US20030070075A1 - Secure hybrid robust watermarking resistant against tampering and copy-attack - Google Patents
Secure hybrid robust watermarking resistant against tampering and copy-attack Download PDFInfo
- Publication number
- US20030070075A1 US20030070075A1 US10/194,278 US19427802A US2003070075A1 US 20030070075 A1 US20030070075 A1 US 20030070075A1 US 19427802 A US19427802 A US 19427802A US 2003070075 A1 US2003070075 A1 US 2003070075A1
- Authority
- US
- United States
- Prior art keywords
- watermark
- frag
- data
- authentication
- robust
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0042—Fragile watermarking, e.g. so as to detect tampering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0064—Geometric transfor invariant watermarking, e.g. affine transform invariant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32352—Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0601—Image watermarking whereby calibration information is embedded in the watermark, e.g. a grid, a scale, a list of transformations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3284—Processing of the additional information for error correction
Definitions
- interference cancellation which can be performed either at the encoder side by embedding the watermark using quantization as Quantization Index Modulation (QIM) [4] or using product codebooks of dithered uniform scalar quantizers in the Scalar Costa Scheme (CSC) [5], or at the decoder side based on the robust prediction of the embedded watermark as in our previous approach [1,6].
- QIM Quantization Index Modulation
- CSC Scalar Costa Scheme
- geometrical synchronization aiming at compensating geometrical distortions which desynchronize the embedded signal and make it unreadable.
- Solutions against geometrical transform can use either a transform invariant domain watermark like the Fourier-Mellin transform [7], or an additional template for resynchronization [8], or a self-reference watermark based on the Autocorrelation Function (ACF) of a repetitive watermark [9].
- Self-reference watermarks have been shown to have as main advantage over other methods the fact that they exploit the redundancy of the regular structure of the watermark in order to robustly estimate the undergone geometrical distortions.
- the watermark can be either fragile, meaning that any modification, even a limited change of a small set of pixels, is detected, or semi-fragile, offering a level of tolerance to some “acceptable” alterations such as low-level lossy compression or slight contrast adjustment.
- the image is generally first divided into small blocks for locality, and a key-dependent hash function is applied to each of them, and the obtained hash-codes are embedded into their corresponding blocks, usually in the least significant bits (LSB) of pixels. Tampering is then detected where the recomputed codes do not match the stored codes.
- LSB least significant bits
- Wong [13] proposed such a blockwise approach. At the opposite, semi-fragile watermarks are more tolerant, and can even be used to measure the severity of the alteration; a robust watermarking scheme has sometimes been proposed for this, however this approach is insecure since robust watermarks are usually additive, making them vulnerable to the so-called copy attack: the signal can be easily estimated using denoising techniques and copied to another image [14].
- the present invention describes a method for hybrid robust watermarking which: first, joins a highly robust watermark (which we will call w) with a fragile authentication watermark (called w frag ) for combined copyright protection, authentication and tamperproofing; secondly, which embeds the authentication watermark w frag in a way which preserves the resistance and the reliability of the robust watermark w.
- the robust watermark w mainly consists in two parts which are: an informative watermark carrying the embedded message itself (called w inf ), and a key-dependent only reference watermark used as a pilot signal for synchronization as well as for channel state estimation purpose (called w ref ) at the decoder side.
- the authentication watermark w frag could be embedded orthogonally with respect to the informative watermark w inf , using the positions of the reference watermark w ref only.
- the density of the robust watermark w is less than 1, positions still remain which contain no robust watermark information at all, called w empty , and which could be used for the embedding of w frag too.
- FIG. 1 An embodiment for the proposed hybrid embedding algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram, each block being identified by a unique number in parenthesis:
- a Perceptual Model M is computed from the input cover image x (block 1 ) in order to achieve low visual impact; the message b to be embedded is encoded and encrypted ( 2 ) using a user secret key k, resulting into a codeword c; the codeword c is then spatially allocated (i.e. into k key-dependent positions) and embedded into x by the Robust Watermark (WM) Embedder ( 3 ) as a robust watermark w, using the perceptual mask M, to form the robustly marked image y.
- Blocks 2 and 3 use the secret key k.
- Fragile part spatial k key-dependent positions and bits are retained for the embedding of the fragile watermark w frag ; these positions can fit those used by w for the reference watermark (w ref ) as well as positions not containing any robust watermark information (w empty ), in order to achieve the orthogonality with respect to the informative watermark (w inf ); the bits retained can be the least significant bits (LSB) of the selected pixels; the Blockwise Bits Selector block ( 4 ) then clears these selected bits (i.e.
- Blockwise Keyed Hashing ( 5 ) generates hash codes from y*, resulting into a set of signatures s which are embedded by the Blockwise Fragile WM Embedder ( 6 ) into y, using the perceptual mask M, to get the final stego image z.
- Blocks 4 , 5 and 6 use the secret key k; blocks 4 and 6 also use the w ref and w empty positions transmitted from the robust part as shown by the dashed arrows.
- FIG. 3 An embodiment for the proposed hybrid extraction and verification algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram:
- Robust part the possibly attacked stego image z′ is processed by the Robust WM Extractor (block 9 ) which estimates the robust watermark ⁇ and extracts an estimated codeword ⁇ ; ⁇ is decrypted and decoded ( 10 ) using the secret key k, to get the estimated message ⁇ circumflex over (b) ⁇ .
- Fragile part the Blockwise Fragile WM Extractor ( 11 ) estimates the embedded fragile watermark ⁇ frag and get the embedded signatures ⁇ ; the Blockwise Bits Selector ( 4 ) clears from z′ all bits reserved for w frag to get z′* on which the Blockwise Keyed Hashing ( 5 ) is performed, resulting into the recomputed set of signatures ⁇ tilde over (s) ⁇ ; then ⁇ and ⁇ tilde over (s) ⁇ are blockwise compared ( 12 ) (schematically denoted as “-”) to get a tampered-blocks map ⁇ circumflex over (T) ⁇ of changed blocks, with values 1 where tampering occurred—i.e.
- a T (0 ⁇ A T ⁇ 1) can then be computed which counts the ratio of authentic blocks over all blocks (i.e. the ratio of 0's in ⁇ circumflex over (T) ⁇ ).
- Hybrid diagnostic finally, by combining the robust message ⁇ circumflex over (b) ⁇ and a decoding diagnostic (i.e. is ⁇ circumflex over (b) ⁇ correctly decoded or not, based for example on some integrity check-code applied to the message and including into the binary string b), the tampered-blocks map ⁇ circumflex over (T) ⁇ , and the global authenticity value A T , a Final Decision ( 13 ) is taken about the authenticity or the possible tampering of z′, resulting into the tampering/authenticity diagnostic message d T .
- a decoding diagnostic i.e. is ⁇ circumflex over (b) ⁇ correctly decoded or not, based for example on some integrity check-code applied to the message and including into the binary string b
- the tampered-blocks map ⁇ circumflex over (T) ⁇ the global authenticity value A T
- a Final Decision ( 13 ) is taken about the authenticity or the possible tampering of z′,
- FIG. 5 Pseudo-code describing the fragile part embedding for all blocks: the robustly marked image y is divided into blocks y i,j , and the blocks processed for each index i,j (lines 1 , 2 ); from the current block y i,j and its neighbors y ⁇ (i,j) the bits which are to be used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into y* i,j and y* ⁇ (i,j) (line 3 ); then y* i,j and y* ⁇ (i,j) are hashed by the KeyedHash function, together with additional information if needed (denoted by the “ . .
- FIG. 6 Pseudo-code describing the fragile part verification for all blocks: the possibly attacked image z′ is divided into blocks z′ i,j , and the blocks processed for each index i,j (lines 1 , 2 ); from the current block z′ i,j and its neighbors z′ ⁇ (i,j) the bits used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into z′* i,j and z′* ⁇ (i,j) (line 3 ); then z′* i,j and z′* ⁇ (i,j) are hashed by the KeyedHash function, together with the same additional information as for the embedding stage if needed (denoted by “ .
- FIG. 1 shows the hybrid embedding process at the image level. This is a symmetrical tamperproofing/authentication scheme, that means that both the signature embedding and verification require the same user key k, which should be kept secret.
- the robust watermark w further consists in the following two non-overlapping, i.e. orthogonal, components: the informative watermark w inf holding the copyright message b, encoded and encrypted to a codeword c with the secret key k (FIG. 1, block 2 ); and the reference watermark w ref only depending on k, used as a pilot e.g. for translation/cropping determination and for other side information which can be used for the decoding step.
- the allocated positions within each block also depend on k.
- w is embedded with a density less than 1, free positions still remain that contain no robust information and which we call w empty . Then w is embedded by the robust watermarking algorithm to the cover image x (FIG. 1, block 3 ), taking into account the perceptual model M (FIG. 1, block 2 ) computed from x to ensure low visual distortions.
- the fragile component has to be applied after the robust one, in order to hash the robust watermark with the image.
- the fragile watermark called w frag , is then based on a key-dependant blockwise cryptographically secure hash function (FIG. 1, block 5 ), of which input key is derived from k.
- the resulting code is then embedded as a local signatures s (note that from the cryptographic point of view, we should talk about message digest code (MDC), however in this document we will use the term of secret key signature) is then embedded in a fragile way within each block (FIG.
- MDC message digest code
- a set of positions is pseudo-randomly selected in y based on k, and the bits of the signature embedded at these positions into the bits reserved for w frag in y (e.g. the LSB).
- the hash function takes as input y*, a version of y where all bits (e.g. LSB) selected for the embedding of w frag have been cleared (i.e. set to 0) by the “Bits Selector” block (FIG. 1, block 4 ).
- the “Keyed Hashing” block could be any keyed hash algorithm, or an unkeyed one encrypted afterwards.
- the hash function requirements could be summarized as:
- I and I′ are any input (not necessary visual data), and H k is a hash function depending on a random key k. Moreover, when I ⁇ I′ even for a single bit, H k (I) and H k (I′) are completely uncorrelated. Finally we obtain z, the stego image containing both robust and fragile watermarks.
- M,N is the image size and m,n the block size in number of pixels (width and height respectively). Note that if the image size is not an exact multiple of the block size, one can actually take the lower integer bounds of M m
- ⁇ (i,j) ((i ⁇ 1),j ⁇ 1),(i ⁇ 1,j),(i ⁇ 1,j+1),(i,j ⁇ 1),(i,j+1),(i+1,j ⁇ 1),(i+1,j),(i+1,j+1)) (the 8 neighbors)
- ⁇ (i,j) ((i ⁇ 1,j),(i,j ⁇ 1),(i,j+1),(i+1,j)) (4 neighbors)
- HBC In addition to HBC, other local or global contextual information can be included in the input of hash functions, such as current block indexes (i,j), the image size (M,N), owner-related data like in the case of robust watermarking, date and time, place, unique image identification name or number, etc.
- hashed additional information is denoted by the “ . . . ” in pseudo-code in FIG. 5 (line 4 ). Linking individual block hashing with both local and global contextual information is important from the security point of view, in order to defeat a large class of substitution attacks dedicated to fragile watermarking schemes.
- w frag fragile blocks may or may not coincide with w robust blocks; actually fragile blocks may be sub-blocks from robust blocks for better locality in the tamper detection.
- an important issue is to preserve the original robustness of the robust watermark: first, embedding the fragile part by LSB modulation of selected pixels ensures very limited modification, which is very unlikely to destroy the robust watermark which has larger amplitude; secondly, we propose to embed the fragile watermark in selected positions not belonging to the robust watermark copyright information component w inf , i.e. we embed w frag in positions of the reference watermark w ref and in positions containing no watermark at all w empty ), thus fully preserving w inf .
- FIG. 3 shows the extraction and authentication part.
- the robust extractor (FIG. 3, block 9 ) first estimates the robust watermark ⁇ from the possibly attacked and tampered stego image z′, and decodes an estimate of the copyright message ⁇ circumflex over (b) ⁇ (FIG. 3, block 10 ); the possibly applied global (affine) and local geometrical distortions (RBA) are compensated for in this part.
- the authentication part takes z′ as input; re-computes signatures (FIG. 3, block 5 ) ⁇ tilde over (s) ⁇ from z′* (a version of z′ where the LSB used for the embedding of w frag have been cleared, i.e. set to 0—FIG. 3, block 4 ); extract ⁇ frag from z′ and get the estimated embedded signatures ⁇ (FIG. 3, block 11 ); outputs a tamper map ⁇ circumflex over (T) ⁇ by comparing the signatures ⁇ tilde over (s) ⁇ and ⁇ for each block (FIG.
- FIG. 4 and pseudo-code in FIG. 6 show the extraction and verification of the fragile signature at the block level.
- One possible definition of the comparison operator is:
- this situation can occur when different robust watermarks are present, all embedded with the same key; note that our robust watermarking algorithm, which works at the local level to achieve resistance to the RBA [2,11], can successfully decode different messages ⁇ circumflex over (b) ⁇ k .
- the copied area comes from another image
- two cases can be distinguished: either the other image is not watermarked or is watermarked with a different key, and the copied object will be detected as tampered; or the other image is watermarked with the same key, and the copied area can be seen as authentic. Therefore the problem arises when the images used are all watermarked using the same key.
- This type of attack aiming at replacing parts or the entire image, are known as substitution attacks.
- the different variants above could be named copy-and-paste attack when an object is pasted into a valid image, or the already mentioned collage attack when a composite image is generated from several marked source images.
- an advanced version of the substitution attack can be mounted using vector-quantization (VQ) techniques [19], which is known as the vector quantization attack, or the Holliman-Memon attack.
- VQ vector-quantization
- This is an enhancement of the collage attack, which is able to construct an arbitrary composite image using the smallest possible areas—the blocks themselves.
- the attacker first needs to gather a set of watermarked images, all marked with the same key. These blocks are sorted in order to regroup together blocks corresponding to the same embedded logo or the same block-synchronization used for the fragile watermark embedding; this is actually the case for all blocks having the same index i,j, if the division is made in the same order for all images.
- the attacker can reconstruct a completely new image by picking up, for each block synchronization, a block from the group corresponding to the same synchronization, which is visually the closest to the image to be constructed.
- This approach is merely the same as vector quantization, where we can think of a “code book” as the collection of all blocks that would be correctly decoded.
- the gathering of a sufficient number of set of images marked with the same key is quite realistic, for example from a database; actually a small number of images (i.e. less than 10) is often sufficient to apply this attack, with very little visual artifact.
- This attack can also be named the cut-and-paste attack [20].
- Hash-Code Block Chaining HBC
- HBC2 hash-code block chaining version 2
- un-deterministic signature means that two strictly identical input hashed using the same key produce two randomly different signatures: consequently the assumption that images are all watermarked with the same key does not help anymore, since signatures always look random to an attacker.
- any deterministic hash function may be turned into an un-deterministic one by using a random salt, taken as input and appended to the signature.
- the salt consists in a random string r which is appended to the hash-code h or the signature s; at the embedding stage r is included in the input of the hash function as:
- the time-stamp is included in the input of the hash functions, and at the verification stage is used before recomputing the signature.
- signatures will be authenticated again in every copied area again, but the extraction of different time-stamps can alerts us that a collage attack probably occurred. With this method it is even possible to count the number of copied areas and to localize them.
- the collage attack detection can be enhanced, since the robust algorithm could either fail, or decode different independent messages correctly when the RBA-resistant version of our robust method [2,11] is used (due to the fact that it extracts the watermark at the local level).
- This feature corresponds to the item 3. of the decision enumeration given in the “Tamperproofing/authentication decision” paragraph.
- the stamp/time-stamp approach we have then another criteria to detect such attacks; further, if the same robust message was embedded in all parts (resulting into only one decoded message), the embedded stamp approach can still distinguish the different parts.
- hash-codes of sufficient lengths hash-codes of at least 128 bits should be used, and we propose the MD5 (128 bits) or the SHA (160 bits), in order to defeat the anniversary attack.
- hash extra global and local information hashing the indexes i,j of the current block makes block synchronization necessary for an attack to succeed; hashing the image's size M,N restrict attacks to images of the same size; hashing an unique ID for each image makes substitutions attacks merely infeasible, but may be not practicable in many applications (this ID should be stored separately).
- hash and embed an unique stamp hash an unique stamp for each image (e.g. a random ID), which is embedded beside the signatures, to defeat the collage attack, and to allow to distinguish and localize pasted areas; can also carry useful information such as a time-stamp. This method can be used in place of the unique ID approach of item 5.
- This patent presents a hybrid robust watermarking scheme for visual data, which combines copyright protection, detection of tampering, and authentication.
- the robust part exhibits high robustness to signal processing attacks, geometrical transforms as shown by the Stirmark [23] results, as well as robustness to printing and rescanning.
