Abstract:
A system and apparatus for evaluating the reliability of a watermarking technique for a video sequence, said system and apparatus comprising: a) a calibrating means adapted to calibrate said system and apparatus using a test original video sequence and a test attacked video sequence in compliance with predetermined degrees of quality; b) an attacking means adapted to attack embedded watermark in said video sequence, said attack selected from a group of attacks; and c) an evaluating means including a comparator means for comparing the test original video sequence with test attacked video sequence and the watermark in the test original video sequence with the watermark in the test attacked video sequence to evaluate the reliability of a watermarking technique to give a reliability score.
Abstract:
A composite masking system and method for improving the invisibility of high-definition video watermarking. The composite masking system includes a watermark generation module, a mask generation module, and watermark embedment means. The watermark generation module generates a basic watermark pattern using a private key, and generate a watermark pattern by repeatedly extending the basic watermark pattern. The mask generation module generates a Noise Visibility Function (NVF) mask using NVF masking means, an adaptive dithering mask using adaptive dithering masking means, and a contour mask using contour masking means. The watermark embedment means generates a composite mask by multiplying the NVF mask, the adaptive dithering mask and the contour mask together, multiplying the composite mask and the extended watermark pattern together, and embedding the result of the second multiplication in the luminance channel of an original image.
Abstract:
The present invention relates generally to digital watermarking and steganographic data hiding. In one embodiment a method of rendering content to a user is provided. The rendered content includes a digital watermark embedded therein. In another embodiment, digital watermarking is utilized to facilitate purchase or lease of audio or video content over a network or with a remote computer. In still another embodiment, a compression characteristic is determined, and subsequent steganographic embedding is influenced based on the characteristic. Other embodiments are provided as well.
Abstract:
Provided is a method of selecting test stimuli for use in evaluating performance of a video watermarking algorithm, including the steps of: calculating an image complexity rate (ICR) for each of a plurality of test stimulus candidates and classifying them into L (where L is an integer more than or equal to 2) levels based on the calculated ICR values; calculating an energy distribution rate (EDR) for each of the plurality of test stimulus candidates, and classifying them into M (where M is an integer more than or equal to 2) levels based on the calculated EDR values; calculating a motion rate (MR) for each of the plurality of test stimulus candidates and classifying them into N (where N is an integer more than or equal to 2) levels of the calculated MR values; and selecting at least one test stimulus from each of the L levels, M levels, the N levels of the test stimuli, respectively.
Abstract:
A method comprises receiving original encoded video stream as one input, accessing encoded data divided into slices which are further divided into blocks, receiving the list of possible changes or watermarks as another input, accessing at least one block, decoding each slice, setting down each slice, extracting from the list those changes that apply to the at least one block, and constructing propagation maps from inter-prediction or intra-prediction using changes for the at least one block. The method can further comprise decoding luminance data using the propagation maps, comparing the luminance data to a fidelity threshold, and applying possible changes or watermarks to those not exceeding the fidelity threshold.
Abstract:
A method comprises accessing changes which can be watermarks in a list for coded data, the changes having an syntax element, an original value and an candidate alternative value; determining for a subset a group of compliant changes from the changes, the complaint changes being compliant with a coding protocol such as a CABAC encoding protocol; and selecting for the subset only compliant changes that result in the subset having only one candidate alternative value for each syntax elements and result in only compliant changes also meeting at least one performance criterion. The method can include determining fidelity, recoverability, or robustness of the watermarks and removing or preventing watermarks from being in the subset based on the fidelity, recoverability, or robustness, wherein fidelity, recoverability, and robustness are performance criteria. The method can include determining at least two performance values for the watermarks, determining some collective metric of the at least two performance values, and removing or preventing watermarks from being in the subset based on the same collective metric.
Abstract:
Video fingerprinting using watermarks is described herein. A watermark encoder embeds a watermark into an input video to produce a watermarked video. The watermark encoder can choose particular regions of the video that are sufficiently complex for watermarking. Spatial and temporal complexity analyses can be performed on a per-pixel basis to locate suitable regions of the video. The watermarks can be embedded using a unique codeword associated with a given user. A watermark decoder can receive the watermarked video. In some instances, the watermarked video may have been attacked in some way after being output by the watermark encoder. In these instances, the watermark decoder can extract the watermark from the watermarked video. In turn, the watermark decoder can extract the codeword from the watermark, and compare the extracted codeword to a plurality of known codewords associated with respective users.
Abstract:
A method for embedding a watermark into digital data, when the watermark is to be embedded in a digital image, independently changes real number components and imaginary number components of each of coefficient values of a complex watermark coefficient matrix using key, from the watermark to be embedded in the digital image, a step for performing a discrete Fourier inverse transform on the sequence matrix of the changed watermark and generating a watermark pattern; and a step for adding like tiling the water mark pattern to the original image, and generating an embedded image.Further more, a watermark detection method for detecting a watermark from a digital data, a step for separating a block from an arbitrary position on the detected object image, a step for performing a discrete Fourier transform on the block and obtaining a sequence matrix, a step for generating position information for a component that is to be detected and that is specified by the key, a step for detecting a position marker sequence by calculating a phase difference of a sequence by an amount of parallel displacement, for each item of the position information, and extracting offset information which is the amount of parallel displacement when there is agreement between a start point of an embedded watermark and a start point of the block cut from the detected object image, and a step for detecting the embedded watermark cut from the detected object image.
Abstract:
A method and system of communicating visual communication quality information, includes extracting reduced-reference (RR) feature data from visual content, embedding the RR feature data in the visual content; and transmitting the visual content with the embedded RR feature data. Visual communication quality is assessed by receiving visual content which includes visual content data and a first set of embedded RR feature data, retrieving the first set of RR feature data from the visual content data, and generating a second set of RR feature data from the visual content data. The second set of RR feature data corresponds to substantially identical features of the visual content data as that used to generate the first set of RR feature data. The first set of RR feature data is compared to the second first set of RR feature data to determine a quality of the visual content based upon the comparison.
Abstract:
Watermark information (denoted WM) consists of several symbols which are embedded continuously in an audio or a video signal. At decoder site the WM is regained using correlation of the received signal with an m-sequence if Spread Spectrum is used. According to the invention, each WM symbol carries an identification data ID item in addition to its normal payload, and it is already tested in the encoder whether or not the signal is good enough so that the embedded symbol can be recovered at decoder side. If true, it is embedded. If not true, no WM is embedded for the length of one symbol and the test is repeated for the following symbol. The sequence of IDs is known at the encoder which can therefore detect using the ID whether or not a symbol has been skipped.