G06F21/1063

Stored image privacy violation detection method and system

Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.

Systems, Devices, and Methods for Watermark Embedding

Techniques for embedding watermarks are described. In accordance with various embodiments, a server (e.g., a cloud in a core network) generates a profile for an encoded media content item and packages the profile as corresponding watermark metadata. The server then transmits the encoded media content item and the corresponding watermark metadata to at least one edge node in an edge cloud. A respective edge node in the edge cloud, upon receiving a request from a client device for the encoded media content item, where the request includes a client identifier associated with the client device, obtains a first portion of the encoded media content item and the corresponding watermark metadata. A watermark embedder of the edge node then embeds the client identifier in the embedded media content item according to the watermark metadata and transmits the watermark embedded media content item to the client device.

Digital Watermarking in a Content Delivery Network
20230141582 · 2023-05-11 · ·

Systems and methods for digital watermarking at a content distribution network, CDN, node are described, whereby source data intended for at least one recipient is received from an origin server, the source data including a plurality of encrypted segments interleaved with at least one non-encrypted segment. Metadata is detected in the source data, the metadata identifying each non-encrypted segment, and in response, the source data is modified for each recipient, by embedding a recipient-specific digital watermark to at least a portion of a non-encrypted segment in the source data. The modified source data is then transmitted to each respective recipient. Other embodiments are also described and claimed.

Digital watermarking system and method
11645367 · 2023-05-09 · ·

A computer implemented method and a system configured to receive digital content; draw the digital content onto a drawing board; draw a watermark on the drawing board over the digital content, the watermark comprising a series of non-linear lines with the lines having random spacing therebetween in the x and y axes, and save the content of the drawing board in a desired file format.

Blockchain digital rights management streaming library

A computer-implemented method includes: receiving, by a computer device, an artifact and a first token with a check-in request; applying, by the computer device, a first level fragile watermark to the artifact, wherein the first level fragile watermark includes ownership information from the first token; receiving, by the computer device, a second token with a check-out request; applying, by the computer device, a second level fragile watermark to a copy of the first level fragile watermarked artifact, wherein the second level fragile watermark includes authentication information from the second token; and transmitting, by the computer device, the second level fragile watermarked copy of the artifact to a client device.

Method and system for making an artificial intelligence inference using a watermark-enabled kernel for a data processing accelerator

In one embodiment, a computer-implemented method performed by a data processing (DP) accelerator, includes receiving, at the DP accelerator, first data representing an artificial intelligence (AI) model that has been previously trained from a host processor and a set of input data; receiving, at the DP accelerator, a watermark kernel from the host processor; and executing the watermark kernel within the DP accelerator on the AI model. The watermark kernel, when executed, is configured to: perform inference operations of the artificial intelligence model based on the input data to generate output data, and implant the watermark within the output data. The DP accelerator then transmits the output data having the watermark implanted therein to the host processor.

Watermark unit for a data processing accelerator

In one embodiment, a computer-implemented method performed by a data processing (DP) accelerator, the method includes receiving, at the DP accelerator, first data representing a set of training data from a host processor and performing training of an artificial intelligence (AI) model based on the set of training data within the DP accelerator. The method further includes implanting, by the DP accelerator, a watermark within the trained AI model and transmitting second data representing the trained AI model having the watermark implanted therein to the host processor. In an embodiment, the method further includes receiving a pre-trained machine learning model; and performing training for the pre-trained AI model based on the set of training data within the DP accelerator.

COPYRIGHT PROTECTION ASSISTANCE SYSTEM
20230205853 · 2023-06-29 ·

In a copyright protection assistance system 1, a content delivery device 2 stores embedded region specification information having identification information and a page of comic contents, and definition information of an embedded region in the page, and user information of a logged-in user receiving delivery of the comic contents, embeds, in response to a request for delivery of specific comic contents by a specific user, the user information of the specific user by means of a difficult-to-perceive digital watermark in the embedded region specified by the embedded region specification information corresponding to the identification information of the specific comic contents, delivers the specific comic contents to the specific user, and transmits the identification information of the delivered specific comic contents and the user information of the specific user in association with each other to a copyright management device 3 for storage purpose.

Secure visual and computational boundary for a subset of resources on a computing machine

A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.

END-POINT MEDIA WATERMARKING

Apparatus, systems, methods, and articles of manufacture related to end-point media watermarking are disclosed. An example device includes a media receiver to receive a media signal, a watermark generator to generate a watermark, a trigger to activate the watermark generator to generate the watermark based on an external input, an encoder to encode the media signal with the watermark to synthesize an encoded media signal, a media output to render the encoded media signal.