Computer system linked by using information in data objects
First Claim
1. A method comprising:
- receiving a plural-bit watermark including an identifier from a watermark decoder that decodes same from an object;
providing said identifier to a remote database through the internet;
receiving from said database a profile of a proprietor of said object, said profile including proprietor name and contact information.
6 Assignments
0 Petitions
Accused Products
Abstract
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.
725 Citations
32 Claims
-
1. A method comprising:
-
receiving a plural-bit watermark including an identifier from a watermark decoder that decodes same from an object;
providing said identifier to a remote database through the internet;
receiving from said database a profile of a proprietor of said object, said profile including proprietor name and contact information. - View Dependent Claims (2)
-
-
3. A computer-readable storage medium having instructions cooperating with an image editing program for performing the.following method:
-
receiving a plural-bit watermark including an identifier from an image watermark decoder associated with the image editing program;
providing said identifier to a remote database through the internet; and
receiving from said database a profile of a proprietor of said image, said profile including the proprietor name and contact information. - View Dependent Claims (4)
-
-
5. A method comprising:
-
from a first computer, accessing a second computer over the internet to obtain issuance of an ID; and
at the first computer, watermarking an electronic object with said ID;
wherein the second computer serves as a central issuing authority for watermark IDs for plural first computers. - View Dependent Claims (6)
-
-
7. A method comprising:
-
loading an electronic content object into RAM memory of a computer device, the content object comprising audio or image data; and
detecting a digital watermark embedded in said content as an automatic operation, rather than as a user-initiated operation. - View Dependent Claims (8, 9, 10)
-
-
11. A method of obtaining a profile of the proprietor of an object from data recorded in.a watermark in said object, said object being located on a first computer, said method comprising the steps of:
-
decoding said watermark from said object, said watermark including an identifier;
sending said identifier to a remote database through the internet in order to obtain said profile of said proprietor, receiving from said database a profile of said proprietor of said object, said profile including proprietor name and contact information.
-
-
12. A computer-readable storage medium having a computer program stored thereon which can cooperate with an image editing program and with other programs to perform the following steps:
-
decoding a plural-bit watermark including an identifier from an image, providing said identifier to a remote database through the internet; and
receiving from said database a profile of a proprietor of said image, said profile including the proprietor name and contact information.
-
-
13. A method of enabling a multi-computer system to embed and read a watermark, the method comprising the steps of:
-
(a) storing a plurality of creator identifiers and creator contact data corresponding to each of the creator identifiers in a first memory electrically connected to a first digital electrical computer system, which is also electrically connected to a first input device and a first output device;
(b) enabling a second digital electrical computer system to embed a watermark in a digital photographic image, the watermark including one of the plurality of creator identifiers, the second digital electrical computer system electrically connected to a second input device and a second output device;
(c) enabling a third digital electrical computer system to read the watermark in the digital photographic image to reveal the one of the plurality of creator identifiers, the third digital electrical computer system electrically connected to a third input device and a third output device; and
(d) enabling communication across a network to communicate the revealed one of the plurality of creator identifiers to the first digital electrical computer to obtain the creator contact data corresponding to the one of the plurality of creator identifiers from the memory. - View Dependent Claims (14, 15, 16, 17, 18)
(a) the network includes the Internet;
(b) the watermark includes information identifying a World Wide Web site; and
wherein(c) the third digital electrical computer system is enabled to load a World Wide Web browser and connect to the World Wide Web site in response to the revealed one of the plurality of creator identifiers.
-
-
17. The method of claim 13, wherein the watermark includes extended data including at least one member from the group consisting of an organization identifier, a transaction identifier, and an item identifier.
-
18. The method of claim 13 wherein the steps are implemented as computer-executable instructions.
-
19. A method of enabling a multi-computer system to embed a watermark in a digital image, read a watermark from the image, and obtain contact information about the image, the method comprising the steps of:
-
(a) enabling storage of an identifier and the contact information corresponding to the identifier in a first memory on a first computer, which is electrically connected to an Internet;
(b) enabling a second computer to embed a watermark in the image, the watermark including the identifier, the second computer electrically connected to the Internet;
(c) enabling a third computer to read the watermark in the image to reveal the identifier, the third computer electrically connected to the Internet; and
(d) enabling the third computer to communicate the identifier across the Internet to the first computer in order to obtain the contact information corresponding to the identifier. - View Dependent Claims (20, 21, 22)
-
-
23. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
(a) storing an identifier and contact information corresponding to the identifier in a first memory on a first computer, which is electrically connected to an Internet;
(b) enabling a second computer to embed a watermark in an image, the watermark including the identifier, the second computer electrically connected to the internet;
(c) enabling a third computer to read the watermark in the image to reveal the identifier, the third computer electrically connected to the Internet; and
(d) enabling the third computer to communicate the identifier across the Internet to the first computer in order to obtain the contact information corresponding to the identifier. - View Dependent Claims (24, 25)
-
-
26. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
(a) enabling an embedding computer to embed a watermark in an image, the watermark including an identifier, the embedding computer electrically connected to an Internet;
(b) enabling a reading computer to read the watermark in the image to reveal the identifier, the reading computer electrically connected to the Internet; and
(c) enabling the reading computer to communicate the identifier across the Internet to a server computer in order to obtain contact information corresponding to the identifier. - View Dependent Claims (27, 28)
-
-
29. A method comprising:
-
issuing codes for use in steganographically embedding in electronic objects;
creating a registry of the codes to correspond to the codes steganographically embedded in electronic objects;
in the registry, storing an association between information about an electronic object and a code that is steganographically embedded in the electronic object, wherein the registry serves as a database accessible by users to get information about the electronic objects. - View Dependent Claims (30, 31, 32)
-
Specification