H04L2209/608

Content distribution pipeline watermarking

Methods, computer-readable media, and devices for tracking an accessing of a media content via a watermark embedded by a network node are disclosed. For example, a processing system including at least one processor may receive, from a first network node, a first copy of a watermark that is embedded by the first network node in a media content. The processing system may further receive a notification comprising a second copy of the watermark and an identification of a first endpoint device, the notification associated with an accessing of the media content by the first endpoint device, and record the accessing of the media content by the first endpoint device.

WATERMARKING FOR DATA INTEGRITY

Methods, systems, and apparatus for ensuring data integrity are disclosed. A data container structure is obtained, the data container structure containing data and a source identifier of a first hardware component. The data container structure is modified, using a header processing device, to include a component signature and an identifier of a second hardware component.

SECURE CONTENT AUGMENTATION SYSTEMS AND METHODS

The disclosure relates to, among other things, systems and methods for augmenting and/or otherwise supplementing content using watermarks. Consistent with embodiments disclosed herein, a user device such as a smartphone may be used to retrieve watermark information encoded in a watermark. The watermark information may comprise content that supplements an associated content item, link and/or location information that may be used to retrieve supplemental content, and/or the like. In some embodiments, the watermark information may comprise cryptographic and/or other access token information used to decrypt and/or otherwise access supplemental content.

Digital watermarking without significant information loss in anonymized datasets
11681825 · 2023-06-20 · ·

A computer-implemented process of altering original data in a dataset, in which original data is anonymised and a digital watermark is included in the anonymised data. Anonymising the original data incurs information loss, and the process of including the digital watermark does not add significant further information loss. The original data can be a tabular file, a relational or a non-relational database, or the results of interactive database queries. Anonymising the data is achieved using one or more techniques that perturb the original data, such as tokenisation, generalisation; data blurring, synthetic record insertion, record removal or re-ordering.

Securing webpages, webapps and applications

A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.

Methods for encoding, decoding and interpreting auxiliary data in media signals
09832353 · 2017-11-28 · ·

The disclosure relates to digital watermarking, steganography, and specifically to message coding protocols used in conjunction with digital watermarking and steganographic encoding/decoding and payload interpretation methods. One claim recites a method for interpreting a data structure having fixed and variable message portions, the method comprising: processing the fixed message portion to determine a version of the variable message portion; decoding the entire payload field of the variable message portion according to the determined version; and interpreting only a portion of the decoded payload field according to the determined version. Of course, other features and claims are provided too.

Digital watermarking for textual data

Methods and system for embedding digital watermark information into textual data arranged in a table of cells are provided. A first subset of cells are selected and for each primary cell key and cell partition number are determined. A portion of a digital watermark ID code is embedded at an embedding position determined based on the partition number. Methods and systems for extracting digital watermark information from the textual data are also provided. A cell is fetched from the table and the presence of portion of the digital watermark ID code is determined. A primary cell key and cell partition number are determined. A portion of the digital watermark ID code is extracted at the embedding position within the cell, the embedding position determined based on the cell partition number. The digital watermarking systems and methods provide tracking for unauthorized copying of the data while modifying only a subset of the data.

METHOD AND APPARATUS FOR EMBEDDING AND EXTRACTING TEXT WATERMARK
20170329943 · 2017-11-16 · ·

One aspect of the present invention discloses a watermark insertion method. The method includes: segmenting target text into pieces of page content; obtaining a watermark variable comprising a line alternation value indicative of a watermark mode changed for each line of the segmented page content and a watermark mode setting value; and applying a flip-flop component insertion algorithm for inserting a watermark into each of the pieces of segmented page content based on the obtained watermark variable.

DYNAMIC DATA WATERMARKING FOR LEAKAGE SOURCE DETECTION

In one example an apparatus comprises a memory and a processor to receive, in an edge node of a secure network, a first file, determine that the first file is addressed to a recipient outside the secure network, and in response to a determination that the first file is addressed to a destination outside the secure network, to generate a watermark that identifies a transmitter of the document, a recipient of the document, and comprises a digital signature of the first file, embed the watermark in the first file to generate a watermarked file, and pass the watermarked file to an input/output system for transmission out of the secure network. Other examples may be described.

METHOD FOR TRANSMITTING FACE IMAGE DATA, TRANSFERRING VALUE, APPARATUS, AND ELECTRONIC DEVICE
20220058376 · 2022-02-24 ·

This application provides a method for transmitting face image data and transferring value, apparatuses, an electronic device, and a storage medium, which belongs to the field of network technologies. The method for transmitting face image data includes acquiring a face data stream through the sensor, and transmitting the face data stream to the first processor; performing image screening on a face image in the face data stream by the first processor to obtain at least a target face image, the target face image meeting a target condition; retrieving a target web address from the memory by the first processor; and transmitting the target face image to the target web address by the first processor.