Abstract:
In one embodiment, a system including a processor is operative to receive a content item including a watermark encoding a series of data values of an output stream of a linear feedback shift register initialized with a seed including an information element and an assurance value, the shift register having a plurality of states each including a first and second value, identify at least part of the watermark in the content item, extract at least some of the data values from the at least part of the identified watermark, process at least some of the extracted data values yielding the initial state of shift register, and authenticate the first value of the initial state using the second value of the initial state in order to confirm that the first value is indeed the information element included in the seed processed by the shift register.
Abstract:
Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
Abstract:
A digital watermark embedding apparatus is disclosed. A first codeword including a bit sequence of digital watermark information is generated. A cyclic shift sequence is generated based on the digital watermark information. A second codeword is generated by cyclically shifting the first codeword based on the generated cyclic shift sequence. The generated second codeword is embedded in contents.
Abstract:
A method and system of detecting colluders conducting a collusion attack including a minority-type collusion attack on a digital product includes the generation of codewords used as watermarks in the digital product. The inner code of the codewords is generated using permutations of rows in a Hadamard matrix and concatenating them together. A typical outer code of the codeword is the Reed Solomon code. An adaptive detector is able to accurately detect one of three or more colluders of a minority-type attack. Prior art schemes using an error correcting code-based watermarking mechanism with an inner code fail to detect colluders with a minority-type collusion attack which includes three colluders.
Abstract:
A method and apparatus are described including generating a unique code for each of a plurality of users using a plurality of symbols, generating a plurality of codes representing the plurality of symbols, substituting the plurality of codes into the unique code for each of the plurality of users, permuting the code resulting from the substitution to produce a codeword for each of the plurality of users and embedding the codeword into digital content. The second generating act further includes generating a string of first symbols followed by second symbols, wherein the first symbols are all ones and the second symbols are all negative ones, wherein a number of first symbols is equal to a number of the second symbols, and wherein if a length of the first symbols followed by the second symbols is less than a length of the code, then the first symbols followed by the second symbols are repeated until the code length is filled.
Abstract:
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.
Abstract:
Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.
Abstract:
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.
Abstract:
A digital watermark embedding apparatus is disclosed. A first codeword including a bit sequence of digital watermark information is generated. A cyclic shift sequence is generated based on the digital watermark information. A second codeword is generated by cyclically shifting the first codeword based on the generated cyclic shift sequence. The generated second codeword is embedded in contents.
Abstract:
A method and system including capturing a video stream including embedded data, segmenting the video stream into a plurality of video frames included therein, locating a color mass, denoted C′, for each color element of every individual video frame of the plurality of video frames by summing color value coordinates for a given color element included in the individual video frame, locating a color mass, denoted C, for each color element of a corresponding individual video frame, the corresponding individual video frame corresponding a video frame which does not include embedded data, subtracting C from C′, and deriving, from a result of the subtraction, a value of a first coordinate and a second coordinate, the first coordinate and the second coordinate including coordinates of a vector, the vector corresponding to a string of bits including information embedded in the individual video frame. Related apparatus, methods and systems are also described.