WO1997034391A1 - Procede d'application de filigrane efficace contre les copies illicites - Google Patents
Procede d'application de filigrane efficace contre les copies illicites Download PDFInfo
- Publication number
- WO1997034391A1 WO1997034391A1 PCT/US1997/003816 US9703816W WO9734391A1 WO 1997034391 A1 WO1997034391 A1 WO 1997034391A1 US 9703816 W US9703816 W US 9703816W WO 9734391 A1 WO9734391 A1 WO 9734391A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- copy
- watermarks
- watermark
- work
- watermarked
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 42
- 230000008569 process Effects 0.000 title description 10
- 239000013598 vector Substances 0.000 claims abstract description 49
- 238000012935 Averaging Methods 0.000 claims description 5
- 230000005236 sound signal Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 9
- 238000012360 testing method Methods 0.000 description 6
- 230000002596 correlated effect Effects 0.000 description 4
- 230000000875 corresponding effect Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32288—Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
- H04N1/32304—Embedding different sets of additional information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0081—Image watermarking whereby both original and watermarked images are required at decoder, e.g. destination-based, non-blind, non-oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91335—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/324—Selecting a particular authentication information from amongst a plurality of different authentication information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Definitions
- the present invention relates generally to preventing unlawful copying of audio, video and other media that can be digitized and, more particularly, to improved watermarking techniques that are robust even against multiple individuals who conspire together with independent copies.
- a "watermark” is a visible or preferably invisible identification code that is permanently embedded in the data and thus remains present within the data after any decryption process.
- a digital watermark would be a visible "seal" placed over an image to identify the copyright owner.
- the watermark might also contain additional information, including the identity of the purchaser of a particular copy of the material.
- Many schemes have been proposed for watermarking digital data. In a known watermarking procedure, each copy of a document D is varied slightly so as to look the same to the user but also so as to include the identity of the purchaser.
- the watermark consists of the variations that are unique to each copy. The idea behind such schemes is that the watermark should be hard to remove without destroying the document. Thus, a copy of a watermarked document should be traceable back to the specific version of the original from which it was created.
- each of a set of copies of the work has a slightly-modified form of a "baseline” watermark that is placed within a critical region of the data.
- the slight variations in the watermarks are not perceptually visible and do not interfere with the works. If multiple persons collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
- the work to be protected is digitized into a data file or string of data.
- a first digital watermark is then inserted in a first copy of the data file, preferably in a critical region of the data.
- a "critical" region may consist of the entire document or alternatively will be some valuable portion of the work that will end up being significantly corrupted if the watermark is corrupted.
- a second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies.
- the first and second digital watermarks are slight variations of a "baseline" watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations.
- the baseline watermark may be a digital string that is part of the original data being protected.
- the variations are "randomized” in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy. After the watermark is inserted into the work, the work can be converted back to its original form.
- the scheme ensures that different possessors of watermarked copies of a work cannot create a "clean" copy that does not include at least one of the slightly-modified watermarks. Indeed, by comparing the watermark of the illicit copy with the baseline watermark, one can determine the identity of the forger.
- FIGURE 1 is a block diagram illustrating the method of inserting a digital watermark into a copy
- FIGURE 2 is a block diagram illustrating the method for retrieving a digital watermark from a copy and correlating the retrieved watermark with a stored watermark.
- the work to be protected may be an image (photographs and graphics), video and/or audio (speech and music).
- image photographs and graphics
- video and/or audio speech and music
- the particular type of work is not relevant to the invention.
- the work in whatever form, is digitized at step 10 into a data file or string of data either as part of the inventive technique or through some known A/D preprocessing.
- a “baseline” watermark that is preferably stored and not used in making a particular copy of the work (although this step is not necessarily required).
- This baseline watermark is then processed to create a set of one or more "modified" watermarks, each of which is related to the baseline watermark in a predetermined manner.
- the "offsets" needed to create the modified watermarks are not fixed, however, but are "randomized.” In this way, a very small amount of "noise” is added to the offsets that does not alter the perception of the watermarked copies but still ensures that possessors of such copies cannot collude to remove all existence of the watermark in at least one illicit copy.
- collusion-type attacks are prevented according to the invention by constructing a watermark using randomness in a specific way.
- an n-length digital string: XT ,X 2 ...,x n is derived at step 1 2 from the data to be watermarked and stored at step 14 for future reference. This may be referred to as the "baseline" watermark.
- the string is preferably "critical" to the data in that corruption of the string will corrupt the data in a way that can be perceived and which will diminish the value of the corrupted document.
- Generation of the baseline watermark can be achieved in many ways, e.g., by digitizing some portion of the document and using the resulting data or some subset thereof. (Whatever method is used is also used in the verification process, as discussed below).
- An n-length watermark vector 1 ( w 2 , ...w n , is then created at step 1 6 and stored at step 1 8 for future reference.
- the vector is preferably created by choosing each w, from a specified random distribution (preferably the normal distribution).
- may or may not be the same (e.g., depending on whether it is desired to embed some specific serial number data in the watermark).
- the watermark vector is then added at step 20 to the string x 1 ,x 2 , ..., x n . and the result reinserted at step 22 into the original data to be protected.
- the work may then be converted back to its original form (image, video, audio, etc.) at step 24.
- step 34 by retrieving the original base line watermark, x 1 f x 2 , ...x n , from memory and subtracting out x 1 ,x 2 , ...x n from x ',x 2 '' —* n to compute a derived watermark w 1 ',w 2 ', ...w n ' at step 36.
- a correlation value (preferably an inner product) is then calculated between the derived watermark and w ( w 2 , ... w n retrieved at step 38, to produce a correlation value at step 40.
- the correlation value is compared at step 42 to threshold levels, and if the correlation is high (step 44), then there is a match and a watermark is present. If the correlation is low (step 46), the watermark is not present.
- the inner product scheme works by computing the absolute value of the sum WT W-I ' + ... + w n w n ').
- a first digital watermark is inserted in a first copy of a data file, preferably in a critical region of the data.
- a second digital watermark is then inserted in a second copy of the data file in a similar manner, and the process is repeated for additional copies.
- the first and second digital watermarks are slight variations of a "baseline” watermark, which is kept secret, and one cannot perceive any differences between the first and second copies due to these variations.
- the variations are "randomized” in such a manner that if two persons were to collude to attempt to create an "illicit" copy of the work (i.e., a copy without a watermark), at least one of the first or second watermarks would still be present in the copy.
- the watermark may consist of a number (e.g., 1000) of randomly generated numbers with a normal distribution having zero mean and unity variance.
- could be selected according to N( ⁇ j, ⁇ ,) where ⁇ ... ⁇ n can be a serial number corresponding to the copy being watermarked (or other information that may be embedded).
- cor(W,W)
- the correlation will be low if the watermark is not present and the work is not destroyed.
- the correlation will be high if D' was derived from the watermarked document or if the data has been corrupted beyond recognition (the latter condition being determined by inspection).
- each of the "modified" watermarks be placed in a critical region of the data.
- the exact location will depend on the nature of the work being protected. It is also helpful if every entry in this region of data is largely uncorrelated with the other data. It has been suggested (by Cox et al) that this can be accomplished by embedding a watermark in the spectrum of an image, the temporal frequency domain of an audio signal, or the spatio-temporal frequency domain of a video sequence.
- the above techniques are preferred, one may even encode the watermark in other less, desirable places (such as in the low order or least significant bits) of the data and still obtain the advantages of the collusion-resistant feature of the invention where multiple parties may collude to remove the watermark. Variations
- the original document (or an original baseline watermark vector) is stored in order to determine whether the watermark is present in a copy of the document.
- the original baseline watermark vector is retrieved at step 34 and subtracted from the derived baseline watermark vector to produce the derived offset watermark vector. This step can be omitted without changing the detection protocol or its results.
- the derived offset watermark vector may be set equal to the derived baseline watermark vector. This change increases the noise level in the correlation test, but not beyond tolerable levels.
- the noise levels can be reduced by specially selecting the original offset watermark vectors to have low noise (e.g., by selecting them to be orthogonal to the original baseline watermark vector to which they are being applied) or by running the correlation test on only specific components of the vectors.
- Another improvement would be to remove the need to store the original offset watermark vector.
- it is necessary to store a copy of the original offset watermark vectors see, e.g., step 18) so that they can be later retrieved and correlated with the derived offset watermark vectors (see, e.g., step 38).
- This step can be largely omitted by the following process.
- the original offset watermark vectors are computed using a secret random hash function H.
