Methods and systems for steganographic processing
First Claim
1. A method comprising:
- obtaining data representing audio or video, wherein the audio or video to be communicated to an audience assembled at a location at a particular time; and
steganographic embedding, using a processor, binary information in the data by modifying portions of the data to hide the binary information in the data, wherein the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time, and wherein the binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time.
4 Assignments
0 Petitions
Accused Products
Abstract
The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too.
242 Citations
25 Claims
-
1. A method comprising:
-
obtaining data representing audio or video, wherein the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding, using a processor, binary information in the data by modifying portions of the data to hide the binary information in the data, wherein the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time, and wherein the binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising instructions stored therein, the instructions comprising:
-
instructions to obtain data representing audio or video, wherein the audio or video to be communicated to an audience assembled at a location at a particular time; and instructions to steganographically embed binary information in the data by modifying portions of the data to hide the binary information in the data, wherein the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time, and wherein the binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time.
-
-
14. An apparatus comprising:
-
a memory configured to buffer data representing audio or video, wherein the audio or video is to be communicated to an audience assembled at a location at a particular time; and a processor configured to steganographically embed binary information in the data by modifying portions of the data to hide the binary information in the data, wherein the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time, and wherein the binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification