Methods and Systems for Steganographic Processing
First Claim
1. A method comprising the acts:
- utilizing a programmed electronic processor, steganographically encoding content with a first message, said steganographic encoding being performed by a first party, said steganographic encoding including altering digital data representing human-perceptible attributes of said content;
utilizing a programmed electronic processor, further steganographically encoding the content with a second message, said further steganographic encoding being performed by a second party different than the first party, said further steganographic encoding including altering digital data representing human-perceptible attributes of said content;
wherein at least one of said steganographic encodings includes altering said digital data in a manner dependent on said content.
5 Assignments
0 Petitions
Accused Products
Abstract
Electronic content data (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One claim recites a method practiced by a first party, including the acts: (a) receiving content that has been previously steganographically encoded by a second party with first plural-bit data; and (b) utilizing a programmed electronic processor, further steganographically encoding the content with a second plural-bit data different than the first. The further encoding includes altering digital data representing human-perceptible attributes of the content, in a manner that is dependent on the content. Both of the first and second plural-bit data are represented in encoded content. Of course, a great variety of other claims, arrangements and features are provided.
172 Citations
21 Claims
-
1. A method comprising the acts:
-
utilizing a programmed electronic processor, steganographically encoding content with a first message, said steganographic encoding being performed by a first party, said steganographic encoding including altering digital data representing human-perceptible attributes of said content; utilizing a programmed electronic processor, further steganographically encoding the content with a second message, said further steganographic encoding being performed by a second party different than the first party, said further steganographic encoding including altering digital data representing human-perceptible attributes of said content; wherein at least one of said steganographic encodings includes altering said digital data in a manner dependent on said content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
electronic memory for buffering obtained content; and an electronic processor programmed for; obtaining steganographically encoded content, the steganographically encoded content having a first message steganographically encoded therein, said steganographic encoding being performed by a first party remotely located from said electronic processor, said first message having been steganographically encoded in said content by altering digital data representing human-perceptible attributes of said content; further steganographically encoding the content with a second message, said further steganographic encoding being performed by a second party different than the first party, said further steganographic encoding including altering digital data representing human-perceptible attributes of said content; wherein at least one of said steganographic encodings includes altering said digital data in a manner dependent on said content. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method practiced by a first party, comprising the acts:
-
(a) receiving content that has been previously steganographically encoded by a second party with first plural-bit data; and (b) utilizing a programmed electronic processor, further steganographically encoding said content with a second plural-bit data different than the first, said further encoding including altering digital data representing human-perceptible attributes of said content, in a manner that is dependent on said content; wherein both said first and second plural-bit data are represented in encoded content. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification