Abstract:
The present invention relates to steganographic encoding for multimedia content. In one combination, a method is provided including: encoding first information in a first component of a multimedia signal, the first component comprising audio, the first information being encoded though subtle changes to data representing the first component; encoding second information in a second component of the multimedia signal, the second component comprising video, the first information being encoded though subtle changes to data representing the first component, the first information and the second information are associated. Of course, other combinations are provided as well.
Abstract:
The present invention provides methods and systems for identifying content to help ensure legal uses of the content. In one implementation a method is provided to include obtaining content, wherein the content comprises a steganographic signal hidden therein through subtle changes to data representing the content; accessing a registry including a plurality of steganographic decoding keys to obtain a key associated with the content, wherein at least some of the keys are encrypted; obtaining the key associated with the content; and decoding the steganographic signal hidden in the content utilizes at least the key associated with the content.
Abstract:
An image processing device includes a code image generating unit that generates a code image that contains plural patterns different in shape and represents predetermined information on the basis of positional relationship between adjacent patterns and a image composing unit that combines the code image generated by the code image generating unit and a document image.
Abstract:
A system and method for verifying a printed document. Generally, the system is implemented to automatically compare first and second images and provide an output with respect thereto. In an illustrative embodiment, the inventive system includes a computer for providing a first electronic image of a document. The image may be provided via a network such as the Internet. A printer is coupled to the computer and driven to print the document. The document is then scanned to provide a second electronic image of the document. The scanned image is then compared to the original image to provide verification of the printed output. For text based documents, the first and second images may be converted to text using conventional optical character recognition software to facilitate comparison. In a refinement of the present teachings, a mechanism is provided to detect a file characterization by which a restriction may be imposed on the number of the documents to be printed. If a document is restricted, successful printouts above the restriction are disabled. As a further refinement, a second mechanism is included to enable a fingerprint to be printed on the restricted document. When scanned, the fingerprint provides an indication of the operability of the printer and the scanner. In the event the fingerprint is not detected, the printer is disabled. This mechanism would be useful in a pay-to-print application to frustrate fraudulent efforts to disable the scanner and thereby cause the printer to output unauthorized printouts.
Abstract:
The present invention relates to digital watermarking systems and methods. In a first implementation, so-called movie studio rough-cuts are watermarked to provide a forensic tracking clue or to provide security for distributed rough-cuts. In another implementation, a watermark is determined for a compressed video object. The watermark is compressed as an object and the watermarked object is then associated with the compressed video object. The two separate objects are provided to a rendering device, which after decompressing both objects, embeds the watermark in the video prior to rendering.
Abstract:
A system and method for generating forensically marking image data from source material. A generated forensic mark will vary from copy to copy by using a selected forensic marking technique and forensic marking parameters that change from copy to copy of the source image data.
Abstract:
The present invention provides methods and systems for identifying content to help ensure legal uses of the content. In one implementation a method is provided to include obtaining content, wherein the content comprises a steganographic signal hidden therein through subtle changes to data representing the content; accessing a registry including a plurality of steganographic decoding keys to obtain a key associated with the content, wherein at least some of the keys are encrypted; obtaining the key associated with the content; and decoding the steganographic signal hidden in the content utilizes at least the key associated with the content.
Abstract:
A print management system includes a policy that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers are managed by a print management system. Each printer can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system routes the print job to a printer that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document. A document can be verified as an original or established as a forgery by inspecting the copy evidence and/or tracing information in the watermark.
Abstract:
Digital watermarks are embedded and decoded from host media signals like images and audio using encryption keys. The encryption keys are used to encrypt different components of the digital watermark message. The encryption keys can be used to scramble the digital watermark and components of it in alternative ways, including scrambling the mapping of the message to the host signal and scrambling carrier signals used to encode the message. Spread spectrum, feature based, and quantization based embedding and decoding schemes may be used in various combinations in the watermark encoder and decoder. Portions of the digital watermark may be encrypted to provide private watermark data, while other portions may be un-encrypted to provide public watermark data.
Abstract:
Audio and image (including video) content data is watermarked by processes that take into account human perception attributes of the content. Some methods assess the input content data to discern inherent biases, and tailor the watermarking to exploit such data characteristics. Other methods make use of a trial-encoding process to determine how the watermark survives corruption—such as compression—and tailor the watermarking accordingly. A great variety of other techniques are also disclosed.