Abstract:
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded information while maintaining security. The image processing device embeds second additional information into document image data embedded with first additional information. The image processing device deletes a part where the first additional information is embedded in the document image data, and embeds the second additional information into the part of the first additional information thus deleted. The image processing device further embeds third information different from the first and second additional information at a position different from position at which the second additional information is embedded. Further, the embedding means embeds the third information at a position indicated by the second additional information.
Abstract:
A method of detecting an embedded signal in a media signal. The method comprises receiving blocks of the media signal and computing a detection metric for the blocks. The detection metric comprises a measure of coincidence of detection parameters of different blocks. The method performs subsequent detection operations based on the measure of coincidence of the detection parameters.
Abstract:
An image data transmission system comprises a first terminal device (110) and a second terminal device (210) included in a communication network. (I) The first terminal device (110) includes first processing means (111) for performing such a first operation upon image data as contains an adding operation to add management information containing copyright information and an embedding operation to embed a watermark on the copyright holder, thereby to generate communication data, and first communication means (112) for transmitting communication data. (II) The second terminal (21) includes second communication means (212) for receiving the communication data, and recording means (215) for recording the image data, to which either the communication data or the management information contained in the communication data is added and in which the watermark is embedded, in a recording medium.
Abstract:
Method for embedding a unique and different digital watermark in digital contents for each access without increasing the overhead or load at the contents server. The contents server has a digital watermark-embedded contents storage unit for storing a plurality of digital contents where a different digital watermark is embedded, and a fingerprint performing unit for, adding to the digital contents the information specified using a bit row that is formed by a digital watermark being embedded into each part of the digital contents.
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.
Abstract:
The present invention allows a specific image to be easily changed when using a counter in the case of adding a specific image. A specific image adding section 12 for adding the specific image to inputted image data includes a first counter 15 for deciding positions of a main scanning direction and a vertical scanning direction and a second counter 16 for specifying a form of the specific image. The second counter 16 counts up addresses of pixels counterclockwise with a starting point at one corner on a matrix made up of the main scanning direction and vertical scanning direction. If the first counter 15 counts a predetermined count value, the second counter 16 starts. When a maximum value of the count value of the second counter 16 is equal to or less than a count set value, an image is formed on each of the pixels. The pixel on which the image is formed is changed and the form of the specific image is also changed by changing the count set value.
Abstract:
Steganographic signals or digital watermarks are detected from media signals. A media signal may represent audio, video or imagery. In one implementation, a method of detecting a digital watermark in a media signal is provided. The method includes receiving blocks of the media signal; buffering the blocks; screening the blocks for a presence of the digital watermark to identify a plurality of blocks likely to include the digital watermark based on a detection metric; combining the blocks that have been identified as being likely to include the digital watermark; and detecting the watermark from the combined blocks. Other implementations are provided as well.
Abstract:
An Internet monitoring method identifies content on the Internet through embedded data and pattern matching, determines the owners of the content and notifies the owners of this use of their audio or images on the Internet.
Abstract:
A method for making an authenticating system for an object includes selecting an image and adding a watermark in a predetermined area of the image. The predetermined area may be a portion of the image. The method also includes establishing the image having the watermark therein on the object, and associating the watermark with the object to render object-specific authenticating data.
Abstract:
To prevent piracy or leakage of data content, a cryptography technique and electronic watermark technique are combined together and used. In a data content supplied to a user, a user data is entered as electronic watermark by a data management center, and the data content with an electronic watermark entered in it is encrypted using a crypt key and is supplied. The encrypted data content is decrypted using a crypt key distributed from the data management center and is used. In case it is to be stored, it is encrypted using another crypt key. In case the data content is copied and transferred to other user, a user data of the other user is entered as electronic watermark, and a scenario to enter the user data of the other user as electronic watermark is registered at the data management center, and the data content with electronic watermark entered in it is encrypted using another crypt key and is supplied. When the validity of the other user is confirmed by the scenario, another crypt key is distributed to the other user. The encrypted data content is decrypted using another crypt key and is used. When it is to be stored, it is encrypted using still another key. In case the data content has been copied and transferred illegitimately, it is possible by verifying the electronic watermark to identify the user who has copied and transferred the data content illegitimately.