- the algorithm is resistant against random local geometrical distortions too as well as to projective and non-linear transforms, and can also defeat collage attack by extracting and decoding the copyright information locally.
- the fragile part does not decrease the robustness of the robust part, due to its nearly orthogonal embedding with respect to the robust information. Exploiting the diagnostics from both the robust and the fragile parts, the algorithm is resistant against different kinds of attacks, including the copy attack and the collage attack.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/194,278 US20030070075A1 (en) | 2001-10-04 | 2002-07-15 | Secure hybrid robust watermarking resistant against tampering and copy-attack |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32709701P | 2001-10-04 | 2001-10-04 | |
US10/194,278 US20030070075A1 (en) | 2001-10-04 | 2002-07-15 | Secure hybrid robust watermarking resistant against tampering and copy-attack |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030070075A1 true US20030070075A1 (en) | 2003-04-10 |
Family
ID=23275145
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/194,278 Abandoned US20030070075A1 (en) | 2001-10-04 | 2002-07-15 | Secure hybrid robust watermarking resistant against tampering and copy-attack |
US10/491,681 Active 2025-07-27 US7664288B2 (en) | 2001-10-04 | 2002-10-02 | Digital watermarking method robust against local and global geometric distortions and projective transforms |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/491,681 Active 2025-07-27 US7664288B2 (en) | 2001-10-04 | 2002-10-02 | Digital watermarking method robust against local and global geometric distortions and projective transforms |
Country Status (3)
Country | Link |
---|---|
US (2) | US20030070075A1 (fr) |
EP (1) | EP1444653B1 (fr) |
WO (1) | WO2003032254A1 (fr) |
Cited By (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030118208A1 (en) * | 2001-12-20 | 2003-06-26 | Koninklijke Philips Electronics N.V. | Varying segment sizes to increase security |
US20030152225A1 (en) * | 2002-02-13 | 2003-08-14 | Sanyo Electric Co., Ltd. | Digital watermarking system using scrambling method |
US20040042635A1 (en) * | 2002-09-03 | 2004-03-04 | Koninklijke Philips Electronics N.V. | Copy protection via redundant watermark encoding |
US20040071311A1 (en) * | 2000-12-09 | 2004-04-15 | Jong-Uk Choi | Network camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof |
US20040136528A1 (en) * | 2002-12-27 | 2004-07-15 | Kabushiki Kaisha Toshiba | Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program |
US6834344B1 (en) * | 1999-09-17 | 2004-12-21 | International Business Machines Corporation | Semi-fragile watermarks |
US20050108535A1 (en) * | 2002-02-19 | 2005-05-19 | Bruekers Alphons Antonius M.L. | Collusion-robust watermarking |
US20050129269A1 (en) * | 2003-12-10 | 2005-06-16 | Jyh-Han Lin | Context watermark for digital contents |
US20060075241A1 (en) * | 2004-09-27 | 2006-04-06 | Frederic Deguillaume | Character and vector graphics watermark for structured electronic documents security |
US20060195886A1 (en) * | 2003-07-26 | 2006-08-31 | Koninklijke Philips Electronics N.V. | Content identification for broadcast media |
US20070009134A1 (en) * | 2003-08-08 | 2007-01-11 | Ebroul Izquierdo | Method and apparatus for fragile watermarking |
US20070230708A1 (en) * | 2004-04-27 | 2007-10-04 | Koninklijke Philips Electroncs N.V. | Watermarking a Compressed Information Signal |
WO2007126180A1 (fr) * | 2006-05-02 | 2007-11-08 | Electronics And Telecommunications Research Institute | Procédé et appareil de filigranage hybride |
US20080240435A1 (en) * | 2005-11-17 | 2008-10-02 | Mehmet Utku Celik | Perpetual Masking For Secure Watermark Embedding |
US20080297206A1 (en) * | 2005-11-18 | 2008-12-04 | Koninklijke Philips Electronics, N.V. | Dc Offset Estimation |
US20090060259A1 (en) * | 2007-09-04 | 2009-03-05 | Luis Goncalves | Upc substitution fraud prevention |
EP2071822A1 (fr) * | 2007-12-13 | 2009-06-17 | Thomson Licensing | Procédé et appareil d'insertion d'un filigrane visible amovible dans une image et procédé et appareil pour supprimer de tels filigranes |
WO2010021694A1 (fr) * | 2008-08-20 | 2010-02-25 | Thomson Licensing | Sélection de filigranes pour un tatouage numérique de vidéo comprimée |
US20110135143A1 (en) * | 2008-08-19 | 2011-06-09 | Dekun Zou | Context-based adaptive binary arithmetic coding (cabac) video stream compliance |
US20110142419A1 (en) * | 2008-08-19 | 2011-06-16 | Thomson Licensing | Changeable block list |
US20110145582A1 (en) * | 2009-12-11 | 2011-06-16 | Electronics And Telecommunications Research Institute | Method for sharing and updating key using watermark |
US20110176610A1 (en) * | 2008-08-19 | 2011-07-21 | Shan He | Propagation map |
CN102142129A (zh) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | 一种基于视觉秘密共享的图像内容篡改检测方法 |
CN102142073A (zh) * | 2010-12-27 | 2011-08-03 | 成都网安科技发展有限公司 | 基于隐密水印的纸质文档防泄密及其鉴别系统 |
US20110228971A1 (en) * | 2010-03-22 | 2011-09-22 | Brigham Young University | Robust watermarking for digital media |
US20110299725A1 (en) * | 2001-04-24 | 2011-12-08 | Rodriguez Tony F | Methods involving maps, imagery, video and steganography |
US20120269412A1 (en) * | 2009-09-18 | 2012-10-25 | Nanyang Technological University | Method of providing security for transmitting a digital medical image |
US20130067180A1 (en) * | 2011-09-12 | 2013-03-14 | Microsoft Corporation | Retaining verifiability of extracted data from signed archives |
US20130132729A1 (en) * | 2010-08-03 | 2013-05-23 | Thomson Licensing | Method and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented |
US20140270331A1 (en) * | 2013-03-15 | 2014-09-18 | Rimage Corporation | Content watermarking |
US8948443B2 (en) | 2008-08-19 | 2015-02-03 | Thomson Licensing | Luminance evaluation |
