`Rhoads
`
`[54] NETWORK LINKING METHOD USING
`STEGANOGRAPHICALLY EMBEDDED DATA
`OBJECTS
`
`[75]
`
`Inventor: Geoffrey B. Rhoads, West Linn, Oreg.
`
`[73] Assignee: Digimarc Corporation, Portland, Oreg.
`
`[21] Appl. No.: 508,083
`
`[22] Filed:
`
`Jul. 27, 1995
`
`Related U.S. Application Data
`
`[63] Continuation-in-part of Ser. No. 436,098, May 8, 1995, Pat.
`No. 5,636,292, and a continuation-in-part of Ser. No. 436,
`099, May 8, 1995, Pat. No. 5,710,834, Ser. No. 436,134,
`May 8, 1995, Ser. No. 438,159, May 8, 1995, Ser. No.
`215,289, Mar. 17, 1994, abandoned, and Ser. No. 327,426,
`Oct. 21, 1994, which is a continuation-in-part of Ser. No.
`154,866, Nov. 18, 1993, abandoned and a continuation-in-
`part of PCT/US94/13366 Nov. 16, 1994..
`[51] Int. C1.6
` GO6F 13/00; H04L 9/00
`[52] U.S. Cl.
` 395/200.47; 395/187.01;
`395/335; 380/4; 380/28
` 395/200.3, 200.48,
`[58] Field of Search
`395/200.38, 200.47, 200 75, 200.66, 187.01,
`682, 602, 610, 329, 335, 339, 200.49; 380/3,
`4, 5, 6, 54, 28
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1971 Simjian
`3,569,619
`5/1972 Yamamoto et al.
`3,665,162
`3,703,628 11/1972 Philipson, Jr.
`3,805,238
`4/1974 Rothfjell
`9/1974 Loughlin et al. .
`3,838,444
`3,914,877 10/1975 Hines
`3,922,074 11/1975 Ikegami et al.
`3,984,624 10/1976 Waggener
`4,225,967
`9/1980 Miwa et al.
`
` 178/6.8
` 235/380
` 235/61.9 R
` 382/118
`
` 380/54
` 380/3
` 348/473
` 455/68
`
`(List continued on next page.)
`
`FOREIGN PATENT DOCUMENTS
`
`11111111111111111111111111f111j111911,118911111111111111111111111111
`5,841,978
`Nov. 24, 1998
`
`[11] Patent Number:
`[45] Date of Patent:
`
`6/1990 European Pat. Off..
`372 601
`2/1991 European Pat. Off..
`411 232
`8/1991 European Pat. Off..
`441 702
`7/1992 European Pat. Off..
`493 091
`2/1994 European Pat. Off..
`581 317
`629 972 12/1994 European Pat. Off..
`650 146 Al
`4/1995 European Pat. Off..
`705 025 A2
`4/1996 European Pat. Off..
`3806411
`9/1989 Germany .
`4-248771
`9/1992
`Japan .
`5-242217
`9/1993
`Japan .
`2063018
`5/1981 United Kingdom .
`2067871
`7/1981 United Kingdom .
`2196167
`4/1988 United Kingdom .
`2204984 11/1988 United Kingdom .
`W089/08915
`9/1989 WIPO .
`W095/10835
`4/1995 WIPO .
`W095/14289
`5/1995 WIPO .
`W095/20291
`7/1995 WIPO .
`
`OTHER PUBLICATIONS
`
`Choudhury, et al., "Copyright Protection for Electronic
`Publishing over Computer Networks," IEEE Network
`Magazine, Jun. 1994, 18 pages.
`Moller, et al., "Rechnergestutzte Steganographie: Wie sie
`Funktioniert und warum folglich jede Reglementierung von
`Verschlusselung unsinnig ist," DuD, Datenschutz und Dat-
`ensicherung, 18/6 (1994) 318-326.
`
`(List continued on next page.)
`
`Primary Examiner-Parshotam S. Lall
`Assistant Examiner-Viet Vu
`Attorney, Agent, or Firm-Marger, Johnson, McCollom &
`Stolowitz, P.C.
`
`[57]
`
`ABSTRACT
`
`A given data object can effectively contain both a graphical
`representation to a network user and embedded information,
`such as the URL address of another network node, thereby
`to permit the object itself to serve as an automated hot link.
`The underlying development tools and web site browsers
`create and identify such an object for use in a manner similar
`to a hot link, as provided on the World Wide Web.
`
`058 482
`
`8/1982 European Pat. Off. .
`
`13 Claims, 18 Drawing Sheets
`
`1002
`
`f 1006
`
`1012
`
`1008
`
`WEB SITE
`DEVELOPMENT TOOL
`WWW SITE
`
`1004
`
`1006
`
`1010
`
`NFLE Ex. 1004 - Page 1
`
`NFLE 1004 - Page 1
`
`
`
`5,841,978
`Page 2
`
`U.S. PATENT DOCUMENTS
`
` 455/4
`4,230,990 10/1980 Lert, Jr. et al.
` 380/34
`4,231,113 10/1980 Blasbalg
` 370/204
`4,238,849 12/1980 Gassmann
` 179/1 GD
`4,252,995
`2/1981 Schmidt et al.
` 370/210
`4,313,197
`1/1982 Maxemchuk
` 370/204
`4,379,947
`4/1983 Warner
` 381/73.1
`4,395,600
`7/1983 Lundy et al.
` 340/825.34
`4,423,415 12/1983 Goldman
` 370/477
`4,425,642
`1/1984 Moses et al.
` 340/825.034
`4,476,468 10/1984 Goldman
` 358/122
`4,528,588
`7/1985 Lofberg
` 340/825.34
`4,532,508
`7/1985 Ruell
` 348/460
`4,547,804 10/1985 Greenberg
` 382/57
`4,553,261 11/1985 Froessl
` 235/494
`4,590,366
`5/1986 Rothfjell
` 358/122
`4,595,950
`6/1986 Lofberg
` 382/1
`4,637,051
`1/1987 Clark
` 379/59
`4,654,867
`3/1987 Labedz et al.
