`Rhoads
`
`I lllll llllllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US005841978A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,841,978
`Nov. 24, 1998
`
`[54]
`
`NETWORK LINKING METHOD USING
`STEGANOGRAPHICALLY EMBEDDED DATA
`OBJECTS
`
`[75]
`
`Inventor: Geoffrey B. Rhoads, West Linn, Oreg.
`
`[73]
`
`Assignee: Digimarc Corporation, Portland, Oreg.
`
`[21]
`
`Appl. No.: 508,083
`
`[22]
`
`Filed:
`
`Jul. 27, 1995
`
`Related U.S. Application Data
`
`[63]
`
`[51]
`[52]
`
`[58]
`
`Continuation-in-part of Ser. No. 436,098, May 8, 1995, Pat.
`No. 5,636,292, and a continuation-in-part of Ser. No. 436,
`099, May 8, 1995, Pat. No. 5,710,834, Ser. No. 436,134,
`May 8, 1995, Ser. No. 438,159, May 8, 1995, Ser. No.
`215,289, Mar. 17, 1994, abandoned, and Ser. No. 327,426,
`Oct. 21, 1994, which is a continuation-in-part of Ser. No.
`154,866, Nov. 18, 1993, abandoned and a continuation-in(cid:173)
`part of PCT/US94/13366 Nov. 16, 1994 ..
`Int. Cl.6
`............................... G06F 13/00; H04L 9/00
`U.S. Cl. ................................ 395/200.47; 395/187.01;
`395/335; 380/4; 380/28
`Field of Search ............................ 395/200.3, 200.48,
`395/200.38, 200.47, 200.75, 200.66, 187.01,
`682, 602, 610, 329, 335, 339, 200.49; 380/3,
`4,5, 6,54,28
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,569,619
`3,665,162
`3,703,628
`3,805,238
`3,838,444
`3,914,877
`3,922,074
`3,984,624
`4,225,967
`
`3/1971 Simjian .................................... 178/6.8
`5/1972 Yamamoto et al.
`.................... 235/380
`11/1972 Philipson, Jr ...................... 235/61.9 R
`4/1974 Rothfjell ................................. 382/118
`9/1974 Loughlin et al. .
`10/1975 Hines ........................................ 380/54
`11/1975 Ikegami et al. ............................. 380/3
`10/1976 Waggener ............................... 348/473
`9/1980 Miwa et al.
`.............................. 455/68
`
`(List continued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`
`372 601
`411 232
`441 702
`493 091
`581 317
`629 972
`650 146 Al
`705 025 A2
`3806411
`4-248771
`5-242217
`2063018
`2067871
`2196167
`2204984
`W089/08915
`W095/10835
`W095/14289
`W095/20291
`
`6/1990
`2/1991
`8/1991
`7/1992
`2/1994
`12/1994
`4/1995
`4/1996
`9/1989
`9/1992
`9/1993
`5/1981
`7 /1981
`4/1988
`11/1988
`9/1989
`4/1995
`5/1995
`7/1995
`
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`European Pat. Off ..
`Germany.
`Japan.
`Japan.
`United Kingdom .
`United Kingdom .
`United Kingdom .
`United Kingdom .
`WIPO.
`WIPO.
`WIPO.
`WIPO.
`
`OTHER PUBLICATIONS
`
`Choudhury, et al., "Copyright Protection for Electronic
`Publishing over Computer Networks," IEEE Network
`Magazine, Jun. 1994, 18 pages.
`Moller, et al., "Rechnergestutzte Steganographie: Wie sie
`Funktioniert und warum folglich jede Reglementierung von
`Verschlusselung unsinnig ist," DuD, Datenschutz und Dat(cid:173)
`ensicherung, 18/6 (1994) 318-326.
`
`(List continued on next page.)
`
`Primary Examiner-Parshotam S. Lall
`Assistant Examiner-Viet Vu
`Attorney, Agent, or Firm---Marger, Johnson, McCollom &
`Stolowitz, P.C.
`
`[57]
`
`ABSTRACT
`
`A given data object can effectively contain both a graphical
`representation to a network user and embedded information,
`such as the URL address of another network node, thereby
`to permit the object itself to serve as an automated hot link.
`The underlying development tools and web site browsers
`create and identify such an object for use in a manner similar
`to a hot link, as provided on the World Wide Web.
`
`058 482
`
`8/1982 European Pat. Off ..
`
`13 Claims, 18 Drawing Sheets
`
`1006
`
`1002
`
`WEB SITE
`DEVELOPMENT TOOL
`WWW SITE
`
`1004
`
`1006
`
`:.:.-:-::.:.·>:
`
`i(Q)••··
`
`0
`
`.----~--~1010
`BROWSER
`WWW SITE
`
`APPLE 1004 - Page 1
`
`
`
`5,841,978
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`4,230,990 10/1980 Lert, Jr. et al. ............................. 455/4
`4,231,113 10/1980 Blasbalg .................................... 380/34
`4,238,849 12/1980 Gassmann ............................... 370/204
`4,252,995
`2/1981 Schmidt et al.
`..................... 179/1 GD
`1/1982 Maxemchuk ............................ 370/210
`4,313,197
`4,379,947
`4/1983 Warner .................................... 370/204
`4,395,600
`7/1983 Lundy et al.
`.......................... 381/73.1
`4,423,415 12/1983 Goldman ............................ 340/825.34
`........................... 370/477
`4,425,642
`1/1984 Moses et al.
