+

WO1999048006A1 - Procede et appareil pour camoufler les donnees - Google Patents

Procede et appareil pour camoufler les donnees Download PDF

Info

Publication number
WO1999048006A1
WO1999048006A1 PCT/SG1998/000023 SG9800023W WO9948006A1 WO 1999048006 A1 WO1999048006 A1 WO 1999048006A1 SG 9800023 W SG9800023 W SG 9800023W WO 9948006 A1 WO9948006 A1 WO 9948006A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
elements
data element
data elements
steganographic encoding
Prior art date
Application number
PCT/SG1998/000023
Other languages
English (en)
Inventor
Anthony Tung Shuen Ho
Original Assignee
Datamark Technologies Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datamark Technologies Pte Ltd filed Critical Datamark Technologies Pte Ltd
Priority to JP2000537139A priority Critical patent/JP2002507771A/ja
Priority to AU69363/98A priority patent/AU6936398A/en
Priority to PCT/SG1998/000023 priority patent/WO1999048006A1/fr
Priority to EP98915102A priority patent/EP1062585A1/fr
Priority to CA002319601A priority patent/CA2319601A1/fr
Publication of WO1999048006A1 publication Critical patent/WO1999048006A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/98Adaptive-dynamic-range coding [ADRC]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3243Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of type information, e.g. handwritten or text document
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3274Storage or retrieval of prestored additional information