- the sequence of numbers preferably has same structure and function as discussed above and appear to be random, but the sequence is easily reconstructed given the secret function H and the underlying information to be inserted into the document. Hence, a watermark is identified by reconstructing the original offset watermark vector locally instead of retrieving the vector from a database.
- the text to be embedded may be a simple serial number, and this serial number can be retrieved from the document by checking all possibilities to see if there is a correlation. This check can be done locally if H is available, since all relevant original offset vectors can be regenerated as needed.
- the correlation test generates the old dot product (which is large, precisely what is desired) plus the dot product of the offset vector and the original picture. Since the offset vector is random, this dot product is small (in the noise range) for any picture. Therefore, one does not need the original picture to do the correlation test.
- the secret random hash function H maps a copyright notice or text into a sequence of independent Gaussian offsets (i.e., an offset vector). Then, one may choose the offset vector for some text to be H(text). Now, one need only remember the text, not the whole offset vector. The text may be timestamped so that the same offset vector is only used once, although one can use the same offset vector more than once.
- This method is provably secure, even against colluders, but has low memory requirements.
- a two-tiered version, wherein there are two hash functions (one for the sign and one for the magnitude of the offsets) might be used as well. In this way, one of the two (sign or magnitude) would be kept in reserve and not released, even in the secure software.
- the hardware/software that creates the watermarks is in secure hands (so that H remains secret and cannot be misused). For example, if the adversary is allowed to watermark a blank document, then the scheme can lose security. There are several ways, however, that security can be enhanced as is now explained. In one approach, it is assumed that each copy of the watermarking software produces watermarks unique to the copy. For example, the XYZ Corporation watermarking software produces watermarks of the form H(XYZCORP
- the original offset watermark vectors can be derived as a function of the document that is being watermarked in addition to the text that is being embedded into the document. This has the effect of making watermarks corresponding to "Do not copy" be different for each document in which they appear. For example, one might use H(x_1 ...X_n
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP97909004A EP0888676A1 (fr) | 1996-03-12 | 1997-03-12 | Procede d'application de filigrane efficace contre les copies illicites |
AU20760/97A AU2076097A (en) | 1996-03-12 | 1997-03-12 | Watermarking process resilient to collusion attacks |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/615,534 | 1996-03-12 | ||
US08/615,534 US5664018A (en) | 1996-03-12 | 1996-03-12 | Watermarking process resilient to collusion attacks |
US67986396A | 1996-07-15 | 1996-07-15 | |
US08/679,863 | 1996-07-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997034391A1 true WO1997034391A1 (fr) | 1997-09-18 |
Family
ID=27087532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1997/003816 WO1997034391A1 (fr) | 1996-03-12 | 1997-03-12 | Procede d'application de filigrane efficace contre les copies illicites |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP0888676A1 (fr) |
AU (1) | AU2076097A (fr) |
WO (1) | WO1997034391A1 (fr) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1089550A2 (fr) * | 1999-09-30 | 2001-04-04 | Kabushiki Kaisha Toshiba | Procédé et unité de génération et de détection de code, et unité d'intégration et de détection de filigrane |
WO2001031910A1 (fr) * | 1999-10-28 | 2001-05-03 | Microsoft Corporation | Procedes et systemes permettant un filigranage de donnees numeriques |
GB2358100A (en) * | 1999-11-30 | 2001-07-11 | Ibm | Digital watermarks |
US6466670B1 (en) | 1998-05-21 | 2002-10-15 | Nds Limited | System for preventing playback of unauthorized digital video recordings |
AU768687B2 (en) * | 1998-12-03 | 2003-12-18 | Hitachi Limited | Method of and apparatus for restricting copy of digital information and apparatus for recording digital information |
US7007165B1 (en) | 1999-05-02 | 2006-02-28 | Nds Limited | Watermark system |