`4,476,468 10/1984 Goldman .......................... 340/825.034
`4,528,588
`7/1985 Liifberg ................................... 358/122
`4,532,508
`7/1985 Ruell .................................. 340/825.34
`4,547,804 10/1985 Greenberg ............................... 348/460
`4,553,261 11/1985 Froessl ...................................... 382/57
`4,590,366
`5/1986 Rothfjell ................................. 235/494
`4,595,950
`6/1986 Liifberg ................................... 358/122
`4,637,051
`1/1987 Clark ........................................... 382/1
`4,654,867
`3/1987 Labedz et al. ............................ 379/59
`4/1987 Dlugos ...................................... 380/23
`4,660,221
`4,663,518
`5/1987 Borror et al. ........................... 235/487
`5/1987 Cooper .................................... 348/480
`4,665,431
`4,672,605
`6/1987 Hustig et al. ........................... 370/201
`4,675,746
`6/1987 Tetrick et al.
`.......................... 358/296
`6/1987 Causse D' Agraives et al.
`. 340/825.31
`4,677,435
`4,682,794
`7/1987 Margolin ................................... 283/82
`4,703,476 10/1987 Howard ................................... 370/491
`4,712,103 12/1987 Gotanda ............................. 340/825.31
`4,718,106
`1/1988 Weinblatt .................................... 455/2
`4,739,377
`4/1988 Allen ....................................... 355/133
`6/1988 Bliithgen ................................. 370/528
`4,750,173
`4,765,656
`8/1988 Becker et al.
`............................ 283/70
`4,775,901 10/1988 Nakano ..................................... 360/60
`4,776,013 10/1988 Kafri et al.
`............................... 380/54
`2/1989 Greenberg ............................... 348/460
`4,805,020
`2/1989 Broughton et al. ..................... 348/460
`4,807,031
`4,811,357
`3/1989 Betts et al. .............................. 375/700
`4,811,408
`3/1989 Goldman ..................................... 382/2
`4,820,912
`4/1989 Samyn .................................... 235/449
`5/1989 van der Gracht et al. ........ 340/310.07
`4,835,517
`4,864,618
`9/1989 Wright et al. ............................. 380/51
`4,866,771
`9/1989 Bain .......................................... 380/23
`4,876,617 10/1989 Best et al. ................................. 360/60
`4,879,747 11/1989 Leighton et al.
`......................... 380/23
`4,884,139 11/1989 Pommier ................................... 348/21
`4,903,301
`2/1990 Kondo et al. .......................... 395/7.92
`3/1990 Rushforth et al. ...................... 375/207
`4,908,836
`4,908,873
`3/1990 Philibert et al. ........................ 382/100
`4,921,278
`5/1990 Shiang et al. ............................. 283/87
`7/1990 Adelson .................................... 341/51
`4,939,515
`7/1990 Iwasaki ................................... 375/200
`4,941,150
`4,943,973
`7/1990 Werner .................................... 375/200
`4,943,976
`7/1990 Ishigaki ................................... 375/200
`7/1990 Hyatt ......................................... 367/43
`4,944,036
`4,963,998 10/1990 Maufe ....................................... 360/60
`4,965,827 10/1990 McDonald ................................ 380/25
`4,967,273 10/1990 Greenberg ............................... 348/460
`4,969,041 11/1990 O'Grady et al. ........................ 348/473
`................................ 380/3
`4,972,471 11/1990 Gross et al.
`4,972,476 11/1990 Nathans .................................... 380/23
`.............................. 380/3
`4,979,210 12/1990 Nagata et al.
`4,993,068
`2/1991 Piosenka et al.
`......................... 380/23
`4,996,530
`2/1991 Hilton ..................................... 341/120
`5,010,405
`4/1991 Schreiber et al.
`...................... 348/432
`5,027,401
`6/1991 Soltesz ...................................... 380/54
`7/1991 Greenblatt ............................... 370/259
`5,036,513
`5,063,446 11/1991 Gibson .................................... 348/484
`5,073,899 12/1991 Collier et al. ........................... 370/202
`5,079,648
`1/1992 Maufe ....................................... 360/31
`5,086,469
`2/1992 Gupta et al. .............................. 380/48
`5,095,196
`3/1992 Miyata .................................... 235/382
`
`5,148,498
`5,150,409
`5,161,210
`5,166,676
`5,181,786
`5,185,736
`5,199,081
`5,200,822
`5,212,551
`5,213,337
`5,228,056
`5,243,423
`5,245,329
`5,253,078
`5,258,998
`5,259,025
`5,267,334
`5,280,537
`5,293,399
`5,295,203
`5,299,019
`5,305,400
`5,315,098
`5,319,453
`5,319,724
`5,319,735
`5,325,167
`5,351,302
`5,379,345
`5,394,274
`5,404,377
`5,408,542
`5,422,963
`5,422,995
`5,428,607
`5,432,870
`5,446,273
`5,450,490
`5,469,506
`5,473,631
`5,479,168
`5,499,294
`5,515,081
`5,530,852
`5,613,004
`
`9/1992 Resnikoff .................................. 382/54
`9/1992 Elsner ....................................... 380/23
`11/1992 Druyvesteyn et al.
