摘要:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
摘要:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
摘要:
A method is provided for authenticating a media signal and related software, systems and applications. A digital watermark is embedded in the media signal. A metric is calculated for the digital watermark as embedded in the media signal. The resulting metric is then embedded in the media signal with the digital watermark. To detect a potential alteration, a detector computes the metric for a potentially corrupted version of the embedded media signal. The detector then compares its computed metric to the embedded metric to detect whether the alteration has occurred.
摘要:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
摘要:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. Biometric information may also be embedded in a machine readable code in the object or indexed via the machine readable code. This biometric information is used to generate biometric templates, and facilitate or enhance biometric comparison for one to one or one to many verification.
摘要:
The present invention relates generally to embedding auxiliary data and data hiding. One claim recites a method including: calculating with a processor or electronic circuitry characteristics of a media signal comprising audio or video; based at least in part on calculated characteristics of the media signal, providing a map of the media signal, wherein the map identifies at least one portion of the media signal in which plural-bit data should be steganographically encoded; transforming at least some portions of the media signal into a transform domain; and steganographically encoding with a processor or electronic circuitry auxiliary data in data representing at least the one portion of the media signal in which the plural-bit data should be steganographically encoded, and wherein at least said act of transforming or said act of steganographically encoding utilizes the map of the media signal. Other claims and combinations are also provided.
摘要:
A method for tracking media signals in multimedia content is provided by uniquely identifying the multimedia content with a digital watermark identifier. A video channel is preferably embedded with a first watermark identifier. The first identifier uniquely identifies the multimedia content or the content family. A second digital watermark is embedded in an audio channel of the multimedia content. The second digital watermark uniquely identifies a user or user device. When the multimedia content is found in an unauthorized or unexpected channel, the content can be traced back to its misappropriating source via the user identifier.
摘要:
A perceptual model performs an analysis of a media signal, such as an image or audio signal. The model may be used in media signal processing applications such as digital watermarking and data compression to reduce perceptibility of changes made to code the signal. For image applications, the model computes the sensitivity of an image to changes based upon local image contrast, while taking into account the sensitivity of connected directional edges. By comparing the local image strength of various directionally filtered versions of the image, the model creates a directional control vector. This control vector may be used to reduce changes to an image in text and edge regions, and thus, avoid perceptible artifacts in those regions. The model takes into account the local contrast of the image and the directional control vector to create a gain vector. Using the local contrast measurements, the model follows the eye's nonlinear response to contrast discrimination.
摘要:
The present invention relates generally to embedding auxiliary data and data hiding. One claim recites a method including: calculating with a processor or electronic circuitry characteristics of a media signal comprising audio or video; based at least in part on calculated characteristics of the media signal, providing a map of the media signal, wherein the map identifies at least one portion of the media signal in which plural-bit data should be steganographically encoded; transforming at least some portions of the media signal into a transform domain; and steganographically encoding with a processor or electronic circuitry auxiliary data in data representing at least the one portion of the media signal in which the plural-bit data should be steganographically encoded, and wherein at least said act of transforming or said act of steganographically encoding utilizes the map of the media signal. Other claims and combinations are also provided.
摘要:
The pages of a children's book are marked in a machine-readable manner (e.g., by imperceptible digital watermark technology). When such a page is shown to a camera-equipped computer device, the watermark is decoded, and the story text from that page is read aloud to a child. A number of variants are contemplated, including using book pages as entry points to corresponding videos; using books to link to corresponding interactive web sites or multi-player games; incorporating the camera in a plush toy; evoking different responses from the system by using the book to convey gestures to the camera; providing such functionality in cell phones, set top boxes, and Bluetooth-equipped devices; customizing read-aloud stories using words provided by the child or a parent; etc.