WO1999048006A1 - Procede et appareil pour camoufler les donnees - Google Patents
Procede et appareil pour camoufler les donnees Download PDFInfo
- Publication number
- WO1999048006A1 WO1999048006A1 PCT/SG1998/000023 SG9800023W WO9948006A1 WO 1999048006 A1 WO1999048006 A1 WO 1999048006A1 SG 9800023 W SG9800023 W SG 9800023W WO 9948006 A1 WO9948006 A1 WO 9948006A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- elements
- data element
- data elements
- steganographic encoding
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 96
- 230000005540 biological transmission Effects 0.000 abstract description 7
- 230000000295 complement effect Effects 0.000 abstract description 6
- 230000005236 sound signal Effects 0.000 description 4
- 230000003044 adaptive effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 241000238631 Hexapoda Species 0.000 description 1
- 241000270322 Lepidosauria Species 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/98—Adaptive-dynamic-range coding [ADRC]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3243—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of type information, e.g. handwritten or text document
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3274—Storage or retrieval of prestored additional information
Definitions
- the present invention relates generally to encoding methods, and more particularly to a method and apparatus for steganographic encoding of data.
- the encoding method is espartially suited to digital camouflaging of audio, still image and video data and it will be convenient to describe the method and associated apparatus in relation to that example application. It should be appreciated, however, that the invention is intended for broader application and use.
- the encoding method of the present invention may also be used in the field of data encryption.
- Rhoads discloses methods to impress an identification code on a carrier, such as an electronic data signal or a physical medium, in a manner that permits the identification code to be later discerned and the carrier thereby identified.
- Sandford and Handel disclose a method of embedding auxiliary information into host data, such as a photograph, television signal, facsimile transmission, or identification card. The method operates by manipulating a noise component of the host data in accordance with the auxiliary information.
- steganography is intended to denote any of various methods seeking to conceal the existence of a message within some other medium such that any unintended party who intercepts the 2 medium does not know it contains the concealed message and does not therefore obtain the information contained in the message.
- Digital watermarking is one example of a steganographic method used to embed secondary data, such as text, in primary or host data, such as a digitized image.
- the word “cryptography” is intended to denote any of various techniques seeking to hide information contained in a message such that when the message is transmitted from a sender to a receiver any third party intercepting the message cannot read it or extract the information contained in the message.
- the word "camouflaging” is intended to denote a steganographic encoding method which conceals secondary data by utilizing a combination of primary or host data and key data.
- the encoding method may not actually embed information in the primary data, as in watermarking, but may utilize information elements existing in the primary data.
- a steganographic encoding method and apparatus which may allow a relatively long string of secondary data (such as text) to be camouflaged in association with primary data (such as image, audio or video data) whilst producing minimal degradation of the primary or host data.
- the primary data may be absolutely unaltered by the encoding process.
- many potential consumer, commercial and service applications may benefit from the use of 3 digital camouflaging/watermarking technology, both for copyright protection purposes and for secure transmission of information. These applications include encoding of text containing ownership identification or attribute information associated with digital still or video cameras, copyright protection and royalty tracking of sound recordings in the music industry.
- Commercial and service sectors may also benefit from secure transmission and reception of sensitive information that could be camouflaged in normal data streams transmitted through an open channel.
- the present invention provides a method of steganographic encoding including the steps of:
- the address of the matching first data element may be stored as a key element associated with the second data element.
- a string of key elements (containing addresses) may be associated with a corresponding string of second data elements.
- the string of key elements may specify where in the primary data each second data element of the secondary data is to be found.
- the secondary data may in this context be considered to be camouflaged in the primary data and the key data.
- Unique key data which is generated for given primary and secondary data may be stored for use in a complementary decoding method which is 4 described below.
- the primary and secondary data may be represented digitally. However, in its broadest aspects, the invention is applicable to any form of data representation or notation using any convenient set of symbols.
- the primary data may represent a still image, motion video, audio, text or other type of information.
- the secondary data may represent a still image, motion video, audio, text or other information.
- the secondary data includes a text message and each second data element includes an alphanumeric character. The alphanumeric characters may be used to compose the text message.
- the text message may include copyright information relating to the image, video, audio, etc. contained in the primary data.
- the text message may include one or more of the following: a title, an artist, a copyright holder, a body to which royalties should be paid, and general terms of publisher distribution.
- the primary data may include a still image.
- the first data elements may be arranged in a two-dimensional array wherein each first data element defines a characteristic associated with a still image element.
- the first data elements are obtained from a stream of data representing a digitised still image.
