WO2008048356A2 - Dispositif et procédé permettant d'effectuer un tatouage numérique sur une image au moyen de données gps - Google Patents

Dispositif et procédé permettant d'effectuer un tatouage numérique sur une image au moyen de données gps Download PDF

Info

Publication number
WO2008048356A2
WO2008048356A2 PCT/US2007/005505 US2007005505W WO2008048356A2 WO 2008048356 A2 WO2008048356 A2 WO 2008048356A2 US 2007005505 W US2007005505 W US 2007005505W WO 2008048356 A2 WO2008048356 A2 WO 2008048356A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
image
pixel
gps
video
Prior art date
Application number
PCT/US2007/005505
Other languages
English (en)
Other versions
WO2008048356A9 (fr
WO2008048356A3 (fr
Inventor
Ira J. Tabankin
Original Assignee
Catcher Holdings, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Catcher Holdings, Inc. filed Critical Catcher Holdings, Inc.
Publication of WO2008048356A2 publication Critical patent/WO2008048356A2/fr
Publication of WO2008048356A3 publication Critical patent/WO2008048356A3/fr
Publication of WO2008048356A9 publication Critical patent/WO2008048356A9/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/45Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from two or more image sensors being of different type or operating in different modes, e.g. with a CMOS sensor for moving images in combination with a charge-coupled device [CCD] for still images
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/667Camera operation mode switching, e.g. between still and video, sport and normal or high- and low-resolution modes

