US20010049788A1 - Method and apparatus for watermarking digital bitstreams - Google Patents

Method and apparatus for watermarking digital bitstreams Download PDF

Info

Publication number
US20010049788A1
US20010049788A1 US09/108,135 US10813598A US2001049788A1 US 20010049788 A1 US20010049788 A1 US 20010049788A1 US 10813598 A US10813598 A US 10813598A US 2001049788 A1 US2001049788 A1 US 2001049788A1
Authority
US
United States
Prior art keywords
watermark
recited
watermarking
digital watermark
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/108,135
Other versions
US6330672B1 (en
Inventor
David Hilton Shur
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Properties LLC
Hanger Solutions LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/108,135 priority Critical patent/US6330672B1/en
Assigned to AT&T CORP. reassignment AT&T CORP. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHUR, DAVID HILTON
Publication of US20010049788A1 publication Critical patent/US20010049788A1/en
Application granted granted Critical
Publication of US6330672B1 publication Critical patent/US6330672B1/en
Assigned to AT&T PROPERTIES, LLC reassignment AT&T PROPERTIES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AT&T CORP.
Assigned to AT&T INTELLECTUAL PROPERTY II, L.P. reassignment AT&T INTELLECTUAL PROPERTY II, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AT&T PROPERTIES, LLC
Assigned to CHANYU HOLDINGS, LLC reassignment CHANYU HOLDINGS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AT&T INTELLECTUAL PROPERTY II, L.P.
Anticipated expiration legal-status Critical
Assigned to HANGER SOLUTIONS, LLC reassignment HANGER SOLUTIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 158 LLC
Assigned to INTELLECTUAL VENTURES ASSETS 158 LLC reassignment INTELLECTUAL VENTURES ASSETS 158 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANYU HOLDINGS, LLC
Assigned to INTELLECTUAL VENTURES ASSETS 158 LLC reassignment INTELLECTUAL VENTURES ASSETS 158 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANYU HOLDINGS, LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • G06T1/0035Output size adaptive watermarking
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32187Transform domain methods with selective or adaptive application of the additional information, e.g. in selected frequency coefficients
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32277Compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32299Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image using more than one embedding method
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32304Embedding different sets of additional information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/146Data rate or code amount at the encoder output
    • H04N19/147Data rate or code amount at the encoder output according to rate distortion criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/189Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding
    • H04N19/19Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding using optimisation based on Lagrange multipliers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/189Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding
    • H04N19/196Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding being specially adapted for the computation of encoding parameters, e.g. by averaging previously computed encoding parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/48Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using compressed domain processing techniques other than decoding, e.g. modification of transform coefficients, variable length coding [VLC] data or run-length data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23892Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0053Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32128Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3239Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark using a plurality of different authentication information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering

Definitions

  • the present invention relates to the field of protecting copyrighted works from piracy by fingerprinting or watermarking the copyrighted information and, more particularly, to a method and apparatus for inserting hidden data such as a digital watermark into a signal representing a copyrighted work simultaneously with or immediately after 1) perceptually encoding a digital representation of an audio signal or 2) perceptually or otherwise coding a digital representation of a video signal or other information carrying signal.
  • Piracy of copyrighted works is a serious problem.
  • street vendors in metropolitan areas offer videotapes, audio compact discs, audio tapes and the like which appear on their surface to have been properly distributed and offered for sale with the permission of or under license to the copyright owner, when, in fact, they are not.
  • Computer software and games are distributed freely via the Internet and pirate copies abound.
  • a pirate can obtain free access to a copyrighted work that is original.
  • original as intended herein, we define “original” as an original or master copy from which other copyright owner authorized copies have been made or an “original” is an authorized copy made from the original or master copy. All other copies will be defined herein as “pirate” copies and comprise copies that are not authorized by a copyright owner.
  • the pirate can produce a high quality, perhaps, perfect reproduction from an original that they have legitimately purchased or otherwise legitimately obtained, can record a live performance for which copyright protection is asserted or can record from a broadcast performance of a live or copied performance.
  • Other means of pirating are best known to the pirates themselves.
