Security based on subliminal and supraliminal channels for data objects

Abstract

This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.

Claims

What is claimed is: 1. A method of protecting a data object comprising: determining a set of candidate bits in a digitized sample stream; steganographically encoding a subset of bits of said set of candidate bits, so that values of bits of said subset are changed by an amount below a perceptibility threshold; perceptibly manipulating data in the digitized sample stream by changing the value of at least one bit of said set of candidate bits that is not a bit in said subset, by more than a perceptibility threshold; whereby said steganographically encoding and said perceptibly manipulating results in a secure/unique digital sample stream. 2. The method of claim 1 , wherein: said steganographic encoding comprises using at least one cryptographically generated key. 3. The method of claim 1 , wherein: said steganographic encoding comprises encoding cryptographically generated key pairs. 4. The method of claim 1 , wherein: said steganographic encoding comprises encoding at least one digital watermark. 5. The method of claim 1 , further comprising preanalyizing said digital sample stream to determine a perceptibility threshold for said set of candidate bits. 6. The method of claim 1 , further comprising preanalyizing said digital sample stream to determine a perceptibility threshold prior to said perceptibly manipulating. 7. The method of claim 1 , further comprising: subsequently to said perceptibly manipulating, manipulating data with a perceptible ciphering technique. 8. The method of claim 1 , further comprising performing another steganographically encoding step and another perceptibly manipulating step on another instance of the digitized sample stream with the same set of candidate bits but encoding different data in at least one of the steganographically encoding and perceptibly manipulating steps. 9. The method of claim 1 , wherein said set of candidate bits comprises a subset of all bits in said digitized sample stream. 10. The method of claim 1 , further comprising independent modulating: a relationship between the perceptible and imperceptible changes with a transfer function. 11. The method of claim 10 , wherein: the relationship between the perceptible and imperceptible changes have logical relationships determined by at least one of a plurality of cryptographically generated keys and key pairs. 12. A method for securing a data signal comprising: preanalyzing said data signal for a set of candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the set of candidate watermark/signature bits, at least one time; and encoding the data signal subsequently with a perceptible technique by changing at least one of the set of candidate watermark bits not in said subset. 13. The method of claim 12 , wherein the step of preanalyzing said data signal for candidate watermarks/signature bits comprises measuring at least one of entropy, noise, and a subliminal channel. 14. The method of claim 12 , wherein said set of candidate watermark/signature bits defines less than all of said data signal. 15. A method of protecting a data signal comprising: imperceptibly embedding data using a watermarking technique that uses a private key, thereby providing embedded data; perceptibly signing the embedded data using a receiver's public key, thereby providing signed embedded data; encrypting the signed embedded data using the receiver's public key and the said private key, thereby providing embedded signed encrypted data; and transmitting a data signal comprising said embedded signed encrypted data. 16. A method for securing a data signal comprising: preanalyzing said data signal for a set of candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the set of candidate watermark/signature bits, at least one time; and subsequently steganographically encoding the remainder of said subset of bits. 17. The method of claim 16 , wherein said set of candidate watermark/signature bits defines less than all of said data signal. 18. The method of claim 16 , wherein: said encoding said subset of the set of candidate watermark/signature bits is performed with at least one of a separate predetermined key and a key pair. 19. The method of claim 18 , further comprising: generating a pattern of 1s and 0s; and embedding the pattern of 1s and 0s into the data signal. 20. The method of claim 18 , wherein said encoding said remainder comprises encoding with a second set of independent data, further comprising: using a third predetermined key to perceptibly encode a third set independent data. 21. The method of claim 20 , further comprising: decoding the third set of independent data; and authenticating the accuracy of the content of the third set of independent data as a means of authenticating the data signal. 22. The method of claim 20 , further comprising: using a fourth predetermined key to imperceptibly encode a fourth set independent data. 23. The method of claim 22 , further comprising: decoding the fourth set of independent data, wherein the fourth data set was encoded using a public key of a user and the decoding is accomplished using a private key of the user, said private key and public key corresponding to a public/private key-pair for the user. 24. The method of claim 21 , wherein the second set of independent data includes a user identifier, further comprising: decoding the second set of independent data; and extracting the user identifier. 25. A method for protecting a data signal comprising: using a predetermined key to imperceptibly encode a data stream with a first set of independent data; providing a housing to house said data stream; and placing on the housing a perceptible machine-readable unique identifier that has a logical relationship to said independent data. 26. A device for securing a data signal said device comprising: a receiver for receiving the data signal; an analyzer to analyze said data signal for a set of candidate watermark bits; wherein said set of candidate watermark bits consists of a subset and a remainder; an encoder for steganographically encoding independent data into the data signal into said subset of the set of candidate watermark bits, at least one time; and an encoder for steganographically encoding the remainder of said candidate watermark bits. 27. The device of claim 26 , wherein said device includes a decoder for detecting at least one of a plurality of candidate watermark bits. 28. The device of claim 26 , wherein said analyzer can determine a perceptibility threshold. 29. The device of claim 26 , wherein said encoder includes a processor for processing keys. 30. The method of claim 26 , wherein said set of candidate watermark bits defines less than all of said data signal.
CROSS REFERENCE TO RELATED APPLICATIONS This application is a continuation of U.S. patent application Ser. No. 11/518,806, filed Sep. 11, 2006 now U.S. Pat. No. 8,271,795, which is a divisional of U.S. patent application Ser. No. 09/956,262, filed Sep. 20, 2001, issued as U.S. Pat. No. 7,127,615 on Oct. 24, 2006, which claims the benefit of U.S. provisional patent application No. 60/234,199, entitled “Improved Security Based on Subliminal and Supraliminal Channels for Data Objects,” filed Sep. 20, 2000. The previously identified patents and/or patent applications are hereby incorporated by reference, in their entireties. BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. 2. Description of Related Art Digital watermarking enables a number of security features in handling various data. Application of a cryptographic protocol to the limits of steganographic measures of perceptibility (i.e., embedding a digital watermark just shy of the point where the watermark becomes humanly perceptible) yields both robust and secure techniques. Digital watermarking serves to tamperproof data by maximizing the encoding level of the subliminally embedded data, a form of information hiding, while preserving the fidelity of the cover channel (as represented by a digitally sampled signal stream). When attempts to remove or erase a digital watermark should result in perceptible changes to the cover signal, such watermarking serves as a simple form of perceptible authentication. Moreover, such watermarking preserves the signal's commercial integrity because to remove the watermark necessarily degrades the signal quality, resulting in a lower commercial value of the data, assuming that the quality of the signal plays some role in determinations of that value. Authentication and verification of the watermarked signal are functions of the predetermined quality of the cover signal as intended by the sender of the watermarked data. SUMMARY OF THE INVENTION Therefore, a need has arisen for improved security based on subliminal and supraliminal channels for data objects. In one embodiment, a method for protecting a data signal is disclosed, which method comprises: providing a data signal to be encoded; using a first predetermined key to encode a first set of independent data into the data signal imperceptibly; and using a second predetermined key to encode a second set of independent data into the data signal perceptibly. Optionally, the first and second sets of independent data may be passed through hash functions, and their hash values may be associated with one or the other of the first and second predetermined keys. In another embodiment, a method of protecting a data object is also disclosed, which method comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. The steganographic encoding may be handled by one or more of a plurality of cryptographically-generated keys. The steganographic encoding may also be handled by cryptographically-generated key pairs. In yet another embodiment, a method for securing a data signal is also disclosed, which method comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique. Preanalysis may include measuring the data signal for at least one of entropy, noise, and a subliminal channel. In yet another embodiment, a method of protecting a data signal is disclosed, which method comprises: imperceptibly embedding data using a watermarking technique; perceptibly signing the data using the receiver's public key; encrypting the data signal using the receiver's public key and the private key used to watermark the signal; and enabling a receiver to authenticate/verify (separate steps) the data signal while connected to a communications channel. In yet another embodiment, a method for securing a data signal is disclosed, which method comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and subsequently steganographically encoding the remainder bits. The method may also include the steps of generating a pattern of 1s and 0s; and embedding the pattern of 1s and 0s into the data signal. The method may also include the additional step of decoding the pattern of 1s and 0s as a means of authenticating the data signal. The method may also use a third predetermined key to perceptibly encode a third set independent data, which independent data is provided to permit authentication by a user. The third set of independent data may also be decoded to authenticate the accuracy of the content of the third set of independent data. A fourth predetermined key may be used to imperceptibly encode a fourth set independent data, which independent data may be intended for access only by a predetermined user. For example, the fourth set of independent data may be encoded using a public key of a user such that only the intended user may decoding the fourth set of independent data, using his private key (wherein the private key and the public key corresponding to a public/private key-pair for the user). In yet another embodiment, a method for protecting a data signal is also disclosed, which method comprises: using a predetermined key to imperceptibly encode a data stream with a first set of independent data; providing a housing to house said data stream; and placing on the housing a perceptible machine-readable unique identifier. The perceptible machine-readable unique identifier may contain information about the first set of independent data, or may contain information about how the predetermined key was used to embed the first set of independent data. The housing may be a compact disc, a holder for a compact disc, or a housing to hold a magnetic storage medium. In yet another embodiment, a method for protecting a data signal is disclosed, which method comprises: providing a data signal to be encoded; using a predetermined key to encode a first set of independent data into the data signal imperceptibly and to encode a second set of independent data into the data signal perceptibly. Optionally, the first and second sets of independent data may be passed through hash functions, and their hash values may be associated with the predetermined key. The predetermined key may be based upon the Hamiltonian path, in whole or in part, that exists between the bits that are imperceptible and bits that are perceptible. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the invention and some advantages thereof, reference is now made to the following descriptions taken in connection with the accompanying drawings in which: FIGS. 1 , 3 and 4 relate to one embodiment of the present invention. FIG. 2 is a detector system which may be used in connection with the embodiment of FIGS. 1 , 3 and 4 , or may be used with another embodiment of the present invention. In particular, FIG. 1 is a functional block diagram for one embodiment of the present invention. FIG. 4 is a functional block diagram that shows the details of the embedding unit illustrated in FIG. 1 , while FIG. 3 is a functional block diagram that shows the details for the synchronizer unit illustrated in FIG. 1 . The data reducer illustrated in FIG. 1 may be of the type that is disclosed in the Data Reduction application referenced above. FIG. 2 is a functional block diagram that shows a detector system for an embodiment of the present invention, which detector system may operate independently of the system illustrated in FIG. 1 . Data-Reducer The data reducer of FIG. 1 may be used to make subsequent operations more efficient, and to separate the signal into different portions for watermarking. Preferably, the data reducer optimally employs a processor that is highly efficient. For audio applications, an example of useful data reduction is downsampling. This corrects for inconsistencies in input sample rate, and can provide significant processor savings on time and frequency domain procedures. Preferably, the downsampling algorithm is chosen for repeatable performance after signal degradation. For this reason, it is preferable to use a windowed sync interpolator in the data reducer. Different target sample rates can be chosen to afford multiple channels of watermarks using the same embedder. The sample rate can also be varied as a function of a key to provide security. It should be noted that a downsampling data reducer only assures a processor savings during detection. There may actually be an increase in overhead during embedding. Synchronizer Different synchronizers may be used for different applications. The simplest synchronizer calculates the offset in sample from the beginning of the track, and creates a sync signal based on a patient of the offset. This is extremely efficient, but may only be suitable when the decode target can be restored to its original time base and length. Variations on this system may use a signal feature (instead of the beginning of the track) to start the sync pattern—especially with images. Stream-based decoding and decoding with no reference to the original may require a synchronizer that is based solely on signal characteristics. For this purpose, a module as described in FIG. 3 may be used. The band pass filter may be, for example, a 3 pole Bessel with a center frequency of 0.037*the sample rate, with a bandwidth of 0.0075*the sample rate. Other filters may be used with different characteristics. In general, wider filters may have better performance synchronizing on time-base-altered signals, white narrower filters may have better performance on signals with modified frequency spectra. Embedder The embedder may use a frequency domain transformation to weight the strengths of different frequency bands (see, for example, FIG. 4 ). The psychoacoustic/psychovisual model matches the candidate window with rejection criteria and can make a decision to embed or not, and may possibly make decisions about embedding relative to a predetermined perceptibility threshold. For instance, a decision to embed less than all candidates or embed in some logical pattern that can be later determined for detection or decoding operations. The magnitude sequencer may pick some even numbers of magnitudes of frequency components and modify them to match the current bit. Imagine a sequence of 6 magnitudes: 10.9 12.5 6.3 8.4 20.6 20.1 Calculating ratios between adjacent values yields the following ratios: 0.87 1.98 0.75 0.41 1.02 A bit may be determined by reading the number of ratios less than (or more than) 1.0. In this case, the count is 3 for the number of ratios less than 1 (namely, 0.87, 0.75, and 0.41), so the bit is determined by X mod 2, which, in this case, equals 1. The strength may be defined as the size of the ratio closest to 1 (namely, 1.02) minus 1 (in this case 0.02, or 1.02−1=0.02). This is the amount of change necessary to change the bit encoding. The embedder may have a minimum strength that it allows for a particular signal (e.g. 0.2). This example can be modified to code either a 1 or a 0. To encode a 1, all strengths below the minimum strength are increased until they reach the minimum: 10.0 12.5 6.3 8.4 22.0 18.3 yielding the following ratios: 0.80 1.98 0.75 0.38 1.20 while maintaining the count of 3. To encode this example as a 0, it is necessary to flip one of the ratios. Once again, the last 2 can be used: 10.0 12.5 6.3 8.4 18.0 22.5 yielding the following ratios: 0.80 1.98 0.75 0.46 0.80 which now gives a count of 4 and an encoding of 0. The more frequency bands used, the more likely it is to have a minor modification available to create the correct encoding. However, the more frequency bands used, the more likely that an inadvertent or intentional frequency-modifying event (such as filtering) will affect the coding. Decoder The decoder may be described as repeating all of the stages of the embedder, except that instead of modifying the bands, it simply reads the current coding. To protect against fluke positives, it may be useful to reject windows whose minimum coding strength is below a threshold (e.g., 0.08). Detection may be separate from decoding or “reading the message pattern.” DETAILED DESCRIPTION OF THE INVENTION Authentication of a digital signal may be handled by protocols that are intentionally perceptible but independently handled by checks of data that have been objectively presented for additional verification. Examples include digital signatures checks (e.g., where the ASCII text represents interpretable data for authentication in a verification step), data glyph checks (e.g., where some “randomly” but identifiable and perceptible data, including unique barcodes, can be authenticated), and perceptible unique identifiers (for instance, holographic stickers or materials not easily replicated). Differentiated from digital watermarks, these forms of authentication exist separately from the data to be protected. Such authentication does not necessarily impact the quality of the underlying information, as would an imperceptible digital watermark. The choice of imperceptibly or perceptibly tagging objects has a direct relationship with processing overhead. The computational difficulty of attacks on watermarks (as compared to attacks on digital signatures) relates to the watermark's imperceptibility as well as the difficulty in forging the watermarking key that was used to create the watermark. By enabling existing scanners, bar code readers, and other perceptible verification devices to additionally verify imperceptible data, security for any number of applications can be improved. Devices that capture only the perceptibly represented data are not fool proof. Such perceptibly represented data may be forged. Enabling a logical relationship between an imperceptible channel of information and any perceptible identifiers enhances the difficulty in determining what elements of the subliminally embedded data and what features of the perceptible or supraliminally associated information are related. The perceptible information may simply increase the cover size of the data to be protected, meaning the candidate watermark bits can be more efficiently handled if both signal and perceptible identifier are both used to increase the amount of candidate watermark bit space. The inverse is true; for instance, if a Hamiltonian path between bits that are imperceptible and bits that are perceptible describes the path by which the data is to be verified. A digital signature similarly represents entropy which can be changed by the private key holder but is not obvious to the receiver of the information, the digital signature itself is “affixed” to the data but its value is not part of the document. The ability to enable security of objects that may have value in physical media and electronic media also has clear economic benefits. In situations where economic benefits can be observed by the imperceptible nature of subliminal information, a number of situations exist where the perceptible information has a separate benefit. An example is where data is available for electronic and physical media distribution, and a perceptible mark and an imperceptible mark can be mutually dependent to offer security to both situations. At the same time, an additional affixed security measure, which is not “part” of the signal but is added on top, cannot help the object if it is encoded to some other media, for which the subliminally embedded information is still carried. If a document is digitally signed, no marking is evident. If it is watermarked, the signature is interwoven in the data in an imperceptible manner. If the methods disclosed herein are deployed, noise can be evident in the document but may represent only part of the authentication since imperceptible signature-like changes have also been made. The noise introduced, if removed, does not remove the imperceptible marks, but can be easily observed to indicate that the document has been “tagged”. The ease of removing the perceptible tag, when a predetermined glyph or “mark”, instead of noise, is obvious. The fact that the perceptible tag is not linear to the imperceptible mark, enables further difficulty in defeating the protocol, whereas the imperceptible information gains some more data space, theoretically, because the perceptible mark has no imperceptibility limits. To further boost the security of any given object combining an imperceptible watermark and perceptible signature-like functions has novel features absent in the prior art. Digital watermarking algorithms may be optimized to generate a watermark or watermarks that are embedded in a given sample stream. Optimal watermarking can be done depending on the signal stream, images, audio, video and may be optimized for robustness, like an ROW (“robust open watermark”), or security, a forensic or fragile watermark. (See generally, U.S. patent application Ser. No. 09/594,719, entitled “Utilizing Data Reduction in Steganographic and Cryptographic Systems” (hereinafter, “Data Reduction”), as filed Jun. 16, 2000, which application is incorporated by reference herein, in its entirety) The limitation of absolute imperceptibility is removed once a supraliminal channel is utilized. This limitation acts as a roadblock to further increasing the robustness; if perceptibility for part but not all of the security is dependent on perceptible supraliminal information, better verification of the subliminal channel can be handled with the additional data payload afforded above a “predetermined perceptibility threshold,” Utilization of watermark synchronization information or some other detection assistance (for example, statistical or stochastic assumptions about where a watermark is likely to be) may be used to increase the speed and performance of authentication. (See, e.g., the Drawings). Where authorization is dependent on the successful detection or decoding (“reading” or interpreting the actual watermark message) of any given embedded watermark, however, efficiency in detecting or decoding becomes a priority. Design considerations may be altered in order to change the degree of robustness (the survivability of the watermark measured against signal degradation), security (the difficulty in removal or successful obscuring of the watermark), and perceptibility (the limitation of observable cover signal degradation). Visible uniqueness may also be achieved by altering design considerations. For instance, a perceptibly unique tagging mechanism is typically based on observable features of both intended recipients and third party observers, given consideration for ease-of-recognition. Uniquely identifying tags can be used in such a manner as to enable quick authentication checks that are nonobvious to casual observers (for instance, bar code-like or glyph-like information used for postage. An observer cannot read a glyph datum, but a computer or specialized detector can. At the same time, the existence of the datum indicates some functionality generally unknown or unreadable to casual observers, except that it affirms payment, such as with postage, or enables a device to evaluate the visible data.). Ideally, the unique tag should be difficult to reproduce (e.g., magnetic strips, difficult-to-copy color schemes, physically unique material in currency, or a holographic image). Last, physical identifiers must be sufficiently cost-effective to represent a fair cost and computational expense for the value of the item to be protected. There are both methods for changing some characteristic of a perceptible feature in a signal (luminescence or chromatics), or substituting data for separate identifiable data (an actual logo or tag). Changing a perceptible feature allows for a closer link between the identifying mark and the characteristics of the signal, and when ciphered can be made to act as a tamper-proofing element of the signal. In either case, imperceptibility is not a consideration. Moreover, application of transfer function-based changes to subsets of the signal data enable randomly generated weighting of how the data is outputted. A cryptographically generated key may be associated with the data weighting, to enable noise like distortions to be introduced into the signal. (See generally U.S. patent application Ser. No. 09/046,627, entitled “Method for Combining Transfer Function with Predetermined Key Creation”, filed Mar. 24, 1998, which application is incorporated by reference herein, in its entirety). Combining Subliminal Channels with Supraliminal Channels The present invention, as a radical departure from the art, seeks to combine the benefits of steganographic ciphering with observable cryptographic protocols. Steganographic ciphering is limited by the channel signal's capacity for imperceptibly embedding data. Identifiable uniqueness tacks such a limitation. Given the breadth of perceptible identifier authentication devices, the security features of digital watermarks can be added to increase the overall security of given objects. The overall ease of implementation is often overlooked in the design of security architectures. The design of a security architecture must take into account the security applied, the value of the objects being protected, the cost associated with the security's renewability, and the difficulty of defeating the security. Measured in computational terms, security must be flexible enough to address new problems. Whereas cryptography represents mathematically provable measures of difficulty in discovering the secret key or keys, steganography serves to bridge cryptography with perceptibility of the watermarked signal. Asymmetric watermarking algorithms are available in systems where the embedding and detection of watermarks utilizes nonlinear relationships between how the signal was sampled and encoded. Certain signal processing schemes, including linear time invariant approaches, can provide adequate nonlinearity to enable public key watermarking schemes. Public key watermarking enables detection of the watermark but not access or detection of the watermark bits to preserve the integrity of the watermark. Hiding a watermark bit or bits in whitened noise or nondeterministic locations in a signal is discussed in U.S. patent application Ser. No. 