DCT
1:23-cv-11064
KPN Innovations LLC v. Imatag SAS
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: KPN Innovations LLC (Delaware)
- Defendant: Imatag S.A.S. (France)
- Plaintiff’s Counsel: Caldwell Intellectual Property Law
 
- Case Identification: 1:23-cv-11064, D. Mass., 05/12/2023
- Venue Allegations: Venue is asserted on the basis that the Defendant, Imatag S.A.S., is not a resident of the United States and may therefore be sued in any judicial district.
- Core Dispute: Plaintiff alleges that Defendant’s digital watermarking products directly and indirectly infringe a patent related to systems and methods for applying robust digital watermarks to image files.
- Technical Context: The lawsuit concerns digital watermarking technology, which is used to embed hidden, identifying information into digital images to track their distribution and deter unauthorized use.
- Key Procedural History: The complaint alleges that Plaintiff sent a letter to Defendant on March 9, 2023, providing a copy of the patent-in-suit and notice of alleged infringement, which may form the basis for a subsequent claim of willful infringement.
Case Timeline
| Date | Event | 
|---|---|
| 2009-02-04 | U.S. Patent No. 8,385,592 Priority Date | 
| 2013-02-26 | U.S. Patent No. 8,385,592 Issue Date | 
| 2023-03-09 | Plaintiff sent notice letter to Defendant | 
| 2023-05-12 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,385,592 - "Digital Watermarking System and Method," issued February 26, 2013
The Invention Explained
- Problem Addressed: The patent identifies the problem that digital watermarks can be removed or degraded by common image processing, such as compression, making the digital information "effectively untraceable" (ʼ592 Patent, col. 2:19-24).
- The Patented Solution: The invention describes a system that creates a robust and persistent watermark. It does so by first encoding watermark data into a "watermark bitmap template." This template is then "composited" onto an original image by programmatically modifying the image's pixel values where the template and image overlap (ʼ592 Patent, Abstract; col. 2:32-48). The system is designed to create a watermark that is not easily discoverable, resistant to processing, and recoverable even from a degraded image (ʼ592 Patent, Fig. 1).
- Technical Importance: The described methods aim to provide a more durable form of content protection, allowing creators and distributors to track digital assets even after they have been shared and altered online.
Key Claims at a Glance
- The complaint asserts independent claims 1 and dependent claim 8 (Compl. ¶16).
- Independent Claim 1 recites a system comprising:- A storage unit for storing algorithms and image data
- A processor that executes the algorithms to:
- Encode watermark data
- Create a "watermark bitmap template" from the encoded data
- Load and scale an original image
- Composite the template onto the scaled image by aligning them and "programmatically modifying pixel values" where they overlap
- Store the resulting watermarked image
 
- The complaint reserves the right to assert other claims.
III. The Accused Instrumentality
Product Identification
- The accused instrumentalities are Defendant's "Imatag Digital Watermarking API," "Imatag Leaks," and "Imatag Monitor" products (Compl. ¶1).
Functionality and Market Context
- The complaint alleges the "IMATAG API" is a software tool offered as a service or onsite software that "creates and applies digital watermarks to digital image files" (Compl. ¶15). A screenshot from Defendant's website, included in the complaint, describes the API as enabling "invisible tagging of your images" using "forensic steganography" (Compl. p. 4). The "Leaks" product uses this watermark to perform "traitor tracing" to identify the source of leaked content, while the "Monitor" product uses the watermark to search the internet for a customer's images (Compl. p. 4; ¶17).
IV. Analysis of Infringement Allegations
'592 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a storage unit which tangibly stores watermarking algorithms, the original image, watermark data, and the watermarked image; and | The Imatag API is offered as a service and as "onsite software," which would require a storage unit (on Imatag's or a customer's system) to hold the software and image files. | ¶15 | col. 14:46-49 | 
| a processor which executes the watermarking algorithms to | The Imatag API is a "software tool" that performs the functions of creating and applying watermarks, which requires execution by a processor. | ¶15 | col. 14:50-51 | 
| encode the watermark data, | The API is described as performing "forensic steganography" to hide an "invisible identifier" in images, which is a form of encoding data. | p. 4 | col. 14:52 | 
| create a watermark bitmap template at a first desired size and resolution, the watermark bitmap template including at least one watermark bitmap of the encoded watermark data, | The API "creates and applies digital watermarks," which the complaint alleges meets the element of creating a template to be applied to the image. | ¶15 | col. 14:53-56 | 
| load and scale the original image to a second desired size and resolution, | Applying a watermark to a digital image file necessarily involves loading the file; scaling is a common prerequisite for compositing operations. | ¶15 | col. 14:57-58 | 
| composite the watermark bitmap template and the scaled original image to produce the watermarked image by...aligning the...template and...image, and programmatically modifying pixel values of the scaled original image near positions where the watermark bitmap and the scaled original image overlap, | The API's core function is to "integrate and automate the invisible tagging of your images," which corresponds to the claimed compositing process of modifying pixel values to embed the watermark. | ¶15; p. 4 | col. 14:59-65 | 
| store the watermarked image in the storage unit. | The process results in a watermarked image file, which must be stored either by Imatag's service or the customer's onsite software system. | ¶15 | col. 14:66 | 
- Identified Points of Contention:- Technical Questions: A central question is whether the Imatag API's method of "invisible tagging" involves the creation of a discrete "watermark bitmap template" prior to application, as recited in the claim. The complaint alleges the API "creates and applies" watermarks (Compl. ¶15), but provides limited detail on the internal technical steps of that process. The analysis will depend on whether the accused system performs these steps in the claimed sequence.
- Scope Questions: The dispute may turn on the scope of "programmatically modifying pixel values." The patent describes specific compositing techniques, such as applying a faint watermark at 1-3% opacity (ʼ592 Patent, col. 6:7-12). The degree to which these specific embodiments limit the broader claim term will be a focal point.
- Dependent Claim 8: The complaint also asserts claim 8, which requires determining "unacceptable compositing areas" and applying "no modifications" to them (ʼ592 Patent, col. 15:27-32). The complaint does not provide specific facts alleging how the accused products meet this negative limitation, suggesting this could be a point of significant factual dispute.
 
V. Key Claim Terms for Construction
- The Term: "watermark bitmap template" 
- Context and Importance: This term appears central to defining the claimed invention. The infringement analysis will depend on whether the accused Imatag API creates an entity that meets this definition. Practitioners may focus on this term because if the accused system generates pixel modifications on-the-fly without creating an intermediate "template" object, it may fall outside the claim's scope. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent suggests the template can be an "arbitrary type of bitmap, such as a logotype, a barcode, or another image," indicating flexibility in its form (ʼ592 Patent, col. 10:18-20).
- Evidence for a Narrower Interpretation: The patent’s process flowchart (Fig. 3) shows "CREATE WATERMARK TEMPLATE" (46) as a distinct step preceding "COMPOSITE" (52, 54). This could support a narrower construction requiring the creation of a discrete data object before the modification of the original image begins.
 
- The Term: "composite" 
- Context and Importance: This term defines the core infringing act of applying the watermark. Its construction will determine what specific technical actions constitute infringement. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The term itself is general, and the claims define it as "aligning" and "programmatically modifying pixel values" without further limitation (ʼ592 Patent, col. 14:61-65).
- Evidence for a Narrower Interpretation: The specification provides specific examples of compositing, such as using "Adobe® Photoshop® terminology, 'multiply' and 'color'" modes (ʼ592 Patent, col. 6:3-6). A defendant may argue that these examples inform and limit the meaning of "composite" to these or similar specific blending operations.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement by asserting that Imatag encourages its customers to use the accused products in an infringing manner (Compl. ¶24). It alleges contributory infringement on the grounds that the products are not designed for non-infringing uses and have "no other practical use" (Compl. ¶25).
- Willful Infringement: The complaint alleges that Imatag's infringement is willful because it continued its allegedly infringing acts after receiving KPN's notice letter on March 9, 2023, which provided actual knowledge of the '592 Patent (Compl. ¶21, ¶26).
VII. Analyst’s Conclusion: Key Questions for the Case
- A central issue will be one of claim construction and technical evidence: Does the Imatag API's watermarking process involve the creation of a discrete "watermark bitmap template" before it is applied to an image? The outcome may depend on how broadly the court construes this term and what evidence emerges regarding the accused system's internal operations.
- A key evidentiary question will be one of proof of function: Can the plaintiff provide evidence that the accused system performs all the claimed steps, particularly the negative limitation in claim 8 requiring the identification and avoidance of "unacceptable compositing areas," for which the complaint currently provides no specific factual allegations?
- A final question will concern willfulness: Did Imatag's alleged conduct after receiving the March 9, 2023 notice letter rise to the level of "egregious" behavior that might justify enhanced damages, or was its continuation of business a good-faith disagreement over infringement or validity?