Image management system and methods using digital watermarks
First Claim
Patent Images
1. A method of managing images in a database, wherein a first image includes a first identifier steganographically embedded therein, said method comprising the steps of:
- providing a first hash of the first image;
uniquely identifying the first image in the database with the first hash of the first image, wherein a second image includes the first identifier steganographically embedded therein; and
in the database, associating the second image with the first image via the first identifier.
6 Assignments
0 Petitions
Accused Products
Abstract
Digital watermarking technology is used in an image management system. Images are identified by digital watermarks. The images are stored so as to be indexed according to their unique identifiers. In the preferred embodiment, related images are grouped into a set of images through a common watermark identifier. A particular image within the set of images is identified through a hash of the particular image.
207 Citations
19 Claims
-
1. A method of managing images in a database, wherein a first image includes a first identifier steganographically embedded therein, said method comprising the steps of:
-
providing a first hash of the first image;
uniquely identifying the first image in the database with the first hash of the first image, wherein a second image includes the first identifier steganographically embedded therein; and
in the database, associating the second image with the first image via the first identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
providing a first hash of the second image; and
in the database uniquely identifying the second image with the first hash of the second image.
-
-
3. The method according to claim 2, wherein the second image comprises a derivative of the first image.
-
4. A method according to claim 3, wherein related information is associated with at least the first image by the first hash of the first image.
-
5. The method according to claim 4, wherein the related information comprises at least one of user usage, creation time, transmission, printing, analyst notes, an audit trail, depicted geographic location, image capture time and image checkout.
-
6. The method according to claim 4, wherein the database comprises a plurality of databases.
-
7. The method according to claim 4, wherein the related information comprises at least one of metadata, location, date, permission level, security access levels, analyst comments, an audit trail, notes, files, and past usage information.
-
8. A method of managing a set of images, the set of images including a first image comprising a first identifier steganographically embedded therein in the form of a digital watermark and a second image comprising the first identifier steganographically embedded therein in the form of a digital watermark, said method comprising the steps of:
-
associating the first image with the set of images by the first identifier;
uniquely identifying the first image within the set of images with a hash of the first image;
associating the second image with the set of images by the first identifier; and
uniquely identifying the second image within the set of images with a hash of the second image. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of managing images, the images including a first image comprising a first identifier steganographically embedded therein in the form of a digital watermark and a second image comprising the first identifier steganographically embedded therein in the form of a digital watermark, said method comprising the steps of:
-
in a database registry, associating a first hash of the first image with a first data record associated with the first image;
in the database registry, associating a first hash of the second image with a second data record associated with the second image; and
linking the first data record and the second data record with the first digital watermark identifier. - View Dependent Claims (16, 17, 18, 19)
interrogating the database registry with the first hash of the first image to locate the first data record.
-
-
17. The method of claim 16, further comprising the step of accessing the second data record through the first digital watermark identifier.
-
18. The method of claim 16, wherein the first data record and the second data record each respectively comprises the first image and the second image.
-
19. The method of claim 16, wherein the second image is a derivative of the first image.
Specification