Definitions

  • the present invention relates generally to watermarking a digital image, and more specifically to embedding an image with GPS data.
  • Watermarking digital images is generally known in the art. Watermarking is a steganographic encoding technique that allows one to hide data within a file in such a way that it is imperceptible to the casual observer. It may be thought of as analogous to invisible ink. Coded images are very good vehicles for this kind of hidden data transfer because of the manner in which their information is stored, and because they are hidden within visual images where very minor color variance would not be noticed. However, with the help of advanced image editing software, digital images
  • Another object of the invention is to provide a method of encoding each frame of a video with a continuous stream of data across each frame, where the data includes a running date and time in which the video was taken.
  • a further object of the invention is to provide a portable handheld security device having a camera for taking an image and an encoder for encoding the image with GPS data.
  • FIG. 1 is a block diagram illustrating an embodiment of the apparatus of the present invention.
  • FIG. 2a is a front view of an embodiment of the apparatus of the present invention.
  • FIG. 2b is a front view of an embodiment of the apparatus of the present invention showing the portability and handheld features of the present invention in use.
  • FIG. 3 is a diagram illustrating the process of encoding an image with a digital watermark according to an embodiment of the invention.
  • FIG. 4 is a diagram illustrating how the image data and the GPS data are merged according to an embodiment of the invention.
  • FIG. 5 is a diagram illustrating how the digital watermark is authenticated according to an embodiment of the invention.
  • FIG. 6a is a diagram of a camera according to an embodiment of the invention.
  • FIG. 6b is a diagram of another embodiment of the invention.
  • each pixel of an image can be watermarked with GPS data. This may be accomplished by encoding the least significant bit of each pixel of the image with GPS data.
  • a digital watermark is a piece of information that is hidden in media content in such a way that it is imperceptible to observation but that can be easily detected by a computer. If a watermark is hidden in media content for the purpose of authentication, it must be done in such a way that alteration of the content either destroys the watermark or creates a mismatch between the content and the watermark that can be easily detected.
  • Watermarking is a process that combines two pieces of information in such a way that they can be independently detected by two different detection processes.
  • One piece of information is the media data, such as music, a photograph or a movie which will be viewed by a human observer.
  • the other piece of information is a watermark, which will be detected by specially designed watermark detector.
  • a watermark is hidden in an image, either still or in video format, by replacing the least significant bit with a watermark pattern based on GPS data received at the time the image or video was taken. This not only allows the image to be watermarked without altering the image itself, but allows the image to be authenticated with respect to at least date, time and location because the watermark contains the GPS data received at the time the image was taken.
  • an image can be stored as a series of pixels encoded in the Red, Green, Blue (RGB) color space.
  • RGB Red, Green, Blue
  • a 3-byte triplet will represent each pixel, with 8 bits of information for each color plane.
  • the difference observed between two colors when one flips the value of the least significant bit (or bits) of any of the bytes within the triplet is negligible. Therefore, one could alter the least significant bites from a series of pixels without adversely affecting the image being observed.
  • the same theory applies for altering frames in a video.
  • a CIF frame of video data contains 288 lines, each containing 352 pixels, or a total of 101,376 pixels.
  • Extraction of the information can be performed by an application, either a viewer or an extraction tool, that understands how and where the data were hidden. This extraction tool can identify which bits hold the hidden information, and can extract that data and reassemble it, and perform any decryption necessary to reveal the original data.
  • the data used to watermark the image can be GPS data received from a GPS satellite.
  • GPS satellites broadcast three different types of data in the primary navigation signal. The first is the almanac which sends coarse time information along with status information about the satellites. The second is the ephemeris, which contains orbital information that allows the receiver to calculate the position of the satellite.
  • the satellites also broadcast two forms of clock information, the Coarse/Acquisition code, or C/A which is freely available to the public, and the restricted Precise code, or P-code, usually reserved for military applications.
  • a portable handheld security device 10 of the present invention has a central processing unit 12 that is ideally a mobile processing unit such as an Intel ® Pentium ® mobile processor.
  • the security device 10 also includes a memory storage device 14 in communication with the central processing unit 12.
  • the memory storage device 14 ideally includes at least 512 mega bytes (MB) and up to 4 gigabytes (GB) and 20+ GB of hard drive space as shown.
  • the security device 10 also includes a power supply 36 preferably comprised of two battery packs in each side handle, for powering the security device 10 and all of its components.
  • the battery packs are ideally rechargeable batteries that can each provide sufficient power to keep the device 10 operational for several hours at a time on a single charge.
  • the battery packs can also preferably be "hot swapped" without shutting the device down.
  • the security device 10 further includes an input device 16.