`..................... 395/2
`11/1992 Milheiser ........................... 340/825.54
`1/1993 Hujink ...................................... 400/61
`2/1993 Tyrrell et al. ........................... 370/358
`3/1993 Saito et al. . ... ... .... ... ... ... ... ... .... ... . 382/2
`4/1993 Bronfin et al. .......................... 348/460
`5/1993 Conanan ................................. 348/484
`5/1993 Sherman ................................... 463/40
`7/1993 Schilling ................................. 375/200
`9/1993 DeJean et al. .......................... 348/473
`9/1993 Gokcebay .......................... 340/825.31
`10/1993 Balkanski et al. ...................... 358/426
`11/1993 Koide ...................................... 375/220
`11/1993 Monroe ..................................... 380/23
`11/1993 Normille et al.
`......................... 382/56
`1/1994 Sugiyama et al. ...................... 375/200
`3/1994 Hefti ......................................... 375/75
`3/1994 Krause et al.
`............................ 382/56
`3/1994 Pack et al. ........................... 358/261.3
`4/1994 Butera ....................................... 382/56
`5/1994 Tow ........................................ 235/494
`6/1994 Copriviza .................................... 348/6
`6/1994 Blonstein et al.
`........................ 382/56
`6/1994 Preuss et al.
`. ... ... .... ... ... ... ... ... 395 /2.14
`6/1994 Melen ....................................... 356/71
`......................... 380/30
`9/1994 Leighton et al.
`1/1995 Greenberg ... ... ... ... ... .... ... ... ... ... .. 380/23
`2/1995 Kahn ......................................... 360/27
`4/1995 Moses ..................................... 370/200
`4/1995 Callahan ................................... 382/56
`6/1995 Chen et al.
`............................. 382/232
`6/1995 Aoki et al. .............................. 395/515
`............................ 370/352
`6/1995 Hiller et al.
`7/1995 Schwartz ................................. 382/232
`8/1995 Leslie ...................................... 235/487
`9/1995 Jensen et al. ............................... 380/6
`11/1995 Berson et al.
`... ... .... ... ... ... ... .... .. 380/23
`12/1995 Moses ..................................... 375/202
`12/1995 Johnson et al. ......................... 341/110
`3/1996 Friedman .................................. 380/10
`5/1996 Vasilik .................................... 345/189
`6/1996 Meske, Jr. et al. ................ 395/200.36
`3/1997 Cooperman et al. ..................... 380/28
`
`OTHER PUBLICATIONS
`
`Pennebaker et al., JPEG Still Image Data Compression
`Standard, Chapter 3, "Aspects of the Human Visual Sys(cid:173)
`tem," pp. 23-27, 1993, Van Nostrand Reinhold, New York.
`Castro et al., "Registration of Translated and Rotated Images
`Using Finite Fourier Transforms," IEEE Transactions on
`Pattern Analysis and Machine Intelligence, vol. PAMI-9,
`No. 5, Sep. 1987,pp. 700--703.
`Weber et al., "Correlative Image Registration," Seminars in
`Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp.
`311-323.
`Toga et al., "Registration Revisited," Journal of Neuro(cid:173)
`science Methods, 48 (1993), pp. 1-13.
`Sheng et al., "Experiments on Pattern Recognition Using
`Invariant Fourier-Mellin Descriptors," Journal of Optical
`Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776.
`Kurak et al., "A Cautionary Note On Image Downgrading,"
`1992 IEEE, pp. 153-159.
`Wagner, "Fingerprinting," 1983 IEEE, pp. 18-22.
`Hecht, "Embedded Data Glyph Technology for Hardcopy
`Digital Documents," SPIE vol. 2171, Feb. 1994, pp.
`341-352.
`
`APPLE 1004 - Page 2
`
`
`
`5,841,978
`Page 3
`
`Roberts, "Picture Coding Using Pseudorandom Noise," IRE
`Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp.
`145-154.
`Pitas et al., "Applying Signatures on Digital Images," IEEE
`Workshop on Nonlinear Image and Signal Processing, Neas
`Marmaras, Greece, pp. 460-463, Jun., 1995.
`Rindfrey, "Towards an Equitable System for Access Control
`and Copyright Protection in Broadcast Image Services: The
`Equicrypt Approach," Intellectual Property Rights and New
`Technologies, Proc. of the Conference, R. Oldenbourg Ver(cid:173)
`lag Wien Miinchen 1995, 12 pages.
`Komatsu et al., "A Proposal on Digital Watermark in Docu(cid:173)
`ment Image Communication and Its Application to Realiz(cid:173)
`ing a Signature," Electronics and Communications inJ apan,
`Part 1, vol. 73, No. 5, 1990, pp. 22-33.
`Schneier, "Digital Signatures, Cryptographic Algorithms
`Can Create Nonforgeable Signatures for Electronic Docu(cid:173)
`ments, Making Them Valid Legal Instruments" BYTE, Nov.
`1993, pp. 309-312.
`Komatsu et al., "Authentication System Using Concealed
`Image in Telematics," Memoirs of the School. of Science &
`Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
`Machado, "Announcing Stego 1.0a2, The First Steganogra(cid:173)
`phy Tool for the Macintosh," Internet reference, Nov. 28,
`1993, 3 pages.
`Arachelian, "White Noise Storm," Apr. 11, 1994, Internet
`reference, 13 pages.
`Brown, "S-Tools for Windows, Version 1.00, ©1994 Andy
`Brown, What is Steganography," Internet reference, Mar. 6,
`1994, 6 pages.
`shaggy@phantom.com, "Hide and Seek v. 4.0," Internet
`reference, Apr. 10, 1994, 3 pages.
`Wise, "The History of Copyright, Photographers' Rights
`Span Three Centuries," PHOTO>Electronic Imaging, vol.