` 380/23
`4,660,221
`4/1987 Dlugos
` 235/487
`5/1987 Borror et al.
`4,663,518
` 348/480
`4,665,431
`5/1987 Cooper
` 370/201
`4,672,605
`6/1987 Hustig et al.
` 358/296
`4,675,746
`6/1987 Tetrick et al.
`6/1987 Causse D'Agraives et al. . 340/825.31
`4,677,435
`4,682,794
`7/1987 Margolin
` 283/82
`4,703,476 10/1987 Howard
` 370/491
`4,712,103 12/1987 Gotanda
` 340/825.31
`4,718,106
`1/1988 Weinblatt
` 455/2
`4,739,377
`4/1988 Allen
` 355/133
`4,750,173
`6/1988 Bliithgen
` 370/528
`8/1988 Becker et al.
` 283/70
`4,765,656
`4,775,901 10/1988 Nakano
` 360/60
`4,776,013 10/1988 Kafri et al.
` 380/54
`4,805,020
`2/1989 Greenberg
` 348/460
`2/1989 Broughton et al.
` 348/460
`4,807,031
`4,811,357
`3/1989 Betts et al.
` 375/700
`4,811,408
`3/1989 Goldman
` 382/2
`4,820,912
`4/1989 Samyn
` 235/449
`5/1989 van der Gracht et al.
` 340/310.07
`4,835,517
`4,864,618
`9/1989 Wright et al.
` 380/51
`4,866,771
`9/1989 Bain
` 380/23
`4,876,617 10/1989 Best et al.
` 360/60
`4,879,747 11/1989 Leighton et al.
` 380/23
`4,884,139 11/1989 Pommier
` 348/21
` 395/7.92
`4,903,301
`2/1990 Kondo et al.
`4,908,836
`3/1990 Rushforth et al.
` 375/207
`4,908,873
`3/1990 Philibert et al.
` 382/100
`4,921,278
`5/1990 Shiang et al.
` 283/87
`4,939,515
`7/1990 Adelson
` 341/51
`4,941,150
`7/1990 Iwasaki
` 375/200
`4,943,973
`7/1990 Werner
` 375/200
`4,943,976
`7/1990 Ishigaki
` 375/200
`4,944,036
`7/1990 Hyatt
` 367/43
`4,963,998 10/1990 Maufe
` 360/60
`4,965,827 10/1990 McDonald
` 380/25
`4,967,273 10/1990 Greenberg
` 348/460
`4,969,041 11/1990 O'Grady et al.
` 348/473
`4,972,471 11/1990 Gross et al.
` 380/3
`4,972,476 11/1990 Nathans
` 380/23
`4,979,210 12/1990 Nagata et al.
` 380/3
`2/1991 Piosenka et al.
` 380/23
`4,993,068
`4,996,530
`2/1991 Hilton
` 341/120
`4/1991 Schreiber et al.
` 348/432
`5,010,405
`5,027,401
`6/1991 Soltesz
` 380/54
`5,036,513
`7/1991 Greenblatt
` 370/259
`5,063,446 11/1991 Gibson
` 348/484
`5,073,899 12/1991 Collier et al.
` 370/202
`5,079,648
`1/1992 Maufe
` 360/31
`2/1992 Gupta et al.
` 380/48
`5,086,469
`5,095,196
`3/1992 Miyata
` 235/382
`
`9/1992 Resnikoff
`5,148,498
`9/1992 Elsner
`5,150,409
`5,161,210 11/1992 Druyvesteyn et al.
`5,166,676 11/1992 Milheiser
`5,181,786
`1/1993 Hujink
`5,185,736
`2/1993 Tyrrell et al.
`5,199,081
`3/1993 Saito et al.
`5,200,822
`4/1993 Bronfin et al.
`5,212,551
`5/1993 Conanan
`5,213,337
`5/1993 Sherman
`5,228,056
`7/1993 Schilling
`5,243,423
`9/1993 DeJean et al.
`5,245,329
`9/1993 Gokcebay
`5,253,078 10/1993 Balkanski et al.
`5,258,998 11/1993 Koide
`5,259,025 11/1993 Monroe
`5,267,334 11/1993 Normille et al.
`1/1994 Sugiyama et al.
`5,280,537
`5,293,399
`3/1994 Hefti
`3/1994 Krause et al.
`5,295,203
`5,299,019
`3/1994 Pack et al.
`5,305,400
`4/1994 Butera
`5,315,098
`5/1994 Tow
`5,319,453
`6/1994 Copriviza
`6/1994 Blonstein et al.
`5,319,724
`5,319,735
`6/1994 Preuss et al.
`5,325,167
`6/1994 Melen
`9/1994 Leighton et al.
`5,351,302
`5,379,345
`1/1995 Greenberg
`5,394,274
`2/1995 Kahn
`5,404,377
`4/1995 Moses
`5,408,542
`4/1995 Callahan
`5,422,963
`6/1995 Chen et al.
`5,422,995
`6/1995 Aoki et al.
`5,428,607
`6/1995 Hiller et al.
`5,432,870
`7/1995 Schwartz
`5,446,273
`8/1995 Leslie
`5,450,490
`9/1995 Jensen et al.
`5,469,506 11/1995 Berson et al.
`5,473,631 12/1995 Moses
`5,479,168 12/1995 Johnson et al.
`5,499,294
`3/1996 Friedman
`5,515,081
`5/1996 Vasilik
`5,530,852
`6/1996 Meske, Jr. et al.
`5,613,004
`3/1997 Cooperman et al.