  • the input device 16 ideally includes user-interface controls and touch screen technology for manipulating the security device 10 and inputting information into the security device 10.
  • the user-interface controls of the input device 16 are preferably auto- ambidextrous in that there are two sets of user-interface controls, as shown in FIGS. 2a and 2b.
  • the first set of user-interface controls 22 and the second set of user- interface controls 24 are selectively operable by users either independently or simultaneously.
  • the user can select a single set of user-interface controls 22, 24, to accommodate left or right-handed tendencies, and use that set of user-interface controls exclusively and independently of the other set of user-interface controls, or the user can select both sets of user-interface controls 22, 24, if the user is ambidextrous, and use both sets simultaneously.
  • the security device 10 can sense which set of user-interface controls 22, 24 has first been touched by a user and make that set of user-interface controls the primary set of user-interface controls, thereby allowing the user, consciously or unconsciously, to select a single set of controls to operate independently based on his or her left or right-handed tendencies. If both sets of controls are touched by a user within a predetermined time period such as 2 seconds, the security device 10 allows both sets of controls 22, 24 to operate simultaneously so that a user can use either hand in the middle of an input or manipulation.
  • the security device 10 may also include a video display screen 18 in communication with the central processing unit 12.
  • the video display screen is ideally between 5" and 8.4" LCD screen that supports touch screen technology. Touch screen technology, or a touch screen display, allows a user to simply touch the video display screen 18 to input information or otherwise manipulate the security device 10.
  • the video display screen 18 also preferably supports direct freehand drawing input, allowing a user to write or draw directly on the video display screen 18 to input information. For example, a user could draw a circle around an image displayed on the video display screen 18, and save the image, including the circle, for later use or distribution to others.
  • Picture-in-picture display is preferably also supported by the video display screen.
  • the video display screen 18 is also ideally readable in any lighting condition, including sunlight, to facilitate both indoor and outdoor use.
  • At least one camera 38 is also provided in communication with the central processing unit 12 for providing video capability for the security device 10.
  • the security device 10 has two digital cameras 38 and can capture both still images and video images up to and including full-motion video images.
  • the full-motion video images ideally are captured at a rate of 30 frames per second, and play back at variable frame rates. Panning, zooming, fast forward, reverse, normal play, and pause features are also preferably supported by the security device 10.
  • At least one of the cameras 38 ideally can operate in infrared light, and at least one of the cameras can ideally operate in normal and low light.
  • Pictures taken in normal, low and infrared light can either be mixed within the same full-motion video image, or the user can switch between the normal, low and infrared light modes as an image is being captured.
  • Each camera ideally has a minimum of 2 mega pixels resolution, and up to 8 hours of full-motion video can ideally be stored in the security device 10.
  • the video capability of the present invention preferably also includes at least a Motion Picture Experts Group (MPEG) encoder and decoder 58, 60.
  • MPEG Motion Picture Experts Group
  • the security device 10 also includes a transmitting device 26 and a receiving device 28 in communication with the central processing unit 12.
  • the transmitting and receiving devices 26, 28 can ideally securely transmit and receive information using wireless devices 30, such as radio frequency (RF) wireless network cards, or wired devices 32, such as Ethernet cable connections.
  • wireless devices 30 such as radio frequency (RF) wireless network cards, or wired devices 32, such as Ethernet cable connections.
  • RF radio frequency
  • Many different wireless local area networks (WLANs) can be used with the security device 10, including without limitation 802.1 la/b/g, 802.1 1 "super g," 802.15.3a, Global System for Mobile Communications and General Packet Radio Service (GSM/GPRS), 3G, ultra wide band, BluetoothTM, and CDMA IX.
  • GSM/GPRS Global System for Mobile Communications and General Packet Radio Service
  • 3G Global System for Mobile Communications and General Packet Radio Service
  • BluetoothTM BluetoothTM
  • CDMA IX Code Division Multiple Access
  • the security device 10 using wireless devices 30, is ideally capable of selecting between available communication network signals, determining which network signal is the best signal at a given time, and automatically switching between the available signals to maintain optimum reception and transmission quality.
  • the security device 10 ideally has middleware that measures the received signal strength of the various network cards and can select the best signal unless the user chooses to "lock in" a particular source. If the security device 10 starts using an RF wireless network card and encounters interference, it can seamlessly switch to another wireless transmission mode without the user knowing a change was made.
  • the security device 10 can also operate whether or not the transmitting and receiving devices 26, 28 are enabled. In other words, the security device 10 can also operate as a stand alone unit.
  • the security device 10 when operating as a stand alone unit, continues to look for wireless or wired networks with which it can authenticate. If such a network is located, the security device 10 will preferably exchange pass codes and information with the corresponding network server to transition from stand alone to network operation.