Definitions

  • the present invention relates generally to encoding methods, and more particularly to a method and apparatus for steganographic encoding of data.
  • the encoding method is espartially suited to digital camouflaging of audio, still image and video data and it will be convenient to describe the method and associated apparatus in relation to that example application. It should be appreciated, however, that the invention is intended for broader application and use.
  • the encoding method of the present invention may also be used in the field of data encryption.
  • Rhoads discloses methods to impress an identification code on a carrier, such as an electronic data signal or a physical medium, in a manner that permits the identification code to be later discerned and the carrier thereby identified.
  • Sandford and Handel disclose a method of embedding auxiliary information into host data, such as a photograph, television signal, facsimile transmission, or identification card. The method operates by manipulating a noise component of the host data in accordance with the auxiliary information.
  • steganography is intended to denote any of various methods seeking to conceal the existence of a message within some other medium such that any unintended party who intercepts the 2 medium does not know it contains the concealed message and does not therefore obtain the information contained in the message.
  • Digital watermarking is one example of a steganographic method used to embed secondary data, such as text, in primary or host data, such as a digitized image.
  • the word “cryptography” is intended to denote any of various techniques seeking to hide information contained in a message such that when the message is transmitted from a sender to a receiver any third party intercepting the message cannot read it or extract the information contained in the message.
  • the word "camouflaging” is intended to denote a steganographic encoding method which conceals secondary data by utilizing a combination of primary or host data and key data.
  • the encoding method may not actually embed information in the primary data, as in watermarking, but may utilize information elements existing in the primary data.
  • a steganographic encoding method and apparatus which may allow a relatively long string of secondary data (such as text) to be camouflaged in association with primary data (such as image, audio or video data) whilst producing minimal degradation of the primary or host data.
  • the primary data may be absolutely unaltered by the encoding process.
  • many potential consumer, commercial and service applications may benefit from the use of 3 digital camouflaging/watermarking technology, both for copyright protection purposes and for secure transmission of information. These applications include encoding of text containing ownership identification or attribute information associated with digital still or video cameras, copyright protection and royalty tracking of sound recordings in the music industry.
  • Commercial and service sectors may also benefit from secure transmission and reception of sensitive information that could be camouflaged in normal data streams transmitted through an open channel.
  • the present invention provides a method of steganographic encoding including the steps of:
  • the address of the matching first data element may be stored as a key element associated with the second data element.
  • a string of key elements (containing addresses) may be associated with a corresponding string of second data elements.
  • the string of key elements may specify where in the primary data each second data element of the secondary data is to be found.
  • the secondary data may in this context be considered to be camouflaged in the primary data and the key data.
  • Unique key data which is generated for given primary and secondary data may be stored for use in a complementary decoding method which is 4 described below.
  • the primary and secondary data may be represented digitally. However, in its broadest aspects, the invention is applicable to any form of data representation or notation using any convenient set of symbols.
  • the primary data may represent a still image, motion video, audio, text or other type of information.
  • the secondary data may represent a still image, motion video, audio, text or other information.
  • the secondary data includes a text message and each second data element includes an alphanumeric character. The alphanumeric characters may be used to compose the text message.
  • the text message may include copyright information relating to the image, video, audio, etc. contained in the primary data.
  • the text message may include one or more of the following: a title, an artist, a copyright holder, a body to which royalties should be paid, and general terms of publisher distribution.
  • the primary data may include a still image.
  • the first data elements may be arranged in a two-dimensional array wherein each first data element defines a characteristic associated with a still image element.
  • the first data elements are obtained from a stream of data representing a digitised still image.
  • the image may be obtained from a still digital camera, a computer game or other software, or other source. It may be a grayscale or color image, for example, and may be stored in any known format, eg. BMP, GIF, TIFF, or JPEG.
  • the primary data may alternatively or additionally include motion video.
  • the first data elements may be arranged in a three-dimensional array wherein each first data element defines a characteristic associated with a motion video element.
  • the first data elements are obtained from a stream of data representing digitised motion video.
  • the digitised video may be obtained from a Video Compact Disc (VCD) player, a Laser Disc (LD) player, a computer game or other software, a Digital Versatile Disc (DVD) player or other source, and may be stored in any known format, eg. MPEG.