US20150052364A1 (en) * | 2012-03-08 | 2015-02-19 | Sandia Corporation | Increasing Security in Inter-Chip Communication |
CN104486632A (zh) * | 2014-12-31 | 2015-04-01 | 四川九洲电器集团有限责任公司 | 一种视频数据的处理方法及检测方法 |
WO2015030894A3 (fr) * | 2013-06-20 | 2015-04-23 | Verance Corporation | Gestion de clés stéganographiques |
US9105091B2 (en) | 2010-02-09 | 2015-08-11 | Thomson Licensing | Watermark detection using a propagation map |
US9117270B2 (en) | 1998-05-28 | 2015-08-25 | Verance Corporation | Pre-processed information embedding system |
US9153006B2 (en) | 2005-04-26 | 2015-10-06 | Verance Corporation | Circumvention of watermark analysis in a host content |
US9189955B2 (en) | 2000-02-16 | 2015-11-17 | Verance Corporation | Remote control signaling using audio watermarks |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
US9262794B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US9596521B2 (en) | 2014-03-13 | 2017-03-14 | Verance Corporation | Interactive content acquisition using embedded codes |
WO2017058756A1 (fr) * | 2015-09-28 | 2017-04-06 | EyeVerify Inc. | Pipeline d'images sécurisées |
US9779227B1 (en) * | 2014-10-24 | 2017-10-03 | Amazon Technologies, Inc. | Security system using keys encoded in holograms |
EP3242239A1 (fr) | 2016-05-02 | 2017-11-08 | Scantrust SA | Authentification optimisée de code d'authentification graphique |
US20180089789A1 (en) * | 2015-09-28 | 2018-03-29 | EyeVerify Inc. | Secure image pipeline |
CN108470318A (zh) * | 2018-02-06 | 2018-08-31 | 杭州电子科技大学 | 基于分组策略和邻域关系定位的三维网格双重水印方法 |
CN109214425A (zh) * | 2018-08-07 | 2019-01-15 | 歌尔股份有限公司 | 图片验证方法、图片处理方法、设备及系统 |
CN109285106A (zh) * | 2018-10-11 | 2019-01-29 | 中南大学 | 一种基于slt-svd的医学影像的可逆还原方法 |
CN109785217A (zh) * | 2018-12-25 | 2019-05-21 | 湖南大学 | 基于fpga技术的差错控制芯核水印方法 |
CN110288505A (zh) * | 2019-06-30 | 2019-09-27 | 湖南科技大学 | 抗几何变换攻击的空域矢量地理空间数据数字水印方法 |
US10498541B2 (en) * | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
US10586055B2 (en) * | 2017-10-30 | 2020-03-10 | Paypal, Inc. | Electronically backing up files using steganography |
CN111667395A (zh) * | 2020-06-03 | 2020-09-15 | 南京师范大学 | 一种三维模型版权认证方法 |
CN112132731A (zh) * | 2020-09-10 | 2020-12-25 | 郑州轻工业大学 | 采用预设psnr的dwt-svd域自适应鲁棒水印算法 |
CN112313645A (zh) * | 2018-08-10 | 2021-02-02 | 深度来源公司 | 通过合成原始数据和标记数据来生成已标记数据的数据嵌入网络的学习方法和测试方法以及用其的学习装置和测试装置 |
US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
CN113014742A (zh) * | 2021-02-09 | 2021-06-22 | 安徽师范大学 | 基于脆弱水印的图像篡改检测定位与自恢复方法 |
US11062106B2 (en) | 2016-03-07 | 2021-07-13 | Ping Identity Corporation | Large data transfer using visual codes with feedback confirmation |
US11082711B2 (en) * | 2018-06-06 | 2021-08-03 | JVC Kenwood Corporation | Image coding device, image coding method, and image falsification identification program |
US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
US11134075B2 (en) | 2016-03-04 | 2021-09-28 | Ping Identity Corporation | Method and system for authenticated login using static or dynamic codes |
CN113469862A (zh) * | 2021-05-28 | 2021-10-01 | 安徽大学 | 用于档案扫描的防篡改数字水印嵌入方法及图像复原方法 |
US11170130B1 (en) | 2021-04-08 | 2021-11-09 | Aster Key, LLC | Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification |
US11206133B2 (en) | 2017-12-08 | 2021-12-21 | Ping Identity Corporation | Methods and systems for recovering data using dynamic passwords |
US11263415B2 (en) | 2016-03-07 | 2022-03-01 | Ping Identity Corporation | Transferring data files using a series of visual codes |
US11323266B2 (en) * | 2019-05-28 | 2022-05-03 | Brownie Technologies Ltd. | System and method for secured digital communication using a digital signature |
CN114493976A (zh) * | 2022-04-15 | 2022-05-13 | 湖北微模式科技发展有限公司 | 一种基于脆弱水印的jpeg图像篡改检测方法 |
CN114511437A (zh) * | 2022-04-19 | 2022-05-17 | 山东科技大学 | 基于参考矩阵和lsb替换的水印嵌入和图像自恢复方法 |
CN114693500A (zh) * | 2022-05-31 | 2022-07-01 | 山东科技大学 | 一种用于篡改检测和自恢复的量子图像水印方法 |
CN115443004A (zh) * | 2022-09-16 | 2022-12-06 | Oppo广东移动通信有限公司 | 防水易碎贴、电子设备及制备电子设备的方法 |
US11544367B2 (en) | 2015-05-05 | 2023-01-03 | Ping Identity Corporation | Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual |
CN116825116A (zh) * | 2023-07-18 | 2023-09-29 | 合肥工业大学 | 抗去同步攻击的鲁棒音频水印嵌入和提取方法 |
CN117057971A (zh) * | 2023-10-07 | 2023-11-14 | 湖北微模式科技发展有限公司 | 一种基于亮度收缩校准的jpeg图像半脆弱水印算法及装置 |
USRE49968E1 (en) * | 2017-02-06 | 2024-05-14 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
CN118608367A (zh) * | 2024-08-07 | 2024-09-06 | 浙江大学 | 一种针对大模型生成文本的水印嵌入、检测方法及装置 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110280434A1 (en) * | 2010-05-11 | 2011-11-17 | Rajesh Mamidwar | Method and system for watermakr insertin using video start codes |
WO2013067589A1 (fr) * | 2011-11-11 | 2013-05-16 | Gauss Research Laboratory, Inc | Communications numériques |
CN103093127B (zh) * | 2013-01-21 | 2015-07-15 | 深圳大学 | 基于数独和多重数字水印的动态版权保护系统及实现方法 |
CN103177219A (zh) * | 2013-03-29 | 2013-06-26 | 太原理工大学 | 一种医用生化检验报告关键数据防篡改方法 |
WO2018006095A2 (fr) * | 2016-07-01 | 2018-01-04 | Digimarc Corporation | Détermination de pose basée sur une image |
US10902144B2 (en) * | 2017-08-25 | 2021-01-26 | Electronics And Telecommunications Research Institute | Method and apparatus for securing data |
WO2020186386A1 (fr) * | 2019-03-15 | 2020-09-24 | Boe Technology Group Co., Ltd. | Procédé de codage de filigrane dans une image numérique, appareil de codage de filigrane dans une image numérique, procédé de détection de filigrane dans une image numérique, appareil de détection de filigrane dans une image numérique, et produit programme d'ordinateur |
US10757292B1 (en) * | 2019-04-10 | 2020-08-25 | Beyontech, Inc | Method of embedding and extracting watermark data from original image adjusted with noise based image converted using watermark |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7113615B2 (en) * | 1993-11-18 | 2006-09-26 | Digimarc Corporation | Watermark embedder and reader |