  • Audio capability including a sound producing device 40, such as speakers, and a sound recording device 42, such as a digital sound recorder including a microphone, is preferably included.
  • a global positioning system including a global positioning system
  • the security device 10 is preferably a complete personal computer (PC) that runs on Microsoft ® XP operating system and supports voice, data, video conferencing, email, Microsoft ® Office ® files, any software that operates under or over Microsoft ® XP operating system, forms generation, and document scanning. It should be understood, however, that the security device 10 of the present invention can be configured to run on any operating system including Linux, MacOS, Solaris and Unix.
  • PC personal computer
  • All of the above-described features of the present invention are ideally contained in a lightweight, handheld housing 56 that is durable enough to meet Military Standard 80 IF, waterproof, and able to withstand virtually all weather conditions and climates with an operating temperature range of -30 to +50° Celsius.
  • the entire security device 10 is also ideally very lightweight, preferably between 1.5 and 6 pounds including the battery.
  • the handheld, lightweight, wireless security device 10 can easily be carried and operated using one or both hands, as shown in FIG. 2b.
  • the security device 10 can be easily carried and used by personnel in, for example, transportation security, transportation operations, corporate security, education security, first responder organizations, government agencies, the
  • the security device of the present invention can be used in a number of ways and for a number of purposes.
  • An example of one such purpose relates to capturing images and video which can be easily authenticated.
  • the cameras 38 may be used to digitally capture an image or a stream of images in the form of video.
  • the global positioning system (GPS) 44 may receive a signal from the GPS satellites 100. As shown in Fig. 3, the camera is used to take a picture or a video.
  • picture data is generated which includes a plurality of pixels depending on the resolution of the image and GPS data is generated which corresponds to a received GPS signal.
  • the GPS data may be encrypted 320 prior to being merged with the image data, or the GPS data may be directly merged with the image data at 330.
  • the watermarked image is generated. The method of merging the GPS data, either encrypted or unencrypted with the image data will be explained with reference to Fig. 4.
  • Fig. 4 illustrates a digital image which is divided into a plurality of pixels depending on the resolution of the image.
  • each pixel contains 8 bits.
  • the GPS data contains N number of bits of information.
  • each least significant bit (LSB) is replaced by a bit of the GPS data
  • the first bit of the GPS data replaces the LSB of the first pixel.
  • the second bit of the GPS data replaces the LSB of the second pixel, and so on until the Nth bit of the GPS data has been placed in a LSB of a pixel of the image.
  • the GPS data is then repeated in the remaining pixels until all of the pixels of the image have had their LSB's replaced with a bit of the GPS data.
  • the GPS data can be encrypted prior to being merged with the image data. Further, the GPS data can be dispersed throughout the pixels of the image in an encrypted fashion. It should also be understood that each frame of a video may be watermarked in a similar fashion. Further, one row of each frame of the video, preferably the last row of pixels, may contain an encoded running time clock. In other words, the least significant bits of one of the rows of pixels may contain the time the frame was shot so that if a frame is removed, it will be easily detected by decoding that row of pixels.
  • a video or image may be authenticated as shown in Fig. 5. Authenticating a video or image may be performed by the hand-held security device itself, or a separate device (not shown) which contains decoding software to decode the watermark.
  • the image or video is received. This may entail transferring the image data to another device, or merely loading the stored image data in the hand-held security device.
  • the image data is decoded into pixel data, where each pixel of the image is expressed in terms of a "0" or a "1".
  • the LSB of each pixel is removed. Each LSB is assembled at 530 and then decoded at 540. Once the LSB 's are decoded, the image or video can be authenticated because the original GPS data will be repeated throughout the image. If a portion of the GPS data is missing, it will be evident that a portion of the image was modified and the authentication process will fail.
  • a stand-alone digital camera may include at least a receiver capable of receiving GPS signals and a processor capable of capturing digital images and embedding a digital watermark containing received GPS data, as discussed above.
  • a camera 600 may include a built in GPS receiver 610 or have a connector 601 that allows a stand-alone GPS unit 602 to be attached to the camera 600. The operation of the process of replacing the LSB of each pixel of an image is the same as discussed above.
  • Fig. 6b illustrates an example of how the camera 600 having a lens 620 would capture an image 630 and a digital signal processor 630 would process the image with the received GPS input and store the resulting watermarked image in the memory 640.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Le procédé selon l'invention permet d'effectuer un tatouage numérique sur une image ou une vidéo par remplacement du bit le moins significatif de chaque pixel de l'image par des données GPS reçues au moment où les données image ont été capturées, de telle sorte qu'une image ou une vidéo peut être authentifiée par suppression des bits les moins significatifs, par nouvel assemblage des bits en un flux de données et décodage dudit flux de données.
PCT/US2007/005505 2006-03-03 2007-03-05 Dispositif et procédé permettant d'effectuer un tatouage numérique sur une image au moyen de données gps WO2008048356A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US77836406P 2006-03-03 2006-03-03
US60/778,364 2006-03-03

