Patent
Copyright detection and protection system and method
Reads0
Chats0
TLDR
In this article, a method for detecting against unauthorized transmission of digital works comprises the steps of maintaining a registry of information permitting identification of digital copyrighted works, monitoring a network for transmission of at least one packet-based digital signal, extracting at least 1 feature from the at least digital signal and comparing the extracted feature with registry information and applying business rules based on the comparison result.Abstract:
A method for detecting against unauthorized transmission of digital works comprises the steps of maintaining a registry of information permitting identification of digital copyrighted works, monitoring a network for transmission of at least one packet-based digital signal, extracting at least one feature from the at least one digital signal, comparing the extracted at least one feature with registry information and applying business rules based on the comparison result.read more
Citations
More filters
Patent
Intuitive computing methods and systems
TL;DR: A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires as discussed by the authors, and can apply more or less resources to an image processing task depending on how successfully the task is proceeding or based on the user's apparent interest in the task.
Patent
Connected audio and other media objects
TL;DR: In this paper, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc.
Patent
Smartphone-based methods and systems
Bruce L. Davis,Tony F. Rodriguez,Geoffrey B. Rhoads,William Y. Conwell,Jerrine K. Owen,Adnan M. Alattar,Eliot Rogers,Brett A. Bradley,Alastair M. Reed,Robert Craig Brandis +9 more
TL;DR: In this paper, the authors discuss the use of portable devices (e.g., smartphones and tablet computers) in a variety of applications, such as shopping, text entry, sign language interpretation, and vision-based discovery.
Patent
Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
TL;DR: In this article, the authors present methods and systems for encoding digital watermarks into content signals, including window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing sample window to provide normalized samples.
Patent
Media processing methods and arrangements
Bruce L. Davis,Tony F. Rodriguez +1 more
TL;DR: In this paper, the authors present a program directory database, compiled automatically from information reported by network nodes that watch and identify content traffic passing into (and/or out of) networked computers.
References
More filters
Journal ArticleDOI
Maximum likelihood from incomplete data via the EM algorithm
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)
System and methods for recognizing sound and music signals in high noise and distortion
Method and apparatus for identifying media content presented on a media playing device
Vance Ikezoye,James B. Schrempp +1 more