Claims
- 1. A method of authenticating a wireless audio transmission comprising the steps of:
receiving an audio transmission from a first site at a second site, wherein the first site includes a first digital watermark identifier associated therewith, and the audio transmission includes the first identifier embedded therein in the form of a digital watermark component; providing the received audio transmission to a digital watermark decoder; decoding the audio transmission to recover the first identifier; comparing the first identifier to a predetermined set of authentic identifiers; and deeming the audio transmission to be authentic only when the first identifier matches at least one of the identifiers in the set of identifiers.
- 2. A method of obtaining information from a network of computers based at least in part on an environment associated with a first computer, said method comprising:
acquiring optical data corresponding to an object presented within the field of view of an optical sensor device, the optical sensor device communicating with a first computer, wherein the object includes plural-bit data steganographically encoded in thereon, and wherein the first computer communicates with at least a second computer in the network of computers; decoding the plural-bit digital data from the optical data; submitting to the second computer at least some of said decoded data and environmental data, wherein the environmental data is associated with the first computer or user; and determining at the second computer which information to send to the first computer based at least in part on the environmental data.
- 3. The method of claim 2 wherein the environmental data comprises an indication of whether the first computer comprises at least one of a store kiosk, home computer or mobile device.
- 4. An optical assembly used in cooperation with an image capture device for optically capturing an image of an object including steganographically encoded data, said assembly comprising:
a dual reflective system comprising:
a first reflective surface, and a second reflective surface, wherein the first reflective surface is positioned at a 45-degree angle with respect to the encoded object, and the second reflective surface is positioned so as to be parallel with the first reflective surface, such positioning serving to allow an image capture sensor to be mounted on the same plane as the encoded object.
- 5. A method comprising:
storing in a database a URL associated with an index number, the URL corresponding to the address of a networked computer on which a web page associated with the index number can be found; occasionally and automatically changing the URL associated in said database with said index number; and providing said web page at said changed URLs.
- 6. A method comprising:
storing in a database a network address that is associated with an index number, the network address corresponding to the storage location on the network for a file associated with the index number; occasionally and automatically changing a network address that is associated in said database with said index number; and providing said file at said changed network address.
- 7. A method of controlling an automated internet web-spider, the spider being adapted to crawl the internet to locate data to index for an associated internet search engine, said method comprising the steps of:
upon encountering image data on the internet, requiring the spider or a computer associated with the spider to search the data to locate a digital watermark; and if a digital watermark is found in the image data, preventing the spider or the computer associated with the spider from creating a reduced bit representation of the image data unless the watermark otherwise specifies.
- 8. The method of claim 7 wherein the reduced bit representation comprises a thumbnail image.
- 9. A method comprising the steps of:
receiving an image comprising an embedded digital watermark; storing the image in a database for online access; and upon selection of the image, providing a print of the image to at least a first customer.
- 10. A method according to claim 9, wherein said providing step comprises notifying a photo-processing lab to generate the print.
- 11. The method according to claim 9, wherein the print is at least one of a digital print and a physical print.
- 12. The method according to claim 11, wherein the print comprises the digital watermark.
- 13. A method comprising the steps of:
capturing an image; digitally watermarking the captured image to include plural-bit data; storing the watermarked captured image for internet access; associating additional information with the watermarked captured image; upon request, providing a print of the watermarked captured image to a requestor; providing the additional information upon request.
- 14. The method according to claim 13, wherein the additional information comprises copy control information.
- 15. A method according to claim 13, wherein said providing step comprises notifying a photo-processing lab to generate the print.
- 16. A method of authenticating an identification document comprising:
presenting the identification document to a sensor station; generating optical data corresponding to the identification document; processing the optical data to extract a first set of auxiliary data steganographically encoded therein; machine-sensing first information carried by the identification document, the first information being separate, but related, to the first set of auxiliary data; checking correspondence between the machine-sensed first information and the first set of auxiliary data extracted from the identification document; and further processing the optical data to extract a second set of auxiliary data steganographically encoded therein, the second set of auxiliary data evidencing degradation upon copying or signal processing, wherein the identification document is determined to be not authentic if either: i) the first information and the first auxiliary data do not correspond, or ii) the second set of auxiliary data evidences degradation or is undetectable.
- 17. A method of authenticating an identification document comprising:
presenting the identification document to an optical sensor station; generating optical data corresponding to the identification document; processing the optical data to extract a first set of auxiliary data steganographically encoded therein, wherein the first set of auxiliary data comprises characteristics that evidence degradation upon copying or signal processing; wherein the identification document is determined to be not authentic when the second set of auxiliary data evidences degradation or is undetectable.
- 18. A digital watermark embedding process comprising the steps of:
dividing a source signal into a plurality of blocks or segments; embed a unique watermark component in each of the plurality of blocks or segments, wherein the unique component comprises information related to the location of its respective block within the source signal or to a type of security features associated with the source signal.
- 19. An object authentication process, the object comprising a digital watermark embedded therein, wherein the object is divided into a plurality of blocks or segments, and a unique watermark component is embedded in each of the plurality of blocks or segments, wherein the unique component comprises information related to the location of its respective block within the object or to a type of security features associated with the object, said method comprising the steps of:
extracted the block watermark components from the digitally watermarked object; mapping at least a subset of the components to corresponding authentication information; and based on the authentication information, determining whether the object is authentic.
- 20. A method of detecting steganographic embedding comprising the steps of:
embedding a steganographic authentication watermark in media content, wherein the authentication watermark comprises characteristics that are dependent upon the media content; and detecting whether the steganographic authentication watermark has changed, the change indicating that the underlying content has changed.
- 21. The method of claim 20, wherein a change in the content signifies that unexpected steganographic embedding has occurred.
- 22. A graphical computer interface to facilitate the association of an embedded object with a computer response, said interface comprising
a first interface to allow a user to enter a command line to associate an identifier that is embedded in the object with a computer response; and a second interface to test an entered command to ensure that the entered command is acceptable to the user.
- 23. The method of claim 22 wherein the command line invokes a Windows shell execute command.
RELATED APPLICATION DATA
[0001] The present application claims the benefit of U.S. Provisional Patent Application No. 60/327,687, filed Oct. 5, 2001. The present invention is also a continuation in part of U.S. patent application Ser. No. 10/122,141, filed Apr. 12, 2002, which claims priority to U.S. Provisional Application No. 60/284,163, filed Apr. 16, 2001. The present invention is also a continuation in part of U.S. Pat. Ser. No. 10/012,676, filed Nov. 5, 2001. The present application is also related to U.S. patent application Ser. Nos. 09/571,422, filed May 15, 2000 and 09/515,545, filed Feb. 29, 2000, and U.S. Pat. Nos. 6,324,573, 6,122,403 and 5,841,978. Each of these patent documents is herein incorporated by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60327687 |
Oct 2001 |
US |
|
60284163 |
Apr 2001 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
10122141 |
Apr 2002 |
US |
Child |
10265348 |
Oct 2002 |
US |
Parent |
10012676 |
Nov 2001 |
US |
Child |
10265348 |
Oct 2002 |
US |