Image management system and methods using digital watermarks
First Claim
Patent Images
1. A method of maintaining images in a database, wherein a first image includes a digital watermark embedded therein, the digital watermark comprising a first unique identifier, said method comprising the steps of:
- storing the first image to be indexed by the first unique identifier;
storing information related to the first image; and
linking the first image and the related information by the first unique identifier.
7 Assignments
0 Petitions
Accused Products
Abstract
Digital watermarking technology is used in an image management system. Images are uniquely identified by digital watermarks. The images are stored so as to be indexed according to their unique identifiers. In the preferred embodiment, related images are linked together by the unique watermark identifier. The unique watermark identifiers are also used to manage metadata, and provide forensic tracking.
-
Citations
29 Claims
-
1. A method of maintaining images in a database, wherein a first image includes a digital watermark embedded therein, the digital watermark comprising a first unique identifier, said method comprising the steps of:
-
storing the first image to be indexed by the first unique identifier;
storing information related to the first image; and
linking the first image and the related information by the first unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for managing images, the images including a first image comprising a first identifier steganographically embedded in the first image in the form of a digital watermark, said method comprising the steps of:
-
retrieving the first image from a database;
altering the first image to create a second image;
steganographically embedding a second identifier in the second image in the form of a digital watermark; and
associating the second image in the database with the first identifier. - View Dependent Claims (10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22, 24, 25, 26, 27, 29)
-
-
15. A method to monitor images in a system, the system comprising at least a first user terminal to communicate with a second user terminal and with a database, the images comprising at least a first image digitally watermarked to include a first identifier, said method comprising the steps of:
-
determining a security level associated with the first image;
comparing the first image security level with a user security level; and
allowing access to the first image based on a result of said comparison step.
-
-
23. A system comprising:
-
a first user terminal;
a second user terminal;
a database, wherein the first user terminal and the second user terminal are in communication, and the first user terminal and the second user terminal are each in communication with the database; and
a gatekeeper to regulate the flow of an least a first image between the first user terminal and the second user terminal, wherein the first image comprises at least a first digital watermark including a first identifier, said gatekeeper to determine a security level associated with the first image, compare the first image security level with a user security level, and to allow access by the second user terminal to the first image based on a result of the comparison.
-
-
28. A module for use in a network comprising at least a first terminal in communication with a database, said module to monitor the flow of an least a first image at a first network location, the first image comprising at least a first digital watermark including a first identifier, said module comprising:
-
means for determining a security level associated with the first image;
means for comparing a first image security level with a user security level; and
means for allowing access to the first image based on a result of said comparing means.
-
Specification