09/456,319, entitled “Z-Transform Implementation of Digital Watermarks,” filed Dec. 8, 1999, which application is incorporated by reference herein, in its entirety. Embodiments A number of specific problems exist in the art where combining imperceptible embedding techniques with perceptible security protocols to enhance the security of any given object, including objects represented in physical media. Overall security can be increased in systems where both confusion and diffusion can be optimized. Confusion applies to the ability to hide relationships between the plaintext, ciphertext, and the key. Diffusion enables relationships between the plain text and key to be spread over the ciphertext. Because mathematical proofs rely heavily on credibility, the present invention seeks to leverage the benefits of steganographic ciphering in enabling successful subliminal channels with the notion of a supraliminal channel for handling limitations placed on the subliminal channel (by perceptibility, robustness, and security). The real limitation on the supraliminal channel is to enhance, not to obscure, the security of the data object. Similarly, in straight application of cryptographic protocols, cipher design is intended to make confusion and diffusion iteratively useful in reducing processing overhead. That is, to confuse the pirate by making encryptions look like entropy, or diffuse the encryption making the entire message more difficult to decrypt, or do both in an iterative fashion. If the application is primarily a visible mark type the visible mark is helped by the difficulty of discovering the imperceptible data or the way in which the bits are iteratively integrated into both perceptible and imperceptible domains—and cryptographically stored on a predetermined key. Alternatively, the opposite can be true to reduce the lack of imperceptible candidate bits alone in making a given signal unique. The present invention likewise borrows the confusion of obfuscated data, from steganography, with the higher demands of cryptographic processing which are limited for application in a digital sample stream if intended only for a subliminal channel (the limit is the channel capacity in part based on a predetermined perceptibility threshold). The present invention also enhances security for objects that can be digitally and physically represented. Because we can observe entropy which is both perceptible and imperceptible, confusing the authentication data with entropy, or noise-like features, utilizing both subliminal and supraliminal channels, results in higher robustness results. To properly combine the subliminal and supraliminal channel data, it may be desired to predetermine just how much overall data should be introduced or manipulated by the key. Similarly, a single digital signature or one way hash calculation may be propagated across the changes introduced by creating blocks of data, comprising subsets of the overall changes intended. Hashing a current block dependent on the hash of a subsequent block, enables such propagation. The hashing may be directed at those bits in the sample stream which are deemed to have higher perceptible significance or at a point where some data reduction has already been applied to the sample stream (see the Data Reduction application referenced above). The purpose is to enable subsequent detection of tampering of a particular portion of a signal; when applied after data reduction more valuable data, based on the reduction applied, will be hashed. Alternatively, hashes of each subset of data changes may be performed and saved to a detection or encoding key. That is, changes introduced by the encoder contemplated herein may be the basis for the uniqueness that is subsequently checked to enable verification. Separation between just what data subsets are hashed or signed for authentication, and what data needs to be further checked for verification offers a wide range of options to the encoder in enabling robust security features. Any dependencies between how perceptible and imperceptible data is handled can be effectively obscured to increase the complexity of brute force attacks. Further, because information complexity provides a limit of what information is represented in binary or digital terms, hashing data reduced portions of a signal or propagating such a hash throughout a signal is likely to secure the perceptibly significant portions of any given signal. Unique Document Creation Prior to distribution of a document, an imperceptible watermark consisting of at least one bit is uniquely generated for a plurality of copies. The embedding key may be maintained by the sender for security. Each of a plurality of intended recipients sends a public key, uniquely identifying each recipient, to further perceptibly mark the document based on the provided public keys. Alternatively, the public keys can be used to digitally sign the document. Ultimately, any number of relationships between the perceptible and imperceptible marks can be made to uniquely identify the documents. The digital signature, representing an affixed unique identifier based on any encryption performed on the plaintext is viewed as additional security. Should the document need to be authenticated or verified, a hierarchy representing the imperceptible and perceptible data can be ciphered so as to confuse potential attempts at tampering with the document. For predetermined documents (in the sense that any physical features are controlled by the sender), such as currency, postage stamps, travelers' checks, or the like can be estimated for any physical nonuniformities in the physical representation to assist in further representations of uniqueness for the physical documents. Unlike other technologies in the prior art, the present invention offers the benefit of digital watermarking as an imperceptible and perceptible application to address the inherent limits of computation of a subliminal channel alone. Additionally, the enhanced mapping based on the evaluation of a predetermined perceptibility threshold (for determinations of the difference between the subliminal and supraliminal channel) provides for higher robustness and resistance to brute force attacks on understanding the structure of the materials or logically ordered and mapped information being added to an object. Improved Steganographic Ciphers The improvement of the present invention relates to predetermining the available candidate bits for a steganographic ciphering process and then “sealing” the remaining bits. Most steganographic ciphering utilizes less than all available candidate bits to force attempts at removal to randomize a larger set of bits. A randomization attack operates by bit-flipping those bits which are believed to represent the predetermined watermark. Choosing a subset of the candidate bits increases the randomness of the actual bits manipulated. The choice to manipulate any remaining bits in the candidate subliminal channel bit stream serves as a means for seating the entire digital watermark channel. (a watermark algorithm determines the candidate bits for watermarking and randomly changes a subset of the overall candidate bits, the remaining bits that are not chosen by the encoder can be determined and saved to differentiate the watermark bits from the additional bits that could have been watermarked in the candidate bit set of data). The further improvement of the present invention may utilize any supraliminal channel entropy or noise to enable logical relationships between imperceptible and perceptible noise for any given data object. Confusing authentication or verification bits with noise above and below a perceptibility threshold (the supraliminal and subliminal channels) removes some of the stricter limitations imposed by the imperceptibility requirements of steganographic cipher techniques, as described in the art. Moreover, enabling true subliminal free channels for digital objects requires an understanding of the overall available entropy in a document. Digital signatures hash the entropy in the document and save the hash to the private key so that the private key holder can determine if the document has been altered, usually a byte, 8 bits of data, must be changed for the signature check to fail. However, signature algorithms which are deemed subliminal free suffer from an incomplete information theoretic understanding both of the math which “proves” public key cryptography (there is no real proof only mathematically difficult problems such as factoring or Fermat's Theorem), and how much data relates the public and private key via the message being signed. Zero knowledge proofs address this partially by requiring some additional bit commitment by the sender to establish for the receiver that it was indeed he who signed the message, say by the alteration of a specific bit of a set of candidate entropy bits in the signal. Essentially separating “useful” information from information alone. However, since zero knowledge proofs are not related to measures of perceptibility, an for the purposes of the present invention such measures invariably matter to securing or making unique objects, by use of a steganographic cipher it can be determined, in advance, all candidate bits and enable additional related supraliminal bits to play a role in a predetermined change which suffices a zero knowledge proof. Screening Technique for Caching or Archival Purposes A visible watermark has application to screening in much the same way as robust open watermarks (ROW). [For a discussion of ROWs, see pending U.S. patent application Ser. No. 09/594,719, filed Jun. 16, 2000, entitled “Utilizing Data Reduction Steganographic and Cryptographic Systems” (which is a continuation-in-part of PCT application No. PCT/US00/06522, filed Mar. 14, 2000, which PCT application claimed priority to U.S. Provisional Application No. 60/125,990, filed Mar. 24, 1999), and PCT Application No. PCT/US00/21189, filed Aug. 4, 2000 (which claims priority to U.S. patent application Ser. No, 60/147,134, filed Aug. 4, 1999, and to U.S. patent application Ser. No. 60/213,489, filed Jun. 23, 2000, both of which are entitled, “A Secure Personal Content Server”). The previously identified patents and/or patent applications are hereby incorporated by reference, in their entireties.] While a visible watermark has traditionally been viewed as an ordered pattern which renders differences observable to 3rd parties for any particular media object, an ROW (“robust open watermark”) is a fixed low cost imperceptible watermark designed to be robust against a number of signal manipulations (which can be predetermined as well). To boost the security of a visible watermark, ciphering of the mapped and observable changes made to a signal are made. Similarly, any imperceptible marks can be ciphered as well. By enabling a system to handle either perceptible marks (which need not be discovered by casual observers) or ROWs (which are informationally hidden in a manner consistent with the perceptibly significant features of a given data object), or both, screening can be made more robust. First, many data objects benefit from perceptible marks, including those objects that require quick visible authentication, such as traveler's checks and currency. The perceptible mark can be quickly checked since it is readily perceptible. Second, the perceptible marks may be made more random by application of a transfer function to scramble the signal changes enabling only the holder of a predetermined key the ability to observe the perceptible mark in an unfettered manner. Third, combinations of perceptible marks and ROWs are a low cost means for screening data objects which are sent and received by servers or caching applications for which data object-based tagging is desired (for legal reasons, efficiencies in grouping commercial and noncommercial objects consistently, etc.). The visible watermark, or manipulated supraliminal channel, may simply contain redundant enough information to be logically associated with the predetermined key (having both subliminal and supraliminal mapping and ciphering information), the predetermined message (which may exist in either the subliminal, or supraliminal channels, or both channels, and may be encrypted), and the object being protected (which may first be subject to some form of data reduction to measure the absolute minimum amount of data required to appropriately represent the object informationally or physically). The present invention would increase the breadth of authentication and verification techniques that have a wider range of computational requirements to enable a wider range of commercial activity. With the addition of perceptible tags, the range increases beyond applications which focus strictly on imperceptible tagging (as most digital watermarking systems do). Consumers would have a simpler means for self-authentication of an object by observing a visible watermark and by supplying their public key to a server for which the watermarked object exists. The public key and signal characteristics of that data object sought could be further combined to assist in imperceptibly tagging the object with a forensic watermark (i.e., the characteristics of the object, the characteristics of the perceptible mark and the public key in combination can be used to generate an imperceptible mark). Alternatively, separation of the authentication of the visible or perceptible mark from the data object alone can be logically constrained for successful authentication or verification of the imperceptible tag to assure that data objects are handled in a manner consistent with the designs of the owner or creator of the data signal being offered. Providers of storage and archive space, and services which handle data which may be copyrighted or require security, benefit from the relationship between the perceptible and imperceptible tagging mechanism with the signal characteristics of the object. Unlike many disclosed systems in the prior art, too many systems rely strictly on access restriction protocols or security which has no relationship with the signal features of the data being protected. While the invention has been particularly shown and described by the foregoing detailed description, it will be understood by those skilled in the art that various other changes in form and detail may be made without departing from the spirit and scope of the invention.