`37, No. 6, 1994.
`Kassam, Signal Detection in Non-Gaussian Noise, Dowden
`& Culver, 1988, pp. 1-96.
`Brassil et al., "Electronic Marking and Identification Tech(cid:173)
`niques to Discourage Document Copying, Proceedings of
`INFOCOM '94 Conference on Computer, IEEE Commun.
`Soc Conference, Jun. 12-16, 1994, 1278-1287.
`Jain, "Image Coding Via a Nearest Neighbors Image
`Model," IEEE Transactions on Communications, vol.
`COM-23, No. 3, Mar. 1975, pp. 318-331.
`Arthur, "Digital Fingerprints Protect Artwork," New Scien(cid:173)
`tist, Nov. 12, 1994, p. 24.
`Matthews, "When Seeing is Not Believing," New Scientist,
`Oct. 16, 1993, pp. 13-15.
`Bender et al., "Techniques for Data Hiding," Massachusetts
`Institute of Technology, Media Laboratory, Jan. 1995, 10
`pages.
`Walton, "Image Authentication for a Slippery New Age," Dr.
`Dobb's Journal, Apr. 1995, pp. 18-26, 82-87.
`Port, "Halting Highway Robbery on the Internet," Business
`Week, Oct. 17, 1994, p. 212.
`"Foiling Card Forgers With Magnetic 'Noise,"' Wall Street
`Journal, Feb. 8, 1994.
`Fitzgerald, "Invisible Digital Copyright ID," Editor & Pub(cid:173)
`lisher, Jun. 25, 1994, p. 62.
`van Schyndel et al., "A Digital Watermark," IEEE Interna(cid:173)
`tional Conference on Image Processing, Nov. 13-16, 1994,
`pp. 86-90.
`Matsui et al., "Video-Steganography: How to Secretly
`Embed a Signature in a Picture," IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
`
`Tanaka et al., "Embedding Secret Information Into a Dith(cid:173)
`ered Multi-Level Image," Proc. IEEE Military Comm.
`Conf, Sep. 1990, pp. 216-220.
`Tanaka et al., "New Integrated Coding Schemes for Com(cid:173)
`puter-Aided Facsimile," Proc. IEEE Int'l Conf on Sys.
`Integration, Apr. 1990, pp. 275-281.
`Schreiber et al., "A Compatible High-Definition Television
`the Noise-Margin Method of Hiding
`System Using
`Enhancement Information," SMPTE Journal, Dec. 1989, pp.
`873-879.
`Short, "Steps Toward Unmasking Secure Communications,"
`International Journal of Bifurcation and Chaos, vol. 4, No.
`4, 1994,pp. 959-977.
`Tanaka, "Embedding the Attribute Information Into a Dith(cid:173)
`ered Image," Systems and Computers in Japan, vol. 21, No.
`7, 1990,pp. 43-50.
`Nakamura et al., "A Unified Coding Method of Dithered
`Image and Text Data Using Micropatterns," Electronics and
`Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp.
`50-56.
`Simmons, "Subliminal Channels; Past and Present," ETT,
`vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59.
`Nakamura et al., "A Unified Coding Method of Image and
`Text Data Using Discrete Orthogonal Transform," Systems
`and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92.
`Tanaka et al., "A Visual Retrieval System with Private
`Information for Image Database," Proceeding International
`Conference on DSP Applications and Technology, Oct.
`1991, pp. 415-421.
`Sapwater et al.,
`"Electronic Copyright Protection,"
`PHOTO>Electronic Imaging, vol. 37, No. 6, 1994, pp.
`16-21.
`JPEG Group's JPEG Software (release 4), FTP.CSU(cid:173)
`A.BEREKELEY.EDU /PUB/CYPHERPUNKS/APPLICA(cid:173)
`TIONS/JSTEG/JPEG.ANNOUNCEMENT.GZ,
`Jun.
`7,
`1993, 2 pages.
`Caronni, "Assuring Ownership Rights for Digital Images,"
`Published in the Proceedings of 'Reliable It Systems,' vis
`'95, HH. Briiggemann and W. Gerhardt-Hackl (Ed.),
`Vieweg Publishing Company, Germany, 1995, Jun. 14,
`1994, 10 pages.
`Tirkel et al, "Electronic Water Mark," DICTA-93, Macqua(cid:173)
`rie University, Sydney, Australia, Dec., 1993, pp. 666-673.
`Koch et al., "Copyright Protection for Multimedia Data,"
`Fraunhofer Institute for Computer Graphics, Dec. 16, 1994,
`15 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 8: Watermarking," Jun. 30, 1995, 46 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 3: Evaluation of Existing Systems," Apr. 19,
`1995, 68 pages.
`Boneh, "Collusion-Secure Fingerprinting for Digital Data,"
`Department of Computer Science, Princeton University,
`1995, 31 pages.
`Friedman, "The Trustworthy Digital Camera: Restoring
`Credibility to the Photographic Image," IEEE Transactions
`on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp.
`905-910.
`"Cyphertech Systems: Introduces Digital Encoding Device
`to Prevent TV Piracy," Hollywood Reporter, Oct. 20, 1993,
`p. 23.
`"NAB-Cyphertech Starts Anti-Piracy Broadcast Tests,"
`Newsbytes, NEW03230023, Mar. 23, 1994.
`Humphrey, "Stamping Out Crime," Hollywood Reporter,
`Jan. 26, 1994, p. S48.
