WO2025096523A1 - Protection contre la copie pour images en ligne - Google Patents
Protection contre la copie pour images en ligne Download PDFInfo
- Publication number
- WO2025096523A1 WO2025096523A1 PCT/US2024/053538 US2024053538W WO2025096523A1 WO 2025096523 A1 WO2025096523 A1 WO 2025096523A1 US 2024053538 W US2024053538 W US 2024053538W WO 2025096523 A1 WO2025096523 A1 WO 2025096523A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- sub
- layer
- image layer
- webpage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/478—Supplemental services, e.g. displaying phone caller identification, shopping application
- H04N21/4782—Web browsing, e.g. WebTV
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4402—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
- H04N21/440227—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by decomposing into layers, e.g. base layer and one or more enhancement layers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Definitions
- An online image displayed on a computer screen by a web browser is subject to being copied easily by anyone who is viewing this image.
- countermeasures to protect an online image from being copied include integrating a watermark into the image and disabling any response to a computer mouse “right-click” on the displayed webpage by the viewer.
- a watermark disturbs the content of the image.
- a watermark can be removed with advanced image processing techniques. Even with the “right-click” response disabled, a user can still view the webpage’s HyperText Markup Language (HTML) source code, find the image’s URL and download it directly.
- HTML HyperText Markup Language
- a copy of an image on a computer screen may also be obtained by taking a “screenshot” of the image, which refers to the action of using a program to make a replica of the image that is displayed on the computer screen.
- the screenshot action is also commonly known as “print screen,” “screen snapshot,” “screen capture,” etc.
- FIGs 1A and IB show overlapping images with transparent and opaque backgrounds.
- FIG. 2 is a block diagram of a network for generating and accessing webpages and associated media content, in accordance with various representative embodiments.
- FIG. 3 shows an example of an image to be displayed in a webpage, in accordance with various representative embodiments.
- FIG. 4 shows an image stack, in accordance with various representative embodiments.
- FIG. 5 is a flow chart of a method of generating a webpage for displaying a target image, in accordance with various representative embodiments.
- FIG. 6 shows a further example of sub-image layers, in accordance with various representative embodiments.
- FIG. 7 shows the result of combining sub-image layers on a client-side display screen, in accordance with various representative embodiments.
- FIG. 8 shows the image saved by “right-clicking” on the displayed image, in accordance with various representative embodiments.
- FIG. 9 shows an example of a target image divided into four regions, in accordance with various representative embodiments.
- FIG. 10 shows four sub-image layers of an image stack, in accordance with various representative embodiments.
- FIG. 11 is a diagrammatic representation of a stack of sub-image layers, in accordance with various representative embodiments.
- FIG. 12 shows a target image divided into sub-images, in accordance with various representative embodiments.
- FIG. 13-15 show example sub-image layers, in accordance with various representative embodiments.
- FIG. 16-17 show partially overlapping sub-images after pre-processing, in accordance with various representative embodiments.
- FIG. 18 shows sub-images layers of a target image, in accordance with various representative embodiments.
- FIG. 19 shows sub-images layers of a target layer displayed on a client-side display screen, in accordance with various representative embodiments.
- FIG. 20 is a flow chart of a method of protecting an online image, in accordance with various representative embodiments.
- a webpage is a structured document accessible by a computer application called a web browser.
- a webpage is identified by a Uniform Resource Locator (URL).
- URL Uniform Resource Locator
- a user inputs a URL into a web browser, the associated webpage is retrieved from a web server and the web browser transforms it into a visual representation displayed on the user’s computer screen.
- a webpage may contain URL links to other pages for additional content, such as images to be displayed, that are stored on the same web server or other webs servers.
- a webpage is a text document containing computer instructions, such as HyperText Markup Language (HTML), for displaying information and providing user controls.
- a webpage may also contain instructions, such as Cascading Style Sheets (CSS), that specify how the content of the webpage is to be displayed.
- a webpage may also include one or more JavaScript or Web Assembly programs that may be executed by the web browser to enable a range of behaviors.
- a webpage may contain links to images, either static images or videos, to be displayed to the user.
- the owner of these images may desire to protect the images from being copied by a user.
- the images may have a commercial value or may be copyright protected.
- a web site may provide multiple linked webpages together with a database of content.
- a web browser may have a “point-and-click” interface controlled by a computer mouse, touch-screen, or joystick for example.
