摘要:
The present invention leverages randomly generated areas with random attributes from two-dimensional media forms to embed information relating to a media's ownership and/or distribution source. This provides a means to establish a media's source despite attacks. By providing embedded user-unique identification, media can enable detection for identifying the source of copied media without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, media is transformed into a two-dimensional media form with randomly generated areas having a subset of overlapping areas. User-unique keys are then utilized to determine attributes for each of the areas. This permits creation of statistically unique locations for each user key. The statistical qualities are biased and utilized to determine a logarithmic magnitude watermark value to embed in the media at that location. Detection is performed by utilizing a statistical correlation method to determine a user.
摘要:
An implementation is described herein facilitates certification of goods and/or identifications of the source of such goods. At least one implementation, described herein, embeds a watermark into a relatively small amount of data in a deterministic manner. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
摘要:
The present invention leverages randomly generated areas with random attributes from two-dimensional media forms to embed information relating to a media's ownership and/or distribution source. This provides a means to establish a media's source despite attacks. By providing embedded user-unique identification, media can enable detection for identifying the source of copied media without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, media is transformed into a two-dimensional media form with randomly generated areas having a subset of overlapping areas. User-unique keys are then utilized to determine attributes for each of the areas. This permits creation of statistically unique locations for each user key. The statistical qualities are biased and utilized to determine a logarithmic magnitude watermark value to embed in the media at that location. Detection is performed by utilizing a statistical correlation method to determine a user.
摘要:
Exemplary methods for estimating an orientation angle and a translation values for scanned images are disclosed. The methods described herein may be embodied as logic instructions on a computer-readable medium. In one exemplary implementation meaningful image information is removed from a scanned image, resulting in a transformed image that comprises alternating, parallel lines disposed at an orientation angle relative to an orthogonal axis. The orientation angle may be determined using geometric techniques or statistical correlation techniques, and statistical correlation techniques may be implemented to determine translation values.
摘要:
An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
摘要:
The present invention leverages a series of media watermark locations to provide information relating to media ownership and/or distribution source. This provides a forensic means to establish a source of media with a high degree of certainty despite malicious and/or non-malicious attacks. By providing embedded user unique identification, a source of copied media can be determined without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, digital media is transformed into an N-dimensional media signal. User unique keys are then utilized along with a master key to determine locations for embedding a watermark signal that possesses substantially similar quantized statistics as the transformed media signal. The watermark signal is then embedded into the media signal, fingerprinting the media.
摘要:
A desynchronized fingerprinting method and system for identifying collaborators in the making of illegal copies of digital multimedia products. The desynchronized fingerprinting system and method can be used for both audio and video applications. The method and system include an embedding feature and a detection and extraction feature. A different and unique key is assigned to each buyer of a copy of the digital data. The embedding feature includes applying a pseudo-random transformation to selected embedding regions. The key for the pseudo-random transform is user-specific. These regions are chosen by using a secure multimedia hash function. The detection and extraction feature includes a brute-force search in the key space of the buyers. If one of the keys is likely enough, then it can be said that that user was been involved in the production of an illegal copy.
摘要:
Video fingerprinting using watermarks is described herein. A watermark encoder embeds a watermark into an input video to produce a watermarked video. The watermark encoder can choose particular regions of the video that are sufficiently complex for watermarking. Spatial and temporal complexity analyses can be performed on a per-pixel basis to locate suitable regions of the video. The watermarks can be embedded using a unique codeword associated with a given user. A watermark decoder can receive the watermarked video. In some instances, the watermarked video may have been attacked in some way after being output by the watermark encoder. In these instances, the watermark decoder can extract the watermark from the watermarked video. In turn, the watermark decoder can extract the codeword from the watermark, and compare the extracted codeword to a plurality of known codewords associated with respective users.
摘要:
Video fingerprinting using watermarks is described herein. A watermark encoder embeds a watermark into an input video to produce a watermarked video. The watermark encoder can choose particular regions of the video that are sufficiently complex for watermarking. Spatial and temporal complexity analyses can be performed on a per-pixel basis to locate suitable regions of the video. The watermarks can be embedded using a unique codeword associated with a given user. A watermark decoder can receive the watermarked video. In some instances, the watermarked video may have been attacked in some way after being output by the watermark encoder. In these instances, the watermark decoder can extract the watermark from the watermarked video. In turn, the watermark decoder can extract the codeword from the watermark, and compare the extracted codeword to a plurality of known codewords associated with respective users.
摘要:
Digital fingerprinting using synchronization marks and watermarks. At a watermark embedder, an input host signal is divided into regions, and a subset of the regions is selected to receive synchronization marks. Respective synchronization marks are then embedded into the selected regions. At a receiver, an input signal is divided into regions, and a subset of the regions is synchronized with additional regions, which were defined by the embedder when producing the signal that is input to the receiver. Also, the receiver can model any geometric distortion undergone by the input signal between the embedder and the receiver.