`
` 382/54
` 380/23
` 395/2
` 340/825.54
` 400/61
` 370/358
` 382/2
` 348/460
` 348/484
` 463/40
` 375/200
` 348/473
` 340/825.31
` 358/426
` 375/220
` 380/23
` 382/56
` 375/200
` 375/75
` 382/56
` 358/261.3
` 382/56
` 235/494
` 348/6
` 382/56
` 395/2.14
` 356/71
` 380/30
` 380/23
` 360/27
` 370/200
` 382/56
` 382/232
` 395/515
` 370/352
` 382/232
` 235/487
` 380/6
` 380/23
` 375/202
` 341/110
` 380/10
` 345/189
` 395/200.36
` 380/28
`
`OTHER PUBLICATIONS
`
`Pennebaker et al., JPEG Still Image Data Compression
`Standard, Chapter 3, "Aspects of the Human Visual Sys-
`tem," pp. 23-27,1993, Van Nostrand Reinhold, New York.
`Castro et al., "Registration of Translated and Rotated Images
`Using Finite Fourier Transforms," IEEE Transactions on
`Pattern Analysis and Machine Intelligence, vol. PAMI-9,
`No. 5, Sep. 1987, pp. 700-703.
`Weber et al., "Correlative Image Registration," Seminars in
`Nuclear Medicine, vol XXIV, No. 4, Oct., 1994, pp.
`311-323.
`Toga et al., "Registration Revisited," Journal of Neuro-
`science Methods, 48 (1993), pp. 1-13.
`Sheng et al., "Experiments on Pattern Recognition Using
`Invariant Fourier—Mellin Descriptors," Journal of Optical
`Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776.
`Kurak et al., "A Cautionary Note On Image Downgrading,"
`1992 IEEE, pp. 153-159.
`Wagner, "Fingerprinting," 1983 IEEE, pp. 18-22.
`Hecht, "Embedded Data Glyph Technology for Hardcopy
`Digital Documents," SPIE vol. 2171, Feb. 1994, pp.
`341-352.
`
`NFLE Ex. 1004 - Page 2
`
`NFLE 1004 - Page 2
`
`
`
`5,841,978
`Page 3
`
`Roberts, "Picture Coding Using Pseudorandom Noise," IRE
`Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp.
`145-154.
`Pitas et al., "Applying Signatures on Digital Images," IEEE
`Workshop on Nonlinear Image and Signal Processing, Neos
`Marmaras, Greece, pp. 460-463, Jun., 1995.
`Rindfrey, "Towards an Equitable System for Access Control
`and Copyright Protection in Broadcast Image Services: The
`Equicrypt Approach," Intellectual Property Rights and New
`Technologies, Proc. of the Conference, R. Oldenbourg Ver-
`lag Wien Munchen 1995, 12 pages.
`Komatsu et al., "A Proposal on Digital Watermark in Docu-
`ment Image Communication and Its Application to Realiz-
`ing a Signature," Electronics and Communications in Japan,
`Part 1, vol. 73, No. 5, 1990, pp. 22-33.
`Schneier, "Digital Signatures, Cryptographic Algorithms
`Can Create Nonforgeable Signatures for Electronic Docu-
`ments, Making Them Valid Legal Instruments" BYTE, Nov.
`1993, pp. 309-312.
`Komatsu et al., "Authentication System Using Concealed
`Image in Telematics," Memoirs of the School. of Science &
`Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
`Machado, "Announcing Stego 1.0a2, The First Steganogra-
`phy Tool for the Macintosh," Internet reference, Nov. 28,
`1993, 3 pages.
`Arachelian, "White Noise Storm," Apr. 11, 1994, Internet
`reference, 13 pages.
`Brown, "S-Tools for Windows, Version 1.00, ©1994 Andy
`Brown, What is Steganography," Internet reference, Mar. 6,
`1994, 6 pages.
`shaggy@phantom.com, "Hide and Seek v. 4.0," Internet
`reference, Apr. 10, 1994, 3 pages.
`Wise, "The History of Copyright, Photographers' Rights
`Span Three Centuries," PHOTO>Electronic Imaging, vol.
`37, No. 6, 1994.
`Kassam, Signal Detection in Non-Gaussian Noise, Dowden
`& Culver, 1988, pp. 1-96.
`Brassil et al., "Electronic Marking and Identification Tech-
`niques to Discourage Document Copying, Proceedings of
`INFOCOM '94 Conference on Computer, IEEE Commun.
`Soc Conference, Jun. 12-16, 1994, 1278-1287.
`Jain, "Image Coding Via a Nearest Neighbors Image
`Model," IEEE Transactions on Communications, vol.
`COM-23, No. 3, Mar. 1975, pp. 318-331.
`Arthur, "Digital Fingerprints Protect Artwork," New Scien-
`tist, Nov. 12, 1994, p. 24.
`Matthews, "When Seeing is Not Believing," New Scientist,
`Oct. 16, 1993, pp. 13-15.
`Bender et al., "Techniques for Data Hiding," Massachusetts
`Institute of Technology, Media Laboratory, Jan. 1995, 10
`pages.
`Walton, "Image Authentication for a Slippery New Age," Dr
`Dobb's Journal, Apr. 1995, pp. 18-26, 82-87.
`Port, "Halting Highway Robbery on the Internet," Business
`Week, Oct. 17, 1994, p. 212.
`"Foiling Card Forgers With Magnetic 'Noise,"' Wall Street
`Journal, Feb. 8, 1994.
`Fitzgerald, "Invisible Digital Copyright ID," Editor & Pub-
`lisher Jun. 25, 1994, p. 62.
`van Schyndel et al., "A Digital Watermark," IEEE Interna-
`tional Conference on Image Processing, Nov. 13-16, 1994,
`pp. 86-90.
`Matsui et al., "Video-Steganography: How to Secretly
`Embed a Signature in a Picture," IMA Intellectual Property
`Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
`
`Tanaka et al., "Embedding Secret Information Into a Dith-
`ered Multi-Level Image," Proc. IEEE Military Comm.
`Conf., Sep. 1990, pp. 216-220.
`Tanaka et al., "New Integrated Coding Schemes for Com-
`puter-Aided Facsimile," Proc. IEEE Int'l Conf. on Sys.