Description

Topics

Download Full PDF Version (Non-Commercial Use)

Patent Citations (419)

    Publication numberPublication dateAssigneeTitle
    US-6373892-B1April 16, 2002Sega Enterprises, Ltd.Method for compressing and decompressing moving picture information and video signal processing system
    US-6389538-B1May 14, 2002International Business Machines CorporationSystem for tracking end-user electronic content usage
    US-2007011458-A1January 11, 2007Scott A. MoskowitzOptimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-5832119-ANovember 03, 1998Digimarc CorporationMethods for controlling systems using control signals embedded in empirical data
    US-5497419-AMarch 05, 1996Prima Facie, Inc.Method and apparatus for recording sensor data
    US-5450490-ASeptember 12, 1995The Arbitron CompanyApparatus and methods for including codes in audio signals and decoding
    US-3984624-AOctober 05, 1976Weston Instruments, Inc.Video system for conveying digital and analog information
    US-5930369-AJuly 27, 1999Nec Research Institute, Inc.Secure spread spectrum watermarking for multimedia data
    US-5136647-AAugust 04, 1992Bell Communications Research, Inc.Method for secure time-stamping of digital documents
    US-5341429-AAugust 23, 1994Testdrive CorporationTransformation of ephemeral material
    US-6687683-B1February 03, 2004Matsushita Electric Industrial Co., Ltd.Production protection system dealing with contents that are digital production
    US-2005246554-A1November 03, 2005Apple Computer, Inc.System and method for creating tamper-resistant code
    US-2007226506-A1September 27, 2007Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-5617119-AApril 01, 1997Systems Research & Applications CorporationProtection of an electronically stored image in a first color space by the alteration of a digital component in a second color space
    US-5394324-AFebruary 28, 1995Xerox CorporationAuction-based control system for energy resource management in a building
    US-5646997-AJuly 08, 1997Barton; James M.Method and apparatus for embedding authentication information within digital data
    US-5930377-AJuly 27, 1999Digimarc CorporationMethod for image encoding
    US-2006041753-A1February 23, 2006Koninklijke Philips Electronics N.V.Fingerprint extraction
    US-4979210-ADecember 18, 1990Matsushita Electric Industrial Co., Ltd.Method and apparatus for protection of signal copy
    US-6799277-B2September 28, 2004Z4 Technologies, Inc.System and method for monitoring software
    US-2007110240-A1May 17, 2007Blue Spike, Inc.System and methods for permitting open access to data objects and for securing data within the data objects
    US-5737416-AApril 07, 1998International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
    US-5243515-ASeptember 07, 1993Lee Wayne MSecure teleprocessing bidding system
    US-6192138-B1February 20, 2001Kabushiki Kaisha ToshibaApparatus and method for embedding/unembedding supplemental information
    US-5479210-ADecember 26, 1995Quantel, Ltd.Video image processing system having variable data compression
    US-2006013395-A1January 19, 2006Brundage Trent J, Brunk Hugh LDigital watermark key generation
    US-6081597-AJune 27, 2000Ntru Cryptosystems, Inc.Public key cryptosystem method and apparatus
    US-2004059918-A1March 25, 2004Changsheng XuMethod and system of digital watermarking for compressed audio
    US-5905800-AMay 18, 1999The Dice CompanyMethod and system for digital watermarking
    US-5341477-AAugust 23, 1994Digital Equipment CorporationBroker for computer network server selection
    US-5719937-AFebruary 17, 1998Solana Technology Develpment CorporationMulti-media copy management system
    US-5428606-AJune 27, 1995Moskowitz; Scott A.Digital information commodities exchange
    US-2005135615-A1June 23, 2005Moskowitz Scott A., Cooperman Marc S.Z-transform implementation of digital watermarks
    US-6480937-B1November 12, 2002Pact Informationstechnologie GmbhMethod for hierarchical caching of configuration data having dataflow processors and modules having two-or multidimensional programmable cell structure (FPGAs, DPGAs, etc.)--
    US-6957330-B1October 18, 2005Storage Technology CorporationMethod and system for secure information handling
    US-5530751-AJune 25, 1996Hewlett-Packard CompanyEmbedded hidden identification codes in digital objects
    US-6530021-B1March 04, 2003Koninklijke Philips Electronics N.V.Method and system for preventing unauthorized playback of broadcasted digital data streams
    US-6088455-AJuly 11, 2000Logan; James D., Goessling; Daniel F., Goldhor; Richard S.Methods and apparatus for selectively reproducing segments of broadcast programming
    US-2008022113-A1January 24, 2008Wistaria Trading, Inc.Optimization methods for the insertion, protection and detection of digital of digital watermarks in digital data
    US-7409073-B2August 05, 2008Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-5365586-ANovember 15, 1994Washington UniversityMethod and apparatus for fingerprinting magnetic media
    US-5398285-AMarch 14, 1995Motorola, Inc.Method for generating a password using public key cryptography
    US-6457058-B1September 24, 2002Cisco Technology, Inc.Network switch with hash table look up
    US-5790677-AAugust 04, 1998Microsoft CorporationSystem and method for secure electronic commerce transactions
    US-4528588-AJuly 09, 1985Loefberg BoMethod and apparatus for marking the information content of an information carrying signal
    US-5903721-AMay 11, 1999cha|Technologies Services, Inc.Method and system for secure online transaction processing
    US-6813718-B2November 02, 2004Z4 Technologies, Inc.Computer readable storage medium for securing software to reduce unauthorized use
    US-2005160271-A9July 21, 2005Brundage Trent J., Mahmood Sher-Jan, Weaver Matthew M., Hannigan Brett T., Bradley Brett A., John Stach, Perry Burt W., Durst Robert T.Jr., Rhoads Geoffrey B.Identification document and related methods
    US-2006251291-A1November 09, 2006Rhoads Geoffrey BMethods for inserting and detecting watermarks in digital data
    US-5073925-ADecember 17, 1991Matsushita Electric Industrial Co., Ltd.Method and apparatus for the protection of signal copy
    US-4980782-ADecember 25, 1990Peter GinkelSoftware protection and identification system
    US-5379345-AJanuary 03, 1995Radio Audit Systems, Inc.Method and apparatus for the processing of encoded data in conjunction with an audio broadcast
    US-5633932-AMay 27, 1997Intel CorporationApparatus and method for preventing disclosure through user-authentication at a printing node
    US-5894521-AApril 13, 1999Direct Business Technologies, Inc.System and method for encrypting sensitive information
    US-5754697-AMay 19, 1998Fu; Chi-Yung, Petrich; Loren I.Selective document image data compression technique
    US-5418713-AMay 23, 1995Allen; RichardApparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials
    US-7095874-B2August 22, 2006Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-6532284-B2March 11, 2003Morgan Guaranty Trust CompanyMethod and system for optimizing bandwidth cost via caching and other network transmission delaying techniques
    US-6590996-B1July 08, 2003Digimarc CorporationColor adaptive watermarking
    US-5243423-ASeptember 07, 1993A. C. Nielsen CompanySpread spectrum digital data transmission over TV video
    US-6278791-B1August 21, 2001Eastman Kodak CompanyLossless recovery of an original image containing embedded data
    US-7289643-B2October 30, 2007Digimarc CorporationMethod, apparatus and programs for generating and utilizing content signatures
    US-5889868-AMarch 30, 1999The Dice CompanyOptimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-7343492-B2March 11, 2008Wistaria Trading, Inc.Method and system for digital watermarking
    US-6041316-AMarch 21, 2000Lucent Technologies Inc.Method and system for ensuring royalty payments for data delivered over a network
    US-6381618-B1April 30, 2002International Business Machines CorporationMethod and apparatus for autosynchronizing distributed versions of documents
    US-4969204-ANovember 06, 1990Eastman Kodak CompanyHybrid residual-based hierarchical storage and display method for high resolution digital images in a multiuse environment
    US-5765152-AJune 09, 1998Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
    US-2004125983-A1July 01, 2004Reed Alastair M., Rhoads Geoffrey B.Color adaptive watermarking
    US-5287407-AFebruary 15, 1994International Business Machines CorporationComputer software protection
    US-5530759-AJune 25, 1996International Business Machines CorporationColor correct digital watermarking of images
    US-6226618-B1May 01, 2001International Business Machines CorporationElectronic content delivery system
    US-5513126-AApril 30, 1996Xerox CorporationNetwork having selectively accessible recipient prioritized communication channel profiles
    US-2008022114-A1January 24, 2008Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-5781184-AJuly 14, 1998Wasserman; Steve C., Williams; Gregory G., Bucher; Timothy P., Pansegrau; Curtis, Cassareau; Philippe M., Wallace; Gregory K.Real time decompression and post-decompress manipulation of compressed full motion video
    US-5583488-ADecember 10, 1996Sala; Nicola R., Sala; Rocco L.Proximity alarm system
    US-6051029-AApril 18, 2000Entelos, Inc.Method of generating a display for a dynamic simulation model utilizing node and link representations
    US-6009176-ADecember 28, 1999International Business Machines CorporationHow to sign digital streams
    US-5673316-ASeptember 30, 1997International Business Machines CorporationCreation and distribution of cryptographic envelope
    US-6453252-B1September 17, 2002Creative Technology Ltd.Process for identifying audio content
    US-4405829-ASeptember 20, 1983Massachusetts Institute Of TechnologyCryptographic communications system and method
    US-6199058-B1March 06, 2001Oracle CorporationReport server caching
    US-6425081-B1July 23, 2002Canon Kabushiki KaishaElectronic watermark system electronic information distribution system and image filing apparatus
    US-6725372-B1April 20, 2004Verizon Laboratories Inc.Digital watermarking
    US-5629980-AMay 13, 1997Xerox CorporationSystem for controlling the distribution and use of digital works
    US-5822432-AOctober 13, 1998The Dice CompanyMethod for human-assisted random key generation and application for digital watermark system
    US-5568570-AOctober 22, 1996Eastman Kodak CompanyMethod and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
    US-7647503-B2January 12, 2010Wistaria Trading, Inc.Optimization methods for the insertion, projection, and detection of digital watermarks in digital data
    US-6069914-AMay 30, 2000Nec Research Institute, Inc.Watermarking of image data using MPEG/JPEG coefficients
    US-6282300-B1August 28, 2001Signafy, Inc.Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
    US-6272634-B1August 07, 2001Regents Of The University Of MinnesotaDigital watermarking to resolve multiple claims of ownership
    US-5949055-ASeptember 07, 1999Xerox CorporationAutomatic geometric image transformations using embedded signals
    US-5471533-ANovember 28, 1995Symbol Technologies, Inc.Record with encoded data
    US-5740244-AApril 14, 1998Washington UniversityMethod and apparatus for improved fingerprinting and authenticating various magnetic media
    US-5884033-AMarch 16, 1999Spyglass, Inc.Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
    US-5862260-AJanuary 19, 1999Digimarc CorporationMethods for surveying dissemination of proprietary empirical data
    US-4200770-AApril 29, 1980Stanford UniversityCryptographic apparatus and method
    US-6240121-B1May 29, 2001Matsushita Electric Industrial Co., Ltd.Apparatus and method for watermark data insertion and apparatus and method for watermark data detection
    US-5974141-AOctober 26, 1999Mitsubishi CorporationData management system
    US-5410598-AApril 25, 1995Electronic Publishing Resources, Inc.Database usage metering and protection system and method
    US-5768396-AJune 16, 1998Yamaha CorporationOnline karaoke system with flying start performance
    US-6647424-B1November 11, 2003Nortel Networks LimitedMethod and apparatus for discarding data packets
    US-5142576-AAugust 25, 1992Market Data CorporationSystem for securely providing restricted video information
    US-2010153734-A1June 17, 2010Blue Spike, Inc.Utilizing data reduction in steganographic and cryptographic system
