Abstract:
The present invention relates generally to digital watermarking and steganographic data hiding. In one embodiment a method of rendering content to a user is provided. The rendered content includes a digital watermark embedded therein. In another embodiment, digital watermarking is utilized to facilitate purchase or lease of audio or video content over a network or with a remote computer. In still another embodiment, a compression characteristic is determined, and subsequent steganographic embedding is influenced based on the characteristic. Other embodiments are provided as well.
Abstract:
An encoding data processing apparatus is arranged to generate a marked copy of an item of material by introducing at least one code word into a copy of the material item, the code word being arranged to identify a payload data word. The encoding apparatus comprises an encryption circuit operable to receive a payload encryption key and to receive the payload data word, and to encrypt the payload data word using the payload encryption key. A pseudo random number generator receives the encrypted payload data and a finger print key and generates the code word having a plurality of code word coefficients using the encrypted payload as a seed for the pseudo random number generator and the finger print key. A combiner combines the code word with the material to form the marked copy of the material item. The encoding apparatus may form part of a media terminal for marking material items with the code words, when the material items are to be reproduced. A more secure system for reproducing watermarked material can be formed using the encoding apparatus in which the payload data is encrypted and used as a seed for the pseudo random number generator with the finger print key to generate the code word coefficients. The code word is thereby generated from a finger print key and an encrypted seed, which provides an improved level of security against an attack aimed at compromising correction detection of a code word in a mark material item.
Abstract:
An apparatus 10 for generating watermark signals to be embedded as a digital watermark in real-time contents includes: input means 12 for inputting the real-time contents; an input buffer 14 for storing the real-time contents; generation means for generating watermark signals corresponding to predicted intensities of the real-time contents from divided real-time contents; and an output buffer 18 for storing the generated watermark signals to be outputted. The generation means is configured by including prediction means 16 for predicting intensities of the watermark signals; control means 20 for controlling embedding by use of a message to be embedded as the digital watermark in the divided real-time contents; and means 22 for generating the watermark signals to be outputted.
Abstract:
The present invention relates generally to steganography and digital watermarking. One method recites: encoding content with a plural-bit digital watermark in accordance with initial encoding parameters; determining an assessment of the encoded plural-bit digital watermark in each of two or more portions of the content; for each of the two or more portions of the content, adjusting at least one of the initial encoding parameters according to a determined assessment for a respective portion of the content; and encoding the content with said plural-bit watermark in accordance with adjusted encoding parameters. Other methods are provided and claimed as well.
Abstract:
A method for embedding a watermark into digital data, when the watermark is to be embedded in a digital image, independently changes real number components and imaginary number components of each of coefficient values of a complex watermark coefficient matrix using key, from the watermark to be embedded in the digital image, a step for performing a discrete Fourier inverse transform on the sequence matrix of the changed watermark and generating a watermark pattern; and a step for adding like tiling the water mark pattern to the original image, and generating an embedded image.Further more, a watermark detection method for detecting a watermark from a digital data, a step for separating a block from an arbitrary position on the detected object image, a step for performing a discrete Fourier transform on the block and obtaining a sequence matrix, a step for generating position information for a component that is to be detected and that is specified by the key, a step for detecting a position marker sequence by calculating a phase difference of a sequence by an amount of parallel displacement, for each item of the position information, and extracting offset information which is the amount of parallel displacement when there is agreement between a start point of an embedded watermark and a start point of the block cut from the detected object image, and a step for detecting the embedded watermark cut from the detected object image.
Abstract:
An encoding data processing apparatus is arranged to generate a marked copy of an image by introducing a code word into a copy of the image. The apparatus comprises a code word generator operable to generate the code word. The encoding apparatus includes an image perception analyser and a strength adapter. The image perception analyser is operable to receive the image and to generate weighting factors. A combiner is operable to combine the weighted code word with the image. The image perception analyser includes a contrast masking engine, a smoothness compensation engine and a compensation combiner. The weighting factor has an effect of reducing the code word coefficients for image parts having lower relative contrast measures. A compensation combiner is operable to combine the compensation factors with the weighting factor. The likelihood of a code word being perceivable when the code word is combined with an image is reduced.
Abstract:
Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie.
Abstract:
Exemplary systems and methods implement an exemplary visual perception model. This model can be implemented in such applications as imaging, compression, denoising, annotation of hi-fidelity images, etc. In one implementation a perceptual filter estimates an entropy statistic and a standard deviation statistic associated with each pixel of an image, then mixes the entropy statistic and the standard deviation statistic to map an estimation of human perceptual tolerance to noise or alteration in parts of the image. In one application, metadata may be added to an image via a system of synergistic watermarks, in which the watermarks strengthen each other and are placed according to the noise tolerance of the pixels in order to maintain hi-fidelity of the image.
Abstract:
The present invention aims to be able to provide an efficient public key digital watermark method which is specialized to information common to contents. In the method, arrangement order of digital data in input digital contents is set to become predetermined arrangement order so that the input digital contents constitute an error correction code.
Abstract:
Methods for reversible data hiding are disclosed herein. These methods may be applied to images for reversible image data hiding. In one embodiment, a method for reversible data hiding comprises identifying carrier data having a plurality of components and establishing prediction-errors for each of the components of the carrier data. A first threshold and a second threshold are established. The prediction-errors of the components are evaluated against the first threshold to identify components for possible hiding. The components identified for possible hiding are evaluated against the second threshold to identify components for hiding. To-be embedded data is embedded into the carrier data identified for hiding to create marked data. The marked data is evaluated for overflow or underflow. If overflow or underflow is detected, histogram modification is performed. Marked data is then established.