Abstract:
An image processing apparatus includes a document image generating section, a medium ID generating section, a correspondence information storing section and an image output section. A document image generating section generates a document image based on a managed data in the apparatus. A medium ID generating section generates a medium ID for identifying a medium on which the document image is printed. A correspondence information storing section stores correspondence information by which the managed data and the medium ID are correlated with each other. An image output section outputs an image in which a code image indicating the medium ID is superimposed on the document image.
Abstract:
After a digital content is loaded into an information terminal such as a PC, ID information unique to a viewer or a user of the PC is imprinted into the content. The ID information is imprinted into a predetermined location of the content or alternatively, it may be imprinted over the entire content in the form of a spatial frequency. The content with an ID added thereto is then enabled to be used in the terminal.
Abstract:
The present invention leverages a series of media watermark locations to provide information relating to media ownership and/or distribution source. This provides a forensic means to establish a source of media with a high degree of certainty despite malicious and/or non-malicious attacks. By providing embedded user unique identification, a source of copied media can be determined without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, digital media is transformed into an N-dimensional media signal. User unique keys are then utilized along with a master key to determine locations for embedding a watermark signal that possesses substantially similar quantized statistics as the transformed media signal. The watermark signal is then embedded into the media signal, fingerprinting the media.
Abstract:
Method and system for embedding a unique and different digital watermark in digital contents for each access without increasing the overhear or load at the contents server. The contents server has a digital watermark-embedded contents storage unit for storing a plurality of digital contents where a different digital watermark is embedded, and a fingerprint performing unit for, adding to the digital contents the information specified using a bit row that is formed by a digital watermark being embedded for each part of the digital contents.
Abstract:
An identification information embedding apparatus for embedding identification information into an object, comprises a first generator which generates, based on the identification information, an identification information polynomial corresponding to the identification information, an acquisition unit configured to acquire a plurality of remainder polynomials by dividing the identification information polynomial by each of a plurality of relatively prime polynomials, the relatively prime polynomials being pairwise relatively prime, an order of each of the relatively prime polynomials being limited, a second generator which generates, based on the remainder polynomials, a plurality of integers corresponding to the remainder polynomials, respectively, a third generator which generates a plurality of component codes corresponding to the integers, respectively, a fourth generator which generates a collusion-secure code by arranging the component codes in series, and an embedding unit configured to embed the collusion-secure code into the object.
Abstract:
The present invention relates watermarking compressed objects. A watermark is determined for a compressed video object. The watermark is compressed as an object and the watermarked object is then associated with the compressed video object. The two separate objects are provided to a rendering device, which after decompressing both objects, embeds the watermark in the video prior to rendering.
Abstract:
A watermark system includes an embedder, detector, and reader. The watermark embedder encodes a watermark signal in a host signal to create a combined signal. The detector looks for the watermark signal in a potentially corrupted version of the combined signal, and computes its orientation. Finally, a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal. While adapted for images, video and audio, the watermark system applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.
Abstract:
A method for secure distribution of digital content, the method including the steps of dividing a unit of digital content into at least first and second portions, storing the first portion on a first computerized apparatus, digitally watermarking the second portion, and combining the first portion and the digitally watermarked second portion, thereby forming a watermarked version of the digital content.
Abstract:
After a digital content is loaded into an information terminal such as a PC, ID information unique to a viewer or a user of the PC is imprinted into the content. The ID information is imprinted into a predetermined location of the content or alternatively, it may be imprinted over the entire content in the form of a spatial frequency. The content with an ID added thereto is then enabled to be used in the terminal.
Abstract:
A method of authenticating digital data such as measurements made for medical, environmental purposes, or forensic purpose, and destined for archival storage or transmission through communications channels in which corruption or modification in part is possible. Authenticated digital data contain data-metric quantities that can be constructed from the digital data by authorized persons having a digital key. To verify retrieved or received digital data, the data-metrics constructed from the retrieved or received data are compared with similar data-metrics calculated for the retrieved or received digital data. The comparison determines the location and measures the amount of modification or corruption in the retrieved or received digital data.