Methods utilizing steganography
First Claim
Patent Images
1. A method comprising:
- obtaining access to a set of data corresponding to an image or video;
controlling a steganographic encoding detector to examine only a portion of the data, without examining the entire set of data,detecting plural-bit data from the portion of the data; and
upon detection of the plural-bit data, carrying out an action based on the detected plural-bit data, wherein the plural-bit data indicates a possible use of a device for an illicit activity and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates generally to steganography, digital watermarking and data hiding. In one embodiment a method is provided including: processing data representing content; analyzing the data to determine whether a plural-bit identifier is steganographically encoded therein, the plural-bit identifier encoded in the data through modifications to the data, the modifications steganographically hiding the presence of the plural-bit identifier; and upon detection of the plural-bit identifier, redundantly carrying out an action while attempting to conceal the action from one or more users of the content. Of course, other embodiments are described and claimed as well.
260 Citations
19 Claims
-
1. A method comprising:
-
obtaining access to a set of data corresponding to an image or video; controlling a steganographic encoding detector to examine only a portion of the data, without examining the entire set of data, detecting plural-bit data from the portion of the data; and upon detection of the plural-bit data, carrying out an action based on the detected plural-bit data, wherein the plural-bit data indicates a possible use of a device for an illicit activity and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity. - View Dependent Claims (2)
-
-
3. A method comprising:
-
obtaining data representing content; analyzing the data to determine whether a steganographic signal is encoded therein through modifications to the data, wherein the modifications are made so as to conceal the presence of the steganographic signal to a casual human observer of the content; and upon detection of the steganographic signal, redundantly carrying out an action that is concealed from a user of the content, wherein the steganographic signal indicates a possible use of a device for an illicit activity, and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
processing data representing content; analyzing the data to determine whether a plural-bit identifier is steganographically encoded therein through modifications to the data, wherein the modifications steganographically hide the plural-bit identifier; upon detection of the plural-bit identifier, redundantly carrying out an action while attempting to conceal the action from one or more users of the content, wherein the plural-bit identifier indicates a possible use of a device for an illicit activity and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A device comprising:
-
a memory configured to store data representing content; and a processor operatively coupled to the memory and configured to; analyze the data to determine whether a steganographic signal is encoded therein through modifications to the data, wherein the modifications are made so as to conceal a presence of the steganographic signal; and upon detection of the steganographic signal, carry out an action that is concealed from a user of the content, wherein the steganographic signal indicates a possible use of the device for an illicit activity, and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity. - View Dependent Claims (17)
-
-
18. A tangible computer-readable medium having instructions stored thereon, the instructions comprising:
-
instructions to obtain data representing content; and instructions to analyze the data to determine whether a steganographic signal is encoded therein through modifications to the data, wherein the modifications are made so as to conceal a presence of the steganographic signal; and upon detection of the steganographic signal, instructions to carry out an action that is concealed from a user of the content, wherein the steganographic signal indicates a possible use of the device for an illicit activity, and wherein the action comprises storing or generating forensic data to identify the possible use or the illicit activity. - View Dependent Claims (19)
-
Specification