- a web browser may be programmed to respond to a “right-click” on an object by displaying a menu to enable selection of other action.
- the menu may include an option to save the image to selected storage location.
- Embodiments of the disclosure split a target image into a stack of image, each containing a sub-image, to protect an online image from being easily copied.
- Some images in the stack may be partially transparent.
- a stack of images referenced in a webpage are rendered by a web browser in accordance with instructions in the webpage to display the target image. This makes it more difficult for a user to copy the target image.
- the disclosed mechanisms have application in a website that does not want its images to be easily copied and reposted without proper permission. For example, an e-commerce website has many product photos, which, if not protected, can be easily copied by its competitors selling the same product and reposted on their own website.
- Various embodiments of the disclosure provide a method of generating a webpage for displaying a target image on a computer display. The method includes generating an image stack, including a plurality of sub-image layers, and dividing the target image into multiple regions, each region containing a sub-image.
- a sub-image layer of the image stack For each region of the target image a sub-image layer of the image stack is selected, and the sub-image of the region is stored in a corresponding region of the sub-image layer. Pixels in corresponding regions of sub-image layers higher in the image stack than the selected sub-image layer are set to be transparent.
- the sub-image layer is stored in a sub-image file and network locators, such as hyperlinks, of the sub-image files are embedded in a webpage.
- the webpage includes a stacking context for each sub-image file of the image stack. Storing a sub-image layer in a sub-image file may include compressing the sub-image layer.
- the stacking context may include a Hyper-Text Markup Language (HTML) z-index or a Cascading Style Sheet (CSS) z-index.
- HTML Hyper-Text Markup Language
- CSS Cascading Style Sheet
- setting a pixel to be transparent includes setting an alphachannel level of the pixel.
- one or more sub-image layers of the image stack are converted to video frames and stored in a video file. The video may be protected using a digital rights management (DRM) mechanism.
- DRM digital rights management
- the sub-image layers have different sizes.
- the sub-image layers are offset from one another.
- the webpage specifies that one sub-image layer of the stack can be enlarged or otherwise transformed, while another sub-image layer cannot.
- the webpage specifies that one or more sub-image layers are to be displayed as blinking images, appearing at different times.
- one or more target images are generated from a document, such as a text document or a document containing both text and images.
- a reversible transformation is performed on one or more subimage layers of the image stack prior to storing the sub-image layers, and the inverse transformation of the reversible transformation is specified in the webpage.
- a sub-image layer of the image stack may be the same size as or larger than the sub-image contained in the sub-image layer.
- Various embodiments of the disclosure provide a method of generating a webpage for displaying a target image on computer display.
- the method includes generating an image stack, including a first sub-image layer and a second sub-image layer, determining a first region of the target image based on a text mask, and determining a second region of the target image based on a complement of the text mask.
- For the first sub-image layer pixelvalues of the first region of the target image are stored in a corresponding region of the first sub-image layer and the first sub-image layer is stored in a first sub-image file.
- pixel-values of the second region of the target image are stored in a corresponding region of the second sub-image layer, pixels of the first region of the target image in a corresponding region of the second sub-image layer are set to be transparent and the second sub-image layer is stored in second sub-image file.
- Network locators of the first and second sub-image files such as hyperlinks, are embedded in a webpage.
- the webpage also includes a stacking context for the first sub-image file and the second sub-image file.
- a webpage for displaying a target image on a computer display is generated by dividing the target image into a plurality of regions, each region containing a sub-image, generating an image stack including a plurality of subimage layers, each sub-image layer containing one or more sub-images, storing each subimage layer of the image stack in a sub-image file, and embedding hyperlinks to the subimage files in a webpage.
- IP Internet Protocol
- the webpage is a program of instructions that may be executed by a web browser application on a computer.
- the webpage may be stored on a non-transitory, computer- readable medium.
- the webpage may be generated by a program of computer-readable instructions.
- the instructions may be stored on a non-transitory, computer-readable medium.
- FIG. 1A shows two images with transparent backgrounds. As shown, when these two images are overlay ed, while both images occupy a rectangular space, the transparent part of front image 100 does not block back image 102 from being displayed.
- FIG. IB shows two images with opaque (non-transparent) backgrounds.
- front image 104 partially blocks back image 106.
- an “image” refers a digital image composed of a set of picture elements or pixels. Each pixel specifies one or more quantized values that represent the brightness of a given color at any specific point in the image. Images may be stored in computer readable files in various formats. The image may be stored in a compressed form or an uncompressed form.