US6614914B1 (en) * | 1995-05-08 | 2003-09-02 | Digimarc Corporation | Watermark embedder and reader |
US6408082B1 (en) * | 1996-04-25 | 2002-06-18 | Digimarc Corporation | Watermark detection using a fourier mellin transform |
US5862260A (en) * | 1993-11-18 | 1999-01-19 | Digimarc Corporation | Methods for surveying dissemination of proprietary empirical data |
US5636292C1 (en) * | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
ATE261225T1 (de) | 1995-05-08 | 2004-03-15 | Digimarc Corp | Gebrauch im transformationsbereich steganographisch eingebetteter kalibrierungsdaten zur detektion von bildverzerrungen |
US6282299B1 (en) * | 1996-08-30 | 2001-08-28 | Regents Of The University Of Minnesota | Method and apparatus for video watermarking using perceptual masks |
IT1308273B1 (it) | 1999-04-16 | 2001-12-10 | Univ Firenze | Metodo di rilevazione di un marchio in immagini digitali |
US6385329B1 (en) * | 2000-02-14 | 2002-05-07 | Digimarc Corporation | Wavelet domain watermarks |
US7251256B1 (en) * | 2000-05-18 | 2007-07-31 | Luminous Networks, Inc. | Synchronization of asynchronous networks using media access control (MAC) layer synchronization symbols |
WO2002013138A1 (fr) * | 2000-08-03 | 2002-02-14 | Digital Copyright Technologies Ag | Procede de conception de filigrane numerique adaptatif resistant a des transformations geometriques |
US6483927B2 (en) * | 2000-12-18 | 2002-11-19 | Digimarc Corporation | Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes |
US7024018B2 (en) * | 2001-05-11 | 2006-04-04 | Verance Corporation | Watermark position modulation |
US6904151B2 (en) * | 2002-01-17 | 2005-06-07 | Deguillaume Frederic | Method for the estimation and recovering of general affine transform |
-
2002
- 2002-07-15 US US10/194,278 patent/US20030070075A1/en not_active Abandoned
- 2002-10-02 WO PCT/IB2002/004054 patent/WO2003032254A1/fr not_active Application Discontinuation
- 2002-10-02 EP EP02800687.2A patent/EP1444653B1/fr not_active Expired - Lifetime
- 2002-10-02 US US10/491,681 patent/US7664288B2/en active Active
Cited By (113)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9117270B2 (en) | 1998-05-28 | 2015-08-25 | Verance Corporation | Pre-processed information embedding system |
US6834344B1 (en) * | 1999-09-17 | 2004-12-21 | International Business Machines Corporation | Semi-fragile watermarks |
US9189955B2 (en) | 2000-02-16 | 2015-11-17 | Verance Corporation | Remote control signaling using audio watermarks |
US20040071311A1 (en) * | 2000-12-09 | 2004-04-15 | Jong-Uk Choi | Network camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof |
US20110299725A1 (en) * | 2001-04-24 | 2011-12-08 | Rodriguez Tony F | Methods involving maps, imagery, video and steganography |
US8976998B2 (en) * | 2001-04-24 | 2015-03-10 | Digimarc Corporation | Methods involving maps, imagery, video and steganography |
US9792661B2 (en) | 2001-04-24 | 2017-10-17 | Digimarc Corporation | Methods involving maps, imagery, video and steganography |
US7006658B2 (en) * | 2001-12-20 | 2006-02-28 | Koninklijke Philips Electronics N.V. | Varying segment sizes to increase security |
US20030118208A1 (en) * | 2001-12-20 | 2003-06-26 | Koninklijke Philips Electronics N.V. | Varying segment sizes to increase security |
US7487356B2 (en) * | 2002-02-13 | 2009-02-03 | Sanyo Electric Co., Ltd. | Digital watermarking system using scrambling method |
US20030152225A1 (en) * | 2002-02-13 | 2003-08-14 | Sanyo Electric Co., Ltd. | Digital watermarking system using scrambling method |
US20050108535A1 (en) * | 2002-02-19 | 2005-05-19 | Bruekers Alphons Antonius M.L. | Collusion-robust watermarking |
US20040042635A1 (en) * | 2002-09-03 | 2004-03-04 | Koninklijke Philips Electronics N.V. | Copy protection via redundant watermark encoding |
US7133534B2 (en) * | 2002-09-03 | 2006-11-07 | Koninklijke Philips Electronics N.V. | Copy protection via redundant watermark encoding |
US7646882B2 (en) * | 2002-12-27 | 2010-01-12 | Kabushiki Kaisha Toshiba | Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program |
US20040136528A1 (en) * | 2002-12-27 | 2004-07-15 | Kabushiki Kaisha Toshiba | Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program |
US20060195886A1 (en) * | 2003-07-26 | 2006-08-31 | Koninklijke Philips Electronics N.V. | Content identification for broadcast media |
US7489797B2 (en) | 2003-08-08 | 2009-02-10 | Motorola, Inc. | Method and apparatus for fragile watermarking |
US20070009134A1 (en) * | 2003-08-08 | 2007-01-11 | Ebroul Izquierdo | Method and apparatus for fragile watermarking |
US20050129269A1 (en) * | 2003-12-10 | 2005-06-16 | Jyh-Han Lin | Context watermark for digital contents |
US20070230708A1 (en) * | 2004-04-27 | 2007-10-04 | Koninklijke Philips Electroncs N.V. | Watermarking a Compressed Information Signal |
US7644281B2 (en) | 2004-09-27 | 2010-01-05 | Universite De Geneve | Character and vector graphics watermark for structured electronic documents security |
US20060075241A1 (en) * | 2004-09-27 | 2006-04-06 | Frederic Deguillaume | Character and vector graphics watermark for structured electronic documents security |
US9153006B2 (en) | 2005-04-26 | 2015-10-06 | Verance Corporation | Circumvention of watermark analysis in a host content |
US20080240435A1 (en) * | 2005-11-17 | 2008-10-02 | Mehmet Utku Celik | Perpetual Masking For Secure Watermark Embedding |
US20080297206A1 (en) * | 2005-11-18 | 2008-12-04 | Koninklijke Philips Electronics, N.V. | Dc Offset Estimation |
US20090172404A1 (en) * | 2006-05-02 | 2009-07-02 | Electronics And Telecommunications Research Institute | Method and Apparatus for Hybrid Watermarking |
WO2007126180A1 (fr) * | 2006-05-02 | 2007-11-08 | Electronics And Telecommunications Research Institute | Procédé et appareil de filigranage hybride |