  • Watermarking as used herein is intended to refer to either term and to signify the same process; namely, it is an objective of watermarking to identify and to verify the source of an original as defined above.
  • Digimark Corporation of Portland, Oregon offers a method of watermarking images that may represent copyrighted works.
  • pixels within digital photographic images carry a digital watermark prior to distribution of the images, for example, over the Internet.
  • a pirate By hiding the watermark within the image itself, it is expected that a pirate will have difficulty locating the watermark. Consequently, it is a further objective of the present invention to not only apply a watermark but apply a watermark in such a manner as to disguise its location from a pirate so the pirate cannot simply remove it.
  • Perceptual coding relates to coding and decoding designed to recognize that the signal fidelity perceived by humans is a better quality measure than “fidelity” computed by traditional distortion measures.
  • fidelity computed by traditional distortion measures.
  • the human ear may not be able to even hear frequencies at the lower or higher end of the spectrum.
  • quality is defined to mean “listener indistinguishable from compact disc audio,” generally regarded today as the best quality audio in comparison with tape, record or earlier forms of recording a live performance.
  • Patents describing audio perceptual coding include U.S. Pat. No. 5,285,498 of Johnston issued in 1994.
  • FIGS. 1 and 2 of the '498 patent generally describe prior art perceptual coders, typically involving the conversion of analog data to digital, a transformation of the digital data in association with a perceptual model and a quantizer.
  • Recent articles on perceptual encoding/decoding include: “AT&T Perceptual Audio Coding (PAC)” of Johnston et al., Collected Papers on Digital Audio Bit-Rate Reduction, Feb.
  • PAC Perceptual Audio Coding
  • perceptual coder as used herein is intended a general form of coder which may comprise simple perceptual coders or more complex perceptual coders, for example, hybrid coders, integrated source-model perceptual coders and perceptual coders using temporal noise shaping among other coders.
  • Information carrying signals that have high information content do not appear to be susceptible to elimination of “irrelevance” and perceptual coding.
  • a digital data computer program may have an undiscovered and so not particularly “relevant” embedded subroutine. Nevertheless, compression principles may still be applied to such a signal to eliminate redundancy. Yet, perceptual coding may be applied to such a signal for at least the latter reason.
  • a signal is encoded, for example, perceptually and, during or after the perceptual coding process, a digital data sequence, for example, a digital watermark is inserted into a quantized digital signal resulting from the perceptual coding process in such a manner that its insertion is imperceptible to one later listening to, displaying or otherwise utilizing the signal.
  • the digital watermark may be inserted in accordance with a key indicative of the location of the mark in the digitally encoded signal. The key may be protected and secured with a trusted entity and distributed in such a manner as to be not detectable by a pirate.
  • the key may be utilized at watermarking apparatus that can be located anywhere in the distribution channel of a copyright protected work.
  • the key may be embedded in a secure microprocessor of validating apparatus at a point of distribution or even a point of sale.
  • the watermark can be applied at the time of fixing in a copy, thus validating a copy.
  • a compact disc recording may be validated at the point of sale as an authorized copy through watermarking (validating) apparatus according to the present invention or, at the time of broadcast over radio frequencies or distribution via the Internet, information may be watermarked.
  • further information may be included or otherwise indicated by the watermark to assist in not only recognizing a pirated work and the original from which the pirate copy was produced but the identity of the pirate.
  • the present invention also includes dependent features directed to the information contained within the watermark itself. Not only will the watermark identify the work, identify the source of the work, and identify the author but may identify variable information such as the date and time the original was distributed or broadcast, the identity of the seller, the identity of the purchaser and the location from which the original was distributed or broadcast. While purchase/sale is presumed in this comment, the actual form of contractual arrangement may differ between parties in the distribution channel. For example, the work may be legitimately sold, licensed, leased for a period of time and the like all within the boundaries of being an original. Consequently, an applied digital watermark may further comprise indicia of the form of the transaction, and, for example, if the transaction represents a lease, the expiration date of the lease.
  • the watermark may comprise data indicating the number of licensed plays.