- Some image formats such as Portable Network Graphics (PNG) and Graphics Interchange Format (GIF), support image transparency, wherein the image, or any part of the image, can be set to be transparent.
- Other formats such as JPG, do not support such a property.
- the PNG format supports an “alpha-channel” in addition to red, green and blue (RGB) channels.
- RGB red, green and blue
- the alpha value of a pixel determines the level of opacity, with the value zero representing complete transparency.
- GIF allows a selected background color to be made transparent.
- a transparent image may be rendered over the image to prevent copying of the image by “right-clicking” on the image to activate a menu with a “save” option.
- a link to the image such as a URL of the image source file, can easily be found in the text version of the webpage, enabling the image to be downloaded directly.
- an image is divided into two or more sub-images and displayed by overlaying the sub-images. In this way, the webpage does not contain any links to the complete image.
- FIG. 2 is a block diagram of a network 200 for generating and accessing webpages and associated media content, in accordance with various representative embodiments.
- a user To retrieve a webpage from web server 202, a user enters a domain name (URL) into browser application 204 on user device 206.
- a corresponding Internet Protocol (IP) address of web server 202 is retrieved from Domain Name Server (DNS) 208 via network 210.
- IP Internet Protocol
- DNS Domain Name Server
- a request for the webpage is sent from user device 206 to web server 202 and the requested webpage is returned to the user device.
- Browser 204 parses the webpage, which is a text document containing links to other media content such as images, and renders a graphical version of the webpage on display 212.
- image protection engine 214 processes image 216 to generate webpage 218 and stack 220 of sub-image files containing sub-images of image 216.
- Webpage 218 contains links to the image files together with instructions on how to display them.
- Web server 202 may provide information 222, such as a user network address, to the image protection engine to enable the sub-image files to be altered in response to user request.
- the web server will also send instructions, using CSS styling sheets or JavaScript for example, instructing the browser how to correctly display the image. Operation of image protection engine 214 is discussed in more detail below.
- a link to sub-image layer stored in a file sub image layer l .png is a hyperlink.
- a URL may be an absolute web address or an address relative to the address of the webpage.
- hyperlinks are used for Internet addresses, other networks may use other references.
- hyperlink is used to refer to any mechanism that enables the specified image file to be retrieved.
- a “sub-image” of a target image refers to a subset of the set of pixels that make up the target image. Locations of pixels in a sub-image define a “region” of the target image. The region may be a connected region or a number of disconnected sub-regions.
- FIG. 4 shows image stack 400 including first sub-image layer 402, which includes the sub-image 404 in the first region of the target image, and second sub-image layer 406 that includes the sub-image 408 in the second region of the target image.
- second sub-image layer 406 is higher in the image stack and will be painted last when the webpage is rendered.
- the sub-image layers can be of any size and do not need to be the same size as the original image.
- the target image may be divided into any number of regions.
- a sub-image layer may contain any number of sub-images (as illustrated in FIG. 6, discussed below for example).
- a sub-image layer is itself an image that includes one or more of the sub-images.
- a sub-image layer may also contain additional pixels that are transparent and additional pixels that are opaque but hidden by pixels in higher layers of the stack.
- pixels in region 410 of second layer 406 are set to be transparent so that the sub-image 404 in the first layer are visible when the sub-image layers are stacked.
- the pixel values in region 410 may be set to any value that is different from the corresponding values of the target image.
- the RGB value of a pixel could be set to (0, 0, 0), (255, 255, 255) or a random value in a sub-image layer. This prevents reconstruction of the target image by resetting the pixels to be opaque.
- Hyperlinks to the subimage files are embedded in the webpage, together with a stacking context for each image file of the image stack. Additional layout information may also be included - such as image scaling, orientation and offset information.
- a stacking context is a three-dimensional conceptualization of HTML elements along an imaginary z-axis relative to the user, who is assumed to be facing the viewport or the webpage. HTML elements occupy this space in priority order based on element attributes.
- Pixels in region 412 are obscured when the stack of sub-image layers is displayed, and may be set to any values.
- a text message is displayed. The message would be visible to a user who inspects the text of the webpage to find the Hyper-Text link to the image file for sub-image layer 402 and then downloaded the image file.
- the target image shown in FIG. 3 is visible on the user’s display.