US8068674B2 (en) * | 2007-09-04 | 2011-11-29 | Evolution Robotics Retail, Inc. | UPC substitution fraud prevention |
US20090060259A1 (en) * | 2007-09-04 | 2009-03-05 | Luis Goncalves | Upc substitution fraud prevention |
WO2009074618A1 (fr) * | 2007-12-13 | 2009-06-18 | Thomson Licensing | Procédé et appareil d'insertion d'un filigrane visible amovible dans une image et procédé et appareil d'élimination de tels filigranes |
US20100254569A1 (en) * | 2007-12-13 | 2010-10-07 | Thomson Licensing | Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks |
EP2071822A1 (fr) * | 2007-12-13 | 2009-06-17 | Thomson Licensing | Procédé et appareil d'insertion d'un filigrane visible amovible dans une image et procédé et appareil pour supprimer de tels filigranes |
US8635161B2 (en) | 2007-12-13 | 2014-01-21 | Thomson Licensing | Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks |
US20110142419A1 (en) * | 2008-08-19 | 2011-06-16 | Thomson Licensing | Changeable block list |
US20110135143A1 (en) * | 2008-08-19 | 2011-06-09 | Dekun Zou | Context-based adaptive binary arithmetic coding (cabac) video stream compliance |
US9113231B2 (en) | 2008-08-19 | 2015-08-18 | Thomson Licensing | Changeable block list |
US8594366B2 (en) | 2008-08-19 | 2013-11-26 | Thomson Licensing | Context-based adaptive binary arithmetic coding (CABAC) video stream compliance |
US9042455B2 (en) | 2008-08-19 | 2015-05-26 | Thomson Licensing | Propagation map |
US20110176610A1 (en) * | 2008-08-19 | 2011-07-21 | Shan He | Propagation map |
US8948443B2 (en) | 2008-08-19 | 2015-02-03 | Thomson Licensing | Luminance evaluation |
US8824727B2 (en) | 2008-08-20 | 2014-09-02 | Thomson Licensing | Selection of watermarks for the watermarking of compressed video |
WO2010021694A1 (fr) * | 2008-08-20 | 2010-02-25 | Thomson Licensing | Sélection de filigranes pour un tatouage numérique de vidéo comprimée |
US20110158465A1 (en) * | 2008-08-20 | 2011-06-30 | Dekun Zou | Selection of watermarks for the watermarking of compressed video |
US20120269412A1 (en) * | 2009-09-18 | 2012-10-25 | Nanyang Technological University | Method of providing security for transmitting a digital medical image |
US8818020B2 (en) * | 2009-09-18 | 2014-08-26 | Nanyang Technological University | Method of providing security for transmitting a digital medical image |
US20110145582A1 (en) * | 2009-12-11 | 2011-06-16 | Electronics And Telecommunications Research Institute | Method for sharing and updating key using watermark |
US8745399B2 (en) * | 2009-12-11 | 2014-06-03 | Electronics And Telecommunications Research Institute | Method for sharing and updating key using watermark |
US9105091B2 (en) | 2010-02-09 | 2015-08-11 | Thomson Licensing | Watermark detection using a propagation map |
US20110228971A1 (en) * | 2010-03-22 | 2011-09-22 | Brigham Young University | Robust watermarking for digital media |
US8588461B2 (en) * | 2010-03-22 | 2013-11-19 | Brigham Young University | Robust watermarking for digital media |
US20130132729A1 (en) * | 2010-08-03 | 2013-05-23 | Thomson Licensing | Method and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented |
CN102142073A (zh) * | 2010-12-27 | 2011-08-03 | 成都网安科技发展有限公司 | 基于隐密水印的纸质文档防泄密及其鉴别系统 |
CN102142129A (zh) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | 一种基于视觉秘密共享的图像内容篡改检测方法 |
US8819361B2 (en) * | 2011-09-12 | 2014-08-26 | Microsoft Corporation | Retaining verifiability of extracted data from signed archives |
US20130067180A1 (en) * | 2011-09-12 | 2013-03-14 | Microsoft Corporation | Retaining verifiability of extracted data from signed archives |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US20150052364A1 (en) * | 2012-03-08 | 2015-02-19 | Sandia Corporation | Increasing Security in Inter-Chip Communication |
US9722796B2 (en) * | 2012-03-08 | 2017-08-01 | National Technology & Engineering Solutions Of Sandia, Llc | Increasing security in inter-chip communication |
US9262794B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US20160155208A1 (en) * | 2013-03-15 | 2016-06-02 | Qumu Corporation | Content watermarking |
US20140270331A1 (en) * | 2013-03-15 | 2014-09-18 | Rimage Corporation | Content watermarking |
US9773290B2 (en) * | 2013-03-15 | 2017-09-26 | Qumu Corporation | Content watermarking |
US9245310B2 (en) * | 2013-03-15 | 2016-01-26 | Qumu Corporation | Content watermarking |
US9485089B2 (en) | 2013-06-20 | 2016-11-01 | Verance Corporation | Stego key management |
WO2015030894A3 (fr) * | 2013-06-20 | 2015-04-23 | Verance Corporation | Gestion de clés stéganographiques |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
US9596521B2 (en) | 2014-03-13 | 2017-03-14 | Verance Corporation | Interactive content acquisition using embedded codes |
US9779227B1 (en) * | 2014-10-24 | 2017-10-03 | Amazon Technologies, Inc. | Security system using keys encoded in holograms |
CN104486632A (zh) * | 2014-12-31 | 2015-04-01 | 四川九洲电器集团有限责任公司 | 一种视频数据的处理方法及检测方法 |
US11544367B2 (en) | 2015-05-05 | 2023-01-03 | Ping Identity Corporation | Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual |
US10931455B2 (en) * | 2015-09-28 | 2021-02-23 | EyeVerify Inc. | Secure image pipeline |
WO2017058756A1 (fr) * | 2015-09-28 | 2017-04-06 | EyeVerify Inc. | Pipeline d'images sécurisées |
US20180089789A1 (en) * | 2015-09-28 | 2018-03-29 | EyeVerify Inc. | Secure image pipeline |
US11658961B2 (en) | 2016-03-04 | 2023-05-23 | Ping Identity Corporation | Method and system for authenticated login using static or dynamic codes |
US11134075B2 (en) | 2016-03-04 | 2021-09-28 | Ping Identity Corporation | Method and system for authenticated login using static or dynamic codes |
US11544487B2 (en) | 2016-03-07 | 2023-01-03 | Ping Identity Corporation | Large data transfer using visual codes with feedback confirmation |