- the image may be obtained from a still digital camera, a computer game or other software, or other source. It may be a grayscale or color image, for example, and may be stored in any known format, eg. BMP, GIF, TIFF, or JPEG.
- the primary data may alternatively or additionally include motion video.
- the first data elements may be arranged in a three-dimensional array wherein each first data element defines a characteristic associated with a motion video element.
- the first data elements are obtained from a stream of data representing digitised motion video.
- the digitised video may be obtained from a Video Compact Disc (VCD) player, a Laser Disc (LD) player, a computer game or other software, a Digital Versatile Disc (DVD) player or other source, and may be stored in any known format, eg. MPEG.
- the primary data may alternatively or additionally include audio 5 information.
- the first data elements may be arranged in a one-dimensional array wherein each first data element defines a characteristic associated with a digital audio sample.
- the digital audio samples are obtained from a stream of data representing digitised sound or music.
- the digitised sound may be obtained from a Compact Disc (CD) player, Digital Audio Tape (DAT) player, Laser Disc player, Video Compact Disc (VCD) player or other source, and may be stored in any known format eg. WAV, AIFF, etc.
- the digital audio samples are obtained from two streams of data representing two channels of digitised sound for stereo reproduction.
- the first and second data elements may be represented by integer values and step (C) may further include: when a match is not found for the content of a second data element;
- the method may further include:
- a search is conducted to locate values 104 or 106. If one of these values is found, the address of the first data element containing that value is stored in a key element, and the content of the first data element (104 or 106) is replaced with the value 105. If on the other hand the values 104 or 106 are not found, a 6 search is conducted for values 103 or 107.
- This modification of the primary data may be considered to be a form of embedding of the secondary data in the primary data, in the watermarking sense, but is only performed in the relatively rare event that a desired integer value is not found in the primary data. It has been found that these rarely occurring changes are imperceptible in the modified primary image, video or audio data.
- the modified version of the primary data may subsequently be stored for distribution via the internet or other means.
- the modified primary data contains the secondary data which can be extracted at any future time using the associated key data generated during the encoding process.
- the encoding method may include "data shifting" steps prior to step (C).
- the data shifting steps may be required whenever the range for the secondary data does not fall within the range for the primary data. This may occur for example when the primary data is a digitised audio signal and the secondary data is a text message. Similar data shifting steps may be applied to other types of data.
- the data shifting steps may include: determining a range for the contents of the first data elements, determining a range for the contents of the second data elements, comparing the range for the first data elements with the range for the second data elements, shifting the contents of the second data elements when the range for the second data elements falls outside of the range for the first data elements, such that the range for the second data elements falls substantially within the range for the first data elements, and using the shifted second data elements as the second data elements in step (C).
- the step of determining a range for the contents of the first data elements includes: calculating a mean and standard deviation for the first data elements; and determining a lower limit for the first data elements based on the mean and standard deviation.
- the step of determining a range for the contents of the second data elements may include establishing as a reference a minimum 7 value which can be attributed to the range of possible second data elements.
- the step of comparing may include calculating an offset value by subtracting the reference value from the lower limit, and the step of shifting may include adding the offset value to the contents of each second data element.
- the offset value is stored with the key elements in the key data.
- the complementary decoding method should also include steps to reverse the data shifting offset.
- the offset value may be retrieved from the key data.
- the present invention has the distinct advantage that long sentences of text may be camouflaged. Even with long text strings, the integrity of the primary data is in most cases not affected or compromised.
- the primary data may remain absolutely unchanged by the encoding method because the method utilises data already present in the primary data. Even in those cases where specific values contained in the secondary data cannot be found in the primary data, and the primary data is modified to insert those values, the primary data may remain substantially unaltered.
- the present invention provides a method of steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said method including the steps of:
- the present invention provides an apparatus for steganographic encoding including:
- (C) means for searching, for each second data element, a first data element which matches content of the second data element
- (D) means for generating a key element including the address of the matching first data element when a match is found for the content of the second data element.
- the present invention provides an apparatus for steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said apparatus including:
- A means for providing said primary data containing a plurality of addressable first data elements
- B means for providing said key elements, each key element including an address of a first data element
- (C) means for generating a second data element for each key element by extracting the content of the addressed first data element.
- the method of encoding described above may be applied to cryptography.
- a hidden message may be transmitted from a sender to a receiver.
- the message may be encoded in the key elements which are generated by the method in association with the primary data.
- the message to be hidden in this case corresponds to the second data elements.
- the hidden message may be decoded by the receiver from the key elements by utilizing the primary data in a complementary decoding method.