Publications (3)

Publication Number Publication Date
WO2008048356A2 true WO2008048356A2 (fr) 2008-04-24
WO2008048356A3 WO2008048356A3 (fr) 2009-04-16
WO2008048356A9 WO2008048356A9 (fr) 2010-12-09

Family

ID=39314566

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/005505 WO2008048356A2 (fr) 2006-03-03 2007-03-05 Dispositif et procédé permettant d'effectuer un tatouage numérique sur une image au moyen de données gps

Country Status (1)

Country Link
WO (1) WO2008048356A2 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009022606A1 (de) 2009-05-26 2010-12-02 Siemens Aktiengesellschaft Verfahren und Vorrichtung zur steganographischen Modifikation eines Bitstroms
US9513635B1 (en) 2015-12-30 2016-12-06 Unmanned Innovation, Inc. Unmanned aerial vehicle inspection system
US9609288B1 (en) 2015-12-31 2017-03-28 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US9740200B2 (en) 2015-12-30 2017-08-22 Unmanned Innovation, Inc. Unmanned aerial vehicle inspection system
RU2633122C2 (ru) * 2012-03-22 2017-10-11 Сони Корпорейшн Устройство приема, способ приема, программа, устройство обработки дешифрования, система обработки приема и устройство обработки информации
CN109145649A (zh) * 2018-08-03 2019-01-04 金联汇通信息技术有限公司 基于执法终端的视频处理方法、证书生成方法及相应装置
US11029352B2 (en) 2016-05-18 2021-06-08 Skydio, Inc. Unmanned aerial vehicle electromagnetic avoidance and utilization system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269446B1 (en) * 1998-06-26 2001-07-31 Canon Kabushiki Kaisha Authenticating images from digital cameras
GB2361377A (en) * 1998-12-11 2001-10-17 Kent Ridge Digital Labs Method and device for generating digital data watermarked with authentication data
US20040091111A1 (en) * 2002-07-16 2004-05-13 Levy Kenneth L. Digital watermarking and fingerprinting applications
GB2408876A (en) * 2003-12-05 2005-06-08 Symbian Ltd Embedding location data in an image
WO2005091547A2 (fr) * 2004-03-18 2005-09-29 Digimarc Corporation Procedes et systemes de codage de charge par filigrane
US20060001757A1 (en) * 2004-07-02 2006-01-05 Fuji Photo Film Co., Ltd. Map display system and digital camera

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269446B1 (en) * 1998-06-26 2001-07-31 Canon Kabushiki Kaisha Authenticating images from digital cameras
GB2361377A (en) * 1998-12-11 2001-10-17 Kent Ridge Digital Labs Method and device for generating digital data watermarked with authentication data
US20040091111A1 (en) * 2002-07-16 2004-05-13 Levy Kenneth L. Digital watermarking and fingerprinting applications
GB2408876A (en) * 2003-12-05 2005-06-08 Symbian Ltd Embedding location data in an image
WO2005091547A2 (fr) * 2004-03-18 2005-09-29 Digimarc Corporation Procedes et systemes de codage de charge par filigrane
US20060001757A1 (en) * 2004-07-02 2006-01-05 Fuji Photo Film Co., Ltd. Map display system and digital camera