`
`APPLE 1004 - Page 3
`
`
`
`5,841,978
`Page 4
`
`Koch et al., "Towards Robust and Hidden Image Copyright
`Labeling," Proc. of 1995 IEEE Workshop on Nonlinear
`Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
`"Copyright Protection for Digital Images, Digital Finger(cid:173)
`printing from FBI," Highwater FBI brochure, 1995, 4 pages.
`"High Water FBI Limited Presentation Image Copyright
`Protection Software," FBI Ltd brochure, Jul., 1995, 17
`pages.
`Boland et al, "Watermarking Digital Images for Copyright
`Protection," Fifth International Conference on Image Pro(cid:173)
`cessing and its Applications, Conference Date 4-6 Jul. 1995,
`Conf. Publ. No. 410, pp. 326-330.
`Clarke, "Invisible Code Tags Electronic Images," Electronic
`Engineering Times, Jun. 12, 1995, n. 852, p. 42.
`"The Copyright Can of Worms Opened Up By The New
`Electronic Media,"
`Computergram
`Internations,
`pCGN07170006, Jul. 17, 1995 and The Copyright Can of
`Worms Opened Up By the New Electronic Media-2,
`Computergraminternations, pCGN07210008, Jul. 21, 1995,
`3 pages total.
`
`"Access Control and COpyright Protection for Images,
`WorkPackage 1: Access Control and Copyright Protection
`for Images Need Evaluation," Jun., 1995, 21 pages.
`
`"Access Control and COpyright Protection for Images,
`Conditional Access and Copyright Protection Based on the
`Use of Trusted Third Parties," 1995, 43 pages.
`
`Luc, "Analysis of Spread Spectrum System Parameters for
`Design of Hidden Transmission," Radioengineering, vol. 4,
`No. 2, Jun. 1995, pp. 26-29.
`
`Macq, "Cryptology for Digital TV Broadcasting," Proceed(cid:173)
`ings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944--957.
`
`Sandford II, et al., "The Data Embedding Method," SPIE
`vol. 2615, Oct. 23, 1995, pp. 226-259.
`
`Dautzenberg, "Watermarking Images," Department of
`Microelectronics and Electrical Engineering, Trinity Col(cid:173)
`lege Dublin, 47 pages, Oct. 1994.
`
`APPLE 1004 - Page 4
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 1of18
`
`5,841,978
`
`FIG. 1
`
`12
`DIGITAL
`NUMBER 8
`(SIGNAL
`LEVEL) 4
`
`0
`
`'4-BITS'
`
`-
`-
`T
`1
`1
`I
`I
`I
`I
`T
`:
`0 1 2 3 4 5 6 7 8 9 10 11 12 1314
`SAMPLE NUMBER (INDEX)
`
`-
`
`FIG. 4
`
`"\_102
`
`COMPUTER
`
`106
`
`I
`
`~104
`~ 100
`
`7777777~7777777(,7
`
`----1~~ EXPOSE AND STEP
`
`APPLE 1004 - Page 5
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 2 of 18
`
`5,841,978
`
`FIG. 2
`
`I OBTAIN OR CREATE ORIGINAL I
`DIGITAL SIGNAL OR IMAGE
`+
`I ESTIMATE ROUGH OFFSET
`I
`AND RMS NOISE
`+
`I
`I
`CHOOSE N OR N-BIT
`IDENTIFICATION WORD E.G. 32
`I
`I
`
`•
`
`GENERATE N-BIT
`IDENTIFICATION WORD
`+
`GENERATE OR SYNTHESIZE N "RANDOM" INDEPENDENT
`SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION
`ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE
`EQUAL EXTENT AND DIGITAL SPACING OF
`ORIGINAL DIGITAL SIGNAL OR IMAGE
`
`•
`APPLY DIGITAL FILTER WHICH ATTENUATES
`BOTH LOW AND HIGH FREQUENCIES, LEAVING
`MIDDLE-RANGE FREQUENCIES LARGELY INTACT
`+
`CONDENSE N RANDOM SIGNALS TO A LOWEST
`ACCEPTABLE BIT VALUE IF MEMORY OR
`STORAGE SPACE IS AT A PREMIUM
`•
`
`ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE
`A CORRESPONDING '1' IN THEIR ASSOCIATED
`BIT-PLACE-VALUE OF THEN-BIT IDENTIFICATION WORD,
`CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE
`+
`EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED
`TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO
`ORIGINAL DIGITAL SIGNAL OR IMAGE, AND DETERMINING
`THE ACCEPTABLE PERCEIVED NOISE LEVEL
`+
`APPLY FOUND GAIN AND GAMMA TO BASE COMPOSITE,
`ADD TO ORIGINAL, THEN CALL THIS