`Integration, Apr. 1990, pp. 275-281.
`Schreiber et al., "A Compatible High-Definition Television
`System Using
`the Noise-Margin Method of Hiding
`Enhancement Information,"SMPTE Journal, Dec. 1989, pp.
`873-879.
`Short, "Steps Toward Unmasking Secure Communications,"
`International Journal of Bifurcation and Chaos, vol. 4, No.
`4, 1994, pp. 959-977.
`Tanaka, "Embedding the Attribute Information Into a Dith-
`ered Image," Systems and Computers in Japan, vol. 21, No.
`7, 1990, pp. 43-50.
`Nakamura et al., "A Unified Coding Method of Dithered
`Image and Text Data Using Micropatterns," Electronics and
`Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp.
`50-56.
`Simmons, "Subliminal Channels; Past and Present," ETT,
`vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59.
`Nakamura et al., "A Unified Coding Method of Image and
`Text Data Using Discrete Orthogonal Transform," Systems
`and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92.
`Tanaka et al., "A Visual Retrieval System with Private
`Information for Image Database," Proceeding International
`Conference on DSP Applications and Technology, Oct.
`1991, pp. 415-421.
`Sapwater et al., "Electronic Copyright Protection,"
`PHOTO>Electronic Imaging, vol. 37, No. 6, 1994, pp.
`16-21.
`JPEG Group's JPEG Software (release 4), FTP.CSU-
`A.BEREKELEY.EDU /PUB/CYPHERPUNKS/APPLICA-
`TIONS/JSTEG/JPEG.ANNOUNCEMENT.GZ,
`Jun. 7,
`1993, 2 pages.
`Caronni, "Assuring Ownership Rights for Digital Images,"
`Published in the Proceedings of 'Reliable It Systems,' vis
`'95, HH. Briiggemann and W. Gerhardt-flackl (Ed.),
`Vieweg Publishing Company, Germany, 1995, Jun. 14,
`1994, 10 pages.
`Tirkel et al, "Electronic Water Mark," DICTA-93, Macqua-
`rie University, Sydney, Australia, Dec., 1993, pp. 666-673.
`Koch et al., "Copyright Protection for Multimedia Data,"
`Fraunhofer Institute for Computer Graphics, Dec. 16, 1994,
`15 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 8: Watermarking," Jun. 30, 1995, 46 pages.
`"Access Control and Copyright Protection for Images,
`WorkPackage 3: Evaluation of Existing Systems," Apr. 19,
`1995, 68 pages.
`Boneh, "Collusion-Secure Fingerprinting for Digital Data,"
`Department of Computer Science, Princeton University,
`1995, 31 pages.
`Friedman, "The Trustworthy Digital Camera: Restoring
`Credibility to the Photographic Image," IEEE Transactions
`on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp.
`905-910.
`"Cyphertech Systems: Introduces Digital Encoding Device
`to Prevent TV Piracy," Hollywood Reporter, Oct. 20, 1993,
`p. 23.
`"NAB-Cyphertech Starts Anti-Piracy Broadcast Tests,"
`Newsbytes, NEW03230023, Mar. 23, 1994.
`Humphrey, "Stamping Out Crime," Hollywood Reporter,
`Jan. 26, 1994, p. S48.
`
`NFLE Ex. 1004 - Page 3
`
`NFLE 1004 - Page 3
`
`
`
`5,841,978
`Page 4
`
`Koch et al., "Towards Robust and Hidden Image Copyright
`Labeling," Proc. of 1995 IEEE Workshop on Nonlinear
`Signal and Image Processing, Jun. 20-22, 1995, 4 pages.
`"Copyright Protection for Digital Images, Digital Finger-
`printing from FBI," Highwater FBI brochure, 1995, 4 pages.
`"High Water FBI Limited Presentation Image Copyright
`Protection Software," FBI Ltd brochure, Jul., 1995, 17
`pages.
`Boland et al, "Watermarking Digital Images for Copyright
`Protection," Fifth International Conference on Image Pro-
`cessing and its Applications, Conference Date 4-6 Jul. 1995,
`Conf. Publ. No. 410, pp. 326-330.
`Clarke, "Invisible Code Tags Electronic Images," Electronic
`Engineering Times, Jun. 12, 1995, n. 852, p. 42.
`"The Copyright Can of Worms Opened Up By The New
`Electronic Media,"
`Computergram
`Internations,
`pCGN07170006, Jul. 17, 1995 and The Copyright Can of
`Worms Opened Up By the New Electronic Media-2,
`Computergram Internations, pCGN07210008, Jul. 21, 1995,
`3 pages total.
`
`"Access Control and COpyright Protection for Images,
`WorkPackage 1: Access Control and Copyright Protection
`for Images Need Evaluation," Jun., 1995, 21 pages.
`
`"Access Control and COpyright Protection for Images,
`Conditional Access and Copyright Protection Based on the
`Use of Trusted Third Parties," 1995, 43 pages.
`
`Luc, "Analysis of Spread Spectrum System Parameters for
`Design of Hidden Transmission," Radioengineering, vol. 4,
`No. 2, Jun. 1995, pp. 26-29.
`
`Macq, "Cryptology for Digital TV Broadcasting," Proceed-
`ings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957.
`
`Sandford II, et al., "The Data Embedding Method," SPIE
`vol. 2615, Oct. 23, 1995, pp. 226-259.
`
`Dautzenberg, "Watermarking Images," Department of
`Microelectronics and Electrical Engineering, Trinity Col-
`lege Dublin, 47 pages, Oct. 1994.
`
`NFLE Ex. 1004 - Page 4
`
`NFLE 1004 - Page 4
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 1 of 18
`
`5,841,978
`
`FIG. 1
`
`12
`DIGITAL
`NUMBER 8
`(SIGNAL
`LEVEL) 4
`
`•
`
`•
`
`•
`
`'4-BITS'
`
`0
`
`t 1 • I 1 I
`I
`1 I
`I
`0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
`SAMPLE NUMBER (INDEX)
`
`FIG. 4
`
`104
`
`100
`
`/
`//////////////////
`
`EXPOSE AND STEP
`
`NFLE Ex. 1004 - Page 5
`
`NFLE 1004 - Page 5
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 2 of 18
`
`5,841,978
`
`FIG. 2
`
`OBTAIN OR CREATE ORIGINAL
`DIGITAL SIGNAL OR IMAGE
`i
`ESTIMATE ROUGH OFFSET
`AND RMS NOISE
`i
`CHOOSE N OR N-BIT
`IDENTIFICATION WORD, E.G. 32
`i
`GENERATE N-BIT
`IDENTIFICATION WORD
`i
`GENERATE OR SYNTHESIZE N "RANDOM" INDEPENDENT
`SIGNALS WITH ROUGHLY GAUSSIAN DISTRIBUTION
`ABOUT SOME MEAN VALUE, WHERE SIGNALS HAVE
`EQUAL EXTENT AND DIGITAL SPACING OF
`ORIGINAL DIGITAL SIGNAL OR IMAGE
`i
`APPLY DIGITAL FILTER WHICH ATTENUATES
`BOTH LOW AND HIGH FREQUENCIES, LEAVING
`MIDDLE-RANGE FREQUENCIES LARGELY INTACT
`i
`CONDENSE N RANDOM SIGNALS TO A LOWEST
`ACCEPTABLE BIT VALUE IF MEMORY OR
`STORAGE SPACE IS AT A PREMIUM
`i
`ADD ALL RANDOM IMAGES TOGETHER WHICH HAVE
`A CORRESPONDING '1' IN THEIR ASSOCIATED
`BIT-PLACE-VALUE OF THE N-BIT IDENTIFICATION WORD,
`CALL THIS THE BASE COMPOSITE SIGNAL OR IMAGE
`i
`EXPERIMENT VISUALLY WITH GAIN AND GAMMA APPLIED
`TO BASE COMPOSITE SIGNAL OR IMAGE, ADDING THIS TO
`ORIGINAL DIGITAL SIGNAL OR IMAGE, AND DETERMINING
`THE ACCEPTABLE PERCEIVED NOISE LEVEL
`i
`APPLY FOUND GAIN AND GAMMA TO BASE COMPOSITE,
`ADD TO ORIGINAL, THEN CALL THIS
`THE DISTRIBUTABLE SIGNAL OR IMAGE
`i
`STORE AWAY AND SECURE ORIGINAL SIGNAL OR IMAGE,
`ALONG WITH N-BIT IDENTIFICATION WORD AND
`THEN RANDOM SIGNALS
`i
`SELL OR DISTRIBUTE THE DISTRIBUTABLE SIGNAL OR IMAGE
`
`NFLE Ex. 1004 - Page 6
`
`NFLE 1004 - Page 6
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 3 of 18
`
`5,841,978
`
`FIG. 3 OBTAIN DIGITAL OR NON-DIGITAL COPY
`OF SUSPECT SIGNAL OR IMAGE
`*
`DIGITIZE IF NOT ALREADY DIGITAL
`
`CUT AND MASK PORTION OF SIGNAL OR IMAGE
`BELIEVED TO BE SUSPECT
`(ONLY IF ENTIRE SIGNAL OR IMAGE IS NOT SUSPECT)
`i
`PROCURE ORIGINAL DIGITAL SIGNAL OR
`IMAGE AND CUT AND MASK TO ROUGHLY
`THE SAME LOCATION OR SEQUENCE
`i
`VISUALLY RESCALE AND REGISTER THE CUT-OUT
`SUSPECT SIGNAL TO THE CUT-OUT ORIGINAL SIGNAL
`i
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND X OFFSET, Y OFFSET,
`AND SCALE AS THE THREE VARIABLES
`
`APPLY X OFFSET, Y OFFSET, AND SCALE TO CUT-OUT SUSPECT,
`THEN RESAMPLE ONTO EXACT GRID AND CUT-OUT
`OF ORIGINAL SIGNAL
`
`RUN THROUGH SEARCH PROGRAM WITH MEAN
`SQUARED ERROR AS CRITERIA AND DC OFFSET, GAIN, AND
`GAMMA AS THE THREE VARIABLES; APPLY TO SUSPECT
`i
`SUBTRACT ORIGINAL FROM SUSPECT,
`GIVING DIFFERENCE SIGNAL OR IMAGE
`
`STEP THROUGH ALL N RANDOM INDEPENDENT SIGNALS, MASKED
`AS ORIGINAL AND CROSS-CORRELATED WITH DIFFERENCE SIGNAL
`IN IMMEDIATE NEIGHBORHOOD OF REGISTRATION POINTS
`
`FIND 0 AND 1 LEVEL BY AVERAGING FIRST FOUR 0101 CODE VALUES
`V
`ASSIGN EITHER A 0 OR A 1 TO EACH CROSS-CORRELATION RESULT
`DEPENDING ON PROXIMITY TO THE AVERAGES OF PREVIOUS STEP
`
`CHECK RESULT AGAINST SECURED IDENTIFICATION NUMBER
`i
`PROSECUTE IF IT MATCHES? OR AT LEAST SEND
`A NASTY LETTER DEMANDING RECOMPENSE
`
`NFLE Ex. 1004 - Page 7
`
`NFLE 1004 - Page 7
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 4 of 18
`
`5,841,978
`
`FIG. 5
`
`CODE WORD --op.
`(e,g. 01101001)
`
`INPUT ___....