- Figure 1A illustrates a one dimensional data array containing integer values representing a digitised audio signal
- Figure 1 B illustrates a two dimensional data array containing integer values representing a digital still image
- Figure 2 illustrates an example of an audio signal
- Figure 3 illustrates an example of a digital image
- Figure 4 illustrates a table of the ASCII character set
- Figure 5 illustrates a typical greyscale histogram for a digital image
- Figures 6A and 6B illustrate a two dimensional data array of 4 x 8 data elements representing pixels of a greyscale image
- Figure 7 is a schematic block diagram of a digital camouflaging apparatus according to the present invention.
- Figure 8 is a pseudocode of the digital camouflaging text encoder
- Figure 9 is a pseudocode of the digital camouflaging text decoder
- Figure 10 is a pseudocode of the spatial location program used in the encoding process shown in Figure 8;
- Figure 11 illustrates an example of digital camouflaging of an alphanumeric text message in an image;
- Figure 12 illustrates an entire English text paragraph which is camouflaged in the image of Figure 11.
- Figure 1A illustrates a one dimensional data array containing integer values which may, for example, represent a digital audio signal (speech or music) 10 sampled under a conventional digital sound format.
- Figure 1B illustrates a two dimensional data array containing integer values which may, for example, represent a digital still image in GIF or JPEG format, or a video frame in MPEG format.
- Figure 2 illustrates a typical digital sampled audio waveform (music) in
- FIG. 3 illustrates a typical 8 bit greyscale image of 512 x 512 pixels.
- Digital camouflaging may be described as analogous to natural camouflaging, where the camouflaged object (for example a leaf, insect or reptile) conceals itself completely into the surrounding environment.
- digital camouflaging conceals secondary data, such as an alphanumeric text string in integer form, in primary data, such as an image, by locating the spatial positions of integer values that match the text string values.
- Figure 4 illustrates a table of the ASCII character set.
- the digits at the left of the table are the left digits of the decimal equivalent (0 - 127) of the character code, and the digits at the top of the table are the right digits of the character code.
- the character code for "F” is 70
- the character code for "&" is 38.
- the commonly used alphanumeric codes for text strings are as follows: 48 to 57 represent the numeric values "0 - 9", 65 to 90 represent the upper case alphabet "A - Z", and
- 97 to 122 represent the lower case alphabet "a - z".
- the present invention may be applied to many different data formats for audio, image and video data.
- a histogram distribution for most natural images, such as human faces or landscapes would span a wide range of greyscale levels. For example, an 8 - bit or 256 grey level image would contain image pixel values between 0 and 255.
- Figure 5 illustrates a typical image histogram. It can be seen that a wide spread of pixel values is available in the image for exact matching to alphanumeric character codes to be camouflaged. It can also be seen that a large number of pixels at different spatial locations within the image have the same integer value. For example, the value 105 appears in approximately 2500 11 pixels in the image.
- a search for an exact matching of this character to an image pixel is first performed. Once the pixel value is found, the address of the spatial location of the pixel is stored in a key element. However, more than one pixel containing the same value as the alphanumeric character value is likely to arise. When this occurs, the encoding method will preferably select the first pixel that it finds. The address of this pixel will form an important part of key data that will later be used to decode the camouflaged alphanumeric character text string. Table 1 gives an example of an alphanumeric text string "This is an Example" and the corresponding integer values.
- Figures 6A and 6B show an example of a two-dimensional data array representing pixel values of a 4 x 8 pixel image.
- the terms (1 , 1), (1 , 2), (4, 8) 12 are spatial location addresses of the pixels in the image. These addresses are stored as key elements when the alphanumeric character values are matched to pixel values during searching. For example, in the encoding process, the first alphanumeric character "T" with its integer value of 84 (shown in bold in Figure 6A) would match the values of pixels located at (3,1) and (2, 8). The address of the first location (3, 1) will be stored in a corresponding key element for later use in the complementary decoding process.
- the present invention will perform a new search for an adjusted value that is one pixel off either side of the character value.
- the address of the pixel containing the adjusted value is then stored as the key element. For example, if the first alphanumeric character of the text string is a "T", with an integer value of 84, when the search of the pixel values does not locate a single value of 84, a new search would commence to locate values 83 or 85. These values correspond to alphanumeric characters of "S" and "U", respectively.
- the new search when the new search locates a pixel having a value of 83 or 85 it will first check whether that pixel has already been used. If so, and providing that the same pixel values occur at other addresses, the encoding method will select another pixel having the value of 83 or 85. Once such a pixel has been found, the pixel value is overwritten with the character value of 84.
- a second search commences to locate a pixel value having a new adjusted value, of 2 pixel values off either side of the character value (ie. 82 and 86 in the present example). The matching and overwriting steps are then repeated as before.