US7047413B2 (en) | 2001-04-23 | 2006-05-16 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7231400B2 (en) | 2000-11-30 | 2007-06-12 | Microsoft Corporation | Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values |
US7246136B2 (en) | 2001-11-26 | 2007-07-17 | Microsoft Corporation | Dynamically generated schema representing multiple hierarchies of inter-object relationships |
US7334197B2 (en) | 2000-07-19 | 2008-02-19 | Microsoft Corporation | Display and management of data within hierarchies and polyarchies of information |
US7359907B2 (en) | 2001-11-26 | 2008-04-15 | Microsoft Corporation | Extending a directory schema independent of schema modification |
US7389335B2 (en) | 2001-11-26 | 2008-06-17 | Microsoft Corporation | Workflow management based on an integrated view of resource identity |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5488664A (en) * | 1994-04-22 | 1996-01-30 | Yeda Research And Development Co., Ltd. | Method and apparatus for protecting visual information with printed cryptographic watermarks |
US5530759A (en) * | 1995-02-01 | 1996-06-25 | International Business Machines Corporation | Color correct digital watermarking of images |
-
1997
- 1997-03-12 WO PCT/US1997/003816 patent/WO1997034391A1/fr not_active Application Discontinuation
- 1997-03-12 AU AU20760/97A patent/AU2076097A/en not_active Abandoned
- 1997-03-12 EP EP97909004A patent/EP0888676A1/fr not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5488664A (en) * | 1994-04-22 | 1996-01-30 | Yeda Research And Development Co., Ltd. | Method and apparatus for protecting visual information with printed cryptographic watermarks |
US5530759A (en) * | 1995-02-01 | 1996-06-25 | International Business Machines Corporation | Color correct digital watermarking of images |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6466670B1 (en) | 1998-05-21 | 2002-10-15 | Nds Limited | System for preventing playback of unauthorized digital video recordings |
SG104257A1 (en) * | 1998-12-03 | 2004-06-21 | Pioneer Corp | Method of and apparatus for restricting copy of digital information, and apparatus for recording digital information |
AU768687B2 (en) * | 1998-12-03 | 2003-12-18 | Hitachi Limited | Method of and apparatus for restricting copy of digital information and apparatus for recording digital information |
US7200751B2 (en) | 1999-05-02 | 2007-04-03 | Nds Limited | Watermark system |
US7802100B2 (en) | 1999-05-02 | 2010-09-21 | Nds Limited | Watermark system |
EP2360915A2 (fr) | 1999-05-02 | 2011-08-24 | NDS Limited | Système de filigrane |
US7007165B1 (en) | 1999-05-02 | 2006-02-28 | Nds Limited | Watermark system |
US7624273B2 (en) | 1999-09-30 | 2009-11-24 | Kabushiki Kaisha Toshiba | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit |
EP1089550A3 (fr) * | 1999-09-30 | 2003-04-16 | Kabushiki Kaisha Toshiba | Procédé et unité de génération et de détection de code, et unité d'intégration et de détection de filigrane |
EP1089550A2 (fr) * | 1999-09-30 | 2001-04-04 | Kabushiki Kaisha Toshiba | Procédé et unité de génération et de détection de code, et unité d'intégration et de détection de filigrane |
US6901515B1 (en) | 1999-09-30 | 2005-05-31 | Kabushiki Kaisha Toshiba | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit |
EP1619872A2 (fr) * | 1999-09-30 | 2006-01-25 | Kabushiki Kaisha Toshiba | Procédé de génération de code et unité correspondante, procédé de détection de code et unité correspondante, unité dýinsertion de filigrane et unité de détection de filigrane |
EP1624359A2 (fr) * | 1999-09-30 | 2006-02-08 | Kabushiki Kaisha Toshiba | Procédé de génération de code et unité correspondante, procédé de détection de code et unité correspondante, unité d'insertion de filigrane et unité de détection de filigrane |
US7082537B2 (en) | 1999-09-30 | 2006-07-25 | Kabushiki Kaisha Toshiba | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit |
EP1624359A3 (fr) * | 1999-09-30 | 2006-03-01 | Kabushiki Kaisha Toshiba | Procédé de génération de code et unité correspondante, procédé de détection de code et unité correspondante, unité d'insertion de filigrane et unité de détection de filigrane |
EP1619872A3 (fr) * | 1999-09-30 | 2006-03-15 | Kabushiki Kaisha Toshiba | Procédé de génération de code et unité correspondante, procédé de détection de code et unité correspondante, unité dýinsertion de filigrane et unité de détection de filigrane |
US6754364B1 (en) | 1999-10-28 | 2004-06-22 | Microsoft Corporation | Methods and systems for fingerprinting digital data |
US7200244B2 (en) | 1999-10-28 | 2007-04-03 | Microsoft Corporation | Systems for fingerprinting digital data |
US7158655B2 (en) | 1999-10-28 | 2007-01-02 | Microsoft Corporation | Systems for fingerprinting digital data |
