Patent classifications
G06T2201/0064
Device and method for inserting identification code for tracking duplicated image
The present disclosure a method of providing identification code insertion service for tracking a duplicated image, which is performed by a server, including: (a) receiving an image from a user terminal; (b) converting the received image to black and white, and selecting a plurality of insertion regions in the converted image; (c) transforming an image of at least one of a plurality of insertion regions selected at random; and (d) mapping an identification code and image information included in the transformed image of the insertion region, storing the identification code and the image information in a database, and providing the image in which the identification code is inserted to the user terminal.
METHOD AND APPARATUS FOR EMBEDDING AND EXTRACTING TEXT WATERMARK
One aspect of the present invention discloses a watermark insertion method. The method includes: segmenting target text into pieces of page content; obtaining a watermark variable comprising a line alternation value indicative of a watermark mode changed for each line of the segmented page content and a watermark mode setting value; and applying a flip-flop component insertion algorithm for inserting a watermark into each of the pieces of segmented page content based on the obtained watermark variable.
HALLMARK-BASED IMAGE CAPTURE PREVENTION
A method, computer system, and a computer program product for image protection are provided. A first device includes a computer and a first camera. The first device identifies a picture that has a hallmark. The first device transmits a message requesting authorization to have a copy of the picture. The message contains data representative of the hallmark. The first device receives a response message. The first device determines whether the response message authorizes capture of a copy of the picture.
System and Method for Identifying the Source of Counterfeit Copies of Multimedia Works Using Layered Simple Digital Watermarks
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
Securing protected content during video playback
The disclosed embodiments provide a system that drives a display from a computer system. During operation, the system writes graphical output to protected memory and drives the display from the protected memory. If the graphical output lacks protection, the system discontinues the driving of the display from the protected memory. In particular, upon detecting a lack of protection in the graphical output, the system continues to drive the display from the protected memory during a grace period associated with the lack of protection in the graphical output. The system then discontinues driving of the display from the protected memory if protection of the graphical output does not resume during the grace period.
METHOD AND APPARATUS OF DRM SYSTEMS FOR PROTECTING ENTERPRISE CONFIDENTIALITY
One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.
IMAGE MANAGEMENT METHOD AND DATA STRUCTURE OF METADATA
The present technology relates to an image management method and a data structure of metadata that allow for management of an image captured by an artificial satellite. A management device that manages a captured image captured by a satellite adds metadata that includes at least information regarding a person related to the captured image to the captured image. The present technology can be applied to, for example, artificial satellites that perform satellite remote sensing by a formation flight.
IMAGE SYNTHESIS DEVICE AND METHOD FOR EMBEDDING WATERMARK
An image synthesis method includes inputting an original image and a watermark image into a synthesis model and obtaining a synthesized image output from the synthesis model. The original image and the watermark image are respectively processed in first and second sub-models of the synthesis model and then combined, and the concatenated result is processed in a third sub-model to generate the synthesized image.
Hallmark-based image capture prevention
A method, computer system, and a computer program product for image protection are provided. A first device includes a computer and a first camera. The first device identifies a picture that has a hallmark. The first device transmits a message requesting authorization to have a copy of the picture. The message contains data representative of the hallmark. The first device receives a response message. The first device determines whether the response message authorizes capture of a copy of the picture.
METHOD OF TRACKING SOURCE DISPLAY PANEL FROM WHICH ILLEGAL COPY OF IMAGE IS CAPTURED BY CAMERA AND ELECTRONIC APPARATUS FOR TRACKING ILLEGAL COPY OF IMAGE CAPTURED BY CAMERA FROM SOURCE DISPLAY PANEL OF ELECTRONIC APPARATUS
A method of tracking a source display panel from which an illegal copy of an image is captured by a camera is provided. The method includes generating a content image visible to human eyes using a visible light component integrated in an integrated light emitting source; generating a watermark image invisible to the human eyes in real time using an invisible light component integrated in the same integrated light emitting source; and simultaneously displaying the content image and the watermark image on the source display panel. Generating the watermark image includes generating an image of an identifier unique to the source display panel. The method further includes analyzing the image captured by the camera to extract the image of an identifier unique to the source display panel; and identifying the source display panel based on the identifier unique to the source display panel.