Abstract:
Detection of a watermark in blocks of video or image data which has been subjected to affine geometric distortion is accomplished by approximating the distortion by a spatially varying translation of the blocks. The watermark is extracted by spatial translations of the blocks based on an assumed affine geometric distortion. The extracted watermarks are correlated with possible watermarks and the maximum correlator output is tested for statistical significance in order to determine whether a watermark is present in the image or video frame. The data may be compressed or uncompressed data. If the affine geometric distortion is known, a search for the maximum correlator output over a space of possible distortions can be performed.
Abstract:
A watermark is embedded into video/image/multimedia data using spread spectrum methodology. The watermark is extracted from watermarked data without the use of an original or unwatermarked version of the data by using MPEG/JPEG coefficients. The image to be watermarked is divided into subimages. Each subimage is embedded with a watermark. When extracting the watermark, the result from each subimage is combined to determine the originally embedded watermark.
Abstract:
A digital watermark is inserted into multimedia data containing two image fields by placing a positive watermark into a first field and a negative watermark into a second field. The positive watermark and negative watermark are opposite of one another. The two fields can be interlaced fields of a field-based video signal or alternate rows of a frame-based video signal. The watermark is extracted from field-based watermarked data by separating the watermarked data into two fields and subtracting one of the fields from the other field to generate a watermarked signal. The resultant watermarked signal is processed in a conventional manner to extract and detect the watermark.
Abstract:
A queryless, multimedia database search method incorporating a Bayesian inference engine that refines its answer with each user response. The set of user responses includes of a series of displays and user actions, and is defined by a relatively simple user interface.
Abstract:
A media work may be associated with an action by (a) extracting features from the media work, (b) determining an identification of the media work, based on the features extracted, using a sub-linear time search, such as an approximate nearest neighbor search for example, and (c) determining an action based on the identification of the media work determined. The media work may be an audio work. The features extracted from the work may include (A) a frequency decomposition of a signal of the audio work, (B) information samples of the audio work, (C) average intensities of sampled windows of the audio work, and/or (D) information from frequencies of the audio work.
Abstract:
Data is protected from unauthorized copying by rescrambling an unauthorized version of the data, but descrambling an authorized version of the data. This is done using a trigger signal. One property of the trigger signal is that it is preserved through signal transformations, such as one or more of compression, decompression, analog to digital conversion, and digital to analog conversion. As a result of this property the trigger signal can be detected in either scrambled or descrambled data. The trigger signal is embedded into the data to form watermarked data. The watermarked data is passed through a descrambler, where the trigger signal, if present, is extracted. A descrambling key and a descrambling algorithm are applied to the watermarked data if the trigger signal is present, but not applied to the watermarked data if the trigger signal is not present.
Abstract:
A method for utilizing a title signal contained in digital data through a comparison of the title signal to a player signal stored in a player device. The method includes the steps of: downloading the digital data having the title signal via an Internet connection; possibly transferring the downloaded digital data to the player device; detecting, at the player device, the title signal in the data: comparing the title signal to the player signal stored at the player device; and performing an action based upon the comparison. In a preferred implementation of the present invention, the player device is a personal computer and the digital data is either image, video, audio or multimedia data or is an application program for running on the personal computer. Preferably, the player device is a personal computer. In other embodiments the title signal is contained in or part of an application program or is contained in data to be input into the application program.
Abstract:
A method for detecting a watermark signal in digital image data. The detecting method includes the steps of: computing a log-polar Fourier transform of the image data to obtain a log-polar Fourier spectrum; projecting the log-polar Fourier spectrum down to a lower dimensional space to obtain an extracted signal; comparing the extracted signal to a target watermark signal; and declaring the presence or absence of the target watermark signal in the image data based on the comparison. Also provided is a method for inserting a watermark signal in digital image data to obtain a watermarked image. The inserting method includes the steps of: computing a log-polar Fourier transform of the image data to obtain a log-polar Fourier spectrum; projecting the log-polar Fourier spectrum down to a lower dimensional space to obtain an extracted signal; modifying the extracted signal such that it is similar to a target watermark; performing a one-to-many mapping of the modified signal back to log-polar Fourier transform space to obtain a set of watermarked coefficients; and performing an inverse log-polar Fourier transform on the set of watermarked coefficients to obtain a watermarked image.
Abstract:
A watermarking procedure that is applicable to images, audio, video and multimedia data to be watermarked divides the data to be watermarked into a set of n×n blocks, such as the 8×8 blocks of MPEG. The same watermark signal can be distributed throughout the set of blocks in a large variety of ways. This allows the insertion algorithm to be changed without affecting the decoders. The decoding procedure first sums together the DCT coefficients of N sets of 8×8 blocks to form a set of N summed 8×8 blocks and then extracts the watermark from the summed block. Since the sum of the DCT blocks is equal to the DCT of the sum of the intensity blocks, efficient decoding can occur in both the spatial and frequency domains. The symmetric nature of the decoding process allows geometric distortions to be handled in the spatial domain and other signal distortions to be handled in the frequency domain. Moreover, insertion of a watermark signal into image data and the subsequent extraction of the watermark from watermarked image data which has been subject to distortion between the times of insertion and extraction involves the insertion of multiple watermarks designed to survive predefined distortions of the image data, such as panscan or letterbox mode transformations. Alternatively, a registration pattern in the image data, after the image data containing the registration pattern is subject to an unknown distortion, is used to compensate for distortion of the watermarked image data.
Abstract:
Digital watermarking of audio, image, video or multimedia data is achieved by inserting the watermark into the perceptually significant components of a decomposition of the data in a manner so as to be visually imperceptible. In a preferred method, a frequency spectral image of the data, preferably a Fourier transform of the data, is obtained. A watermark is inserted into perceptually significant components of the frequency spectral image. The resultant watermarked spectral image is subjected to an inverse transform to produce watermarked data. The watermark is extracted from watermarked data by first comparing the watermarked data with the original data to obtain an extracted watermark. Then, the original watermark, original data and the extracted watermark are compared to generate a watermark which is analyzed for authenticity of the watermark.