Methods and systems for steganographic processing
First Claim
1. In a method that includes receiving electronic signals representative of content, and rendering the received content for presentation to an audience assembled at a location, an improvement comprising encoding hidden tracing data in the content to permit an illicitly captured version of said rendered content to be traced back to its source, said encoding occurring after the content has been received.
6 Assignments
0 Petitions
Accused Products
Abstract
Electronic content data that is copied without authorization can be traced back to its source using steganographically encoded information. Such arrangements are useful, e.g., where electronic content is rendered to an audience—one of whom may be making an illicit recording. In such embodiments, the encoding may be performed as the content is made available to the consumer, e.g., allowing data identifying time and place of rendering to be encoded. The specification details a variety of other steganographic techniques and applications, including conveying different messages using different parts of an image, and conveying record control information with electronic content.
-
Citations
20 Claims
- 1. In a method that includes receiving electronic signals representative of content, and rendering the received content for presentation to an audience assembled at a location, an improvement comprising encoding hidden tracing data in the content to permit an illicitly captured version of said rendered content to be traced back to its source, said encoding occurring after the content has been received.
-
7. In a method that includes presenting electronic content to a consumer, an improvement comprising encoding hidden identification data in the content, said identification information allowing a captured version of said content to be identified as to its time of presentation, so as to facilitate tracing of unauthorized copies.
-
8. In a method that includes presenting electronic content to a consumer, an improvement comprising encoding hidden identification data in the content, said identification information allowing a captured version of said content to be identified as to a location at which it was presented, so as to facilitate tracing of unauthorized copies.
-
9. In a method that includes:
-
sensing a physical phenomenon and producing electronic information corresponding thereto; and recording the electronic information in a storage medium; an improvement wherein the recorded information includes plural-bit data steganographically encoded therein, said plural bit data conveying information corresponding to a time at which the information was recorded. - View Dependent Claims (10, 11)
-
-
12. In a method that includes:
-
sensing a physical phenomenon at a location, and producing electronic information corresponding thereto; and recording the electronic information in a storage medium; an improvement wherein the recorded information includes plural-bit data steganographically encoded therein, said plural bit data conveying information by which said location can be determined.
-
-
13. A system including a steganographic encoding apparatus, said apparatus having an input for receiving an electronic content signal, an output for delivering a steganographically encoded version of said electronic content signal, and a processor therebetween, the processor serving to encode the input electronic content signal with an identifier, the identifier associating the encoded content with a particular time, the system further including an apparatus for converting the encoded electronic content signal into human perceptible form, wherein said identifier associates the encoded content with a time at which said content signal is rendered into human perceptible form.
- 14. A system including a steganographic encoding apparatus, said apparatus having an input for receiving an electronic content signal, an output for delivering a steganographically encoded version of said electronic content signal, and a processor therebetween, the processor serving to encode the input electronic content signal with an identifier, the identifier associating the encoded content with a particular physical location.
-
16. A method of tracing content to determine information about a source from which it was obtained and reproduced without authorization, the method comprising:
-
decoding identification data from a reproduced version of said content; and by reference to the decoded identification data, determining a time the content was obtained.
-
-
17. A method of tracing content to determine information about a source from which it was obtained and reproduced without authorization, the method comprising:
-
decoding identification data from a reproduced version of said content; and by reference to the decoded identification data, determining a location from which the content was obtained.
-
-
18. A method of tracing electronic content that has been made available via a source and recorded without authorization, comprising:
-
decoding identification information hidden in the recorded content, said identification information having been encoded at an earlier time, when the content was made available at the source; and by reference to said decoded identification information, determining information relating to the place or time the content was made available from the source. - View Dependent Claims (19, 20)
-
Specification