    US-5912972-AJune 15, 1999Sony CorporationMethod and apparatus for embedding authentication information within digital data
    US-6966002-B1November 15, 2005Trymedia Systems, Inc.Methods and apparatus for secure distribution of software
    US-7743001-B1June 22, 2010Amazon Technologies, Inc.Method and system for dynamic pricing of web services utilization
    US-5406627-B1February 04, 1997Nippon Denki Home ElectronicsSystem and method for transmitting entertainment information to authorized ones of plural receivers
    US-6233347-B1May 15, 2001Massachusetts Institute Of TechnologySystem method, and product for information embedding using an ensemble of non-intersecting embedding generators
    US-5818818-AOctober 06, 1998Fujitsu LimitedCommunication service quality control system
    US-3986624-AOctober 19, 1976International Incinerators, Inc.Disposal feeding system including selective container control
    US-5689587-ANovember 18, 1997Massachusetts Institute Of TechnologyMethod and apparatus for data hiding in images
    US-7150003-B2December 12, 2006Matsushita Electric Industrial Co., Ltd.Class coalescence for obfuscation of object-oriented software
    US-5859920-AJanuary 12, 1999Eastman Kodak CompanyMethod for embedding digital information in an image
    US-5848155-ADecember 08, 1998Nec Research Institute, Inc.Spread spectrum watermark for embedded signalling
    US-5625690-AApril 29, 1997Lucent Technologies Inc.Software pay per use system
    US-6381747-B1April 30, 2002Macrovision Corp.Method for controlling copy protection in digital video networks
    US-5915027-AJune 22, 1999Nec Research Institute, Nec CorporationDigital watermarking
    US-5677952-AOctober 14, 1997International Business Machines CorporationMethod to protect information on a computer storage device
    US-6385324-B1May 07, 2002Sorus Audio AgBroadband loudspeaker
    US-6502195-B1December 31, 2002Z4 Technologies, Inc.Computer readable storage medium for providing repeated contact with software end-user
    US-7240210-B2July 03, 2007Microsoft CorporationHash value computer of content of digital signals
    US-2010220861-A1September 02, 2010Moskowitz Scott AMultiple transform utilization and application for secure digital watermarking
    US-6430301-B1August 06, 2002Verance CorporationFormation and analysis of signals with common and transaction watermarks
    US-7050396-B1May 23, 2006Cisco Technology, Inc.Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network
    US-6785825-B2August 31, 2004Z4 Technologies, Inc.Method for securing software to decrease software piracy
    US-4390898-AJune 28, 1983Northern Telecom LimitedScrambling and unscrambling video signals in a pay TV system
    US-6363483-B1March 26, 2002Lucent Technologies Inc.Methods and systems for performing article authentication
    US-5598470-AJanuary 28, 1997International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block
    US-6522769-B1February 18, 2003Digimarc CorporationReconfiguring a watermark detector
    US-5850481-ADecember 15, 1998Digimarc CorporationSteganographic system
    US-5973731-AOctober 26, 1999Schwab; Barry H.Secure identification system
    US-5963909-AOctober 05, 1999Solana Technology Development CorporationMulti-media copy management system
    US-6523113-B1February 18, 2003Apple Computer, Inc.Method and apparatus for copy protection
    US-7095715-B2August 22, 20063Com CorporationSystem and method for processing network packet flows
    US-4908873-AMarch 13, 1990Philibert Alex C, Smith Jack W, Fox James WDocument reproduction security system
    US-6784354-B1August 31, 2004Microsoft CorporationGenerating a music snippet
    US-7460994-B2December 02, 2008M2Any GmbhMethod and apparatus for producing a fingerprint, and method and apparatus for identifying an audio signal
    US-5748783-AMay 05, 1998Digimarc CorporationMethod and apparatus for robust information coding
    US-7362775-B1April 22, 2008Wistaria Trading, Inc.Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
    US-6668246-B1December 23, 2003Intel CorporationMultimedia data delivery and playback system with multi-level content and privacy protection
    US-6493457-B1December 10, 2002At&T Corp.Electronic watermarking in the compressed domain utilizing perceptual coding
    US-2007083467-A1April 12, 2007Apple Computer, Inc.Partial encryption techniques for media data
    US-5579124-ANovember 26, 1996The Arbitron CompanyMethod and apparatus for encoding/decoding broadcast or recorded segments and monitoring audience exposure thereto
    US-6385596-B1May 07, 2002Liquid Audio, Inc.Secure online music distribution system
    US-6446211-B1September 03, 2002Z4 Technologies, Inc.Method and apparatus for monitoring software using encryption
    US-6310962-B1October 30, 2001Samsung Electronics Co., Ltd.MPEG2 moving picture encoding/decoding system
    US-5513261-AApril 30, 1996At&T Corp.Key management scheme for use with electronic cards
    US-6785815-B1August 31, 2004Intertrust Technologies Corp.Methods and systems for encoding and protecting data using digital signature and watermarking techniques
    US-4977594-ADecember 11, 1990Electronic Publishing Resources, Inc.Database usage metering and protection system and method
    US-6067622-AMay 23, 2000Moore; Steven JeromeSoftware security system using remove function to restrict unauthorized duplicating and installation of an application program
    US-5634040-AMay 27, 1997Samsung Electronics Co., Ltd.Data communication apparatus and method having concurrent image overlay function
    US-6230268-B1May 08, 2001International Business Machines CorporationData control system
    US-5506795-AApril 09, 1996Yamakawa; TakeshiApparatus and method for generating chaotic signals and chaos device
    US-6029126-AFebruary 22, 2000Microsoft CorporationScalable audio coder and decoder
    US-5617506-AApril 01, 1997The 3Do CompanyMethod for communicating a value over a transmission medium and for decoding same
    US-2008151934-A1June 26, 2008Wistaria Trading, Inc.Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
    US-5850481-C1July 16, 2002Digimarc CorpSteganographic system
    US-4339134-AJuly 13, 1982Rockwell International CorporationElectronic card game
    US-6522767-B1February 18, 2003Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-5664018-ASeptember 02, 1997Leighton; Frank ThomsonWatermarking process resilient to collusion attacks
    US-6345100-B1February 05, 2002Liquid Audio, Inc.Robust watermark method and apparatus for digital signals
    US-2004037449-A1February 26, 2004Davis Bruce L., Rodriguez Tony F., Rhoads Geoffrey B.Integrating digital watermarks in multimedia content
    US-6415041-B1July 02, 2002Nec CorporationDigital watermark insertion system and digital watermark characteristic table creating device
    US-6044471-AMarch 28, 2000Z4 Technologies, Inc.Method and apparatus for securing software to reduce unauthorized use
    US-7532725-B2May 12, 2009Blue Spike, Inc.Systems and methods for permitting open access to data objects and for securing data within the data objects
    US-6968337-B2November 22, 2005Audible Magic CorporationMethod and apparatus for identifying an unknown work
    US-6131162-AOctober 10, 2000Hitachi Ltd.Digital data authentication method
    US-5493677-AFebruary 20, 1996Systems Research & Applications CorporationGeneration, archiving, and retrieval of digital images with evoked suggestion-set captions and natural language interface
    US-5842213-ANovember 24, 1998Odom; Paul S., Massey; Michael J.Method for modeling, storing, and transferring data in neutral form
    US-5581703-ADecember 03, 1996International Business Machines CorporationMethod and apparatus for reserving system resources to assure quality of service
    US-5751811-AMay 12, 1998Magnotti; Joseph C., Nelson; Larry A.32N +D bit key encryption-decryption system using chaos
    US-6081251-AJune 27, 2000Sony CorporationApparatus and method for managing picture data
    US-6282650-B1August 28, 2001Intel CorporationSecure public digital watermark
    US-6665489-B2December 16, 2003Research Investment Network, Inc.System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server
    US-5991426-ANovember 23, 1999Signafy, Inc.Field-based watermark insertion and detection
    US-5469536-ANovember 21, 1995Imageware Software, Inc.Image editing system including masking capability
    US-5539735-AJuly 23, 1996Moskowitz; Scott A.Digital information commodities exchange
    US-6418421-B1July 09, 2002International Business Machines CorporationMultimedia player for an electronic content delivery system
    US-6208745-B1March 27, 2001Sarnoff CorporationMethod and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
    US-4939515-AJuly 03, 1990General Electric CompanyDigital signal encoding and decoding apparatus
    US-7779261-B2August 17, 2010Wistaria Trading, Inc.Method and system for digital watermarking
    US-7206649-B2April 17, 2007Microsoft CorporationAudio watermarking with dual watermarks
    US-5640569-AJune 17, 1997Sun Microsystems, Inc.Diverse goods arbitration system and method for allocating resources in a distributed computer system
    US-6658010-B1December 02, 2003Hybrid Networks, Inc.High-speed internet access system
    US-5548579-AAugust 20, 1996International Business Machines CorporationSystem for effective allocation of network-wide bandwidth
    US-5530739-AJune 25, 1996Fujitsu LimitedMail center management system
    US-5745569-AApril 28, 1998The Dice CompanyMethod for stega-cipher protection of computer code
    US-5412718-AMay 02, 1995Institute Of Systems ScienceMethod for utilizing medium nonuniformities to minimize unauthorized duplication of digital information
    US-7058570-B1June 06, 2006Matsushita Electric Industrial Co., Ltd.Computer-implemented method and apparatus for audio data hiding
    US-7123718-B1October 17, 2006Blue Spike, Inc.Utilizing data reduction in stegnographic and cryptographic systems
    US-2004093521-A1May 13, 2004Ihab Hamadeh, George KesidisReal-time packet traceback and associated packet marking strategies
    US-6865747-B1March 08, 2005Digital Video Express, L.P.High definition media storage structure and playback mechanism
    US-5721788-AFebruary 24, 1998Corbis CorporationMethod and system for digital image signatures
    US-6398245-B1June 04, 2002International Business Machines CorporationKey management system for digital content player
    US-7051208-B2May 23, 2006Microsoft CorporationTechnique for producing through watermarking highly tamper-resistant executable code and resulting “watermarked” code so formed
    US-6377625-B1April 23, 2002Soft4D Co., Ltd.Method and apparatus for generating steroscopic image using MPEG data
    US-7233669-B2June 19, 2007Sony Corporation, Sony Electronics Inc.Selective encryption to enable multiple decryption keys
    US-5918223-AJune 29, 1999Muscle FishMethod and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information
    US-6978370-B1December 20, 2005Cryptography Research, Inc.Method and system for copy-prevention of digital copyright works
    US-6374036-B1April 16, 2002Macrovsion Corporation, Digimarc CorporationMethod and apparatus for copy-once watermark for video recording
    US-7046808-B1May 16, 2006Verance CorporationMethod and apparatus for detecting processing stages applied to a signal
    US-5478990-ADecember 26, 1995Coleman Environmental Systems, Inc.Method for tracking the production history of food products
    US-5687236-ANovember 11, 1997The Dice CompanySteganographic method and device
    US-6373960-B1April 16, 2002Pixel Tools CorporationEmbedding watermarks into compressed video data
    US-6606393-B1August 12, 2003Verizon Laboratories Inc.Message authentication code using image histograms
    US-5680462-AOctober 21, 1997Sandia CorporationInformation encoder/decoder using chaotic systems
    US-6385329-B1May 07, 2002Digimarc CorporationWavelet domain watermarks
    US-7286451-B2October 23, 2007Koninklijke Philips Electronics N.V.Copy control using digital speed bumps
    US-6275988-B1August 14, 2001Canon Kabushiki KaishaImage transmission apparatus, image transmission system, and communication apparatus
    US-2007113094-A1May 17, 2007Wistaria Trading, Inc.Method and system for digital watermarking
    US-4748668-AMay 31, 1988Yeda Research And Development Company LimitedMethod, apparatus and article for identification and signature