- FIG. 5 is a flow chart of a method of generating a webpage for displaying a target image, in accordance with various representative embodiments.
- an image stack is generated including two or more sub-image layers.
- the target image is divided into two or more regions, each region containing a sub-image.
- the sub-image is retrieved at block 506, a sub-image layer of the image stack is selected at block 508, and the sub-image of the region is stored in a corresponding region of the sub-image layer at block 510.
- pixels in corresponding regions of sub-image layers higher in the image stack than the selected sub-image layer are set to be transparent.
- FIG. 6 shows a further example of sub-image layers, in accordance with various representative embodiments.
- Sub-image layer 602 contains target image pixels in a first set of regions arranged in a “checker-board” pattern, while sub-image layer 604 contains target image pixels in a second, complementary, set of regions of the target image.
- Sub-image layer 604 overlays sub-image layer 602 and so is in a higher layer of the stack. Accordingly, the white rectangles in sub-image layer 604 are set to be transparent.
- FIG. 7 shows the result of combining sub-image layer 604 and sub-image layer 602 on a client-side user display screen.
- the sub-images in layer 602 are visible through the transparent rectangles in sub-image layer 604, so the complete target image is visible.
- FIG. 8 shows the image saved by “right-clicking” on the displayed image. Only the top sub-image layer is saved, and the target image is protected.
- FIG. 9 shows an example of a target image divided into four regions, 902, 904, 906 and 908, in accordance with various representative embodiments.
- FIG. 10 shows four sub-image layers of an image stack, in accordance with various representative embodiments.
- the layers are ordered 1002, 1004, 1006 and 1008, with layer 1002 being the lowest layer in the stack and 1008 being the highest layer.
- the sub-image layers have different sizes.
- Layer 1002 contains sub-image 902
- layer 1004 contains sub-image 904
- layer 1006 contains sub-image 906,
- layer 1008 contains sub-image 908.
- No region of layers 1004, 1006 or 1008 overlays the sub-image 902, so no transparent pixels are needed.
- no region of layers 1006 or 1008 overlays the subimage 904, and no region of layer 1008 overlays the sub-image 906. Consequently, no transparent pixels are needed in any of the layers.
- the regions of the sub-image layers outside of the sub-image are obscured by higher layers, so can be set to any pixel values.
- the sub-image layers are obtained by simply cropping the target image to different sizes.
- the order and relative positions of the sub-images are recorded in the webpage.
- the webserver will send the separate sub-image files along with their position information.
- the positional information may be carried in multiple ways, such as using a CSS styling sheet or using JavaScript.
- the web browser that received the webpage will display those sub-images according to the positional information such that the original target image is displayed.
- a human user or an application that wants to copy this image will only get a set of sub-images, and substantial efforts must be made to restore the original image.
- FIG. 11 is a diagrammatic representation of a stack of sub-image layers, in accordance with various representative embodiments.
- the order of stack is designated by the z-coordinate of the layer.
- the lowest layer is designated level zO, the highest layer is designated level z3.
- the bottom- left-hand comer (BLHC) of sub-image layer 902 has position coordinates (0,y2,0).
- the BLHC of sub-image layer 904 has position coordinates (0,0, zl).
- the BLHC of sub-image layer 906 has position coordinates (xl,0,z2).
- the BLHC of sub-image layer 908 has position coordinates (0,yl,z3). These coordinates may be specified in the webpage.
- FIG. 12 shows another way in which a target image can be divided into subimages, in accordance with various representative embodiments.
- the target image is divided into three irregularly shaped regions 1202, 1204 and 1206 that are contained in three sub-image layers 1212, 1214 and 1216, respectively. Regions of sub-image layers outside of the sub-images may be set to be transparent so that the layers can be overlaid to recompose the complete target image.
- FIG. 13 shows example sub-image layers, in accordance with various representative embodiments.
- the two image layers 1302 and 1304 of an image stack can be overlaid to display the target image. Separately, however, each sub-image layer displays a warning message. When one of the sub-images is copied by a user, as shown in image 1306, the user will see this warning message for unauthorized use of the image and be deterred from reposting the image.
- FIG. 14 shows further examples of sub-image layers, in accordance with various representative embodiments.
- the two sub-image layers 1402 and 1404 of an image stack can be overlaid to display the target image. Separately, however, each sub-image layer displays a warning message.
- the sub-images are generated dynamically based on user information.
- the user information may be derived from the request for the webpage, for example.
- the user’s IP address is overlaid/placed on the image to warn the user of the consequence of unauthorized use of the copyrighted image.
- the sub-images are pre-processed with a reversible method at the web server.
- the processing is reversed by a client-side script, such as JavaScript, at the client side.
- the reversible method may be a transformation such as scaling, rotation or a combination thereof.
- FIG. 15 shows two partially overlapping sub-image layers, 1502 and 1504, of a target image, in accordance with various representative embodiments.
- FIG. 16 shows the two partially overlapping sub-images after pre-processing, in accordance with various representative embodiments.
- First sub-image 1502 is unaltered, while second sub-image 1504 is rotated 180° into image 1604.
- the second sub-image is rotated -180° at the client side before being displayed.
- Other angles of rotation may be used.
- FIG. 17 shows the two partially overlapping sub-images after pre-processing, in accordance with various representative embodiments.
- First sub-image 1502 is unaltered, while second sub-image 1504 is contracted by 25% - i.e., scaled by a factor 3 /4 - to provide image 1704.
- the second sub-image is expanded by a factor 4/3 at the client side before being displayed.
- Other scale factors may be used.
- FIG. 18 shows two sub-images layers, 1802 and 1804, of a target image, in accordance with various representative embodiments.
- the white rectangles in upper layer 1804 are transparent.
- FIG. 19 shows sub-image layers 1802 and 1804 displayed on a client-side display screen, in accordance with various representative embodiments.
- Sub-image layers 1802 and 1804 are displayed as images 1902 and 1904, respectively.
- a user has attempted to enlarge the target image before copying using a screenshot.
- only the upper displayed sub-image layer 1904 is enlarged.
- This approach prevents a user from enlarging the target image before performing a screenshot.
- a client-side program such as a JavaScript program
- the blinking frequency of those images should be high enough such that the blinking is not perceivable.
- These images will blink with a different pattern or frequency, for example, while one sub-image appears, another sub-image disappears. Thus, at any given time when a screenshot is made, part of the original image is not displayed thereby preventing the original image from being screenshot.
- DRM Digital Rights Management
- three major technologies used for digital DRM, especially for video streaming, are Widevine developed by Google, PlayReady® developed by Microsoft, and FairPlay developed by Apple.
- These technologies support video encryption, which is to say, a video clip is encrypted and sent to a web browser, and the browser must have the correct key to decrypt the video before it can be played.
- the key is obtained by negotiation between the browser and a license server, and the license server will provide the key only if the browser passes a certain authentication.
- a feature provided by these DRM technologies is prevention of a screenshot capture.
- a DRM-protected video clip even after it has been correctly decrypted and played in the browser, cannot be captured with screenshot applications.
- the video When a screenshot application is activated, the video will become blank (all-black or all-white) and thus prevents the application from making a screenshot.
- FIG. 20 is a flow chart of a method 2000 of protecting an online image, in accordance with various representative embodiments.
- the target image is distributed and displayed as one or more static sub-images overlaying one or more videos. This protects the target image from being downloaded or captured in a screenshot.
- an image stack is generated including a plurality of sub-image layers.
- the target image is divided into a plurality of regions, each region containing a sub-image.
- the sub-image is retrieved at block 506, a sub-image layer of the image stack is selected at block 508, and the sub-image of the region is stored in a corresponding region of the sub-image layer at block 510.
- pixels in corresponding regions of sub-image layers higher in the image stack than the selected sub-image layer are set to be transparent.
- flow returns to block 506 if there are more regions to be processed.
- one or more sub-image layers of the stack are converted to a video format, such as the MPEG-4 format of the International Organization for Standardization/Intemational Electrotechnical Commission (ISO/IEC), in which one or more frames of each video show the sub-images contained in the sub-image layer.
- the one or more videos are stored at block 2002.
- Digital Rights Management (DRM) technology is used to protect the video.
- Other video formats may be used and copy protection methods may be used.
- the remaining sub-image layers of the image stack are converted to an image format, such as PNG for example, which supports transparency, and each stored in a corresponding sub-image file. Sub-image layers without transparent pixels may be converted to other image formats.
- hyperlinks to one or more sub-image videos and the sub-image files are embedded in a webpage, together with a stacking context for each subimage file of the image stack and any other layout information. It is noted that the order of operations may be altered without departing from the scope of the present disclosure. For example, a completed sub-image layer may be saved to an image file or a video file before other sub-image layers have been generated.
- Browser technologies such as JavaScript or Cascading Style Sheets, may be used to display these sub-images, including the images and the video, in an overlayed manner, where the transparent sub-images are placed above each other such that they visually display the complete original image.
- the control panel of the video clip such as play/pause, fast b ackwar d/forward can be hidden using HTML techniques.
- the video which contains a static image, appears to be a normal static image. It is noted that it is not necessary to convert all sub-images into a transparency-supporting format. Some sub-images can be in the format such as JPG, as long as all these sub-images can be composed into the original image.
- the embodiment described above which creates a single video clip including one or multiple images, can also work with videos that are not DRM-protected video. Rather, the technique can be used anywhere where a set of images is to be displayed. By doing this, a user who is viewing these “images” is unable to right-click and save it. This is because the person is actually viewing a video clip playing a static picture, instead of a static image.
- the target image is protected since, when a person views this image and wants to download it, either by right-clicking and saving the picture, or using third-party image downloading tools, the person cannot get the complete image.
- the person can only save the single sub-image that sits on the top-most layer of the stack.
- the person can obtain all sub-images except the ones that are converted into one or more encrypted videos. The user is still unable to obtain all the parts in order to compose the complete target image.
- the sub-images that are converted into video clips will become blank and thus prevent the person from making a complete screenshot of the image.
- the term “configured to,” when applied to an element, means that the element may be designed or constructed to perform a designated function, or that is has the required structure to enable it to be reconfigured or adapted to perform that function. [0090] Numerous details have been set forth to provide an understanding of the embodiments described herein. The embodiments may be practiced without these details. In other instances, well-known methods, procedures, and components have not been described in detail to avoid obscuring the embodiments described. The disclosure is not to be considered as limited to the scope of the embodiments described herein.
- Various embodiments described herein are implemented using dedicated hardware, configurable hardware or programmed processors executing programming instructions that are broadly described in flow chart form that can be stored on any suitable electronic storage medium or transmitted over any suitable electronic communication medium.
- the programming instructions can be stored in any known non-transitory computer-readable medium such as semiconductor, magnetic disk, or optical disc. A combination of these elements may be used.
- Those skilled in the art will appreciate that the processes and mechanisms described above can be implemented in any number of variations without departing from the present disclosure. For example, the order of certain operations carried out can often be varied, additional operations can be added, or operations can be deleted, without departing from the present disclosure. Such variations are contemplated and considered equivalent.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Une page web permettant d'afficher une image cible sur un écran d'ordinateur est générée en divisant l'image cible en plusieurs régions, chaque région contenant une sous-image, en générant une pile d'images comprenant plusieurs couches de sous-images, chaque couche de sous-image contenant une ou plusieurs sous-images, en stockant chaque couche de sous-image de la pile d'images dans un fichier de sous-image, et en intégrant des hyperliens vers les fichiers de sous-image dans une page web. Une région d'une couche de sous-image recouvrant une sous-image d'une couche de sous-image différente est transparente. La page web peut être un programme d'instructions qui, lorsqu'il est exécuté par un navigateur web, télécharge les sous-images sur la base des hyperliens et restitue l'image cible sur un écran d'affichage sous la forme d'une pile de couches de sous-images conformément à un ordre d'empilement dans le programme d'instructions. Cela rend l'obtention d'une copie de l'image cible beaucoup plus difficile.
