Steganographic method and device
First Claim
1. A computer-implemented method for decoding independent information encoded into digital data comprising:
- providing a key from a database, said key providing an indication of where, in the digital data, the independent information can be located;
using said key to locate a first portion of said independent information in said digital data; and
using said key to determine said independent information from said digital data.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner. The information is encoded using special keys. The information is contained in the samples, not prepended or appended to the sample stream. The method makes it extremely difficult to find the information in the samples if the proper keys are not possessed by the decoder. The method does not cause a significant degradation to the sample stream. The method is used to establish ownership of copyrighted digital multimedia content and provide a disincentive to piracy of such material.
-
Citations
71 Claims
-
1. A computer-implemented method for decoding independent information encoded into digital data comprising:
- providing a key from a database, said key providing an indication of where, in the digital data, the independent information can be located;
using said key to locate a first portion of said independent information in said digital data; and
using said key to determine said independent information from said digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- providing a key from a database, said key providing an indication of where, in the digital data, the independent information can be located;
-
9. A computer-implemented method for protecting a digital signal comprising the steps of:
- a) providing a carrier signal;
b) using a key from a memory to map independent information including a digital watermark into the carrier signal. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
- a) providing a carrier signal;
-
27. A computer-implemented method for protecting a digital signal comprising:
- a) providing a carrier signal that has been encoded with independent information; and
b) using a key from a database to locate independent information including a digital watermark in the carrier signal. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
- a) providing a carrier signal that has been encoded with independent information; and
-
48. A computer-based process for watermarking content comprising the steps of:
- a) accessing content; and
b) using a key from a memory comprising at least one map function to map a watermark into the content. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55)
- a) accessing content; and
-
56. A computer-based process for identifying content comprising:
- a) receiving content that been encoded with independent information; and
b) using a key from a memory to locate and extract the independent information from the content. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63)
- a) receiving content that been encoded with independent information; and
-
64. A system for watermarking content comprising:
- a) a receiver configured to receive content; and
b) a processor configured to map at least one watermark into the content according to a key. - View Dependent Claims (65, 66, 67, 68, 69, 70, 71)
- a) a receiver configured to receive content; and
Specification