摘要:
The work to be protected is digitized (10) and a baseline watermark is derived (12). A watermark offset vector is created (16) and then stored (18). The offset vector is added to the baseline watermark vector to generate a modified watermark vector (20). The baseline watermark vector is replaced with the modified watermark in the digitized work (22). And, finally, the watermarked work is returned to the original form (24).
摘要:
A camera (10) with a built in microprocessor system (48) is programmed to receive an input password (72) and indicium from a host computer (12). The camera is configured to use the indicium in combination with a conversion formula to mark an original acquired image (Fig. 14) in a non-destructive manner to form modified image data (Fig. 5-7) and add the indicium to an image header. The camera also creates image authentication data for comparison with corresponding data of a questionable second image to determine if the second image is the same as or different from the original image. This process of marking and creating authentication data all occurs during acquisition and prior to any image data storage in a medium from which a person could subsequently access data. The camera takes the authentication data and stores it along with the marked image data in memory for subsequent transmission to the host computer.
摘要:
A watermarking scheme for images which include techniques for inserting and extracting watermarks in the frequency domain and for determining whether an image so watermarked has been tampered with. Watermark insertion is accomplished by embedding the bits of a digital signature of a hash function of the image in the frequency coefficients of the image. Tamper detection is accomplished generally as follows: the watermark which was embedded during the watermark insertion process is extracted from the image; the hash function of the image is computed as in the insertion process; it is verified using a public key whether the extracted watermark is a valid signature of the hash value. If so, then there is assurance that the image has not been tampered with. Otherwise, there is reason to conclude that the image has been tampered with.
摘要:
The work to be protected by the watermark is first digitized (10), and then the baseline watermark vector is derived (12) and stored (14). Also, a watermark offset vector is created (16) and stored (18). The watermark offset vector and the baseline watermark vector are added together to generate a modified watermark vector (20). Next, the baseline watermark vector is replaced by the modified watermark vector in the digitized work to be protected (22). Finally, the watermarked work is returned to its original form (24).
摘要:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system (100) encrypts a content purchased by the purchaser using a public key of a purchaser system (200) and sends the encrypted content to the purchaser system. The purchaser system 200 creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system 100 verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
摘要:
Described herein is a trusted rendering system for use in a system for controlling the distribution and use of digital works. The trusted rendering system facilitates the protection of rendered digital works which have been rendered on a system which controls the distribution and use of digital works through the use of dynamically generated watermark information that is embedded in the rendered output. The watermark data typically provides information relating to the owner of the digital work, the rights associated with the rendered copy of the digital work and when and where the digital work was rendered. This information will typically aid in deterring or preventing unauthorized copying of the rendered work to be made. The system for controlling distribution and use of digital works provides for attaching persistent usage rights to a digital work. Digital works are transferred between repositories which are used to request and grant access to digital works. Such repositories are also coupled to credit servers which provide for payment of any fees incurred as a result of accessing a digital work.
摘要:
A method for picture-based barcode encoding and decoding is provided herein. The method for picture-based barcode encoding includes: transforming an original data into an original data bitstream; performing an error correction on the original data bitstream for translating the original data bitstream into an error corrected bitstream; selecting all or part of the picture as an encoded area; calculating a data storage capacity of the encoded area; adjusting a size of the error corrected bitstream or a size of the encoded area for equalizing a data storage capacity of an encoded data bitstream and the data storage capacity of the encoded area; and adjusting a pixel value of the encoded area according to the encoded data bitstream.
摘要:
A method for picture-based barcode encoding and decoding is provided herein. The method for picture-based barcode encoding includes: transforming an original data into an original data bitstream; performing an error correction on the original data bitstream for translating the original data bitstream into an error corrected bitstream; selecting all or part of the picture as an encoded area; calculating a data storage capacity of the encoded area; adjusting a size of the error corrected bitstream or a size of the encoded area for equalizing a data storage capacity of an encoded data bitstream and the data storage capacity of the encoded area; and adjusting a pixel value of the encoded area according to the encoded data bitstream.