Applications Claiming Priority (8)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202363594657P | 2023-10-31 | 2023-10-31 | |
| US63/594,657 | 2023-10-31 | ||
| US202363597734P | 2023-11-10 | 2023-11-10 | |
| US63/597,734 | 2023-11-10 | ||
| US202463574383P | 2024-04-04 | 2024-04-04 | |
| US63/574,383 | 2024-04-04 | ||
| US202463678038P | 2024-07-31 | 2024-07-31 | |
| US63/678,038 | 2024-07-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025096523A1 true WO2025096523A1 (fr) | 2025-05-08 |
Family
ID=95581453
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2024/053538 Pending WO2025096523A1 (fr) | 2023-10-31 | 2024-10-30 | Protection contre la copie pour images en ligne |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025096523A1 (fr) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060017747A1 (en) * | 2004-07-26 | 2006-01-26 | Dawson Thomas P | Copy protection arrangement |
| US20140035947A1 (en) * | 2004-03-03 | 2014-02-06 | Engram Networking Llc | System for delivering and enabling interactivity with images |
| US8855414B1 (en) * | 2004-06-30 | 2014-10-07 | Teradici Corporation | Apparatus and method for encoding an image generated in part by graphical commands |
| US20170097763A1 (en) * | 2008-02-25 | 2017-04-06 | Tixtrack, Inc. | Sports and concert event ticket pricing and visualization system |
| US20170329943A1 (en) * | 2016-05-12 | 2017-11-16 | Markany Inc. | Method and apparatus for embedding and extracting text watermark |
| US20180143950A1 (en) * | 2016-11-18 | 2018-05-24 | InGage Technologies, Inc. | Interactive communication via online video systems |
| US10102648B1 (en) * | 2011-12-12 | 2018-10-16 | Google Llc | Browser/web apps access to secure surface |
-
2024
- 2024-10-30 WO PCT/US2024/053538 patent/WO2025096523A1/fr active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140035947A1 (en) * | 2004-03-03 | 2014-02-06 | Engram Networking Llc | System for delivering and enabling interactivity with images |
| US8855414B1 (en) * | 2004-06-30 | 2014-10-07 | Teradici Corporation | Apparatus and method for encoding an image generated in part by graphical commands |
| US20060017747A1 (en) * | 2004-07-26 | 2006-01-26 | Dawson Thomas P | Copy protection arrangement |
| US20170097763A1 (en) * | 2008-02-25 | 2017-04-06 | Tixtrack, Inc. | Sports and concert event ticket pricing and visualization system |
| US10102648B1 (en) * | 2011-12-12 | 2018-10-16 | Google Llc | Browser/web apps access to secure surface |
| US20170329943A1 (en) * | 2016-05-12 | 2017-11-16 | Markany Inc. | Method and apparatus for embedding and extracting text watermark |
| US20180143950A1 (en) * | 2016-11-18 | 2018-05-24 | InGage Technologies, Inc. | Interactive communication via online video systems |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7281272B1 (en) | Method and system for copyright protection of digital images | |
| US20160253772A1 (en) | Secure content and document watermarking | |
| JP5144699B2 (ja) | 透かしエンコーダ及びデコーダイネーブルソフトウェア及び装置 | |
| CN106605220A (zh) | 用于选择性文档修订的方法及系统 | |
| US8363884B2 (en) | Watermark hiding in designated applications | |
| US6747648B2 (en) | Website on the internet for automated interactive display of images | |
| KR20040044373A (ko) | 비디오 썸네일 및 그 생성 방법 | |
| WO2006073859A2 (fr) | Procede et appareil de creation d'une image numerique d'un filigrane numerique et suppression du filigrane numerique de l'image numerique et utilisation d'une image compatible jpeg | |
| Borra et al. | Digital image watermarking tools: state-of-the-art | |
| EP2594080A2 (fr) | Systèmes et procédés pour la visualisation d'images à haute résolution en réseau et dans leur contexte | |
| US20190377461A1 (en) | Interactive file generation and execution | |
| KR102347137B1 (ko) | 화면 데이터 유출 방지 장치 및 방법 | |
| US10891387B2 (en) | Secure distribution of an image | |
| JP2005192001A (ja) | 電子透かし埋め込み方法および電子透かし埋め込み装置 | |
| CN104933375A (zh) | 一种保护电子显示文档的方法及系统 | |
| US7738677B2 (en) | Efficient application of video marking technologies | |
| US9361852B2 (en) | Media reproduction device | |
| WO2025096523A1 (fr) | Protection contre la copie pour images en ligne | |
| US20160284072A1 (en) | System for photo customizable caricature generation for custom products | |
| CN115270084A (zh) | 一种基于截图信息保护的盲水印加密实现方法 | |
| WO2004102464A2 (fr) | Tatouage numerique reversible et applications associees | |
| US20240037688A1 (en) | Inspection of digital images through watermarks | |
| EP1001330A2 (fr) | Méthode et système pour la protection du droit d'auteur lors de la transmission d'images numériques sur réseaux | |
| JPWO2007091298A1 (ja) | 表示処理装置、表示処理方法、及びコンピュータプログラム | |
| KR20210068929A (ko) | 이미지 무단 복제 및 무단 도용 추적 시스템 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24886755 Country of ref document: EP Kind code of ref document: A1 |