  • the transaction date or expiration date forward or after the number of licensed plays has been spent, if a copy of the original appears after that date, the copy can be identified as a pirate copy and the pirate identified.
  • the invention also considers the player, computer or other device upon which a legitimate recipient or pirate uses or plays the protected work.
  • the device may require the key to play the work.
  • the key may be extracted from the compressed digital bitstream or distributed personally, for example, as a memory or “smart” card or the decoder require both kinds of keys to operate. Even if the key is provided, the device may comprise a time-of-day clock that, upon expiration of the period of the lease, actuates the device to preclude further play.
  • apparatus for inserting a digital watermark into protected information comprises a perceptual coder for coding an information signal representative of the protected information, a watermark location selector responsive to the perceptual coder for selecting a location for inserting a digital watermark, a digital watermark generator for generating a digital watermark and a quantizer of the perceptual coder responsive to the digital watermark detector and the watermark location selector for inserting a digital watermark at selected locations within an output bitstream including the perceptually coded information signal.
  • a method for inserting a digital watermark into protected information comprises the steps of perceptually encoding an information signal representative of the protected information, selecting, responsive to the perceptual coding step, a location for inserting a digital watermark, generating a digital watermark, and during perceptual coding, quantizing the information signal to insert the generated digital watermark at selected locations within an output bitstream including the perceptually coded information signal.
  • FIG. 1 is a block schematic diagram of apparatus for watermarking copyright protected information according to the present invention comprising a perceptual encoder, a watermark location (index) selector responsive to transformation processes of the perceptual coder for selecting a location within the perceptual coded bitstream for a watermark and a digital watermark generator, a quantizer of the perceptual coder outputting a digitally watermarked bitstream with a watermark inserted at the selected location;
  • FIG. 1( a ) provides details of a generalized digital encoder and FIG. 1( b ) provides more specific details directed to the design of a particular digital encoder involving the encoding of an analog signal.
  • FIG. 2 comprises a typical power versus frequency spectrum of a trumpet useful for explaining principles of perceptual coding.
  • FIG. 3 is a functional block schematic diagram of a decoder/player for use in playing a digital bitstream of information having an embedded, hidden data watermark.
  • FIG. 1( a ) represents a block schematic diagram of a generalized digital encoder for embedding a hidden data stream into a digital information signal to be perceptually encoded according to the present invention.
  • FIG. 1( b ) represents a specific analog signal implementation of FIG. 1( a ) including specific recommendations for implementation of encryption. Similar reference characters used in each drawing represent similar components.
  • perceptual coding has evolved over the past several years from a concept to practical application.
  • enhancements to perceptual coding/decoding techniques have evolved which describe enhanced or improved performance in one or another step or component of the encoding/decoding process.
  • perceptual coder 110 a hidden data index selector 120 for selecting an index or location to insert a hidden data sequence, for example, a digital watermark, into an information signal that is being perceptually coded and a digital hidden data generator 130 .
  • the entirety of perceptual coder 110 is drawn to generically describe the process of perceptual coding and is not intended to describe the most current or best manner of implementation.
  • the method and means for perceptual encoding does not comprise the present invention, rather it is the manner and apparatus for inserting (and when appropriate, removing) a hidden data sequence such as a digital watermark into the coded, compressed signal as will be further described below.
  • each of the components of the perceptual coder 110 is known from the prior art and may comprise hardware, a software programed processor or firmware in implementation.
  • each of the components of the hidden data index selector 120 and digital hidden data generator 130 is known from the prior art individually. It is the combination of elements described by the claims which comprises the present invention.
  • An uncompressed digital data stream is presented to perceptual coder 110 at point 100 .
  • the uncompressed digital data stream may comprise audio, video, software algorithm, or other protectable digital data stream.
  • What is intended by “protectable” is the protection of intellectual property by copyright, for example, any work that has been reduced to a tangible medium of expression including, but not limited to, audio, video, software or other work protectable by copyright.
  • the first task of the perceptual decoder as represented by step 80 is the generation of N sample points for the input digital stream of protectable information according to a compression algorithm.
  • the compression algorithm is typically predetermined or selectable according to the type of presented data. For example, audio may be compressed differently from video data and the like.