    US-7287275-B2October 23, 2007Moskowitz Scott AMethods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    US-2009037740-A1February 05, 2009Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-2010064140-A1March 11, 2010Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-5613004-AMarch 18, 1997The Dice CompanySteganographic method and device
    US-6990453-B2January 24, 2006Landmark Digital Services LlcSystem and methods for recognizing sound and music signals in high noise and distortion
    US-6611599-B2August 26, 2003Hewlett-Packard Development Company, L.P.Watermarking of digital object
    US-2002071556-A1June 13, 2002Moskowitz Scott A., Berry Michael W.System and methods for permitting open access to data objects and for securing data within the data objects
    US-5905975-AMay 18, 1999Ausubel; Lawrence M.Computer implemented methods and apparatus for auctions
    US-6587837-B1July 01, 2003International Business Machines CorporationMethod for delivering electronic content from an online store
    US-2010098251-A1April 22, 2010Moskowitz Scott AMethod for combining transfer functions and predetermined key creation
    US-7346472-B1March 18, 2008Blue Spike, Inc.Method and device for monitoring and analyzing signals
    US-5675653-AOctober 07, 1997Nelson, Jr.; Douglas ValmoreMethod and apparatus for digital encryption
    US-5408505-AApril 18, 1995Washington UniversityMethod and apparatus for process control, tension control, and testing of magnetic media
    US-4218582-AAugust 19, 1980The Board Of Trustees Of The Leland Stanford Junior UniversityPublic key cryptographic apparatus and method
    US-5860099-AJanuary 12, 1999Usar Systems, Inc.Stored program system with protected memory and secure signature extraction
    US-5917915-AJune 29, 1999Sony CorporationScramble/descramble method and apparatus for data broadcasting
    US-4876617-AOctober 24, 1989Thorn Emi PlcSignal identification
    US-5077665-ADecember 31, 1991Reuters LimitedDistributed matching system
    US-2004117628-A1June 17, 2004Z4 Technologies, Inc.Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
    US-2006013451-A1January 19, 2006Koninklijke Philips Electronics, N.V.Audio data fingerprint searching
    US-5657461-AAugust 12, 1997Xerox CorporationUser interface for defining and automatically transmitting data according to preferred communication channels
    US-5319735-AJune 07, 1994Bolt Beranek And Newman Inc.Embedded signalling
    US-3947825-AMarch 30, 1976International Business Machines CorporationAbstracting system for index search machine
    US-5363448-ANovember 08, 1994United Technologies Automotive, Inc.Pseudorandom number generation and cryptographic authentication
    US-6442283-B1August 27, 2002Digimarc CorporationMultimedia data embedding
    US-6330672-B1December 11, 2001At&T Corp.Method and apparatus for watermarking digital bitstreams
    US-2007127717-A1June 07, 2007Juergen Herre, Eric Allamanche, Oliver Hellmuth, Thorsten KastnerDevice and Method for Analyzing an Information Signal
    US-5920900-AJuly 06, 1999Cabletron Systems, Inc.Hash-based translation method and apparatus with multiple level collision resolution
    US-5870474-AFebruary 09, 1999Scientific-Atlanta, Inc.Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
    US-6205249-B1March 20, 2001Scott A. MoskowitzMultiple transform utilization and applications for secure digital watermarking
    US-7020285-B1March 28, 2006Microsoft CorporationStealthy audio watermarking
    US-2010182570-A1July 22, 2010Chota Matsumoto, Shinko Seiki Company, LimitedOphthalmic examination system
    US-5050213-ASeptember 17, 1991Electronic Publishing Resources, Inc.Database usage metering and protection system and method
    US-5369707-ANovember 29, 1994Tecsec IncorporatedSecure network method and apparatus
    EP-0649261-B1January 23, 2002Canon Kabushiki KaishaVorrichtung zur Verarbeitung und Verschlüsselung von Bilddaten
    US-5737733-AApril 07, 1998Microsoft CorporationMethod and system for searching compressed data
    US-6078664-AJune 20, 2000Moskowitz; Scott A., Cooperman; Marc S.Z-transform implementation of digital watermarks
    US-2008005572-A1January 03, 2008Moskowitz Scott AMethods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    EP-1354276-B1December 12, 2007Audible Magic CorporationMethod and apparatus for creating a unique audio signature
    US-5734752-AMarch 31, 1998Xerox CorporationDigital watermarking using stochastic screen patterns
    US-6674858-B1January 06, 2004Hitachi, Ltd.Receiving device, recording and reproducing device and receiving/recording-reproducing system for digital broadcast signal
    US-5136646-AAugust 04, 1992Bell Communications Research, Inc.Digital document time-stamping with catenate certificate
    US-6484264-B1November 19, 2002Z4 Technologies, Inc.Method for providing repeated contact with software end-user using authorized administrator
    US-5809139-ASeptember 15, 1998Vivo Software, Inc.Watermarking method and apparatus for compressed digital video
    US-5111530-AMay 05, 1992Sony CorporationDigital audio signal generating apparatus
    US-5757923-AMay 26, 1998Ut Automotive Dearborn, Inc.Method of generating secret identification numbers
    US-4424414-AJanuary 03, 1984Board Of Trustees Of The Leland Stanford Junior UniversityExponentiation cryptographic apparatus and method
    US-2007253594-A1November 01, 2007Vobile, Inc.Method and system for fingerprinting digital video object based on multiresolution, multirate spatial and temporal signatures
    US-2010002904-A1January 07, 2010Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-6804453-B1October 12, 2004Hitachi, Ltd.Digital signal recording/reproducing apparatus
    US-7530102-B2May 05, 2009Moskowitz Scott AMethods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    US-6842862-B2January 11, 2005Cloakware CorporationTamper resistant software encoding
    US-5487168-AJanuary 23, 1996International Business Machines CorporationMethod and system for global optimization of device allocation
    US-7177430-B2February 13, 2007Portalplayer, Inc.Digital entroping for digital audio reproductions
    US-6141753-AOctober 31, 2000Fraunhofer Gesellschaft, Mitsubishi CorporationSecure distribution of digital representations
    US-6351765-B1February 26, 2002Media 100, Inc.Nonlinear video editing system
    US-6285775-B1September 04, 2001The Trustees Of The University Of PrincetonWatermarking scheme for image authentication
    US-5210820-AMay 11, 1993Broadcast Data Systems Limited PartnershipSignal recognition system and method
    US-2008133927-A1June 05, 2008Wistaria Trading Inc.Method and system for digital watermarking
    US-5839100-ANovember 17, 1998Wegener; Albert WilliamLossless and loss-limited compression of sampled data signals
    US-2006140403-A1June 29, 2006Moskowitz Scott AMultiple transform utilization and application for secure digital watermarking
    US-4972471-ANovember 20, 1990Gary Gross, James DaleEncoding system
    US-6178405-B1January 23, 2001Innomedia Pte Ltd.Concatenation compression method
    US-2002010684-A1January 24, 2002Moskowitz Scott A.Systems, methods and devices for trusted transactions
    US-2008046742-A1February 21, 2008Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-5799083-AAugust 25, 1998Brothers; Harlan Jay, Genly; Chris HindEvent verification system
    US-5636276-AJune 03, 1997Brugger; RolfDevice for the distribution of music information in digital form
    US-2002103883-A1August 01, 2002Paul Haverstock, Miguel Estrada, Julio EstradaWeb server with unique identification of linked objects
    US-5999217-ADecember 07, 1999Berners-Lee; Charles PeterApparatus and method for encoding data
    US-5659726-AAugust 19, 1997Sandford, Ii; Maxwell T., Handel; Theodore G.Data embedding
    US-6813717-B2November 02, 2004Z4 Technologies, Inc.Method for securing software to reduce unauthorized use
    US-2004083369-A1April 29, 2004Ulfar Erlingsson, Xavier Boyen, Darrell Anderson, Wayne GraySystems and methods for transparent configuration authentication of networked devices
    US-5636292-C1June 18, 2002Digimarc CorpSteganography methods employing embedded calibration data
    US-7043050-B2May 09, 2006Microsoft CorporationSoftware anti-piracy systems and methods utilizing certificates with digital content
    US-6795925-B2September 21, 2004Z4 Technologies, Inc.Computer readable storage medium for providing repeated contact with software end-user
    US-4789928-ADecember 06, 1988Flex Japan Inc., Aucnet Inc.Auction information transmission processing
    US-5606609-AFebruary 25, 1997Scientific-AtlantaElectronic document verification system and method
    US-5940134-AAugust 17, 1999U.S. Philips CorporationMarking a video and/or audio signal
    US-6823455-B1November 23, 2004Intel CorporationMethod for robust watermarking of content
    US-2001043594-A1November 22, 2001Hiroaki Ogawa, Hiroshi Kakuda, Keiichi Yamada, Yasuharu Asano, Satoshi Fujimura, Hiroaki Kitano, Kazuo Ishii, Yasuhiko Kato, Masato Shimakawa, Masanori Omote, Hitoshi Honda, Atsuo HiroeInformation processing apparatus, information processing method and identification code
    US-2009210711-A1August 20, 2009Moskowitz Scott AMethods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    US-6081587-AJune 27, 2000Zoom Telephonics, Inc.Modem with ring detection/modem processing capability
    US-2005177727-A1August 11, 2005Moskowitz Scott A., Marc CoopermanSteganographic method and device
    US-2001029580-A1October 11, 2001Moskowitz Scott A.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-6754822-B1June 22, 2004Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forshung E.V.Active watermarks and watermark agents
    US-4038596-AJuly 26, 1977E M I LimitedMethod and apparatus for authenticating a record medium consisting of applying two different strength magnetizing fields and monitoring the remanent fields
    US-2002047873-A1April 25, 2002Yoshiyuki Imanaka, Masaki Inaba, Masami Ikeda, Yutaka Koizumi, Tsuyoshi Orikasa, Tatsuo Furukawa, Toshio Kashino, Hideaki Kishida, Seiichiro Karita, Shuji Koyama, Haruhiko Terai, Kimiyuki Hayasaki, Shuichi Katao, Akira Goto, Kouichi Omata, Hiroyuki Maru, Masaaki Izumida, Yuji Kamiyama, Takayuki OnoPrinting head, printing method and apparatus using same, and apparatus and method for correcting said printing head
    US-5113437-AMay 12, 1992Thorn Emi PlcSignal identification system
    US-6061793-AMay 09, 2000Regents Of The University Of MinnesotaMethod and apparatus for embedding data, including watermarks, in human perceptible sounds
    US-7647502-B2January 12, 2010Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-2003005780-A1January 09, 2003Birger Pahl, Hansen James E., Planning Matthew F., Mathews Robert H.Torque measuring apparatus and method employing a crystal oscillator
    US-5809160-ASeptember 15, 1998Digimarc CorporationMethod for encoding auxiliary data within a source signal
    US-5893067-AApril 06, 1999Massachusetts Institute Of TechnologyMethod and apparatus for echo data hiding in audio signals
    US-7035409-B1April 25, 2006Moskowitz Scott AMultiple transform utilization and applications for secure digital watermarking
    US-7266697-B2September 04, 2007Microsoft CorporationStealthy audio watermarking
    US-2002009208-A1January 24, 2002Adnan Alattar, Carr J. Scott, Seder Phillip A., Neil Lofgren, Rhoads Geoffrey B.Authentication of physical and electronic media objects using digital watermarks
    US-4672605-AJune 09, 1987Applied Spectrum Technologies, Inc.Data and voice communications system
    US-7231524-B2June 12, 2007Microsoft CorporationMethod for watermarking computer programs
    US-2004028222-A1February 12, 2004Sewell Roger Fane, Mark St. John Owen, Barlow Stephen John, Long Simon PaulStegotext encoder and decoder
    EP-0581317-A2February 02, 1994Corbis CorporationMethod and system for digital image signatures
    US-7127615-B2October 24, 2006Blue Spike, Inc.Security based on subliminal and supraliminal channels for data objects
    US-2008075277-A1March 27, 2008Wistaria Trading, Inc.Steganographic method and device
    US-6584125-B1June 24, 2003Nec CorporationCoding/decoding apparatus, coding/decoding system and multiplexed bit stream
    US-6330335-B1December 11, 2001Digimarc CorporationAudio steganography
    US-2004128514-A1July 01, 2004Rhoads Geoffrey B.Method for increasing the functionality of a media player/recorder device or an application program
    US-2003219143-A1November 27, 2003Moskowitz Scott A., Cooperman Marc S.Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-5136581-AAugust 04, 1992At&T Bell LaboratoriesArrangement for reserving and allocating a plurality of competing demands for an ordered bus communication network