`SIGNAL
`
`FIG. 6
`
`REAL-TIME
`ENCODER
`
`IDENTIFICATION-
`CODED OUTPUT
`SIGNAL
` KEY DATA
`(OPTIONAL)
`
`7
`
`222
`
`, 202
`
`Alk--
`
`ANALOG
`NOISE
`SOURCE
`
`ND
`
`204
`r---
`LOOKUP
`TABLE
`4"---
`220
`
`FIRST
`SCALER
`
`SECOND
`SCALER
`
`208
`210 226
`J
`
`214
`/
`10. MEMORY
`
` OUTPUT
`
`INPUT
`
`
`
`218
`
`L
`
`0 . ADDER
`SUBTRACTER
`
`232 - - - ---11
`
`---
`212
`
`234
`
`J
`
`230Th _
`+
`01011000
`--- 216
`
`NFLE Ex. 1004 - Page 8
`
`NFLE 1004 - Page 8
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 5 of 18
`
`5,841,978
`
`NOISE
`SOURCE
`
`...1
`
`NOISE
`STORE
`
`206
`
`CODE 1
`
`0
`
`CODE 2-N
`
`242
`
`INPUT>
`
`REAL
`TIME
`ENCODER
`
`<OUTPUT
`
`234
`
`• 0
`• 0
`• 0
`01.0
`• 0
`• 0
`• 0
`0
`0
`
`0 1 0 0 0 0 0
`0 1 0 0 0 0 1
`0 1 0 0 0 1 0
`0 1 0 0 0 1 1
`0
`1 0 0 1
`0
`0
`0
`1 0 0 1
`0
`1
`0 1 0 0 1 1 0
`0 1 0 0_ 1 1 1
`1 0 I r 0 0 0
`
`1ST
`THROUGH
`NTH CODE
`WORDS
`
`REAL
`TIME
`ENCODER
`
`NOISE
`
`202
`
`248
`...,/
`
`H ND -<OUTPUT
`CODE
`
`NOISE
`SOURCE
`A RESET
`
`0 0 0 0
`0 0 1 0
`___•-• Fis 8 1 8
`8 8 7 113
`1 00100011
`00100100
`J
`INCREMENT
`
`FIG. 7
`
`FIG. 8
`
`ND
`
`250
`
`SYNC
`1_
`DETECTOR
`
`NFLE Ex. 1004 - Page 9
`
`NFLE 1004 - Page 9
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 6 of 18
`
`5,841,978
`
`FIG. 9A
`400
`TIME
`
`0.0
`SECONDS
`
`FIG. 9B
`NORMALIZE
`402
`—20dB
`FREQUENCY —40dB
`
`FIG. 9C
`BORDER
`CONTINUITY
`404
`
`1.0
`SECONDS
`
`0HZ
`
`50KHZ
`
`DETAIL OF MATCH AT BORDER;
`CONTINUOUS TO mth DERIVITIVE
`
`FIG. 10
`
`ROM; 504
`STANDARD NOISE SIGNATURES
`
`AUDIO
`±.7_1..N
`(
`500
`
`COPYRIGHT
`DETECTION FLAG
`
`----502 IIIP
`FLAG VALID
`
`ow.
`
`--- 508
`
`---- 506
`
`NFLE Ex. 1004 - Page 10
`
`NFLE 1004 - Page 10
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 7 of 18
`
`5,841,978
`
`STANDARD NOISE
`SIGNATURE
`
`../- 504
`
`FIG. 11
`
`6 /0
`
`0
`
`599N4.
`
`INPUT AUDIO
`SIGNAL
`
`r 602
`
`TIME AVERAGED
`POWER SIGNAL
`P SIG
`
`IP-
`
`READ OUT AT125%ly- 604
`NORMAL RATE
`*
`PITCH CHANG ED h 606
`NOISE SIGNAL
`*
`--0.1 SIGNAL—PITCH CANCELLED
`NOISE SIGNAL
`*
`TIME AVERAGED
`POWER SIGNAL P.C. NOISE
`SIGNAL P S-PCN
`i
`POWER DIFFERENCE SIGNAL
`P S-PCN
`
`PSIG — POUT
`614—)
`L - - - CASE 1.
`
`612
`— 613
`
`616-1
`"—CASE 2:
`
`5s
`
`10s 15s
`
`\AM 1,Nrimn
`
`624---......_
`
`FIG. 12
`600 ------
`
`SIGNAL ONE
`.05s DIGITAL DELAY
`
`H
`
`620
`
`.05s DIGITAL DELAY
`
`.055 DIGITAL DELAY
`
`H
`
`.055 DIGITAL DELAY
`
`H
`
`Os
`w
`I
`10s 15s
`5s
`Os
`-N, 4 SECOND BEATS
`------ 618
`FLAG VALID
`01" SIGNAL--- 508
`----- 622
`DETECTION
`
`AUDIO VALID
`COUNTER
`
`599
`
`H BEAT
`
`599
`
`--r.