`THE DISTRIBUTABLE SIGNAL OR IMAGE
`+
`STORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE,
`ALONG WITH N-BIT IDENTIFICATION WORD AND
`THEN RANDOM SIGNALS
`+
`I SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE I
`
`APPLE 1004 - Page 6
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 3 of 18
`
`5,841,978
`
`FIG. 3
`
`I OBTAIN DIGITAL OR NON-DIGITAL COPY'
`OF SUSPECT SIGNAL OR IMAGE
`'
`I DIGITIZE IF NOT ALREADY DIGITAL I
`'
`'
`
`CUT AND MASK PORTION OF SIGNAL OR IMAGE
`BELIEVED TO BE SUSPECT
`(ONLY IF ENTIRE SIGNAL OR IMAGE IS NOT SUSPECT)
`
`PROCURE ORIGINAL DIGITAL SIGNAL OR
`IMAGE AND CUT AND MASK TO ROUGHLY
`THE SAME LOCATION OR SEQUENCE
`i
`VISUALLY RESCALE AND REGISTER THE CUT-OUT
`SUSPECT SIGNAL TO THE CUT-OUT ORIGINAL SIGNAL
`
`'
`
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND X OFFSET, Y OFFSET,
`AND SCALE AS THE THREE VARIABLES
`+
`APPLY X OFFSET, Y OFFSET, AND SCALE TO CUT-OUT SUSPECT,
`THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT
`OF ORIGINAL SIGNAL
`+
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND
`GAMMA AS THE THREE VARIABLES; APPLY TO SUSPECT
`'
`I SUBTRACT ORIGINAL FROM SUSPECT,
`GIVING DIFFERENCE SIGNAL OR IMAGE
`+
`STEP THROUGH ALL N RANDOM INDEPENDENT SIGNALS, MASKED
`AS ORIGINAL AND CROSS-CORRELATED WITH DIFFERENCE SIGNAL
`IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS
`+
`FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES I
`i
`ASSIGN EITHER A 0 OR A 1 TO EACH CROSS-CORRELATION RESULT
`DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP
`
`I CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER I
`i
`PROSECUTE IF IT MATCHES? OR AT LEAST SEND
`A NASTY LETTER DEMANDING RECOMPENSE
`
`'
`
`APPLE 1004 - Page 7
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 4 of 18
`
`5,841,978
`
`FIG. 5
`
`CODEWORD
`)
`(e,g. 01101001
`
`INPUT
`SIGNAL
`
`FIG. 6
`
`~
`
`~
`
`REAL-TIME
`ENCODER
`
`~ -
`
`I DENTIFICATION(cid:173)
`CODED OUTPUT
`SIGNAL
`
`-.
`
`KEY DATA
`(OPTIONAL)
`
`FIRST
`SCALER
`
`204
`
`LOOKUP
`TABLE
`
`220
`
`214
`
`I MEM~Rvl
`
`ADDER
`IN PUT r---:----e--~ SUBTRACTER i - - - - - - -4 - - - -< OUTPUT
`I
`I
`I 234
`232
`2181
`212
`______ J
`L _____ _ _
`
`230-=:i - :
`+
`01011000
`~216
`
`APPLE 1004 - Page 8
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 5 of 18
`
`5,841,978
`
`NOISE
`SOURCE
`
`NOISE
`STORE
`
`206
`
`CODE1
`
`CODE 2-N
`
`242
`
`202
`
`REAL
`TIME
`ENCODER
`
`i - - - - -< OUTPUT
`234
`0 0 1 0 0 0 0 0
`0 0 1 0 0 0 0 1
`0 0 1 0 0 0 1 0
`0 0 1 0 0 0 1 1
`0 0 1 0 0 1 0 0
`0 0 1 0 0 1 0 1
`0 0 1 0 0 1 1 0
`0 0 1 0 0 1 1 1
`10 1 0 i 1 0 0 01
`
`•
`•
`•
`•
`•
`•
`
`1ST
`THROUGH
`NTH CODE
`WORDS
`
`REAL
`TIME
`ENCODER
`NOISE
`
`/248
`
`202
`
`/
`
`CODE
`
`INPUT">--~
`
`FIG. 7
`
`FIG. 8
`
`250
`
`SYNC
`DETECTOR
`
`NOISE
`SOURCE
`RESET
`
`0 0 1
`0 0 1
`0 0 1
`0 0 1
`0 0 1
`INCREMENT
`
`_____________ _J
`
`0 0 0 0 0
`0 0 0 0 1
`0 0 0 1 0
`0 0 0 1 1
`0 0 1 0 0
`
`APPLE 1004 - Page 9
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 6 of 18
`
`5,841,978
`
`FIG. 9A
`I t\.o Onn I\ A~.,• I\ II I\" l hn~, A~•oOn n I\ Ah '\J •I\ II I\ "l An~, A~
`400
`~v II vuvv'\I yq \I~ l ~V r 411/y
`TIME'Hfll vuvy'VoVq u~l VQ 1' vvy
`0.0
`1.0
`-
`SECONDS
`SECONDS
`
`FIG. 98
`
`NORMALIZE~..\IU
`
`-20dB
`402
`FREQUENCY -40dB
`
`FIG. 9C
`BORDER
`CONTINUITY
`404
`
`OHZ
`
`50KHZ
`
`1.0 0.0 REPEATED
`__. __.
`
`. ··-
`
`..
`
`DETAIL OF MATCH AT BORDER;
`CONTINUOUS TO mth DERIVITIVE
`
`FIG. 10
`
`ROM; 504
`STANDARD NOISE SIGNATURES
`
`AUDIO
`
`T
`
`500
`
`COPYRIGHT
`G
`DETECTION FLA -
`~502.
`FLAG VALID
`
`-
`C5oa ...