  • N samples are presented to an N-point transform step 104 .
  • N-point transform step 104 may comprise any one of a plurality of possible N-point transformations as will be further described herein.
  • the result of the N-point transform step is N coefficients which are provided to quantization step 140 and to perceptual threshold determination step 105 .
  • Perceptual threshold determination step 105 may vary among types of information signals such as audio and video.
  • the objective of the perceptual threshold determination is a threshold for human perception such that below the threshold may be data points that are not perceptible to human perception but above the threshold are data points that are perceptible to human perception and thus represent data points that during compression and the quantization process may not be discounted.
  • Quantization step 140 may be generally described as the process of manipulating perceptual coding coefficients to insert a digital water mark into the perceptually coded bitstream.
  • Quantization step 140 in one one embodiment of the present invention represents three steps. The first and second of these relate to the expected tasks of the perceptual coder.
  • the first step is to select a scale factor.
  • the quantization scale factor may be different for different types of data, such as audio or video.
  • the scale factor selection may be responsive to the perceptual threshold determination process. Once the scale factor is selected for the input N coefficients, the coefficients are quantized according to the selected scale factor.
  • the output is N quantized coefficients representing the compressed digital bitstream.
  • the non-typical third step of quantizer 140 is the process of injecting a hidden data sequence or stream in indexed locations of the output compressed data stream according to, for example, an N-point transformation process 104 as will be further described herein.
  • the hidden data stream may represent a watermark for not only marking protected information as protected but assisting one in tracing a pirate of the protected information as will be further discussed herein.
  • Hidden data index selector 120 responds to the N-point transform process 104 by identifying locations in the compressed digital information stream that a watermark may occupy.
  • Digital hidden data generator 130 provides the data to be introduced or inserted onto the compressed information stream at the selected indices.
  • the output of quantizer 140 is N quantized coefficients representing a compressed information data stream including digital hidden data.
  • the data stream is presented to an entropy encoder 107 .
  • Entropy encoder 107 performs the final stage of compression in a lossless (invertible) manner by encoding frequently occurring symbols using shorter codewords and less frequently occurring symbols using longer codewords. The use of shorter codewords exceeds the use of longer codewords and hence there is compression.
  • Entropy coder 107 provides an output which fills an output buffer 108 of compressed digital information signal (including hidden data). If the buffer is full, a buffer fullness indicator is fed back to the quantizer 140 to throttle or stop the quantization process. Otherwise, the output buffer 108 outputs an output compressed bitstream for, for example, recording, broadcast or other signal distribution.
  • quantizer block 140 One skilled in the art will be familiar with a variety of embodiments for implementing quantizer block 140 including all three steps of selecting a scale factor, quantizing coefficients and injecting the hidden data (watermark).
  • Two embodiments are known for audio (the Advanced Audio Coding, AAC and Perceptual Audio Coding, PAC audio compression algorithms).
  • further embodiments are described for known (MPEG-2) video compression algorithms in the above-identified U.S. provisional application serial No. 60/067,225 filed Dec. 3, 1997.
  • coefficients also known as spectral values
  • spectral values are grouped into scale factor bands that are quantized with the same scale factor.
  • an algorithm is used to quantize them according to the present invention.
  • Distinct hidden data (watermark) bits can be inserted into each coefficient in a scale factor band that has at least one non-zero coefficient.
  • the objectives in either an audio or video embodiment, are achieved of embedding hidden data according to the modified scale factors generated by the algorithm into the output compressed information bit stream.
  • FIG. 1( b ) represents an embodiment for perceptually encoding an analog signal containing protectable information and provides particular recommendations for generating a hidden data index and encrypting the hidden data (watermark).
  • an analog signal for encoding is received into perceptual coder 110 at analog source 101 .
  • the analog signal comprises according to the present invention a signal representing protected information.
  • the protected information itself may represent an audio performance, a video or visual performance, a computer software algorithm, a bitstream representing a book or novel or even be descriptive of other sensory signal (taste, touch or smell) that may be capable of perceptual coding.
