Both of today's issued patents deal with watermarking. The first addresses techniques and devices for packet watermarking and efficient provisioning of bandwidth, Scott Moskovitz, Inventor. The second, no assignee given, describes ways of embedding additional information in document data.
7,287,275, "Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth," no assignee given (Moskowitz, Inventor).
Abstract
Disclosed herein are methods and systems for transmitting streams of data. In one embodiment, a method comprises the steps of: receiving a stream of data; organizing the stream of data into a plurality of packets; generating a packet watermark associated with the stream of data; combining the packet watermark with each of the plurality of packets to form watermarked packets; and transmitting at least one of the watermarked packets across a network. The present invention also relates to: receiving at least one packet that has been transmitted across a network; analyzing at least one packet for a watermark; and authenticating the at least one packet using at least a portion of the watermark. The present invention also relates to generating packet watermarks and packet watermark keys.7,287,284, "Information processing method and apparatus, and computer program and computer-readable storage medium," no assignee given.
Abstract
Additional information is embedded in document data by inputting document data, inputting additional information, and inputting image data. The additional information is embedded in the input image data using a first digital watermark method, and the additional information is embedded in the input document data using a second digital watermark method. The document data embedded with the additional information is composited with the image data embedded with the additional information, with the image data as a background image. In a case where an original document containing information embedded using the second digital watermark method is copied by a copying machine, the information embedded in the copied document cannot be detected. The first digital watermark method has a robustness such that, when an original document containing information embedded using the first digital watermark method is copied by a copying machine, information embedded in the copied document can be detected.