Image management system and methods using digital watermarks
First Claim
Patent Images
1. A method for managing images, the images including a first image comprising a first identifier steganographically embedded therein, said method comprising:
- retrieving a copy of the first image from an image database;
altering the copy of the first image to provide a second image;
steganographically embedding a second identifier in the second image; and
providing the steganographically embedded second image to the image database for storage, wherein the image database associates the second identifier with the first identifier so as to associate the first image and the second image.
7 Assignments
0 Petitions
Accused Products
Abstract
Digital watermarking technology is used in an image management system. Images are uniquely identified by digital watermarks. The images are stored so as to be indexed according to their unique identifiers. In the preferred embodiment, related images are linked together by the unique watermark identifier. The unique watermark identifiers are also used to manage metadata, and provide forensic tracking.
-
Citations
15 Claims
-
1. A method for managing images, the images including a first image comprising a first identifier steganographically embedded therein, said method comprising:
-
retrieving a copy of the first image from an image database; altering the copy of the first image to provide a second image; steganographically embedding a second identifier in the second image; and providing the steganographically embedded second image to the image database for storage, wherein the image database associates the second identifier with the first identifier so as to associate the first image and the second image. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a first user terminal; a second user terminal; a database, wherein the first user terminal and the second user terminal are in communication, and the first user terminal and the second user terminal are each in communication with the database; and a gatekeeper to regulate the flow of at least a first image between the first user terminal and the second user terminal, wherein the first image comprises at least a first digital watermark including a first identifier, said gatekeeper to determine a security level associated with the first image, compare the first image security level with a user security level, and to allow access by the second user terminal to the first image based on a result of the comparison, wherein said gatekeeper comprises or communicates with a digital watermark decoder to decode the digital watermark to determine the first identifier, and to interrogate the database with the first identifier to retrieve the security level. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
-
a first user terminal; a second user terminal; a database, wherein the first user terminal and the second user terminal are in communication, and the first user terminal and the second user terminal are each in communication with the database; and a gatekeeper to regulate the flow of at least a first image between the first user terminal and the second user terminal, wherein the first image comprises at least a first digital watermark including a first identifier, said gatekeeper to determine a security level associated with the first image, compare the first image security level with a user security level, and to allow access by the second user terminal to the first image based on a result of the comparison, wherein said first image digital watermark includes security level data, and wherein said gatekeeper comprises or communicates with a digital watermark decoder to decode the digital watermark to determine the security level data. - View Dependent Claims (12, 13, 14)
-
-
15. An apparatus comprising:
-
electronic processing circuitry; and memory, said memory comprising records stored therein, the records comprising a plurality of images, the plurality of images including a first image and a second image, wherein the first image includes a first identifier steganographically embedded therein, and wherein the second image includes a second identifier steganographically embedded therein, wherein the second image is derived from the first image, and wherein the second identifier is associated with the first identifier so that the first image and the second image are associated with one another.
-
Specification