摘要:
Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
摘要:
Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
摘要:
A method of embedding information in digital content representing media streams. The method includes (1) selecting a set of locations within that digital content reprensenting the media stream to embed information, (2) selecting a set of possible alterations to make at those locations, and (3) making a subset of the possible alterations. The set of locations and possible alterations is herein sometimes called a “watermark.” The subset of actual alterations that are made is herein sometimes called a “fingerprint.” The method determines a set of locations at which there are alternative versions of digital content representing the same media stream, such as one being the original and one being an alternative version of the same digital content, herein sometimes called the “original movie” and the “alt-movie,” or herein sometimes called the “original block” and the “alt-block” for a particular block in the digital content representing the media stream.
摘要:
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
摘要:
A computer is provided with an application and a printer driver. A user of the computer generates image data using the applications. When the image data is for a plurality of pages, the user selects a desired watermark for each of the plurality of pages. The printer driver converts the image data into print data, and combines selected watermarks with the print data for corresponding pages, thereby generating updated print data. The updated print data is output as a single print job to the printer. The printer executes printing operations based on the print job so as to print an image on a plurality of pages, each formed with a corresponding watermark.
摘要:
A computer is provided with an application and a printer driver. A user of the computer generates image data using the application. When the image data is for a plurality of pages, the user selects a desired watermark for each of the plurality of pages. The printer driver converts the image data into print data, and combines selected watermarks with the print data for corresponding pages, thereby generating updated print data. The updated print data is output as a single print job to the printer. The printer executes printing operations based on the print job so as to an image on a plurality of pages each formed with a corresponding watermark.
摘要:
Methods and apparatus for embedding a watermark in a multimedia signal and detecting the watermark, are described. The method comprises the steps of generating a watermark signal comprising a first sequence of values and a second sequence of values; obtaining a first signal portion corresponding to a first channel and a second signal portion corresponding to a second channel from the multimedia signal, said channels being significantly independent; generating a first host modifying signal as a mixture of the first signal portion and the first sequence; generating a second host modifying signal as a mixture of the second signal portion and the second sequence; and generating a watermarked multimedia signal by combining scaled versions of the host modifying signals with the multimedia signal.
摘要:
A data processing apparatus is operable to identify one of a plurality of code words present in a watermarked version of a material item. The marked version is formed by combining each of a plurality of parts of a code word with one of a plurality of units from which the material item is comprised. The apparatus comprises a recovery processor operable to recover at least one part of the code word from a corresponding unit of the marked material item, and a correlator. The correlator is operable to generate for the marked material unit, a dependent correlation value for the part of the code word recovered from the material unit and the corresponding part of at least one of the re-generated code words from the set. A detector is operable to determine whether at least one of the code words is present in the marked material item from the dependent correlation value for the part of the code word exceeding a predetermined threshold. The data processor may detect the presence of the code word with improved probability, in particular when parts of the material have been corrupted.
摘要:
An electronic watermark data insertion apparatus comprises an insertion information memory (39) for preliminarily storing insertion information for designating electronic watermark data to be inserted block by block and an electronic watermark data insertion unit (33) for inserting, on the basis of the insertion information, the designated electronic watermark data from an electronic watermark data table (37) in a quantized image block by block. An electronic watermark data detection apparatus comprises an electronic watermark date extracting unit (45) for extracting the image data having a biased frequency region projecting in dependency on the inserted electronic watermark data block by block and an electronic watermark data detection unit (50) for calculating a statistical similarity between the extracted data and the electronic watermark data stored in an electronic watermark data table (48). An electronic watermark data accumulator (51) accumulates the statistical similarity for a predetermined time interval to produce an accumulated addition result which is reset after the elapse of the predetermined time interval or when the accumulated addition result exceeds the a predetermined threshold value. A determining unit (52) determines that the electronic watermark data is detected when the accumulated addition result exceeds the predetermined threshold value.
摘要:
Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user wished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.