`
`\__ 506
`
`APPLE 1004 - Page 10
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 7 of 18
`
`5,841,978
`
`FIG. 11
`
`599"
`
`600
`
`STANDARD NOISE
`SIGNATURE
`
`READ OUT AT125%
`NORMAL RATE
`
`PITCH CHANG ED
`NOISE SIGNAL
`
`504
`
`604
`
`606
`
`INPUT AUDIO __
`SIGNAL
`
`SIGNAL-PITCH CANCELLED
`NOISE SIGNAL
`
`602
`
`TIME AVERAGED
`POWER SIGNAL
`PSIG
`
`I
`I I _______ _
`
`TIME AVERAGED
`POWER SIGNAL P.C. NOISE
`SIGNAL PS-PCN
`
`608
`
`610
`
`POWER DIFFERENCE SIGNAL
`'-------!--- 612
`L_P.~S'..::.'..-P~C~N_-___:PS~IG~--8~o~UT~===::::J 613
`: 6141
`;---CASE 1:
`
`I
`s8
`08
`108 158
`: 616,
`~---CASE 2· ~HF"\M~
`v
`v u
`. IJ
`08
`58
`108 158
`"'-' 4 SECOND BEATS
`\..__ 618
`
`624
`
`FIG. 12
`600~
`SIGNAL ONE----'-..........+
`.05s DIGITAL DELAY
`
`AUDIO VALID
`COUNTER
`
`FLAG VALID
`SIGNAL'-- 508
`622
`BEAT
`DETECTION
`
`599
`
`599
`
`620
`
`.05s DIGITAL DELAY
`
`.05s DIGITAL DELAY
`
`.05s DIGITAL DELAY
`
`502
`)
`DETECTION
`___. FLAG
`
`APPLE 1004 - Page 11
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 8 of 18
`
`5,841,978
`
`FIG. 13
`
`MOVIE: BUD'S ADVENTURES
`
`700
`
`FRAME#: 12183
`DISTRIBUTION LOT: REGION 14
`
`v ROUTINE #28, 702
`I f-r ENCRYPTION/SCAMBLING
`
`• • • • •
`
`• ~ • •
`•
`-:!Hi • •
`. •
`:~_ ~-.. •-flt' : : . . . . . . . . . : .... "ff : : : ... .
`• "ffF
`
`. ' ; . % . ' . tJ• . ·:.: ...... ·:.: ..... ·:.: ..
`: : :
`.. . : : . "0 . : : : ..... : . : : .
`. .
`... ~=.: ......... :·~ :_._ ...... :·~· .. : ......... ~ · ..
`" . : ·::iff: .. " · .. : ... · ... ·." .. G·~" .. 0•· .. " .
`·:··."flr·:·::··r""I.-.·:·::··.-.-.·:·. : .. h-.·I r704
`• • • • • {] •• L,J. • LI
`• • ~ • •
`
`·=:.:q: ·::·:· :·': ·=:<·:*:":' :·': : .• ·:: :-:: ·::·:·: . ='..:.:.::•:·
`• • ....... ·•• ··o· ·.· .... .
`. : . : ........ :": .: .......... ~ .... : :: : .. : ... ·: :": .: .... ~ .. ~
`. :··.-.·. ·:·. =·· ... ·.·:·. :·· ... ·. ·~· . :-·.'.'ttl-
`·o· · · · .·.····· .·.·····
`..... .
`·=:.- .. ·:: ... : . : . :~¥:-:.'.·:: ..... : :": :=:ci·:: ... : ':.: .. '.'.·:: ..... :
`= :· ::t;:F .. · : · : :o" .. ~· : · : : •· · .. : · : :m" .. ~
`o·:.:-.:.--.-. .::.:.-:-.·:.:-.:.-:-.
`:.
`. . . . : .. ·. . : .. _·.: .. : .. ·. . · ........ : . ·. . · ..... : .. : .. ·. . :
`
`PSEUDO-RANDOM MASTER SNOWY IMAGE
`(SCALED DOWN AND ADDED TO FRAME 12183)
`
`APPLE 1004 - Page 12
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 9 of 18
`
`5,841,978
`
`FIG. 14
`
`...-EMBEDDED
`
`720~
`
`DIFFERENCE
`
`'
`
`MEAN-REMOVED HISTOGRAMS OF
`DIFFERENCE SIGNAL AND KNOWN EMBEDDED
`CODE SIGNAL
`
`722~
`
`...-EMBEDDED
`
`DIFFERENCE
`'-----Hirt---
`'-... T~ESHOLDING
`
`MEAN-REMOVED HISTOGRAMS OF
`FIRST DERIVATIVES (OR SCALER GRADIENTS
`IN CASE OF AN IMAGE)
`
`APPLE 1004 - Page 13
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 10 of 18
`
`5,841,978
`
`STEP Z FRAMES
`
`750
`
`RENDER LOGO FRAME
`
`ENCRYPT/SCRAMBLE
`
`700
`
`702
`
`FIG. 15
`
`. . . OUTPUT MASTER SNOWY
`IMAGE FRAME
`
`704
`
`HIGH BRIGHTNESS MASTER
`SNOWY MOVIE
`
`752
`
`756 754
`
`MPEG
`
`COMPRESSED MASTER .· ···
`SNOWY MOVIE
`
`SCALE DOWN
`
`758
`
`760
`
`DIFFERENCE
`
`"CHEAP MASTER
`SNOWY MOVIE"
`
`ORIGINAL MOVIE
`
`770
`
`DISTRIBUTABLE
`MOVIE
`
`766
`768
`\
`SIDE-BY-SIDE
`VIEWING
`
`.
`'
`:... ........................................... j
`
`762
`
`762
`
`ORIGINAL MOVIE
`
`APPLE 1004 - Page 14
`
`
`
`FIG. 16
`I ... JOE'S IMAGE... I 001101011011101001?:~0 ...
