Abstract:
Signal processing devices and methods estimate a geometric transform of an image. One method measures correlation between a transformed reference signal component and an image, updates, based on the measured correlation that is below a threshold, coordinates of the reference signal component to a location within a neighborhood around the coordinates of the transformed reference signal component; determines a new geometric transform that transforms the reference signal components to updated coordinates; and applies the new geometric transform to extract encoded digital data from the image.
Abstract:
Signal processing devices and methods estimate a geometric transform of an image signal. From a seed set of transform candidates, a direct least squares method applies a seed transform candidate to a reference signal and then measures correlation between the transformed reference signal and an image signal in which the reference signal is encoded. Geometric transform candidates encompass differential scale and shear, which are useful in approximating a perspective transform. For each candidate, update coordinates of reference signal features are identified in the image signal and provided as input to a least squares method to compute an update to the transform candidate. The method iterates so long as the update of the transform provides a better correlation. At the end of the process, the method identifies a geometric transform or set of top transforms based on a further analysis of correlation, as well as other results. Phase characteristics are exploited in the process of updating coordinates and measuring correlation. The geometric transform is used as an approximation of the geometric distortion of an image after digital data is encoded in it, and is used to compensate for this distortion to facilitate extracting embedded digital messages from the image. Due to the errors in the approximation, a signal confidence metric is determined and used to weight message symbol estimates extracted from the image.
Abstract:
A method of detecting tampering in a compressed digital image includes extracting one or more neighboring joint density features from a digital image under scrutiny and extracting one or more neighboring joint density features from an original digital image. The digital image under scrutiny and the original digital image are decompressed into a spatial domain. Tampering in the digital image under scrutiny is detected based on at least one difference in a neighboring joint density feature of the digital image under scrutiny and a neighboring joint density feature of the original image. In some embodiments, detecting tampering in the digital image under scrutiny includes detecting down-recompression of at least a portion of the digital image. In some embodiments, detecting tampering in the digital image includes detecting inpainting forgery in the same quantization.
Abstract:
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
Abstract:
A computer-implemented process can be operated to create a watermarked copy of a unique original copy of an electronic sales receipt in a first computerized device to a second computerized device. The watermarked copy includes an electronic watermark identifying the copy. The process includes creating the watermarked copy of the electronic sales receipt by copying information from the original copy of the electronic sales receipt to the watermarked copy and providing the electronic watermark within the watermarked copy.
Abstract:
Systems and methods for synchronizing a broadcast video with contextual data are disclosed, wherein the broadcast video is enhanced by graphical overlays. Synchronization is achieved by means of digital watermarking of the broadcast video in conjunction with the graphical-overlays. Exemplary embodiments embed a watermark bitstream into the broadcast video based on an overlay-template, characteristic of a corresponding overlay-graphic. The watermarked video is then transmitted over a communication link to a receiving-end including a detector. According to some embodiment, the embedder inserts the watermark bitstream into the overlay-graphics' regions of the video and the detector extracts the watermark bitstream based on information in the overlay-template and based on a restored version of the original overlay-graphics.
Abstract:
A method of embedding a watermark in video data includes generating a watermark to be embedded in the video data, generating a bit string based on a generated watermark, and embedding a watermark in the video data by changing a quantization parameter of the video data by a predetermined value based on the bit string.
Abstract:
A system and apparatus for evaluating the reliability of a watermarking technique for a video sequence, said system and apparatus comprising: a) a calibrating means adapted to calibrate said system and apparatus using a test original video sequence and a test attacked video sequence in compliance with predetermined degrees of quality; b) an attacking means adapted to attack embedded watermark in said video sequence, said attack selected from a group of attacks; and c) an evaluating means including a comparator means for comparing the test original video sequence with test attacked video sequence and the watermark in the test original video sequence with the watermark in the test attacked video sequence to evaluate the reliability of a watermarking technique to give a reliability score.
Abstract:
A method and apparatus are provided for determining a descriptor for a region of interest in an image. The method includes: defining a grid of points for the region of interest; associating a respective zone of influence with each point of the grid of points; determining a representative value for each point of the grid of points as a function of its respective zone of influence; and comparing the representative value obtained for each point of the grid of points with at least one reference value. The result of the comparison serves to define a descriptor for the region of interest.
Abstract:
A method includes receiving, at a first device, data representing a graphic. The graphic includes non-uniformly toned regions with information steganographically encoded therein. The steganographically encoded information is decoded from the received data. The method also includes communicating with a second device and receiving data from the second device. An aspect of operation of the first device is controlled in accordance with the data received from the second device. The data received from the second device is a function of the decoded information.