US7177442B2 (en) | 1999-10-28 | 2007-02-13 | Microsoft Corporation | Methods and systems for fingerprinting digital data |
WO2001031910A1 (fr) * | 1999-10-28 | 2001-05-03 | Microsoft Corporation | Procedes et systemes permettant un filigranage de donnees numeriques |
GB2358100A (en) * | 1999-11-30 | 2001-07-11 | Ibm | Digital watermarks |
GB2358100B (en) * | 1999-11-30 | 2004-03-17 | Ibm | Digital watermarks |
US6807634B1 (en) | 1999-11-30 | 2004-10-19 | International Business Machines Corporation | Watermarks for customer identification |
US7334197B2 (en) | 2000-07-19 | 2008-02-19 | Microsoft Corporation | Display and management of data within hierarchies and polyarchies of information |
US7603374B2 (en) | 2000-11-30 | 2009-10-13 | Microsoft Corporation | Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values |
US7231400B2 (en) | 2000-11-30 | 2007-06-12 | Microsoft Corporation | Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values |
US7047413B2 (en) | 2001-04-23 | 2006-05-16 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7096364B2 (en) | 2001-04-23 | 2006-08-22 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7058812B2 (en) | 2001-04-23 | 2006-06-06 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7681039B2 (en) | 2001-04-23 | 2010-03-16 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7062653B2 (en) | 2001-04-23 | 2006-06-13 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7558959B2 (en) | 2001-04-23 | 2009-07-07 | Microsoft Corporation | Collusion-resistant watermarking and fingerprinting |
US7359907B2 (en) | 2001-11-26 | 2008-04-15 | Microsoft Corporation | Extending a directory schema independent of schema modification |
US7536414B2 (en) | 2001-11-26 | 2009-05-19 | Microsoft Corporation | Dynamically generated schema representing multiple hierarchies of inter-object relationships |
US7487176B2 (en) | 2001-11-26 | 2009-02-03 | Microsoft Corporation | Extending a directory schema independent of schema modification |
US7389335B2 (en) | 2001-11-26 | 2008-06-17 | Microsoft Corporation | Workflow management based on an integrated view of resource identity |
US7246136B2 (en) | 2001-11-26 | 2007-07-17 | Microsoft Corporation | Dynamically generated schema representing multiple hierarchies of inter-object relationships |
Also Published As
Publication number | Publication date |
---|---|
EP0888676A1 (fr) | 1999-01-07 |
AU2076097A (en) | 1997-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5664018A (en) | Watermarking process resilient to collusion attacks | |
US5949885A (en) | Method for protecting content using watermarking | |
Celik et al. | Hierarchical watermarking for secure image authentication with localization | |
US6272634B1 (en) | Digital watermarking to resolve multiple claims of ownership | |
Fridrich | Methods for tamper detection in digital images | |
CA2304041C (fr) | Procede de traitement d'image facilitant la protection contre la copie | |
Memon et al. | Protecting digital media content | |
Rey et al. | A survey of watermarking algorithms for image authentication | |
Wolfgang et al. | A watermarking technique for digital imagery: further studies | |
Wolfgang et al. | Fragile watermarking using the VW2D watermark | |
Cox et al. | A secure, robust watermark for multimedia | |
Liu et al. | A review study on digital watermarking | |
JP2002511201A (ja) | 透かし模様を使用した信号の認証 | |
US8131007B2 (en) | Watermarking using multiple watermarks and keys, including keys dependent on the host signal | |
EP0888676A1 (fr) | Procede d'application de filigrane efficace contre les copies illicites | |
Piva et al. | Self recovery authentication of images in the DWT domain | |
Mishra et al. | A survey on digital watermarking techniques | |
Song | Watermarking of relational databases | |
Craver et al. | Security analysis of public key watermarking schemes | |
Ahuja et al. | A survey of digital watermarking scheme | |
Mahmoud et al. | Frequency domain watermarking: An overview. | |
Kostopoulos et al. | Colour image authentication based on a self-embedding technique | |
Johnson et al. | A role for digital watermarking in electronic commerce | |
Yeung et al. | Digital watermarks: Shedding light on the invisible | |
Piva et al. | A watermarking technique for the protection of digital images IPR |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1997909004 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 97532771 Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1997909004 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1997909004 Country of ref document: EP |