Watermarking systems and methods
First Claim
1. In a method that includes encoding one or more content objects with a steganographic digital watermark, the encoding including embedding a collection of features that can be used to facilitate computation of geometrical distortion of the object after encoding, an improvement including step for making the collection of geometrical features resistant to attack.
3 Assignments
0 Petitions
Accused Products
Abstract
Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver'"'"'s license conveying a user'"'"'s cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed.
-
Citations
7 Claims
- 1. In a method that includes encoding one or more content objects with a steganographic digital watermark, the encoding including embedding a collection of features that can be used to facilitate computation of geometrical distortion of the object after encoding, an improvement including step for making the collection of geometrical features resistant to attack.
-
6. In a method that includes decoding a steganographic digital watermark from an encoded object, the encoding including a template signal that aids in determining corruption of the object, an improvement comprising step for detecting the template signal without log-polar remapping.
-
7. An identity card for a person, the card including machine-readable data conveying a public key identifier associated with said person, the public key identifier being useful in cryptographic operations involving said person.
Specification