    US-5161210-ANovember 03, 1992U.S. Philips CorporationCoder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals from the combined signal, and record carrier having such combined signal recorded thereon
    US-6278780-B1August 21, 2001Nec CorporationMethod of and an apparatus for generating internal crypto-keys
    US-6301663-B1October 09, 2001Kabushiki Kaisha ToshibaCopy protection apparatus and information recording medium used in this copy protection apparatus
    US-5774452-AJune 30, 1998Aris Technologies, Inc.Apparatus and method for encoding and decoding information in audio signals
    US-5696828-ADecember 09, 1997United Technologies Automotive, Inc.Random number generating system and process based on chaos
    US-2002073043-A1June 13, 2002Gary Herman, Goldstein Theodore Charles, Martinez Ronald G.Smart electronic receipt system
    US-2009089427-A1April 02, 2009Blue Spike, Inc.Secure personal content server
    US-2006101269-A1May 11, 2006Wistaria Trading, Inc.Method and system for digital watermarking
    WO-0203385-A1January 10, 2002Moskowitz Scott AProtection contre la copie de donnees numeriques au moyen de techniques steganographiques et cryptographiques combinees
    US-6141754-AOctober 31, 2000International Business Machines CorporationIntegrated method and system for controlling information access and distribution
    US-2002056041-A1May 09, 2002Moskowitz Scott A.Security based on subliminal and supraliminal channels for data objects
    US-2002026343-A1February 28, 2002Dennis DuenkeMaterial and labor cost estimatting method and system
    US-6463468-B1October 08, 2002Netzero, Inc.Targeted network video download interface
    US-5832119-C1March 05, 2002Digimarc CorpMethods for controlling systems using control signals embedded in empirical data
    US-2004243540-A1December 02, 2004Moskowitz Scott A., Berry Michael W.Method and device for monitoring and analyzing signals
    US-6430302-B2August 06, 2002Digimarc CorporationSteganographically encoding a first image in accordance with a second image
    EP-0372601-B1February 22, 1995Philips Electronics N.V.Codeur pour insérer une information supplémentaire dans un signal audio numérique de format préalablement déterminé, décodeur pour déduire cette information supplémentaire de ce signal numérique, dispositif muni d'un tel codeur, pour enregister un signal numérique sur un support d'information et support d'information obtenu avec ce dispositif
    US-7457962-B2November 25, 2008Wistaria Trading, IncOptimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-7103184-B2September 05, 2006Intel CorporationSystem and method for sign mask encryption and decryption
    US-2009190754-A1July 30, 2009Blue Spike, Inc.System and methods for permitting open access to data objects and for securing data within the data objects
    US-7107451-B2September 12, 2006Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-7162642-B2January 09, 2007Digital Video Express, L.P.Digital content distribution system and method
    US-2007028113-A1February 01, 2007Moskowitz Scott ASystems, methods and devices for trusted transactions
    US-2007300072-A1December 27, 2007Wistaria Trading, Inc.Optimization methods for the insertion, protection and detection of digital watermarks in digital data
    US-2001010078-A1July 26, 2001Moskowitz Scott A.Multiple transform utilization and applications for secure digital watermarking
    US-6154571-ANovember 28, 2000Nec Research Institute, Inc., Nec CorporationRobust digital watermarking
    US-5406627-AApril 11, 1995Nec Home Electronics, Ltd.Digital data cryptographic system
    US-6792548-B2September 14, 2004Z4 Technologies, Inc.Method for providing repeated contact with software end-user using authorized administrator
    US-7007166-B1February 28, 2006Wistaria Trading, Inc.Method and system for digital watermarking
    EP-0872073-B1November 28, 2007Wistaria Trading, Inc.Procede et dispositif steganographiques
    US-5327520-AJuly 05, 1994At&T Bell LaboratoriesMethod of use of voice message coder/decoder
    US-5923763-AJuly 13, 1999Walker Asset Management Limited PartnershipMethod and apparatus for secure document timestamping
    US-6539475-B1March 25, 2003Nec CorporationMethod and system for protecting digital data from unauthorized copying
    US-6049838-AApril 11, 2000Sun Microsystems, Inc.Persistent distributed capabilities
    US-2002097873-A1July 25, 2002Rade PetrovicApparatus and method for embedding and extracting information in analog signals using replica modulation
    US-6983058-B1January 03, 2006Kowa Co., Ltd.Method of embedding digital watermark, storage medium in which the method is stored, method of identifying embedded digital watermark, and apparatus for embedding digital watermark
    US-2008028222-A1January 31, 2008Blue Spike, Inc.Security based on subliminal and supraliminal channels for data objects
    US-7568100-B1July 28, 2009Wistaria Trading, Inc.Steganographic method and device
    US-6986063-B2January 10, 2006Z4 Technologies, Inc.Method for monitoring software using encryption including digital signatures/certificates
    US-2003133702-A1July 17, 2003Todd R. CollartSystem, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server
    US-2006005029-A1January 05, 2006Verance CorporationPre-processed information embedding system
    US-2008109417-A1May 08, 2008Blue Spike, Inc.Method and device for monitoring and analyzing signals
    US-2010202607-A1August 12, 2010Wistaria Trading, Inc.Linear predictive coding implementation of digital watermarks
    US-6148333-ANovember 14, 2000Mgi Software CorporationMethod and system for server access control and tracking
    US-6834308-B1December 21, 2004Audible Magic CorporationMethod and apparatus for identifying media content presented on a media playing device
    NL-1005523-C2September 15, 1998Univ Eindhoven TechWerkwijze en communicatiesysteem voor het in gedeeltelijk gecodeerde vorm overdragen van informatiesignalen.
    US-6931534-B1August 16, 2005Telefonaktiebolaget Lm Erricsson (Publ)Method and a device for encryption of images
    US-7152162-B2December 19, 2006Wistaria Trading, Inc.Z-transform implementation of digital watermarks
    US-6857078-B2February 15, 2005Z4 Technologies, Inc.Method for securing software to increase license compliance
    US-5828325-AOctober 27, 1998Aris Technologies, Inc.Apparatus and method for encoding and decoding information in analog signals
    US-2010106736-A1April 29, 2010Blue Spike, Inc.Method and device for monitoring and analyzing signals
    US-6792549-B2September 14, 2004Z4 Technologies, Inc.Method and apparatus for repeated contact of software end-user
    US-5636292-AJune 03, 1997Digimarc CorporationSteganography methods employing embedded calibration data
    US-7159116-B2January 02, 2007Blue Spike, Inc.Systems, methods and devices for trusted transactions
    US-2007300073-A1December 27, 2007Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-2010077219-A1March 25, 2010Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-2007079131-A1April 05, 2007Wistaria Trading, Inc.Linear predictive coding implementation of digital watermarks
    US-2009220074-A1September 03, 2009Wistaria Trading Inc.Steganographic method and device
    US-4896275-AJanuary 23, 1990Bull Hn Information Systems Inc.Full page graphics image display data reduction
    US-6557103-B1April 29, 2003The United States Of America As Represented By The Secretary Of The ArmySpread spectrum image steganography
    US-4827508-AMay 02, 1989Personal Library Software, Inc.Database usage metering and protection system and method
    US-6668325-B1December 23, 2003Intertrust TechnologiesObfuscation techniques for enhancing software security
    US-6405203-B1June 11, 2002Research Investment Network, Inc.Method and program product for preventing unauthorized users from using the content of an electronic storage medium
    US-6977894-B1December 20, 2005Nortel Networks LimitedMethod and apparatus for discarding data packets through the use of descriptors
    EP-0565947-B1May 28, 1997NOKIA TECHNOLOGY GmbHMéthode pour inclusion d'information digitale dans un signal audio avant decoder le canal
    US-5471533-B1April 18, 2000Symbol Technologies IncRecord with encoded data
    US-2003002862-A1January 02, 2003Rodriguez Arturo A., Beebe Randolph R., Hammett Geoffrey G.Bandwidth allocation and pricing system for downloadable media content
    US-2010005308-A1January 07, 2010Wistaria Trading, Inc.Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-7035049-B2April 25, 2006Hitachi Global Storage Technologies Japan, Ltd.Glass substrate for a magnetic disk, a magnetic disk which can be formed with a stable texture and a magnetic disk device
    US-6775772-B1August 10, 2004International Business Machines CorporationPiggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
    US-2004086119-A1May 06, 2004Moskowitz Scott A.Method for combining transfer functions with predetermined key creation
    US-2003126445-A1July 03, 2003Apple Computer, Inc.Method and apparatus for copy protection
    US-2002161741-A1October 31, 2002Shazam Entertainment Ltd.Method and apparatus for automatically creating database for use in automated media recognition system
    US-2008016365-A1January 17, 2008Moskowitz Scott AData protection method and device
    US-7475246-B1January 06, 2009Blue Spike, Inc.Secure personal content server
    US-2007064940-A1March 22, 2007Blue Spike, Inc.Utilizing data reduction in steganographic and cryptographic systems
    US-2006285722-A1December 21, 2006Moskowitz Scott A, Cooperman Marc SOptimization methods for the insertion, protection, and detection of digital watermarks in digitized data
    US-6950941-B1September 27, 2005Samsung Electronics Co., Ltd.Copy protection system for portable storage media
    EP-1547337-B1March 22, 2006Green Border TechnologiesTatouage numérique au niveau des paquets
    US-6233684-B1May 15, 2001Contenaguard Holdings, Inc.System for controlling the distribution and use of rendered digital works through watermaking
    US-6598162-B1July 22, 2003Scott A. MoskowitzMethod for combining transfer functions with predetermined key creation
    US-5943422-AAugust 24, 1999Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
    US-2008005571-A1January 03, 2008Moskowitz Scott AMethods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    US-2002152179-A1October 17, 2002Achiezer RacovRemote payment method and system
    US-2003200439-A1October 23, 2003Moskowitz Scott A.Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
    US-2004049695-A1March 11, 2004Choi Yang Seo, Choi Byeong Cheol, Kang Dong Ho, Han Seung Wan, Seo Dong IiSystem for providing a real-time attacking connection traceback using a packet watermark insertion technique and method therefor
    US-2004117664-A1June 17, 2004Z4 Technologies, Inc.Apparatus for establishing a connectivity platform for digital rights management
    US-7177429-B2February 13, 2007Blue Spike, Inc.System and methods for permitting open access to data objects and for securing data within the data objects
    EP-0651554-A1May 03, 1995Eastman Kodak CompanyMethod and apparatus for the addition and removal of digital watermarks in a hierarchical image storage and retrieval system
    US-7363278-B2April 22, 2008Audible Magic CorporationCopyright detection and protection system and method
    US-6853726-B1February 08, 2005Wistaria Trading, Inc.Z-transform implementation of digital watermarks
    US-2010077220-A1March 25, 2010Moskowitz Scott AOptimization methods for the insertion, protection, and detection of digital watermarks in digital data
    US-7664263-B2February 16, 2010Moskowitz Scott AMethod for combining transfer functions with predetermined key creation
    US-7093295-B1August 15, 2006Makoto SaitoMethod and device for protecting digital data by double re-encryption
    US-2003027549-A1February 06, 2003Msafe Inc.Prepaid communication system and method
    US-2004225894-A1November 11, 2004Z4 Technologies, Inc.Hardware based method for digital rights management including self activating/self authentication software
    US-2002057651-A1May 16, 2002Roberts Lawrence G.Micro-flow management
    US-2007294536-A1December 20, 2007Wistaria Trading, Inc.Steganographic method and device
    US-6263313-B1July 17, 2001International Business Machines CorporationMethod and apparatus to create encoded digital content

NO-Patent Citations (99)

    Title
    1997, Merriam-Webster's Collegiate Dictionary, 10th Ed., Merriam Webster, Inc., p. 207.
