patent: 5751811 (1998-05-01), Koopman, Jr.
patent: 5757923 (1998-05-01), Koopman, Jr.
patent: 5774452 (1998-06-01), Wolosewicz
patent: 5828325 (1998-10-01), Wolosewicz et al.
patent: 5832119 (1998-11-01), Rhoads
patent: 5859920 (1999-01-01), Daly et al.
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 5893067 (1999-04-01), Bender et al.
patent: 5912972 (1999-06-01), Barton
patent: 5930377 (1999-07-01), Powell et al.
patent: 6208745 (2001-03-01), Florencio et al.
patent: 6285775 (2001-09-01), Wu et al.
patent: 6330335 (2001-12-01), Rhoads
patent: 6330672 (2001-12-01), Shur
patent: 6385329 (2002-05-01), Sharma et al.
patent: 0565947 (1993-10-01), None
patent: 0581317 (1994-02-01), None
patent: WO 95/14289 (1995-05-01), None
Schneier, Bruce,Applied Cryptography, 2ndEd., John Wiley & Sons, pp. 4-10, 1996.
Menezes, Alfred J.,Handbook of Applied Cryptography, CRC Press, p. 46, 1997.
Merriam-Webster's Collegiate Dictionary, 10thEd., Merriam Webster, Inc., p. 207.
Erealy, et al.,Principles of Corporate Finance, “Appendix A—Using Option Valuation Models”, 1984, pp. 448-449.
Copeland, et al.,Real Options: A Practioners Guide, 2001 pp. 106-107, 201-202, 204-208.
Sarkar, M. “An Assessment of Pricing Mechanisms for the Interact—A Regulatory Imperative”, Presented MIT Workshop on Internet Economics, Mar. 1995, http://www.press.umich.edu/jep/works/sarkassess.html on Mar. 12, 1995.
Crawford, D.W. “Pricing Network Usage: A Market for Bandwidth of Market Communication?” Presented MIT Workshop on Internet Economics, Mar. 1995 http://www.press.umich.edu/jep/works/crawmarket.html on Mar. 12, 1995.
Low, S. H., “Equilibrium Allocation and Pricing of Variable Resources Among User-Suppliers”, 1988. http://www/citeseer.nj.nec.com/366503.html.
Caronni, Germano, “Assuring Ownership Rights For Digital Images”, Published Proceedings of Reliable IT Systems, VIS '95, H. H. Bruggemann and W. Gerhardt-Häckel (Ed.), Viewing Publishing Company, Germany, 1995.
Zhao, Jian. “A WWW Service to Eulied and Prove Digital Copyright Watermarks”, Proc. of the European Conf. on Multimedia Applications, Services & Techiques Lorvain-La-Nevve, Belgium, May 1996.
Gruhl, Daniel et al.,Echo Hiding, In Proceeding of the Workshop on Information Hiding. No. 1174 in Lecture Notes in Computer Science, Cambridge, England (May/Jun. 1996).
Oomen, A. W.J. et al.,A Variable Bit Route Buried Data Channel For Compact Disc, J. Audio Eng. Soc., vol. 43, No. 1/2, pp. 23-28 (1995).
Ten Kate, W. et al.,A New Surround—Stereo—Surround Coding Techniques, J. Audio Eng. Soc., vol. 40, No. 5, pp. 376-383 (1992).
Gerzon, Michael et al.,A High Rate Buried Data Channel for Audio CD, Presentation Notes, Audio Engineering Soc. 94thConvention (1993).
Sklar, Bernard,Digital Communications, pp. 601-608 (1988).
Jayant, N.S. et al.,Digital Coding of Waveforms, Prentice Hall Inc., Englewood Cliffs, NJ, pp. 486-509 (1984).
Bender, Walter R. et al.,Techniques for Data Hiding, SPIE Int. Soc. Opt. Eng., vol. 2420, 164-173, 1995.
Zhao, Jian et al.,Embedding Robust Labels Into Images for Copyright Protection, (XP 000571967), pp. 242-257, 1995.
Menezes, Alfred J.,Handbook of Applied Cryptography, CRC Press, p. 175, 1997.
Schneier, Bruce,Applied Cryptography, 1stEd., pp. 67-68, 1994.
Ten Kate, W. et al., “Digital Audio Carrying Extra Information”, IEEE, CH2847-2/90/0000-1097, (1990).
van Schyndel et al., A digital Watermark, IEEE International Computer Processing Conference, Austin, Texas, Nov. 13-16, 1994, pp. 86-90.
Smith et al., Modulation and Information Hiding in Images, Springer Verlag, First International Workshop, Cambridge, U.S., May 30-Jun. 1, 1996, pp. 207-227.
Kutter, Martin et al., Digital Signature of Color Images Using Amplitude Modulation, SPIE-E197, vol. 3022, pp. 518-227.
Puate, Joan et al., Using Fractal Compression Scheme to Embed a Digital Signature into an Image, SPIE-96 Proceedings, vol. 2915, Mar. 1997, pp. 108-118.
Swanson, Mitchell, D. et al., Transparent Robust Image Watermarking, Proc. of the 1996 IEEE Int'l. Conf. on Image Processing, vol. III, 1996, pp. 211-214.
Swanson, Mitchell, D. et al., Robust Data Hidting for Images, 7th IEEE Digital Signal Processing workshop. Leon, Norway, Sep. 1-4, 1996, pp. 37-40.
Zhao, Jian et al., Embedding Robust Labels into Images for Copyright Protection, Proceedings of the KnowRight'95 Conference, pp. 242-251.
Koch, E., et al., Towards Robust and Hidden Image Copyright Labeling, 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 1995, Neoe Marmaras, pp. 4.
van Schyndel et al., Towards a Robust Digital Watermark, Second Asian Image Processing Conference, Dec. 6-8, 1995, Singapore, vol. 2, pp. 504-508.
Tirkel, A.Z., A Two-Dimensional Digital Watermark, DICTA'95, University of Queensland, Brisbane, Dec. 5-8, 1995,

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Optimization methods for the insertion, protection, and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Optimization methods for the insertion, protection, and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Optimization methods for the insertion, protection, and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3626940

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.