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009022606A1 (de) 2009-05-26 2010-12-02 Siemens Aktiengesellschaft Verfahren und Vorrichtung zur steganographischen Modifikation eines Bitstroms
US10044508B2 (en) 2012-03-22 2018-08-07 Saturn Licensing Llc Embedding digital watermark at the receiver end to keep track of digital content source and intended legal subscriber
RU2633122C2 (ru) * 2012-03-22 2017-10-11 Сони Корпорейшн Устройство приема, способ приема, программа, устройство обработки дешифрования, система обработки приема и устройство обработки информации
US9513635B1 (en) 2015-12-30 2016-12-06 Unmanned Innovation, Inc. Unmanned aerial vehicle inspection system
US11550315B2 (en) 2015-12-30 2023-01-10 Skydio, Inc. Unmanned aerial vehicle inspection system
US10761525B2 (en) 2015-12-30 2020-09-01 Skydio, Inc. Unmanned aerial vehicle inspection system
US9740200B2 (en) 2015-12-30 2017-08-22 Unmanned Innovation, Inc. Unmanned aerial vehicle inspection system
US9915946B2 (en) 2015-12-31 2018-03-13 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US9881213B2 (en) 2015-12-31 2018-01-30 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US9618940B1 (en) 2015-12-31 2017-04-11 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US10061470B2 (en) 2015-12-31 2018-08-28 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US10083616B2 (en) * 2015-12-31 2018-09-25 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US9613538B1 (en) 2015-12-31 2017-04-04 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US9609288B1 (en) 2015-12-31 2017-03-28 Unmanned Innovation, Inc. Unmanned aerial vehicle rooftop inspection system
US11029352B2 (en) 2016-05-18 2021-06-08 Skydio, Inc. Unmanned aerial vehicle electromagnetic avoidance and utilization system
US11835561B2 (en) 2016-05-18 2023-12-05 Skydio, Inc. Unmanned aerial vehicle electromagnetic avoidance and utilization system
CN109145649A (zh) * 2018-08-03 2019-01-04 金联汇通信息技术有限公司 基于执法终端的视频处理方法、证书生成方法及相应装置

Also Published As

Publication number Publication date
WO2008048356A9 (fr) 2010-12-09
WO2008048356A3 (fr) 2009-04-16

Similar Documents

Publication Publication Date Title
US20080089554A1 (en) Device and method for digitally watermarking an image with data
US20070292034A1 (en) Device and method for digitally watermarking an image with GPS data
WO2006006081A3 (fr) Systeme de surveillance video intelligent garantissant la confidentialite
US8077980B2 (en) Image processing apparatus
WO2008048356A2 (fr) Dispositif et procédé permettant d'effectuer un tatouage numérique sur une image au moyen de données gps
US7841531B2 (en) Camera operating system and matrix code decoding device
KR101650002B1 (ko) 보안 증강 현실 애플리케이션을 위한 컨텍스트 기반 관리
US7209571B2 (en) Authenticating metadata and embedding metadata in watermarks of media signals
US8787580B2 (en) Distribution of keys for encryption/decryption
JP2008269486A (ja) 撮像機器及びその認証方法
US20160050341A1 (en) Security feature for digital imaging
US20110085204A1 (en) Captured image processing system, image capture method, and recording medium
Cheung et al. Protecting and managing privacy information in video surveillance systems
US6961441B1 (en) Method and apparatus for steganographic embedding of meta-data
US11706382B2 (en) Methods and apparatus for encrypting camera media
US20050073725A1 (en) Mobile terminal having camera for inserting watermark data into image data and method thereof
KR101707663B1 (ko) Cctv 카메라를 이용한 영상 이미지 퍼즐 보안 전송 시스템 및 그 제어방법
Wang et al. {CamShield}: Securing Smart Cameras through Physical Replication and Isolation
KR100678035B1 (ko) 휴대단말기의 촬영자 식별장치 및 방법
CN111400768A (zh) 基于人脸和行为识别的加密分享平台及加密分享方法
JP2005229265A (ja) 画像暗号システム及び画像暗号方法
US20040135888A1 (en) Camera systems, systems of offering photographs for sale, and methods of offering photographs for sale
CN1522538A (zh) 带有水印的视频/图像通信
US11057644B2 (en) Distribution system, client terminal, and method of controlling display
KR100973302B1 (ko) 모바일단말의 워터마킹 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07861256

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC, EPO FORM 1205A SENT ON 18/02/09 .

122 Ep: pct application non-entry in european phase

Ref document number: 07861256

Country of ref document: EP

Kind code of ref document: A2