US11263415B2 (en) | 2016-03-07 | 2022-03-01 | Ping Identity Corporation | Transferring data files using a series of visual codes |
US11062106B2 (en) | 2016-03-07 | 2021-07-13 | Ping Identity Corporation | Large data transfer using visual codes with feedback confirmation |
EP3242239A1 (fr) | 2016-05-02 | 2017-11-08 | Scantrust SA | Authentification optimisée de code d'authentification graphique |
USRE49968E1 (en) * | 2017-02-06 | 2024-05-14 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
US11799668B2 (en) | 2017-02-06 | 2023-10-24 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
US10498542B2 (en) * | 2017-02-06 | 2019-12-03 | ShoCard, Inc. | Electronic identification verification methods and systems with storage of certification records to a side chain |
US11323272B2 (en) | 2017-02-06 | 2022-05-03 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
US10498541B2 (en) * | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
US10586055B2 (en) * | 2017-10-30 | 2020-03-10 | Paypal, Inc. | Electronically backing up files using steganography |
US11206133B2 (en) | 2017-12-08 | 2021-12-21 | Ping Identity Corporation | Methods and systems for recovering data using dynamic passwords |
US11777726B2 (en) | 2017-12-08 | 2023-10-03 | Ping Identity Corporation | Methods and systems for recovering data using dynamic passwords |
CN108470318A (zh) * | 2018-02-06 | 2018-08-31 | 杭州电子科技大学 | 基于分组策略和邻域关系定位的三维网格双重水印方法 |
US11082711B2 (en) * | 2018-06-06 | 2021-08-03 | JVC Kenwood Corporation | Image coding device, image coding method, and image falsification identification program |
CN109214425A (zh) * | 2018-08-07 | 2019-01-15 | 歌尔股份有限公司 | 图片验证方法、图片处理方法、设备及系统 |
CN112313645A (zh) * | 2018-08-10 | 2021-02-02 | 深度来源公司 | 通过合成原始数据和标记数据来生成已标记数据的数据嵌入网络的学习方法和测试方法以及用其的学习装置和测试装置 |
CN109285106A (zh) * | 2018-10-11 | 2019-01-29 | 中南大学 | 一种基于slt-svd的医学影像的可逆还原方法 |
US11722301B2 (en) | 2018-10-17 | 2023-08-08 | Ping Identity Corporation | Blockchain ID connect |
US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
US11818265B2 (en) | 2018-10-17 | 2023-11-14 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
CN109785217A (zh) * | 2018-12-25 | 2019-05-21 | 湖南大学 | 基于fpga技术的差错控制芯核水印方法 |
US11323266B2 (en) * | 2019-05-28 | 2022-05-03 | Brownie Technologies Ltd. | System and method for secured digital communication using a digital signature |
CN110288505A (zh) * | 2019-06-30 | 2019-09-27 | 湖南科技大学 | 抗几何变换攻击的空域矢量地理空间数据数字水印方法 |
CN111667395A (zh) * | 2020-06-03 | 2020-09-15 | 南京师范大学 | 一种三维模型版权认证方法 |
CN112132731A (zh) * | 2020-09-10 | 2020-12-25 | 郑州轻工业大学 | 采用预设psnr的dwt-svd域自适应鲁棒水印算法 |
CN113014742A (zh) * | 2021-02-09 | 2021-06-22 | 安徽师范大学 | 基于脆弱水印的图像篡改检测定位与自恢复方法 |
US11170130B1 (en) | 2021-04-08 | 2021-11-09 | Aster Key, LLC | Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification |
CN113469862A (zh) * | 2021-05-28 | 2021-10-01 | 安徽大学 | 用于档案扫描的防篡改数字水印嵌入方法及图像复原方法 |
CN114493976A (zh) * | 2022-04-15 | 2022-05-13 | 湖北微模式科技发展有限公司 | 一种基于脆弱水印的jpeg图像篡改检测方法 |
CN114511437A (zh) * | 2022-04-19 | 2022-05-17 | 山东科技大学 | 基于参考矩阵和lsb替换的水印嵌入和图像自恢复方法 |
CN114693500A (zh) * | 2022-05-31 | 2022-07-01 | 山东科技大学 | 一种用于篡改检测和自恢复的量子图像水印方法 |
CN115443004A (zh) * | 2022-09-16 | 2022-12-06 | Oppo广东移动通信有限公司 | 防水易碎贴、电子设备及制备电子设备的方法 |
CN116825116A (zh) * | 2023-07-18 | 2023-09-29 | 合肥工业大学 | 抗去同步攻击的鲁棒音频水印嵌入和提取方法 |
CN117057971A (zh) * | 2023-10-07 | 2023-11-14 | 湖北微模式科技发展有限公司 | 一种基于亮度收缩校准的jpeg图像半脆弱水印算法及装置 |
CN118608367A (zh) * | 2024-08-07 | 2024-09-06 | 浙江大学 | 一种针对大模型生成文本的水印嵌入、检测方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US20050018871A1 (en) | 2005-01-27 |
EP1444653A1 (fr) | 2004-08-11 |
WO2003032254A1 (fr) | 2003-04-17 |
EP1444653B1 (fr) | 2015-06-03 |
US7664288B2 (en) | 2010-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030070075A1 (en) | Secure hybrid robust watermarking resistant against tampering and copy-attack | |
Deguillaume et al. | Secure hybrid robust watermarking resistant against tampering and copy attack | |
Holliman et al. | Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes | |
Voyatzis et al. | Protecting digital image copyrights: a framework | |
JP5596193B2 (ja) | デジタルホストコンテンツから透かしを抽出するロバスト性を高める方法及び装置 | |
Lin et al. | A review of data hiding in digital images | |
US7616776B2 (en) | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content | |
US6834344B1 (en) | Semi-fragile watermarks | |
US20060239501A1 (en) | Security enhancements of digital watermarks for multi-media content | |
Chandramouli et al. | Digital watermarking | |
Zhou et al. | A semifragile watermark scheme for image authentication | |
Zhang et al. | Reversible fragile watermarking for locating tampered blocks in JPEG images | |
Munir | A secure fragile video watermarking algorithm for content authentication based on arnold CAT map | |
Chandra et al. | Digital watermarking technique for protecting digital images | |
Chen et al. | Combined digital signature and digital watermark scheme for image authentication | |
He et al. | Synchronous counterfeiting attacks on self-embedding watermarking schemes | |
Al-Hamami et al. | A new approach for authentication technique | |
Mursi et al. | A DCT-based secure JPEG image authentication scheme | |
Abdul-Sada | Hiding data using LSB-3 | |
Marvel | Information hiding: Steganography and watermarking | |
Wolthusen | On the limitations of digital watermarks: a cautionary note | |
Jiang et al. | Semi-fragile watermarking algorithm for image tampers localization and recovery | |
Memon et al. | Authentication techniques for multimedia content | |
Li | Digital watermarking schemes for multimedia authentication | |
Voloshynovskiy et al. | Multimedia security: open problems and solutions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |