U.S. patent application Ser. No. 09/314,648, Rodriguez et al., filed May 19, 1999. |
U.S. patent application Ser. No. 09/342,688, Rodriguez et al., filed Jun. 29, 1999. |
U.S. patent application Ser. No. 09/342,971, Rodriguez et al., filed Jun. 29, 1999. |
U.S. patent application Ser. No. 09/679,261, Davis et al., filed Oct. 4, 2000. |
U.S. patent application Ser. No. 09/562,517, Davis et al., filed May 1, 2000. |
U.S. patent application Ser. No. 09/547,664, Rhoads et al., filed Apr. 12, 2000. |
U.S. patent application Ser. No. 09/571,442, Rhoads et al., filed May 15, 2000. |
U.S. patent application Ser. No. 09/858,189, Rhoads et al., filed May 14, 2001. |
U.S. patent application Ser. No. 09/631,409, Brundage et al., filed Aug. 3, 2000. |
U.S. patent application Ser. No. 09/452,021, Davis et al., filed Nov. 30, 1999. |
U.S. patent application Ser. No. 09/629,401, Seder et al., filed Aug. 1, 2000. |
U.S. patent application Ser. No. 09/473,396, Evans et al., filed Dec. 28, 1999. |
U.S. patent application Ser. No. 09/563,664, Levy et al., filed May 2, 2000. |
U.S. patent application Ser. No. 09/670,115, Rhoads et al., filed Sep. 26, 2000. |
Brassil et al., Electronic Marking and Identification Techniques to Discourage Document Copying, Proceedings of INFOCOM '94 Conference on Computer, IEEE Commun. Soc Conference, Jun. 12-16, 1994, 1278-1287. |
Bruckstein, A.M.; Richardson, T.J., A holographic transform domain image watermarking method, Circuits, Systems, and Signal Processing vol. 17, No.3 p. 361-89, 1998. This paper includes an appendix containing an internal memo of Bell Labs, which according to the authors of the paper, was dated Sep. 1994. |
“High Water FBI Limited Presentation Image Copyright Protection Software,” FBI Ltd brochure, Jul., 1995, 17 pp. |
Koch et al., “Copyright Protection for Multimedia Data,” Fraunhofer Institute for Computer Graphics, Dec. 16, 1994, 15 pp. |
Koch et al., “Towards Robust and Hidden Image Copyright Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 20-22, 1995, 4 pp. |
Kurak et al., “A Cautionary Note On Image Downgrading,” 1992 IEEE, pp. 153-159. |
Mintzer et al., “Safeguarding Digital library Contents and Users” Digital Watermarking, D-Lib Magazine, Dec. 1997; ISSN 1082-9873. |
Rindfrey, “Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The Equicrypt Approach,” Intellectual Property Rights and New Technologies, Proc. of the Conference, R. Oldenbourg Verlag Wien Munchen 1995, 12 pp. |
Schreiber et al., “A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information,” SMPTE Journal, Dec. 1989, pp. 873-879. |
SDMI Example Use Scenarios (Non-Exhaustive), Version 1.2, Jun. 16, 1999. |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. |
Szepanski, “Additive Binary Data Transmission for Video Signals,” Papers Presented at Conf. Of Comm. Engineering Soc. Sep. 30-Oct. 3, 1980, Technical Reports vol. 74, pp. 342-352. |
Tanaka et al., “A Visual Retrieval System with Private Information for Image Database,” Proceeding International Conference on DSP Applications and Technology, Oct. 1991, pp. 415-421. |
Tanaka et al., “New Integrated Coding Schemes for Computer-Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281. |
Tirkel et al, “Electronic Water Mark,” DICTA-93, Macquarie University, Syndney, Australia, Dec., 1993, pp. 666-673. |
Weber et al., “Correlative Image Registration,” Seminars in Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp. 311-323. |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. |
Dautzenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pp., Oct. 1994. |
Szepanski, “Additive Binary Data Transmission for Video Signals,” Conference of the Communications Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text and English translation enclosed). |
U.S. patent application Ser. No. 09/404,291, Levy, filed Sep. 23, 1999. |
U.S. patent application Ser. No. 09/234,780, Rhoads/Gustafson, filed Jan. 20, 1999. |
U.S. patent application Ser. No. 09/478,713, Cookson, filed Jan. 6, 2000. |
Cookson, Chris, General Principles of Music Uses on Portable Devices, presented to SDMI, Mar. 5, 1999. |
Winograd, J.M., “Audio Watermarking Architecture for Secure Digital Music Distribution,” a Proposal to the SDMI Portable Devices Working Group, by Aris Technologies, Inc., Mar. 26, 1999. |
Mintzer et al., “Safeguarding Digital Library Contents and Users: Digital Watermarking,” D-Lib Magazine, Dec. 1997, 12 pp. |
U.S. patent application Ser. No. 09/765,102, Shaw, filed Jan. 17, 2001. |
U.S. patent application Ser. No. 09/761,349, Rhoads, filed Jan. 16, 2001. |
U.S. patent application Ser. No. 09/761,280, Rhoads, filed Jan. 16, 2001. |
U.S. patent application Ser. No. 09/645,779, Tian et al., filed Aug. 24, 2000. |
U.S. patent application Ser. No. 09/689,226, Brunk, filed Oct. 11, 2000. |
U.S. patent application Ser. No. 09/689,250, Ahmed, filed Oct. 11, 2000. |
U.S. patent application Ser. No. 09/689,293, Tian et al., filed Oct. 11, 2000. |
U.S. patent application Ser. No. 09/625,577, Carr et al., filed Jul. 25, 2000. |
U.S. patent application Ser. No. 09/574,726, Rhoads et al., filed May 18, 2000. |
U.S. patent application Ser. No. 09/562,524, Carr et al., May 1, 2000. |
U.S. patent application Ser. No. 09/498,223, Rhoads et al., filed Feb. 3, 2000. |
U.S. patent application Ser. No. 09/465,418, Rhoads et al., filed Dec. 16, 1999. |
U.S. patent application Ser. No. 09/431,990, Rhoads, filed Nov. 3, 1999. |
U.S. patent application Ser. No. 09/428,359, Davis et al., filed Oct. 28, 2000. |
U.S. patent application Ser. No. 09/342,972, Rhoads, filed Jun. 29, 1999. |
U.S. patent application Ser. No. 09/293,602, Rhoads, filed Apr. 15, 1999. |
U.S. patent application Ser. No. 09/293,601, Rhoads, filed Apr. 15, 1999. |
U.S. patent application Ser. No. 09/287,940, Rhoads, filed Apr. 7, 1999. |
U.S. patent application Ser. No. 09/185,380, Davis et al., filed Nov. 3, 1998. |
U.S. patent application Ser. No. 09/074,034, Rhoads, filed May 6, 1998. |
U.S. patent application Ser. No. 09/127,502, Rhoads, filed Jul. 31, 1998. |
Audio Watermarking Architectures for Secure Digital Music Distribution, A Proposal to the SDMI Portable Devices Working Group by ARIS Technologies, Inc, Mar. 26, 1999, pp. 1-11. |
Audio Watermarking Architectures for Persistent Protection, Presentation to SDMI PDWG, Mar. 29, 1999, J. Winegrad, Aris Technologies, pp 1-16. |
Audio Watermarking System to Screen Digital Audio Content for LCM Acceptance, A Proposal Submitted in Response to PDWG99050504-Transition CfP by ARIS Technologies, Inc., May 23, 1999, Document Version 1.0, 15 pp. |
Boland et al., “Watermarking Digital Images for Copyright Protection”, Fifth Int'l Conference on Image Processing and it's Application, Jul. 1995, pp. 326-330. |
Levy, “AIPL's Proposal for SDMI. An Underlying Security System” (slide presentation), Mar. 29, 1999, 23 slides. |
Microsoft Response to CfP for Technology Solutions to Screen Digital Audio Content for LCM Acceptance, SDMI, PDWG Tokyo, May 23, 1999, 9 pp. |
Response to CfP for Technology Solutions to Screen Digital Audio Content for LCM Acceptance, NTT Waveless Radio Consotium, May 23, 1999, 9 pp. |
Sandford II et al., “The Data Embedding Method”, Proceedings of the SPIE vol. 2615, pp. 226-259, 1996. |
Thomas, Keith, Screening Technology for Content from Compact Discs, May 24, 1999, 11 pp. |
Tirkel et al., “Electronic Water Mark,” Dicta-93, Marquarie University, Sydney, Australia, Dec., 1993, pp. 666-672. |
Vidal et al., “Non-Noticeable Information Embedding in Color Images: Marking and Detection”, IEEE 1999, pp. 293-297. |
Wolfgang et al., “A Watermark for Digital Images,” Computer Vision and Image Processing Laboratory, Purdue University, Sep. 1996, pp. 219-222. |
“Access Control and COpyright Protection for Images, WorkPackage 8: Watermarking,” Jun. 30, 1995, 46 pp. |
“Access Control and COpyright Protection for Images, WorkPackage 3: Evaluation of Existing Systems,” Apr. 19, 1995, 68 pp. |
“Access Control and COpyright Protection for Images, WorkPackage 1: Access Control and Copyright Protection for Images Need Evaluation,” Jun., 1995, 21 pp. |
“Access Control and COpyright Protection for Images, Conditional Access and Copyright Protection Based on the Use of Trusted Third Parties,” 1995, 43 pp. |
Arachelian, “White Noise Storm,” Apr. 11, 1994, Internet reference, 13 pp. |
Arazi, et al., “Intuition, Perception, and Secure Communication,” IEEE Transactionson Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016-1020. |
Arthur, “Digital Fingerprints Protect Artwork,” New Scientist, Nov. 12, 1994, p. 24. |
Aura, “Invisible Communication,” Helskinki University of Technology, Digital Systems Laboratory, Nov. 5, 1995, 13 pp. |
Bender et al, “Techniques for Data Hiding,” Draft Preprint, Private Correspondence, dated Oct. 30, 1995. |
Bender et al., “Techniques for Data Hiding,” Massachusetts Institute of Technology, Media Laboratory, Jan. 1995, 10 pp. |
Boneh, “Collusion-Secure Fingerprinting for Digital Data,” Department of Computer Science, Princeton University, 1995, 31 pp. |
Boney et al., “Digital Watermarks for Audio Signals,” Proceedings of Multimedia '96, 1996 IEEE, PP. 473-480. |
Boucqueau et al., Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties, Teleservices & Multimedia Communications, 2nd Int. Cost 237 Workshop, Second International Cost 237 Workshop, Nov., 1995; published 1996, pp. 229-243. |
Brassil et al., “Hiding Information in Document Images,” Nov., 1995, 7 pp. |
Brown, “S-Tools for Windows, Version 1.00, .COPYRGT. 1994 Andy Brown, What is Steganography,” Internet reference, Mar. 6, 1994, 6 pp. |
Bruyndonckx et al., Neural Network Post-Processing of Coded Images Using Perceptual Masking, 1994, 3 pp. |
Bruyndonckx et al., “Spatial Method for Copyright Labeling of Digital Images,” 1994, 6 pp. |
Burgett et al., “A Novel Method for Copyright Labeling Digitized Image Data,” requested by e-mail from author (unavailable/password protected on IGD WWW site); received Sep. 18, 1995, 12 pp. |
Caronni, “Assuring Ownership Rights for Digital Images,” Published in the Proceedings of ‘Reliable IT Systems,’ VIS '95, HH. Bruggemann and W. Gerhardt-Hackl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pp. |
Caruso, “Digital Commerce, 2 plans for watermarks, which can bind proof of authorship to electronic works.” New York Times, Aug. 7, 1995, one p. |
Castro et al., “Registration of Translated and Rotated Images Using Finite Fourier Transforms,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703. |
Choudhury, et al., “Copyright Protection for Electronic Publishing over Computer Networks,” IEEE Network Magazine, Jun. 1994, 18 pp. |
Clarke, “Invisible Code Tags Electronic Images,” Electronic Engineering Times, Jun. 12, 1995, n. 852, p. 42. |
“Copyright Protection for Digital Images, Digital Fingerprinting from FBI,” Highwater FBI brochure, 1995, 4 pp. |
“The Copyright Can of Worms Opened Up By The New Electronic Media,” Computergram Internations, pCGN07170006, Jul. 17, 1995 and “The Copyright Can of Worms Opened Up By the New Electronic Media—2,” Computergram Internations, pCGN07210008, Jul. 21, 1995, 3 pp. total. |
Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute Technical Report, Dec. 5, 1995, 33 pp. |
Cox et al., “A Secure, Imperceptable Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia,” IEEE, Southcon/96, Conference Record, Pp. 192-197, 1996. |
“Cyphertech Systems: Introduces Digital Encoding Device to Prevent TV Piracy,” Hollywood Reporter, Oct. 20, 1993, p. 23. |
Delaigle et al., “Digital Watermarking,” Proc. SPIE—Int. Soc. Opt. Eng., vol. 2659, pp. 99-110, 1996. |
Delaigle et al., “A Psychovisual Approach for Digital Picture Watermarking,” 1995, 20 pp. |
DICE Digital Watermark System, Q&A, Dec., 1995, 12 pp. |
Digimare presentation at RSA Conference, approximately Jan. 17, 1996, 4 pp. |
Fimmerstad, “The Virtual Art Museum,” Ericsson Connexion, Dec., 1995, pp. 29-31. |
Fitzgerald, “Invisible Digital Copyright ID,” Editor & Publisher, Jun. 25, 1994, p. 62. |
“Foiling Card Forgers With Magnetic ‘Noise,’” Wall Street Journal, Feb. 8, 1994. |
Frequently Asked Questions About Digimare Signature Technology, Aug. 1, 1995, HTTP://WWW.DIGIMARC.COM, 9 pp. |
Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905-910. |
Gabor, et al., “Theory of Communication,” J. Inst. Elect. Eng. 93, 1946, pp. 429-441. |
Hartung et al., Digital Watermarking of Raw and Compressed Video, Proc. SPIE 2952, Digital Compression Technologies and Systems for Video Communications, Oct., 1996, pp 205-213. |
Hecht, “Embedded Data Glyph Technology for Hardcopy Digital Documents,” SPIE vol. 2171, Feb. 1994, pp. 341-352. |
“Holographic signatures for digital images,” The Seybold Report on Desktop Publishing, Aug. 1995, one p. |
Humphrey, “Stamping Out Crime,” Hollywood Reporter, Jan. 26, 1994, p. S48. |
Jain, “Image Coding Via a Nearest Neighbors Image Model,” IEEE Transactions on Communications, vol. COM-23, No. 3, Mar. 1975, pp. 318-331. |
Johhnson, “Steganography,” Dec. 10, 1995, 32 pp. |
JPEG Group's JPEG Software (release 4), FTP.CSUA.BEREKELEY.EDU/PUB/CYPHERPUNKS/APPLICATIONS/JSTEG/JPEG.ANNOUNCEMENT.GZ. |
Kassam, Signal Detection in Non-Gaussian Noise, Dowden & Culver, 1988, pp. 1-96. |
Koch et al., “Digital Copyright Labeling: Providing Evidence of Misuse and Tracking Unauthorized Distribution of Copyrighted Materials,” Oasis Magazine, Dec. 1995, 3 pp. |
Luc, “Analysis of Spread Spectrum System Parameters for Design of Hidden Transmission,” Radioengineering, vol. 4, No. 2, Jun. 1995, pp. 26-29. |
Machado, “Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh,” Internet reference, Nov. 28, 1993, 3 pp. |
Macq, “Cryptology for Digital TV Broadcasting,” Proceedings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957. |
Matthews, “When Seeing is Not Believing,” New Scientist, Oct. 16, 1993, pp. 13-15. |
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture,” IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205. |
Mintzer et al., “Toward on-line, Worldwide Access to Vatican Library Materials,” IBM J. Res. Develop. vol. 40 No. 2, Mar., 1996, pp. 139-162. |
Moller, et al., “Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist,” DuD, Datenschutz and Datensicherung, Jun. 18, 1994 318-326. |
“NAB—Cyphertech Starts Anti-Piracy Broadcast Tests,” Newsbytes, NEW03230023, Mar. 23, 1994. |
Nakamura et al., “A Unified Coding Method of Image and Text Data Using Discrete Orthogonal Transform,” Systems and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92. |
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56. |
New Product Information, “FBI at AppleExpo” (Olympia, London), Nov., 1995, 2 pp. |
Ohnishi et al., Embedding a Seal into a Picture Under Orthogonal Wavelet Transform, Proceedings of Multimedia '96, 1996, IEEE, pp. 514-421. |
ORuanaidh et al, “Watermarking Digital Images for Copyright Protection,” http://www.kalman.mee.tcd.ie/people/jjr/eva.sub.—pap.html, Feb. 2, 1996, 8 pp. (Also published Aug., 1996, IEEE Proceedings-Vision, Image and Signal Processing, vol. 143, No. 4, pp. 250-256.). |
Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, “Aspects of the Human Visual System,” pp. 23-27, 1993, Van Nostrand Reinhold, New York. |
Pickholtz et al., “Theory of Spread-Spectrum Communications—A Tutorial,” Transactions on Communications, vol. COM-30, No. 5, May, 1982, pp. 855-884. |
Pitas et al., “Applying Signatures on Digital Images,” IEEE Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460-463, Jun., 1995. |
Port, “Halting Highway Robbery on the Internet,” Business Week, Oct. 17, 1994, p. 212. |
Roberts, “Picture Coding Using Pseudorandom Noise,” IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp. 145-154. |
Sapwater et al., “Electronic Copyright Protection,” Photo>Electronic Imaging, vol. 37, No. 6, 1994, pp. 16-21. Schneier, “Digital Signatures, Cryptographic Algorithms Can Create Nonforgeable Signatures for Electronic Documents, Making Them Valid Legal Instruments” BYTE, Nov. 1993, pp. 309-312. |
shaggy@phantom.com, “Hide and Seek v. 4.0,” Internet reference, Apr. 10, 1994, 3 pp. |
Short, “Steps Toward Unmasking Secure Communications,” International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959-977. |
Simmons, “Subliminal Channels; Past and Present,” ETT, vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59. |
Sheng et al., “Experiments on Pattern Recognition Using Invariant Fourier-Mellin Descriptors,” Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776. |
Sklar, “A Structured Overview of Digital Communications—a Tutorial Review—Part I,” IEEE Communications Magazine, Aug., 1983, pp. 1-17. |
Sklar, “A Structured Overview of Digital Communications—a Tutorial Review—Part II,” IEEE Communications Magazine, Oct., 1983, pp. 6-21. |
“Steganography,” Intellectural Property and the National Information Infrastructure The Report of the Working Group on Intellectual Property Rights, Sep. 1995, pp. 212-213. |
Tanaka et al., “Embedding Secret Information Into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220. |
Tanaka, “Embedding the Attribute Information Into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50. |
Tirkel et al., “A Two-Dimensional Digital Watermark,” 1995, 6 pp. |
Toga et al., “Registration Revisited,” Journal of Neuroscience Methods, 48 (1993), pp. 1-13. |
van Schyndel et al., “Towards a Robust Digital Watermark,” ACCV '95, vol. 2, Dec., 1995, pp. 504-508. |
Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22. |
Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb's Journal, Apr. 1995, pp. 18-26, 82-87. |
“Watermarking & Digital Signature: Protect Your Work!” Published on Internet 1996, http://Itswww.epfl.ch/.about.jordan/watermarking.html. |
Wise, “The History of Copyright, Photographers' Rights Span Three Centuries,” Photo>Electronic Imaging, vol. 37, No. 6, 1994. |
van Schyndel et al., “A Digital Watermark,” IEEE International Conference on Image Processing, Nov. 13-16, 1994, pp. 86-90. |
Zhao et al., “Embedding Robust Labels Into Images for Copyright Protection,” Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies (Vienna, Austria) Aug. 21-25, 1995, 10 pp. |
Bender, “Applications for Data Hiding,” IBM Systems Journal, vol. 39, No. 3-4, pp. 547-568, 2000. |
Gruhl et al., “Information Hiding to Foil the Casual Counterfeiter,” Proc. 2d Information Hiding Workshop, LNCS vol. 1525, pp. 1-15 (Apr. 15, 1998). |
U.S. patent application Ser. No. 60/000,442, Hudetz, filed Jun. 20, 1995. |
U.S. patent application Ser. No. 60/082,228, Rhoads, filed Apr. 16, 1998. |
U.S. patent application Ser. No. 60/141,763, Davis, filed Jun. 30, 1999. |
U.S. patent application Ser. No. 60/158,015, Davis et al., filed Oct. 6, 1999. |
U.S. patent application Ser. No. 60/071,983, Levy, filed Jan. 20, 1998. |
U.S. patent application Ser. No. 09/404,291, Levy, filed Sep. 23, 1999. |
U.S. patent application Ser. No. 60/114,725, Levy, filed Dec. 31, 1998. |
U.S. patent application Ser. No. 09/234,780, Rhoads/Gustafson, filed Jan. 20, 1999. |
U.S. patent application Ser. No. 60/116,641, Cookson, filed Jan. 21, 1999. |
U.S. patent application Ser. No. 09/478,713, Cookson, filed Jan. 6, 2000. |