  • the primary data may alternatively or additionally include audio 5 information.
  • the first data elements may be arranged in a one-dimensional array wherein each first data element defines a characteristic associated with a digital audio sample.
  • the digital audio samples are obtained from a stream of data representing digitised sound or music.
  • the digitised sound may be obtained from a Compact Disc (CD) player, Digital Audio Tape (DAT) player, Laser Disc player, Video Compact Disc (VCD) player or other source, and may be stored in any known format eg. WAV, AIFF, etc.
  • the digital audio samples are obtained from two streams of data representing two channels of digitised sound for stereo reproduction.
  • the first and second data elements may be represented by integer values and step (C) may further include: when a match is not found for the content of a second data element;
  • the method may further include:
  • a search is conducted to locate values 104 or 106. If one of these values is found, the address of the first data element containing that value is stored in a key element, and the content of the first data element (104 or 106) is replaced with the value 105. If on the other hand the values 104 or 106 are not found, a 6 search is conducted for values 103 or 107.
  • This modification of the primary data may be considered to be a form of embedding of the secondary data in the primary data, in the watermarking sense, but is only performed in the relatively rare event that a desired integer value is not found in the primary data. It has been found that these rarely occurring changes are imperceptible in the modified primary image, video or audio data.
  • the modified version of the primary data may subsequently be stored for distribution via the internet or other means.
  • the modified primary data contains the secondary data which can be extracted at any future time using the associated key data generated during the encoding process.
  • the encoding method may include "data shifting" steps prior to step (C).
  • the data shifting steps may be required whenever the range for the secondary data does not fall within the range for the primary data. This may occur for example when the primary data is a digitised audio signal and the secondary data is a text message. Similar data shifting steps may be applied to other types of data.
  • the data shifting steps may include: determining a range for the contents of the first data elements, determining a range for the contents of the second data elements, comparing the range for the first data elements with the range for the second data elements, shifting the contents of the second data elements when the range for the second data elements falls outside of the range for the first data elements, such that the range for the second data elements falls substantially within the range for the first data elements, and using the shifted second data elements as the second data elements in step (C).
  • the step of determining a range for the contents of the first data elements includes: calculating a mean and standard deviation for the first data elements; and determining a lower limit for the first data elements based on the mean and standard deviation.
  • the step of determining a range for the contents of the second data elements may include establishing as a reference a minimum 7 value which can be attributed to the range of possible second data elements.
  • the step of comparing may include calculating an offset value by subtracting the reference value from the lower limit, and the step of shifting may include adding the offset value to the contents of each second data element.
  • the offset value is stored with the key elements in the key data.
  • the complementary decoding method should also include steps to reverse the data shifting offset.
  • the offset value may be retrieved from the key data.
  • the present invention has the distinct advantage that long sentences of text may be camouflaged. Even with long text strings, the integrity of the primary data is in most cases not affected or compromised.
  • the primary data may remain absolutely unchanged by the encoding method because the method utilises data already present in the primary data. Even in those cases where specific values contained in the secondary data cannot be found in the primary data, and the primary data is modified to insert those values, the primary data may remain substantially unaltered.
  • the present invention provides a method of steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said method including the steps of:
  • the present invention provides an apparatus for steganographic encoding including:
  • (C) means for searching, for each second data element, a first data element which matches content of the second data element
  • (D) means for generating a key element including the address of the matching first data element when a match is found for the content of the second data element.
  • the present invention provides an apparatus for steganographic decoding of secondary data including a plurality of second data elements, said secondary data being encoded in key elements in association with primary data, said apparatus including:
  • A means for providing said primary data containing a plurality of addressable first data elements
  • B means for providing said key elements, each key element including an address of a first data element
  • (C) means for generating a second data element for each key element by extracting the content of the addressed first data element.
  • the method of encoding described above may be applied to cryptography.
  • a hidden message may be transmitted from a sender to a receiver.
  • the message may be encoded in the key elements which are generated by the method in association with the primary data.
  • the message to be hidden in this case corresponds to the second data elements.