`
`H
`
`502 i
`
`DETECTION
`—0' FLAG
`
`NFLE Ex. 1004 - Page 11
`
`NFLE 1004 - Page 11
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 8 of 18
`
`5,841,978
`
`FIG. 13
`
`_./-- 700
`
`FRAME#: 12183
`DISTRIBUTION LOT: REGION 14
`
`ENCRYPTION/SCAMBLING
`-7- ROUTINE #28, 702
`
`PSEUDO-RANDOM MASTER SNOWY IMAGE
`(SCALED DOWN AND ADDED TO FRAME 12183)
`
`NFLE Ex. 1004 - Page 12
`
`NFLE 1004 - Page 12
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 9 of 18
`
`5,841,978
`
`FIG. 14
`
`7
`
`720
`
`
`
`EMBEDDED
`
`DIFFERENCE
`\
`
`J
`
`-
`
`MEAN-REMOVED HISTOGRAMS OF
`DIFFERENCE SIGNAL AND KNOWN EMBEDDED
`CODE SIGNAL
`
`722
`
`EMBEDDED
`
`DIFFERENCE ) L
`
`-.,
`
`THRESHOLDING
`
`MEAN-REMOVED HISTOGRAMS OF
`FIRST DERIVATIVES (OR SCALER GRADIENTS
`IN CASE OF AN IMAGE)
`
`N
`
`NFLE Ex. 1004 - Page 13
`
`NFLE 1004 - Page 13
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 10 of 18
`
`5,841,978
`
`STEP Z FRAMES 1--/-- 750
`A
`
`
`
`
`RENDER LOGO FRAME
`
`v 700
`
`
`K 702
`ENCRYPT/SCRAMBLE
`
`FIG. 15
`
`OUTPUT MASTER SNOWY
`IMAGE FRAME
`
`___/-- 704
`
`HIGH BRIGHTNESS MASTER ___/-- 752
`SNOWY MOVIE
`r 758
`
`760
`
`DIFFERENCE
`
`"CHEAP MASTER
`SNOWY MOVIE"
`
`756
`
`754--\_
`MPEG
`'--
`COMPRESSED MASTER
`SNOWY MOVIE
`
`_J-764
`
`SCALE DOWN
`A
`
`ORIGINAL MOVIE
`
`762
`
`76
`
`12
`
`
`
`766
`
`768
`
`ORIGINAL MOVIE
`
`NFLE Ex. 1004 - Page 14
`
`77
`
`ADD
`
`/
`
`DISTRIBUTABLE
`MOVIE
`
`SIDE-BY-SIDE
`VIEWING
`
`1
`
`NFLE 1004 - Page 14
`
`
`
`wawa •sn
`
`8661 ‘17z •AoN
`
`81 JO II lamIS
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`N
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`st off Ed - tool •xa aldm
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`JOE'S IMAGE
`
`DATA STREAM
`
`HEADER
`
`001101011011101001010...
`
`...JOE'S IMAGE...
`
`,802
`
`,800
`
`FIG. 16
`
`NFLE 1004 - Page 15
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 12 of 18
`
`5,841,978
`
`FIG. 17
`96 BIT LEADER STRING, 820
`/
`i
`64 BIT LENGTH
`32 BIT DATA WORD SIZE
`822 _J
`
`824J
`
`"SHADOW CHANNEL", 828
`
`DATA...
`
`826J
`
`UNIVERSAL EMPIRICAL DATA FORMAT
`
`FIG. 18
`/
`
`
`850
`
`854
`
`\
`
`864
`
`NFLE Ex. 1004 - Page 16
`
`NFLE 1004 - Page 16
`
`
`
`U.S. Patent
`
`
`
`4, 1998 2
`
`Sheet 13 of 18
`
`5,841,978
`
`FIG. 20
`BRIGHTNESS
`PROFILE, 874
`
`CENTER POINT OF
`
`RING, 8 72
`
`,
`.
`NOMINAL DISTANCE
`TO CENTER OF OUTER
`RING WIDTH, 870
`
`.-
`
`
`
`
`
`NOMINAL DISTANCE
`TO CENTER OF OUTER
`RING WIDTH, 870
`
`NFLE Ex. 1004 - Page 17
`
`NFLE 1004 - Page 17
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 14 of 18
`
`5,841,978
`
`/
`C 2C C
`
`2C 4C 2C
`
`C 2C C
`
`\
`
`WHERE C = 1/16
`
`FIG. 21A
`
`900-,
`
`FIG. 21B
`
`2
`
`6
`
`2
`
`6
`
`3
`
`7
`
`3
`
`7
`
`4
`
`0
`
`5
`
`1
`
`6
`
`2
`
`C 2C C
`
`4 2C 4C 2C 6
`
`C 2C C
`
`0
`
`1
`
`2
`
`7
`
`3
`
`7
`
`3
`
`0
`
`4
`
`0
`
`4
`
`FIG. 23
`
`CABLE, 964,
`TO DATA LINE,
`966
`
`960
`
`962
`
`,---958
`
`pi
`6
`9
`
`m
`
`4
`7
`
`2
`5
`8
`0
`
`NFLE Ex. 1004 - Page 18
`
`NFLE 1004 - Page 18
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 15 of 18
`
`5,841,978
`
`940
`
`FIG. 22
`
`z
`
`DIGITAL IMAGE TAKEN
`OF CUSTOMER
`
`942
`
`COMPUTER
`PROCESSES NEW
`ENCODED IMAGE
`
`PRINTS
`952 (
`PROCESSED
`IMAGE ONTO
`PLASTIC CARD
`
`N
`
`NFLE Ex. 1004 - Page 19
`
`NFLE 1004 - Page 19
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 16 of 18
`
`5,841,978
`
`FIG. 24
`
`970
`
`972
`/
`
`ORIGINAL DIGITAL IMAGE WITH
`BARCODE AND FIDUCIALS
`ADDED
`
`COMPUTER GENERATES MASTER
`SNOWY IMAGE WHICH IS
`GENERALLY ORTHOGONAL TO
`ORIGINAL IMAGE AT LEFT
`
`4.---- 950
`
`COMBINED TO FORM PERSONAL CASH CARD
`
`NFLE Ex. 1004 - Page 20
`
`NFLE 1004 - Page 20
`
`
`
`wawa •sn
`
`8661 ‘17z •AoN
`
`XI Jo a WIN
`
`10. CENTRAL NETWORK CHECKS RESULTS AGAINST MASTER
`
`12. CENTRAL NETWORK DEBITS MERCHANT ACCOUNT,
`
`CREDITS CARD ACCOUNT
`
`11. CENTRAL NETWORK SENDS FINAL APPROVAL OR DENIAL
`
`DOT PRODUCT RESULTS TO CENTRAL NETWORK
`
`9. READER TRANSMITS THE TWENTY-FOUR
`
`4. READER SENDS ID, (PIN), MERCHANT INFORMATION, AND
`3. READER CALLS CENTRAL ACCOUNT DATA NETWORK, HANDSHAKES
`
`1. READER SCANS IMAGE ON CARD, STORES IN
`
`MEMORY, EXTRACTS PERSON'S ID
`
`2. OPTIONAL: USER KEYS IN PIN NUMBER
`
`TYPICAL TRANSACTION STEPS
`
`FIG. 25
`
`REQUESTED TRANSACTION AMOUNT TO CENTRAL NETWORK
`
`5. CENTRAL NETWORK VERIFIES ID, PIN, MERCHANT INFO,
`
`AND ACCOUNT BALANCE
`
`6. IF OK, CENTRAL NETWORK GENERATES TWENTY-FOUR
`
`TO A SET OF 64K ORTHOGONAL SPATIAL PATTERNS
`WHERE THE RANDOM NUMBERS ARE INDEXES
`SETS OF SIXTEEN DISTINCT RANDOM NUMBERS,
`
`7. CENTRAL NETWORK TRANSMITS FIRST OK, AND THE
`
`8A. READER ADDS TOGETHER SET OF ORTHOGONAL
`8. READER STEPS THROUGH THE TWENTY-FOUR SETS
`
`STORES RESULT
`RESULTANT PATTERN AND CARD SCAN,
`8B. READER PERFORMS DOT PRODUCT OF
`
`PATTERNS
`
`SETS OF RANDOM NUMBERS
`
`1z off Ed - tool •xa aldm
`
`NFLE 1004 - Page 21
`
`
`
`U.S. Patent
`
`Nov. 24, 1998
`
`Sheet 18 of 18
`
`5,841,978
`
`FIG. 26
`
`982
`A/
`
`1002
`
`1012
`
`WEB SITE
`DEVELOPMENT TOOL