- the complementary decoding process is relatively straight forward as it uses the unique key data generated from the spatial location addresses of pixels that match the alphanumeric characters composing the text string.
- the unique key data provides the addresses of the spatial locations from which the camouflaged text string may be extracted from the image.
- the key data is unique to a specific text string and specific image. If the key data is applied to another image, the text string extracted will be just a random sequence of characters.
- the dynamic range of values of audio samples associated with music or speech may not be as wide as in the case for digital still/video images.
- the audio integer values may also be in a range that is somewhat different to the range of alphanumeric character values.
- a slightly different approach is therefore needed for camouflaging of alphanumeric text strings in digital audio data.
- the present invention may accordingly include an adaptive statistical approach to first determine the dynamic range of the audio samples.
- the mean ( ⁇ ) and the standard deviation ( ⁇ ) of the audio samples are determined and used to calculate a lower limit of the audio samples.
- the alphanumeric character set may be adaptively shifted to coincide with the dynamic range of the audio samples.
- This adaptive statistical approach has proven very robust for embedding alphanumeric text strings into digital audio samples of music and speech.
- the method steps involved in the adaptive statistical range shifting process are preferably as follows:
- FIG. 7 there is shown a schematic block diagram of a digital encoding/decoding apparatus according to an embodiment of the present invention.
- Data samples 10 are encoded with an alphanumeric character string 12 through a data encoding means 14.
- Encoded data samples 16 and unique key data 18, containing spatial location addresses, are obtained from the data encoding means 14. These two outputs 16, 18 are used in the reverse decoding means 20.
- the original alphanumeric character string 12 is extracted as 12A from the encoded data samples 16 using the location address contained in the unique key data 18.
- the encoded data samples 16 remain unchanged or minimally changed as 16A by the decoding means 20.
- a pseudocode of the digital camouflaging text encoder is shown in Figure 8 and a pseudocode of the digital camouflaging text decoder is shown in Figure 9.
- a pseudocode of the spatial location program used in the encoding process is shown in Figure 10.
- the term "unlabelled” is used to refer to the original data and the term “labelled” is used to refer to the encoded data.
- FIG. 11 An example of the use of the present invention for camouflaging text labels in a digital image is illustrated in Figure 11.
- a text string containing 83 characters "This example shows an alphanumeric text message camouflaged into the image of Lena.” is camouflaged in the Lena image.
- the correlation coefficient equals exactly one, indicating that there is no difference between the labelled and unlabelled images.
- an entire paragraph of English text containing 126 words and 784 characters, as shown in Figure 12 is camouflaged in the same Lena image and, once again, the correlation coefficient is equal to exactly one.
- camouflaging alphanumeric character text strings into digital data has many potential applications for resolving copyright protection 16 issues in the consumer sector or for secure transmission of messages in the commercial and service sectors.
- data camouflaging may be incorporated into consumer electronic products, such as digital still/video cameras and, more recently, VCD and DVD players, to authenticate the true ownership of intellectual property rights or product ownership.
- Another major consumer area for data camouflaging is that of preventing illegal copying and downloading of satellite images, music CD's, and tapes.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimile Image Signal Circuits (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000537139A JP2002507771A (ja) | 1998-03-18 | 1998-03-18 | データ偽装のための方法及び装置 |
AU69363/98A AU6936398A (en) | 1998-03-18 | 1998-03-18 | Method and apparatus for camouflaging data |
PCT/SG1998/000023 WO1999048006A1 (fr) | 1998-03-18 | 1998-03-18 | Procede et appareil pour camoufler les donnees |
EP98915102A EP1062585A1 (fr) | 1998-03-18 | 1998-03-18 | Procede et appareil pour camoufler les donnees |
CA002319601A CA2319601A1 (fr) | 1998-03-18 | 1998-03-18 | Procede et appareil pour camoufler les donnees |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG1998/000023 WO1999048006A1 (fr) | 1998-03-18 | 1998-03-18 | Procede et appareil pour camoufler les donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999048006A1 true WO1999048006A1 (fr) | 1999-09-23 |
Family
ID=20429845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG1998/000023 WO1999048006A1 (fr) | 1998-03-18 | 1998-03-18 | Procede et appareil pour camoufler les donnees |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1062585A1 (fr) |
JP (1) | JP2002507771A (fr) |
AU (1) | AU6936398A (fr) |