  • the hidden message may be decoded by the receiver from the key elements by utilizing the primary data in a complementary decoding method.
  • Figure 1A illustrates a one dimensional data array containing integer values representing a digitised audio signal
  • Figure 1 B illustrates a two dimensional data array containing integer values representing a digital still image
  • Figure 2 illustrates an example of an audio signal
  • Figure 3 illustrates an example of a digital image
  • Figure 4 illustrates a table of the ASCII character set
  • Figure 5 illustrates a typical greyscale histogram for a digital image
  • Figures 6A and 6B illustrate a two dimensional data array of 4 x 8 data elements representing pixels of a greyscale image
  • Figure 7 is a schematic block diagram of a digital camouflaging apparatus according to the present invention.
  • Figure 8 is a pseudocode of the digital camouflaging text encoder
  • Figure 9 is a pseudocode of the digital camouflaging text decoder
  • Figure 10 is a pseudocode of the spatial location program used in the encoding process shown in Figure 8;
  • Figure 11 illustrates an example of digital camouflaging of an alphanumeric text message in an image;
  • Figure 12 illustrates an entire English text paragraph which is camouflaged in the image of Figure 11.
  • Figure 1A illustrates a one dimensional data array containing integer values which may, for example, represent a digital audio signal (speech or music) 10 sampled under a conventional digital sound format.
  • Figure 1B illustrates a two dimensional data array containing integer values which may, for example, represent a digital still image in GIF or JPEG format, or a video frame in MPEG format.
  • Figure 2 illustrates a typical digital sampled audio waveform (music) in
  • FIG. 3 illustrates a typical 8 bit greyscale image of 512 x 512 pixels.
  • Digital camouflaging may be described as analogous to natural camouflaging, where the camouflaged object (for example a leaf, insect or reptile) conceals itself completely into the surrounding environment.
  • digital camouflaging conceals secondary data, such as an alphanumeric text string in integer form, in primary data, such as an image, by locating the spatial positions of integer values that match the text string values.
  • Figure 4 illustrates a table of the ASCII character set.
  • the digits at the left of the table are the left digits of the decimal equivalent (0 - 127) of the character code, and the digits at the top of the table are the right digits of the character code.
  • the character code for "F” is 70
  • the character code for "&" is 38.
  • the commonly used alphanumeric codes for text strings are as follows: 48 to 57 represent the numeric values "0 - 9", 65 to 90 represent the upper case alphabet "A - Z", and
  • 97 to 122 represent the lower case alphabet "a - z".
  • the present invention may be applied to many different data formats for audio, image and video data.
  • a histogram distribution for most natural images, such as human faces or landscapes would span a wide range of greyscale levels. For example, an 8 - bit or 256 grey level image would contain image pixel values between 0 and 255.
  • Figure 5 illustrates a typical image histogram. It can be seen that a wide spread of pixel values is available in the image for exact matching to alphanumeric character codes to be camouflaged. It can also be seen that a large number of pixels at different spatial locations within the image have the same integer value. For example, the value 105 appears in approximately 2500 11 pixels in the image.
  • a search for an exact matching of this character to an image pixel is first performed. Once the pixel value is found, the address of the spatial location of the pixel is stored in a key element. However, more than one pixel containing the same value as the alphanumeric character value is likely to arise. When this occurs, the encoding method will preferably select the first pixel that it finds. The address of this pixel will form an important part of key data that will later be used to decode the camouflaged alphanumeric character text string. Table 1 gives an example of an alphanumeric text string "This is an Example" and the corresponding integer values.
  • Figures 6A and 6B show an example of a two-dimensional data array representing pixel values of a 4 x 8 pixel image.
  • the terms (1 , 1), (1 , 2), (4, 8) 12 are spatial location addresses of the pixels in the image. These addresses are stored as key elements when the alphanumeric character values are matched to pixel values during searching. For example, in the encoding process, the first alphanumeric character "T" with its integer value of 84 (shown in bold in Figure 6A) would match the values of pixels located at (3,1) and (2, 8). The address of the first location (3, 1) will be stored in a corresponding key element for later use in the complementary decoding process.
  • the present invention will perform a new search for an adjusted value that is one pixel off either side of the character value.
  • the address of the pixel containing the adjusted value is then stored as the key element. For example, if the first alphanumeric character of the text string is a "T", with an integer value of 84, when the search of the pixel values does not locate a single value of 84, a new search would commence to locate values 83 or 85. These values correspond to alphanumeric characters of "S" and "U", respectively.
  • the new search when the new search locates a pixel having a value of 83 or 85 it will first check whether that pixel has already been used. If so, and providing that the same pixel values occur at other addresses, the encoding method will select another pixel having the value of 83 or 85. Once such a pixel has been found, the pixel value is overwritten with the character value of 84.
  • a second search commences to locate a pixel value having a new adjusted value, of 2 pixel values off either side of the character value (ie. 82 and 86 in the present example). The matching and overwriting steps are then repeated as before.
  • the complementary decoding process is relatively straight forward as it uses the unique key data generated from the spatial location addresses of pixels that match the alphanumeric characters composing the text string.
  • the unique key data provides the addresses of the spatial locations from which the camouflaged text string may be extracted from the image.
  • the key data is unique to a specific text string and specific image. If the key data is applied to another image, the text string extracted will be just a random sequence of characters.
  • the dynamic range of values of audio samples associated with music or speech may not be as wide as in the case for digital still/video images.
  • the audio integer values may also be in a range that is somewhat different to the range of alphanumeric character values.
  • a slightly different approach is therefore needed for camouflaging of alphanumeric text strings in digital audio data.
  • the present invention may accordingly include an adaptive statistical approach to first determine the dynamic range of the audio samples.
  • the mean ( ⁇ ) and the standard deviation ( ⁇ ) of the audio samples are determined and used to calculate a lower limit of the audio samples.
  • the alphanumeric character set may be adaptively shifted to coincide with the dynamic range of the audio samples.
  • This adaptive statistical approach has proven very robust for embedding alphanumeric text strings into digital audio samples of music and speech.
  • the method steps involved in the adaptive statistical range shifting process are preferably as follows:
  • FIG. 7 there is shown a schematic block diagram of a digital encoding/decoding apparatus according to an embodiment of the present invention.
  • Data samples 10 are encoded with an alphanumeric character string 12 through a data encoding means 14.
  • Encoded data samples 16 and unique key data 18, containing spatial location addresses, are obtained from the data encoding means 14. These two outputs 16, 18 are used in the reverse decoding means 20.
  • the original alphanumeric character string 12 is extracted as 12A from the encoded data samples 16 using the location address contained in the unique key data 18.
  • the encoded data samples 16 remain unchanged or minimally changed as 16A by the decoding means 20.
  • a pseudocode of the digital camouflaging text encoder is shown in Figure 8 and a pseudocode of the digital camouflaging text decoder is shown in Figure 9.
  • a pseudocode of the spatial location program used in the encoding process is shown in Figure 10.
  • the term "unlabelled” is used to refer to the original data and the term “labelled” is used to refer to the encoded data.
  • FIG. 11 An example of the use of the present invention for camouflaging text labels in a digital image is illustrated in Figure 11.
  • a text string containing 83 characters "This example shows an alphanumeric text message camouflaged into the image of Lena.” is camouflaged in the Lena image.
  • the correlation coefficient equals exactly one, indicating that there is no difference between the labelled and unlabelled images.
  • an entire paragraph of English text containing 126 words and 784 characters, as shown in Figure 12 is camouflaged in the same Lena image and, once again, the correlation coefficient is equal to exactly one.
  • camouflaging alphanumeric character text strings into digital data has many potential applications for resolving copyright protection 16 issues in the consumer sector or for secure transmission of messages in the commercial and service sectors.
  • data camouflaging may be incorporated into consumer electronic products, such as digital still/video cameras and, more recently, VCD and DVD players, to authenticate the true ownership of intellectual property rights or product ownership.
  • Another major consumer area for data camouflaging is that of preventing illegal copying and downloading of satellite images, music CD's, and tapes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Facsimile Image Signal Circuits (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé et un appareil pour camoufler les données. On utilise des données primaires telles qu'une oeuvre que demeure protégée par les droits d'auteur dans un procédé de stéganographie pour coder des données secondaires telles que les informations sur la propriété ou sur les droits d'auteur. Les données primaires contiennent plusieurs premiers éléments de données adressables, les données secondaires contenant plusieurs deuxièmes éléments de données. Le procédé consiste à effectuer une recherche des premiers éléments de données qui s'apparient au contenu des deuxièmes éléments de données. Lorsque l'on trouve un premier élément de données apparié, on génère un élément clé qui comprend l'adresse du premier élément de données apparié. Dans un mode de réalisation, on peut utiliser ce procédé pour camoufler un message textuel tel que les informations sur les droits d'auteurs dans les données primaires, par exemple, dans des données audio, vidéo ou d'images. Dans un autre mode de réalisation, on peut utiliser ce procédé pour chiffrer les données destinées à la transmission sécurisée de messages. L'invention concerne également des procédés complémentaires de décodage et un appareil correspondant.
PCT/SG1998/000023 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees WO1999048006A1 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2000537139A JP2002507771A (ja) 1998-03-18 1998-03-18 データ偽装のための方法及び装置
AU69363/98A AU6936398A (en) 1998-03-18 1998-03-18 Method and apparatus for camouflaging data
PCT/SG1998/000023 WO1999048006A1 (fr) 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees
EP98915102A EP1062585A1 (fr) 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees
CA002319601A CA2319601A1 (fr) 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG1998/000023 WO1999048006A1 (fr) 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees

Publications (1)

Publication Number Publication Date
WO1999048006A1 true WO1999048006A1 (fr) 1999-09-23

Family

ID=20429845

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG1998/000023 WO1999048006A1 (fr) 1998-03-18 1998-03-18 Procede et appareil pour camoufler les donnees

Country Status (5)

Country Link
EP (1) EP1062585A1 (fr)
JP (1) JP2002507771A (fr)
AU (1) AU6936398A (fr)
CA (1) CA2319601A1 (fr)
WO (1) WO1999048006A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002084515A1 (fr) * 2001-04-12 2002-10-24 Copyseal Pty Ltd Systeme et procede permettant d'eviter la reproduction non autorisee de documents electroniques
US9727748B1 (en) * 2011-05-03 2017-08-08 Open Invention Network Llc Apparatus, method, and computer program for providing document security

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5532473B2 (ja) * 2009-07-29 2014-06-25 谷電機工業株式会社 番地カラーシステム、カラー写真画像を利用した符号化方法および復号化方法、並びに暗号化方法
CN112445539A (zh) * 2019-09-02 2021-03-05 珠海市魅族科技有限公司 识别伪装音乐播放的方法、装置、电子设备和存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997026732A1 (fr) * 1996-01-17 1997-07-24 The Dice Company Procede de protection de code informatique par cryptage stega
WO1997043761A2 (fr) * 1996-05-15 1997-11-20 Intertrust Technologies Corp. Procedes, appareils et systemes de chiffrement pour la gestion electronique des droits relatifs aux supports de stockage dans des appareils fermes et interconnectes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997026732A1 (fr) * 1996-01-17 1997-07-24 The Dice Company Procede de protection de code informatique par cryptage stega
WO1997043761A2 (fr) * 1996-05-15 1997-11-20 Intertrust Technologies Corp. Procedes, appareils et systemes de chiffrement pour la gestion electronique des droits relatifs aux supports de stockage dans des appareils fermes et interconnectes

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002084515A1 (fr) * 2001-04-12 2002-10-24 Copyseal Pty Ltd Systeme et procede permettant d'eviter la reproduction non autorisee de documents electroniques
US9727748B1 (en) * 2011-05-03 2017-08-08 Open Invention Network Llc Apparatus, method, and computer program for providing document security

Also Published As

Publication number Publication date
JP2002507771A (ja) 2002-03-12
CA2319601A1 (fr) 1999-09-23
AU6936398A (en) 1999-10-11
EP1062585A1 (fr) 2000-12-27

Similar Documents

Publication Publication Date Title
Cox et al. A review of watermarking principles and practices 1
US6983057B1 (en) Methods for embedding image, audio and video watermarks in digital data
EP1256086B1 (fr) Procedes et appareils de masquage de donnees multicouches
US7224819B2 (en) Integrating digital watermarks in multimedia content
US6674861B1 (en) Digital audio watermarking using content-adaptive, multiple echo hopping
AU2010201199B2 (en) Desynchronized fingerprinting method and system for digital multimedia data
US7398395B2 (en) Using multiple watermarks to protect content material
US20050210257A1 (en) System and method for protecting digital media
US20040059933A1 (en) Digital watermarking and fingerprinting applications for copy protection
JP4542411B2 (ja) 媒体のデコード後透かし付けシステム
US7496197B2 (en) Method and system for robust embedding of watermarks and steganograms in digital video content
WO2000025203A1 (fr) Procedes de steganographie numerique destines a des donnees multimedia
Petitcolas et al. Weaknesses of copyright marking systems
Panigrahi et al. An effective steganographic technique for hiding the image data using the LSB technique
Banik et al. Review on steganography in digital media
WO1999048006A1 (fr) Procede et appareil pour camoufler les donnees
Xu et al. Digital audio watermarking and its application in multimedia database
Asad et al. A modification of least significant digit (LSD) digital watermark technique
US6988201B1 (en) Method and apparatus for watermarking wavetable synthesis architectures
Bandyopadhyay Genetic Algorithm Based Substitution Technique of Image Steganography
Singh et al. A survey on Steganography in Audio
Yadav Study of Information Hiding Techniques and their Counterattacks
Hasanudin et al. Storage of Text Messages on e-Book Files using Least Significant Bit and Haar Wavelet Method
Verma et al. Review Paper on Security Measures in Digital Watermarking
Bhadra et al. Keyless, Robust and Cost-Effective Privacy Protection Algorithm for Videos Using Steganography

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA JP SG US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1998915102

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 69363/98

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2319601

Country of ref document: CA

Ref country code: CA

Ref document number: 2319601

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 09622470

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1998915102

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1998915102

Country of ref document: EP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载