摘要:
Disclosed is a non-frame-based method and an arrangement for embedding a watermark in an information signal (x(n)), e.g. an audio signal. The method comprises calculating (101) a non-cyclic convolution of the information signal with a watermark signal (v(n)) and combining (102) the convolution with the information signal. The non-cyclic convolution may be calculated by overlapped Fast Fourier transform filtering.
摘要:
Described herein is a trusted rendering system for use in a system for controlling the distribution and use of digital works. The trusted rendering system facilitates the protection of rendered digital works which have been rendered on a system which controls the distribution and use of digital works through the use of dynamically generated watermark information that is embedded in the rendered output. The watermark data typically provides information relating to the owner of the digital work, the rights associated with the rendered copy of the digital work and when and where the digital work was rendered. This information will typically aid in deterring or preventing unauthorized copying of the rendered work to be made. The system for controlling distribution and use of digital works provides for attaching persistent usage rights to a digital work. Digital works are transferred between repositories which are used to request and grant access to digital works. Such repositories are also coupled to credit servers which provide for payment of any fees incurred as a result of accessing a digital work.
摘要:
An image generation apparatus, in generating verification data (digital signature or MAC) necessary for detecting an alteration in image data, generates secret information Ks necessary for the generation of the verification data, utilizing secret information A and secret information B. In this manner, the image generation apparatus makes difficult the leakage and the analysis of the secret information Ks, necessary for generation of the verification data for the image data, whereby the safety and the confidentiality of the secret information Ks can be improved.
摘要:
A watermarking system comprises an encoding data processor operable to generate at least one marked version of an original item of material by introducing one of a predetermined set of code words into a copy of the original material item. The encoding data processor is arranged to form other code words of the set by cyclically shifting a first code word. The system includes a detecting data processor operable to identify the code word in the marked material item. The detecting data processor is operable to recover the code word from the marked material item and to form a Fourier transform of the recovered code word and a Fourier transform of the first code word of the set. The data detecting processor forms correlation samples by forming an inverse transform of a combination of the recovered and the first code word. Each of the correlation value samples provides the correlation value for one of the set of code words. A computationally efficient way of calculating the correlation for each code word in the set is thereby provided. As a result a time taken to detect a code word present in a marked material item is improved. The watermarking system finds particular application in identifying a point of distribution of pirate copies of video material generated by capturing the watermarked image, using, for example, a camcorder in a cinema.
摘要:
A method and system of authentication for sensor-recorders and other information capture devices is disclosed. In accordance with aspects of the current invention, a digital sample of the environment is obtained. From this sample and at least one parameter representative of at least one condition under which the sample was generated, a digital signature is created. This signature is stored in memory with the sample to be checked at a later time for authenticity. The file is checked for authenticity by generating a second signature from the file and comparing that signature to the original signature. If the two signatures are identical, the sample is considered authentic and if the two signatures are different, the sample cannot be authenticated.
摘要:
A system and method of authenticating a digital still image captured using a digital image capture device. To process the digital still image for later authentication, a signature data is transmitted from a remote location to the digital image capture device. Upon capturing the digital still image, an image identification is associated with the digital still image. The signature data is then applied to the captured digital still image to produce an authentication signature representative of the captured digital still image. The authentication signature is associated with the image identification and transmitted from the digital still image to the remote location for storage at the remote location. To verify the authenticity of the digital still image, the digital still image is transmitted to the remote location. The signature data for the transmitted digital still image is accessed and applied to the transmitted digital still image to produce a verification signature. The authentication signature and the verification signature are compared to determine the authentication of the transmitted digital still image. In an alternate embodiment, the signature data and image identification are sent to the image capture device to generate the verification signature, which is transmitted to the remote location for comparison with the authentication signature.
摘要:
L'invention concerne un procédé et un système sécurisé de transmission de données numériques (DATA) entre un émetteur et un récepteur, comprenant une phase d'authentification du récepteur par un algorithme symétrique à partage de clé d'authentification (K A , K B ) sans transmission de celle-ci, une phase de marquage (WM) des données en utilisant la clé d'authentification comme clé de marquage, et une phase de transmission des données marquées (WD).
摘要:
An image distribution system is configured with multiple clients 2 connectable via a network environment, such as Internet 1; image file server 3 having image file database 5 containing image files and log file 6; user database 7; and security control server 4 having image key database 8 and log file 9. Image data from the image file server can be opened once the client who made the image data request gains access to the security control server using an IP address obtained from the image file server, is granted authorization, and obtains an image key. The client encodes security data, such as the date and time of the distribution of the image data, user ID, serial number of hard disk drive, and client's IP address, in order to embed it in the image data unarchived into its memory in the form of an electronic watermark and transmits the security data to the security control server in order to store it in the log file at the same time.
摘要:
Each copy of software (9) is assigned a unique identifying code pattern (27) which is printed on all documents (19) produced with that software (9) by a high resolution printer (17). The unique identifying code pattern (27) is a plurality of spaced apart marks having a size no greater than about 300 dpi, and is therefore, at best, barely noticeable to the human observer. The 'invisible signature' is also reproduced on documents (19) made by unauthorized copies of software (9) which can therefore be traced. Preferably, the unique identifying code (27) is replicated multiple times (271-275) over the document (19) using an error correcting code to assure that at least one replication will be clear of matter selected for printing by the software. A high resolution scannner (21) extracts and identifies the code patterns (271-275) printed on the document (19). In systems where the software (9) generates (39) a print file for the high resolution printer (17), print commands for the pattern replications (271-275) are interspersed (41) with the other print commands making identification and removal of the commands very difficult and not worth the effort since the 'invisible signature' does not prevent copying of the software (9) or noticeably detract from the appearance of the finished document (19).
摘要:
A method of managing an electronic mark using an agent includes the steps of filing (210) an application of issuing the electronic mark together with user information to be buried in the electronic mark, entrusting (210) generation of the electronic mark together with the information of the user who applied for issuance of the electronic mark and the original image information for representing original image data where the user information is to be buried; generating (410) the electronic mark by burying the information of the user in the original image data represented by the original image information to be generated; and providing (312) the generated electronic mark to a mark user who filed an application of issuing the electronic mark.