Abstract:
Methods of embedding and detecting a watermark into-from a digital image are disclosed. A method of embedding a watermark in accordance with an embodiment of the present invention into a digital image, the method comprising: generating a difference from an original image; segmenting said difference image into sub-regions; and calculating a watermark block into each sub-region by adding said watermark block with pixel values of each sub-region.
Abstract:
An image processing apparatus that superimposes additional information on image data, the apparatus sets, in the image data, a main region in which the superimposing intensity for superimposing the additional information is constant, and a superimposing intensity change region in which the superimposing intensity for superimposing the additional information is not constant, sets, the superimposing intensity according to the target pixel in the superimposing intensity change region, and superimposes the additional information on image data using the set superimposing intensity.
Abstract:
Watermark information (denoted WM) consists of several symbols which are embedded continuously in an audio or a video signal using spread-spectrum. At decoder site the WM is regained using correlation of the received signal with an resequence. According to the invention, not only is the watermark made audio or video signal level dependent (PAS), but also the spreading sequence used for the watermark is made audio or video signal level dependent. This means that the same WM symbol is encoded by several different spreading sequences (NSS). The encoder tests (DEC), which one of these WM symbols or sequences can be retrieved best in a decoder, and embeds that selected spreading sequence WM in the audio or video signal to be watermarked. At decoder side all candidate WM spreading sequences are correlated with the received signal and the spreading sequence with the best match is chosen as the correct one.
Abstract:
A method and system for watermarking video images including generating a payload, selecting sets of coefficients, modifying coefficients and embedding said watermark by enforcing relationships between property values of selected sets of coefficients with a volume of video are described. The modified coefficients replace the selected sets of coefficients.
Abstract:
A reversible watermarking method embeds auxiliary data into a data set, such as an image, audio, video or other data, in a manner that enables full recovery of the original, un-modified data set. This method may be used to determine whether the data set has been tampered. To improve embedding capacity without the need for compression of the auxiliary data, the method uses an expansion technique. One particular approach exploits the correlation or redundancy within the data set to convert the data to a set of small, expandable values, such as difference values. These small values are then expanded by inserting auxiliary data as one or more additional bits, increasing the number of bits without causing an underflow or overflow. This approach also uses a property of the data set that is invariant to the embedding operation to identify embedding locations, obviating the need for separate data to identify where data is embedded in a data set.
Abstract:
An image capture system for retaining check processing data comprises a camera operable to generate an electronic check image of a physical check, with the electronic check image operable to generate an image replacement document. The system includes a scanner operable to process the check image to generate check processing data and one or more processors operable to embed at least a portion of the check processing data in the electronic check image. The embedded check processing data is typically operable to be subsequently identified.
Abstract:
There is disclosed a method of forming a securitized image comprising: obtaining a host image which is to be visible to an observer, obtaining a latent image to be concealed within the host image, adjusting the saturation of regions of at least one of the host image and the latent image such that when the latent image and the host image as adjusted are subsequently combined, the saturation of the combined regions will more closely approximate the saturation of corresponding regions of the original host image; and combining the latent image, and host image as adjusted to form a securitized image.
Abstract:
Exemplary systems and methods implement an exemplary visual perception model. This model can be implemented in such applications as imaging, compression, denoising, annotation of hi-fidelity images, etc. In one implementation a perceptual filter estimates an entropy statistic and a standard deviation statistic associated with each pixel of an image, then mixes the entropy statistic and the standard deviation statistic to map an estimation of human perceptual tolerance to noise or alteration in parts of the image. In one application, metadata may be added to an image via a system of synergistic watermarks, in which the watermarks strengthen each other and are placed according to the noise tolerance of the pixels in order to maintain hi-fidelity of the image.
Abstract:
The present invention aims to be able to provide an efficient public key digital watermark method which is specialized to information common to contents. In the method, arrangement order of digital data in input digital contents is set to become predetermined arrangement order so that the input digital contents constitute an error correction code.
Abstract:
The present invention relates generally to steganographic encoding and/or digital watermarking. In one embodiment, an apparatus is provided including: an input to receive imagery or video; a processor to act on received imagery or video, said processor programmed to steganographically embed a first code and a second code in the imagery or video, the first code comprising a publicly accessible code and the second code comprising a less publicly accessible code relative to the first code; and an output to output embedded imagery or video. Other implementations and embodiments are described and claimed as well.