`
`802
`
`/
`
`800
`
`/
`
`HEADER
`
`DATA STREAM
`
`!JOE'S IMAGE!
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`d •
`\JJ.
`•
`~
`~ ......
`~ = ......
`
`z
`0
`~
`N
`~,J;;..
`""""
`\C
`\C
`00
`
`'Jl =(cid:173)~
`~ .....
`""""
`"""" 0 .....,
`"""" 00
`
`Ul
`....
`00
`~
`~ ....
`\C
`.....::.
`00
`
`APPLE 1004 - Page 15
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 12 of 18
`
`5,841,978
`
`FIG. 17
`"SHADOW CHANNEL", 828
`96 BIT LEADER STRING, 820
`+
`--------__________ f_ ____ ----------------------------·
`I
`64 BIT LENGTH I 32 BIT DATA WORD SIZE I DATA. __
`822~
`824~
`826~
`UNIVERSAL EMPIRICAL DATA FORMAT
`
`FIG. 18
`
`854
`
`~/
`
`864
`
`/
`
`APPLE 1004 - Page 16
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 13 of 18
`
`5,841,978
`
`FIG. 19
`866"
`
`FIG. 20
`
`CENTER POINT OF
`RING, 872
`
`NOMINAL DISTANCE
`TO CENTER OF OUTER
`
`APPLE 1004 - Page 17
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 14 of 18
`
`5,841,978
`
`FIG. 21A
`
`900-..... c 2C
`2C 4C
`c 2C
`
`/
`c
`2C
`c
`
`FIG. 21 B
`
`\
`
`WHERE C = 1/16
`
`2
`
`6
`
`2
`
`6
`
`3
`
`7
`
`3
`
`7
`
`4
`
`0
`
`c
`4 2C
`c
`
`0
`
`5
`
`6
`
`2
`
`1
`2C c
`4C 2C 6
`2C c
`1
`
`2
`
`7
`
`3
`
`7
`
`3
`
`0
`
`4
`
`0
`
`4
`
`FIG. 23
`
`CABLE, 964,
`TO DATA LINE,
`966
`
`960
`
`962
`
`958
`
`APPLE 1004 - Page 18
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 15 of 18
`
`5,841,978
`
`DIGITAL IMAGE TAKEN
`OF CUSTOMER
`
`FIG. 22
`
`942
`
`I
`
`COMPUTER
`PROCESSES NEW
`ENCODED IMAGE
`
`952
`
`/
`
`/
`
`PRINTS
`PROCESSED
`IMAGE ONTO
`PLASTIC CARD
`
`954
`
`APPLE 1004 - Page 19
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 16 of 18
`
`5,841,978
`
`FIG. 24
`
`972
`
`/
`
`ORIGINAL DIGITAL IMAGE WITH
`BARCODE AND FIDUCIALS
`ADDED
`
`COMPUTER GENERATES MASTER
`SNOWY IMAGE WHICH IS
`GENERALLY ORTHOGONAL TO
`ORIGINAL IMAGE AT LEFT
`
`COMBINED TO FORM PERSONAL CASH CARD
`
`APPLE 1004 - Page 20
`
`
`
`FIG. 25
`
`TYPICAL TRANSACTION STEPS
`
`1. READER SCANS IMAGE ON CARD, STORES IN
`MEMORY, EXTRACTS PERSON'S ID
`2. OPTIONAL: USER KEYS IN PIN NUMBER
`3. READER CALLS CENTRAL ACCOUNT DATA NETWORK, HANDSHAKES
`4. READER SENDS ID, (PIN), MERCHANT INFORMATION, AND
`REQUESTED TRANSACTION AMOUNT TO CENTRAL NETWORK
`5. CENTRAL NETWORK VERIFIES ID, PIN, MERCHANT INFO,
`AND ACCOUNT BALANCE
`6. IF OK, CENTRAL NETWORK GENERATES TWENTY-FOUR
`SETS OF SIXTEEN DISTINCT RANDOM NUMBERS,
`WHERE THE RANDOM NUMBERS ARE INDEXES
`TO A SET OF 64K ORTHOGONAL SPATIAL PATTERNS
`7. CENTRAL NETWORK TRANSMITS FIRST OK, AND THE
`SETS OF RANDOM NUMBERS
`8. READER STEPS THROUGH THE TWENTY-FOUR SETS
`BA. READER ADDS TOGETHER SET OF ORTHOGONAL
`PATTERNS
`BB. READER PERFORMS DOT PRODUCT OF
`RESULTANT PATTERN AND CARD SCAN,
`STORES RESULT
`9. READER TRANSMITS THE TWENTY-FOUR
`DOT PRODUCT RESULTS TO CENTRAL NETWORK
`10. CENTRAL NETWORK CHECKS RESULTS AGAINST MASTER
`11. CENTRAL NETWORK SENDS FINAL APPROVAL OR DENIAL
`12. CENTRAL NETWORK DEBITS MERCHANT ACCOUNT,
`CREDITS CARD ACCOUNT
`
`d •
`\JJ.
`•
`~
`~ ......
`~ = ......
`
`z
`0
`~
`N
`~,J;;..
`""""
`\C
`\C
`00
`
`'Jl =(cid:173)~
`~ .....
`""""
`-..J
`0 .....,
`"""" 00
`
`Ul
`....
`00
`~
`~ ....
`\C
`.....::.
`00
`
`APPLE 1004 - Page 21
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 18 of 18
`
`5,841,978
`
`FIG. 26
`
`FIG. 27
`
`