`WWW SITE
`
`1008
`J
`
`1004
`
`FIG. 27
`
`..-- 1006
`
`1010
`
`BROWSER
`WWW SITE
`
`NFLE Ex. 1004 - Page 22
`
`NFLE 1004 - Page 22
`
`
`
`5,841,978
`
`1
`NETWORK LINKING METHOD USING
`STEGANOGRAPHICALLY EMBEDDED DATA
`OBJECTS
`
`RELATED APPLICATION DATA
`
`This is a continuation-in-part of copending applications:
`PCT application Ser. No. PCT/US94/13366, filed Nov.
`16, 1994, application Ser. No. 08/436,098, filed May 8,
`1995, now U.S. Pat. No. 5,636,292, application Ser. No.
`08/436,099, filed May 8, 1995, now U.S. Pat. No. 5,710,834,
`application Ser. No. 08/436,134, filed May 8, 1995, appli-
`cation Ser. No. 08/438,159, filed May 8, 1995, application
`Ser. No. 08/215,289, filed Mar. 17, 1994, abandoned Mar.
`15, 1996, and application Ser. No. 08/327,426 filed Oct. 21,
`1994, which is a continuation-in-part of application Ser. No.
`08/154,866, filed Nov. 18, 1993, abandoned May 23, 1995.
`
`TECHNICAL FIELD
`
`The present invention relates to the field of computer
`network navigation, such as navigation and routing of
`instructions on the Internet. More particularly, the invention
`presents a new method for automatically linking from one
`computer site to another, also known as a "link" or "hot link"
`method.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`BACKGROUND AND SUMMARY OF THE
`INVENTION
`
`2
`In the case of the Internet, however, and the current World
`Wide Web, there is a huge range of graphical objects that are
`representable, and the ideal of a universal data file format is
`far from being realized. Instead, a multitude of file formats
`are used, and most of them do not have a simple means
`whereby a URL address could become attached in a way that
`would also facilitate, by not conflicting with, the continued
`development of standards to attach URL addresses.
`It is desirable, therefore, to find a linking method whereby
`a given object can effectively comprise both a graphical
`representation to a user and the URL address, thereby to
`serve as a hot link. In such a way, a web site developer need
`only include a pointer to the object (often an object with
`which the developer is accustomed to using), and the under-
`lying tools and web site browsers will recognize the object
`as a hot link. One way to provide such a system would be
`to associate URL addresses directly with a graphical object,
`and, preferably, provide some indication that this object is in
`the hot link class. The steganographic linking method of the
`present invention addresses this goal. The invention pro-
`vides a common sense method whereby all web browsers
`and web tools can easily attach (i.e., embed) URL addresses
`to graphical objects. The method easily integrates into the
`current system in a way that does not require sweeping
`changes to well-entrenched file formats and transmission
`protocols.
`Once steganographic methods of "hot link" navigation
`take hold, then, as new file formats and transmission pro-
`tocols develop, more traditional methods of "header-based"
`information attachment can enhance the basic system built
`by a steganographic-based system. In this way, stegano-
`graphic implementation of the present invention pays due
`heed to the huge installed base of file formats existing today,
`paving the way toward simpler attached information imple-
`mentations. Steganographic methods will retain one differ-
`ential property in that, at least for more robust forms of
`steganography, address and index information can survive
`going into and out of the digital and network domain.
`Another aspect of this invention pertains to unauthorized
`use and outright piracy of proprietary source material which,
`since time immemorial, has been a source of lost revenue,
`confusion, and artistic corruption.
`These historical problems have been compounded by the
`advent of digital technology. With it, the technology of
`copying materials and redistributing them in unauthorized
`manners has reached new heights of sophistication, and
`more importantly, omnipresence. Lacking objective means
`for comparing an alleged copy of material with the original,
`owners and litigation proceedings are left with a subjective
`opinion of whether the alleged copy is stolen, or has been
`used in an unauthorized manner. Furthermore, there is no
`simple means of tracing a path to an original purchaser of the
`material - - - something which can be valuable in tracing
`where a possible "leak" of the material first occurred.
`A variety of methods for protecting commercial material
`have been attempted. One is to scramble signals via an
`encoding method prior to distribution, and descramble prior
`to use. This technique, however, is of little use in mass
`market audio and visual media, where even a few dollars
`extra cost causes a major reduction in market, and where the
`signal must eventually be descrambled to be perceived, and
`thus can be easily recorded.
`Another class of techniques relies on modification of
`source audio or video sig