    Bender, Walter R. et al., Techniques for Data Hiding, SPIE Int. Soc. Opt. Eng., vol. 2420, pp. 164-173, 1995.
    Brealy, et al., Principles of Corporate Finance, "Appendix A-Using Option Valuation Models", 1984, pp. 448-449.
    Caronni, Germano, "Assuring Ownership Rights for Digital Images", published proceeds of reliable IT systems, v15 '95, H.H. Bruggemann and W. Gerhardt-Hackel (Ed) Viewing Publishing Company Germany 1995.
    Copeland, et al., Real Options: A Practitioner's Guide, 2001 pp. 106-107, 201-202, 204-208.
    Crawford, D.W. "Pricing Network Usage: A Market for Bandwidth of Market Communication?" presented MIT Workshop on Internet Economics, Mar. 1995 http://www.press.vmich.edu/iep/works/CrawMarket.html on March.
    Dec. 9, 2010, U.S. Appl. No. 11/900,065.
    EPO Application No. 96919405.9, entitled "Steganographic Method and Device"; published as EP0872073 (A2), Oct. 21, 1998.
    Gerzon, Michael et al., A High Rate Buried Data Channel for Audio CD, presentation notes, Audio Engineering Soc. 94th Convention (1993).
    Gruhl, Daniel et al., Echo Hiding. In Proceeding of the Workshop on Information Hiding. No. 1174 in Lecture Notes in Computer Science, Cambridge, England (May/Jun. 1996).
    Jan. 12, 2012, U.S. Appl. No. 11/900,065.
    Jan. 12, 2012, U.S. Appl. No. 12/655,002.
    Jan. 12, 2012, U.S. Appl. No. 12/803,194.
    Jan. 12, 2012, U.S. Appl. No. 13/035,964.
    Jap. App. No. 2000-542907, entitled "Multiple Transform Utilization and Application for Secure Digital Watermarking"; which is a JP national stage of PCT/US1999/007262, published as WO/1999/052271, Oct. 14, 1999.
    Jayant, N.S. et al., Digital Coding of Waveforms, Prentice Hall Inc., Englewood Cliffs, NJ, pp. 486-509 (1984).
    Low, S.H., "Equilibrium Allocation and Pricing of Variable Resources Among User-Suppliers", 1988. http://www.citesear.nj.nec.com/366503.html.
    Mar. 7, 2012, U.S. Appl. No. 11/900,065.
    Menezes, Alfred J., Handbook of Applied Cryptography, CRC Press, p. 46, 1997.
    Nov. 17, 2010, Review of draft master IDS, correction to cite publications in lieu of filed applications, per RAN instructions.
    Nov. 21, 2010, U.S. Appl. No. 12/287,443.
    Nov. 30, 2010, U.S. Appl. No. 12/799,894.
    Oomen, A.W.J. et al., A Variable Bit Rate Buried Data Channel for Compact Disc, J.AudioEng. Sc., vol. 43, No. 1/2, pp. 23-28 (1995).
    PCT Application No. PCT/US00/21189, filed Aug. 4, 2000, entitled, "A Secure Personal Content Server", Pub. No. WO/2001/018628 ; Publication Date: Mar. 15, 2001.
    Sarkar, M. "An Assessment of Pricing Mechanisms for the Internet-A Regulatory Imperative", presented MIT Workshop on Internet Economics, Mar. 1995 http://www.press.vmich.edu/iep/works/SarkAsses.html on.
    Schreier, Bruce, Applied Cryptography, 2nd Ed., John Wiley & Sons, pp. 9-10, 1996.
    Sep. 14, 2010, U.S. Appl. No. 12/383,916.
    Sklar, Bernard, Digital Communications, pp. 601-603 (1988).
    Ten Kate, W. et al., A New Surround-Stereo-Surround Coding Techniques, J. Audio Eng.Soc., vol. 40,No. 5,pp. 376-383 (1992).
    U.S. Appl. No. 08/489,172, filed Jun. 7, 1995, Aug. 1, 2011.
    U.S. Appl. No. 08/587,943, filed Jan. 17, 1996, Jan. 11, 2012.
    U.S. Appl. No. 08/674,726, filed Jul. 2, 1996, Aug. 1, 2011.
    U.S. Appl. No. 08/775,216, filed Dec. 31, 1996, Jan. 11, 2011.
    U.S. Appl. No. 08/999,766, filed Jul. 23, 1997, Oct. 15, 2010.
    U.S. Appl. No. 09/046,627, filed Mar. 24, 1998, Jan. 11, 2012.
    U.S. Appl. No. 09/053,628, filed Apr. 2, 1998, Jan. 11, 2012.
    U.S. Appl. No. 09/545,589, filed Apr. 7, 2000, Jan. 11, 2012.
    U.S. Appl. No. 09/644,098, filed Aug. 23, 2000, Jan. 11, 2012.
    U.S. Appl. No. 09/657,181, filed Sep. 7, 2000, Jan. 11, 2012.
    U.S. Appl. No. 09/731,039, filed Dec. 7, 2000, Jan. 11, 2012.
    U.S. Appl. No. 09/731,040, filed Dec. 7, 2000, Jan. 11, 2012.
    U.S. Appl. No. 10/049,101, filed Jul. 23, 2002, Jan. 11, 2012.
    U.S. Appl. No. 10/369,344, filed Feb. 18, 2003, Aug. 1, 2011.
    U.S. Appl. No. 10/417,231, filed Apr. 17, 2003, Jan. 11, 2011.
    U.S. Appl. No. 10/602,777, filed Jun. 25, 2003, Aug. 1, 2011.
    U.S. Appl. No. 11/050,779, filed Feb. 7, 2005, Oct. 15, 2010.
    U.S. Appl. No. 11/244,213, filed Oct. 5, 2005 Jan. 11, 2012.
    U.S. Appl. No. 11/358,874, filed Feb. 21, 2006, Jan. 11, 2012.
    U.S. Appl. No. 11/482,654, filed Jul. 7, 2006, Aug. 1, 2011.
    U.S. Appl. No. 11/497,822, filed Aug. 2, 2006, Aug. 1, 2011.
    U.S. Appl. No. 11/512,701, filed Aug. 29, 2006, Aug. 1, 2011.
    U.S. Appl. No. 11/512,701, filed Aug. 29, 2006, Oct. 15, 2010.
    U.S. Appl. No. 11/518,806, filed Sep. 11, 2006, Aug. 1, 2011.
    U.S. Appl. No. 11/518,806.
    U.S. Appl. No. 11/599,838, filed Nov. 15, 2006, Oct. 15, 2010.
    U.S. Appl. No. 11/599,964, filed Nov. 15, 2006, Aug. 1, 2011.
    U.S. Appl. No. 11/647/861, filed Dec. 29, 2006, Jan. 11, 2012.
    U.S. Appl. No. 11/649,026, filed Jan. 3, 2007, Aug. 1, 2011.
    U.S. Appl. No. 11/894,443, filed Aug. 21, 2007, Oct. 15, 2010.
    U.S. Appl. No. 11/894,476, filed Aug. 21, 2007, Oct. 15, 2010.
    U.S. Appl. No. 11/895,388, filed Aug. 24, 2007, Oct. 15, 2010.
    U.S. Appl. No. 11/897,790, filed Aug. 31, 2007, Aug. 1, 2011.
    U.S. Appl. No. 11/897,791, filed Aug. 31, 2007, Aug. 1, 2011.
    U.S. Appl. No. 11/899,661, filed Sep. 7, 2007, Aug. 1, 2011.
    U.S. Appl. No. 11/899,662, filed Sep. 7, 2007, Oct. 15, 2010.
    U.S. Appl. No. 11/900,065, filed Sep. 10, 2007, Oct. 15, 2010.
    U.S. Appl. No. 11/900,066, filed Sep. 10, 2007, Jan. 11, 2012.
    U.S. Appl. No. 12/005,229, filed Dec. 26, 2007, Jan. 11, 2012.
    U.S. Appl. No. 12/005,230, filed Dec. 26, 2007, Oct. 15, 2010.
    U.S. Appl. No. 12/009,914, filed Jan. 23, 2008, Oct. 15, 2010.
    U.S. Appl. No. 12/215,812, filed Jun. 30, 2008, Oct. 15, 2010.
    U.S. Appl. No. 12/217,834, filed Jul. 9, 2008, Nov. 8, 2010.
    U.S. Appl. No. 12/287,443, filed Oct. 9, 2008, Oct. 15, 2010.
    U.S. Appl. No. 12/383,289, filed Mar. 23, 2009, Aug. 1, 2011.
    U.S. Appl. No. 12/383,879, filed Mar. 30, 2009, Oct. 15, 2010.
    U.S. Appl. No. 12/383,916, filed Mar. 30, 2009, Oct. 15, 2010.
    U.S. Appl. No. 12/462,799, filed Aug. 10, 2009, Dec. 15, 2010.
    U.S. Appl. No. 12/590,553, filed Nov. 10, 2009, Aug. 1, 2011.
    U.S. Appl. No. 12/590,681, filed Nov. 19, 2009, Dec. 15, 2010.
    U.S. Appl. No. 12/592,331, filed Nov. 23, 2009, Aug. 1, 2011.
    U.S. Appl. No. 12/655,002, filed Dec. 22, 2009, Aug. 1, 2011.
    U.S. Appl. No. 12/655,036, filed Dec. 22, 2009, Aug. 1, 2011.
    U.S. Appl. No. 12/655,357, filed Dec. 22, 2009, Oct. 15, 2010.
    U.S. Appl. No. 12/798,959, filed Apr. 14, 2010, Aug. 1, 2011.
    U.S. Appl. No. 12/799,894, filed May 4, 2010, Dec. 13, 2010.
    U.S. Appl. No. 12/802,519, filed Jun. 8, 2010, Nov. 4, 2010.
    U.S. Appl. No. 12/803,168, filed Jun. 21, 2010, Oct. 15, 2010.
    U.S. Appl. No. 12/803,194, filed Jun. 21, 2010, Oct. 15, 2010.
    U.S. Appl. No. 12/886,732, filed Sep. 21, 2010, Oct. 15, 2010.
    U.S. Appl. No. 12/892,900, filed Sep. 28, 2010, Nov. 8, 2010.
    U.S. Appl. No. 12/901,568, filed Oct. 10, 2010, Nov. 4, 2010.
    U.S. Appl. No. 12/913,751, filed Oct. 27, 2010, Nov. 8, 2010.
    U.S. Appl. No. 13/035,964, filed Feb. 26, 2011, Aug. 1, 2011.
    U.S. Appl. No. 13/212,264, filed Aug. 18, 2011, Jan. 11, 2012.
    U.S. Appl. No. 13/273,930, filed Oct. 14, 2011, Jan. 11, 2012.
    U.S. Appl. No. 13/423,650, filed Mar. 19, 2012, Jul. 26, 2012.
    U.S. Appl. No. 13/429,396, filed Mar. 25, 2012, Jul. 26, 2012.
    Zhao, Jian et al., Embedding Robust Labels into Images for Copyright Protection, (xp 000571976), pp. 242-251, 1995.
    Zhao, Jian. "A WWW Service to Embed and Prove Digital Copyright Watermarks", Proc. of the European conf. on Multimedia Applications, Services & Techniques Louvain-La-Nevve Belgium May 1996.

Cited By (0)

    Publication numberPublication dateAssigneeTitle