img_blogentry_hero

METHODS AND SYSTEMS FOR STEGANOGRAPHIC PROCESSING

8,014,563

9/6/2011 12:00:00 AM

The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too.