CA (1) | CA2319601A1 (fr) |
WO (1) | WO1999048006A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002084515A1 (fr) * | 2001-04-12 | 2002-10-24 | Copyseal Pty Ltd | Systeme et procede permettant d'eviter la reproduction non autorisee de documents electroniques |
US9727748B1 (en) * | 2011-05-03 | 2017-08-08 | Open Invention Network Llc | Apparatus, method, and computer program for providing document security |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5532473B2 (ja) * | 2009-07-29 | 2014-06-25 | 谷電機工業株式会社 | 番地カラーシステム、カラー写真画像を利用した符号化方法および復号化方法、並びに暗号化方法 |
CN112445539A (zh) * | 2019-09-02 | 2021-03-05 | 珠海市魅族科技有限公司 | 识别伪装音乐播放的方法、装置、电子设备和存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997026732A1 (fr) * | 1996-01-17 | 1997-07-24 | The Dice Company | Procede de protection de code informatique par cryptage stega |
WO1997043761A2 (fr) * | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Procedes, appareils et systemes de chiffrement pour la gestion electronique des droits relatifs aux supports de stockage dans des appareils fermes et interconnectes |
-
1998
- 1998-03-18 CA CA002319601A patent/CA2319601A1/fr not_active Abandoned
- 1998-03-18 WO PCT/SG1998/000023 patent/WO1999048006A1/fr not_active Application Discontinuation
- 1998-03-18 EP EP98915102A patent/EP1062585A1/fr not_active Withdrawn
- 1998-03-18 JP JP2000537139A patent/JP2002507771A/ja active Pending
- 1998-03-18 AU AU69363/98A patent/AU6936398A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997026732A1 (fr) * | 1996-01-17 | 1997-07-24 | The Dice Company | Procede de protection de code informatique par cryptage stega |
WO1997043761A2 (fr) * | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Procedes, appareils et systemes de chiffrement pour la gestion electronique des droits relatifs aux supports de stockage dans des appareils fermes et interconnectes |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002084515A1 (fr) * | 2001-04-12 | 2002-10-24 | Copyseal Pty Ltd | Systeme et procede permettant d'eviter la reproduction non autorisee de documents electroniques |
US9727748B1 (en) * | 2011-05-03 | 2017-08-08 | Open Invention Network Llc | Apparatus, method, and computer program for providing document security |
Also Published As
Publication number | Publication date |
---|---|
JP2002507771A (ja) | 2002-03-12 |
CA2319601A1 (fr) | 1999-09-23 |
AU6936398A (en) | 1999-10-11 |
EP1062585A1 (fr) | 2000-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cox et al. | A review of watermarking principles and practices 1 | |
US6983057B1 (en) | Methods for embedding image, audio and video watermarks in digital data | |
EP1256086B1 (fr) | Procedes et appareils de masquage de donnees multicouches | |
US7224819B2 (en) | Integrating digital watermarks in multimedia content | |
US6674861B1 (en) | Digital audio watermarking using content-adaptive, multiple echo hopping | |
AU2010201199B2 (en) | Desynchronized fingerprinting method and system for digital multimedia data | |
US7398395B2 (en) | Using multiple watermarks to protect content material | |
US20050210257A1 (en) | System and method for protecting digital media | |
US20040059933A1 (en) | Digital watermarking and fingerprinting applications for copy protection | |
JP4542411B2 (ja) | 媒体のデコード後透かし付けシステム | |
US7496197B2 (en) | Method and system for robust embedding of watermarks and steganograms in digital video content | |
WO2000025203A1 (fr) | Procedes de steganographie numerique destines a des donnees multimedia | |
Petitcolas et al. | Weaknesses of copyright marking systems | |
Panigrahi et al. | An effective steganographic technique for hiding the image data using the LSB technique | |
Banik et al. | Review on steganography in digital media | |
WO1999048006A1 (fr) | Procede et appareil pour camoufler les donnees | |
Xu et al. | Digital audio watermarking and its application in multimedia database | |
Asad et al. | A modification of least significant digit (LSD) digital watermark technique | |
US6988201B1 (en) | Method and apparatus for watermarking wavetable synthesis architectures | |
Bandyopadhyay | Genetic Algorithm Based Substitution Technique of Image Steganography | |
Singh et al. | A survey on Steganography in Audio | |
Yadav | Study of Information Hiding Techniques and their Counterattacks | |
Hasanudin et al. | Storage of Text Messages on e-Book Files using Least Significant Bit and Haar Wavelet Method | |
Verma et al. | Review Paper on Security Measures in Digital Watermarking | |
Bhadra et al. | Keyless, Robust and Cost-Effective Privacy Protection Algorithm for Videos Using Steganography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA JP SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998915102 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 69363/98 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2319601 Country of ref document: CA Ref country code: CA Ref document number: 2319601 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09622470 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1998915102 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998915102 Country of ref document: EP |