Abstract:
A system and method for embedding information into digital media and later detecting the embedded information using a unique spread spectrum modulation technique. In general, the present invention removes interference caused by an original signal from the detection process thereby eliminating a major source of detection error. The interference caused by the original signal is removed by using the encoder knowledge about the original signal and modulating the energy of the embedded mark to compensate for the original signal interference. The present invention also includes a novel redundant bit representation technique causes a resulting average over a large sample to tend to zero, thereby reducing the vulnerability of the present invention to malicious collusion attacks.
Abstract:
A detecting data processing apparatus determines whether one or more code words of a predetermined set of code words are present in a suspected version of a material item. The apparatus comprises a registration processor operable to associate samples of the suspected version with samples of a copy of the original material item, a recovery processor and a detection processor. The recovery processor is operable to generate a recovered code word by comparing the registered copy of the original and the suspect material items. The detection processor is operable to detect one or more code words from a correlation between the recovered code word and the code words from the set. The registration processor is operable to form at least one reduced-bandwidth-version of the material item and to associate the suspected version and the copy of the material item in accordance with a comparison between the reduced-bandwidth-versions of the suspected version and the original material item. The registration of the suspected version and the original version of the material item is typically required in order to improve a likelihood of correctly recovering a code word from the suspected version. For material items such as video recordings of motion picture films, a substantial number of samples may need to be associated in order to effect the registration process. As a result, the registration process may be time consuming or at least computationally difficult. However, by forming reduced-bandwidth-versions of the suspected version and the original version of the material items, a corresponding reduction in the time taken to perform the registration process is provide in accordance with the bandwidth reduction.
Abstract:
A method is described for finding areas of a signal which survive multiple transcodings and signal conversions. Then using these identified areas and associated meta data to insert in real-time hard to detect traceable watermarks in a secure and robust manner. Also a means of extracting the marks from pilfered or suspect digital signal using such information.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
Digital watermarking of audio, image, video or multimedia data is achieved by inserting the watermark into the perceptually significant components of a decomposition of the data in a manner so as to be visually imperceptible. In a preferred method, a frequency spectral image of the data, preferably a Fourier transform of the data, is obtained. A watermark is inserted into perceptually significant components of the frequency spectral image. The resultant watermarked spectral image is subjected to an inverse transform to produce watermarked data. The watermark is extracted from watermarked data by first comparing the watermarked data with the original data to obtain an extracted watermark. Then, the original watermark, original data and the extracted watermark are compared to generate a watermark which is analyzed for authenticity of the watermark.
Abstract:
A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
Abstract:
Systems and methods are described for obfuscating variants of content segments. Variants of content segments can be used to encode an identifying sequence in a transmission of content. The variants of the content segments can each include one or more marked frames and one or more unmarked frames. Variations can be introduced into the unmarked frames for each of the variants of the content segments.
Abstract:
Systems and methods are described for obfuscating variants of content segments. Variants of content segments can be used to encode an identifying sequence in a transmission of content. The variants of the content segments can each include one or more marked frames and one or more unmarked frames. Variations can be introduced into the unmarked frames for each of the variants of the content segments.
Abstract:
A digital watermarking system and method are disclosed. In one respect, the disclosed digital watermarking includes generating an extracted signal by applying a watermark extractor to an original image, generating a mixed signal by mixing the first signal with a periodic watermark signal using a local weighting factor for the periodic watermark signal that attenuates a strength of the watermark signal in proportion to a pixel luminance level, and replacing the extracted signal in the original image with the mixed signal to generate a marked image, wherein the watermark signal is extractable from the marked image using the watermark extractor.
Abstract:
First and second patterns are formed on a substrate. A spatial offset between the patterns is determined, and stored for later use in authenticating the substrate. (One or both of the patterns may convey steganographic information. One pattern may be printed, while the other may be embossed.) A smartphone can sense these patterns, determine the spatial offset, and check whether the determined offset matches the earlier-stored offset, to judge whether the substrate is authentic. Another arrangement effects serialization of product packaging by use of paired patterns (at least one of which is typically a watermark pattern) applied in a manner causing a spatial offset between the patterns to progressively vary along a length of a printed web. Still other arrangements involve substrates conveying patterns that degrade over time, e.g., indicating freshness or pressurization condition. A great variety of other features and arrangements are also detailed.