  • the analog source may be a source of a combination of audio and visual signals and so represent the protected information content of a movie, computer game or live audio/visual performance such as a ballet or opera.
  • a low pass or other filter 102 is applied for filtering noise or segregating the bandwidth of the analog signal or related purpose.
  • the analog signal presented to the analog to digital converter 102 can be considered to be relatively pure of adverse influences and confined to a known or expected bandwidth of the signal.
  • Analog to digital converter 103 converts the analog signal (for example, voice or visual) to digital data.
  • the digital data output from the A/D converter 103 may be considered a faithful representation of the filtered analog signal, except in binary form.
  • steps 102 or 103 are required, for example, if the input is a digital computer software algorithm or game program.
  • Block 104 represents the transformation block of a perceptual coder, which for example, according to the prior art, may comprise an N point fast Fourier transform or a Modified Discrete Cosine Transform (MDCT) or other transform for perceptual coding.
  • MDCT Modified Discrete Cosine Transform
  • the encoding process slices the time series into contiguous time segments and transforms each segment into the frequency domain. Once in the frequency domain, the spectral coefficients are compared with a perceptual threshold function T(f). This comparison step is shown in the diagram as calculation of perceptual thresholds step 105 .
  • coefficients are below the thresholds, the coefficients potentially can be discarded without any loss in perceived quality. Yet, these coefficients represent candidate locations for placement of at least a portion of a digital watermark. If above the thresholds, the coefficients are quantized and output as necessary data representative of the original analog signal 101 .
  • FIG. 2 a power versus frequency spectrum for the sound of a trumpet. Also, shown is the perceptual threshold function T(f) shown as a stair step curve C over the sound wave W.
  • T(f) the perceptual threshold function
  • a great deal of the trumpet signal is below the perceptual threshold and may be discarded in a perceptual coder. All of these signal portions below the threshold function are candidate watermark locations. For example, humans can hardly, if at all, hear an audio signal at very low frequency. Neither can we humans hear an ultrasonic frequency.
  • the peak in the threshold function T(f) model shown rises rapidly and then decreases steadily from approximately 1000 Hz out to 12,000 Hz. Thus, the highest fidelity sound may be considered wasted on the human ear and perceptibly equivalent quality can be achieved by only sending data indicative of the signal above the threshold function.
  • the quantizing step 106 follows the perceptual coding transformation. What is above the threshold is quantized and output as necessary data for reconstruction of the original analog signal 101 . Quantization is the three step process described above in considerable detail.
  • the output of the transformation process 104 is operated upon by the coefficient quantizer 106 in accordance with the calculated perceptual thresholds of the threshold function output from calculation block 105 . For example, in an audio signal such as a power level of 40 dB at 1,000 Hz, it may be appropriate to quantize that level using a high resolution quantizer having a larger number of steps, for example, 8 or 16 bit coding. In perceptual coding, one probably would not quantize a DC signal at all, because the human ear cannot perceive 0 frequency, regardless of the power level.
  • the binary output of the coefficient quantizer 107 is, in the depicted embodiment, provided to an entropy encoder 107 , already described above.
  • the output of the entropy encoder is the digital bitstream that may be recorded on disc, tape or otherwise recorded or may be broadcast, transmitted or otherwise distributed from the point of sale or distribution.
  • the output buffer 108 described above, is believed unnecessary especially in an embodiment contemplating immediate distribution at higher data rates than the rate of the compressed data stream output of entropy encoder 107 .
  • the output binary bitstream contains a recoverable watermark generated by generator 130 and located in the bitstream according to the output of watermark location (index) selector 120 . It is assumed that it is possible and desirable to alter some bits of an encoded audio, video or other digital bitstream without affecting the perceived quality of what is played out.
  • a digital signature is created for a specific protected media stream. The signature may be a function of a number of identifying parameters as will be further described below, for example, associated with a specific location in the distribution channel, date and time of distribution and type of distribution transaction.
  • the digital watermark or signature is created by encrypting the chosen set of parameters.
  • the encryption key is intended to be kept secret and protected and secured by a trusted entity and only distributed in a protected manner, for example, embedded in a secure manner (for example, in a secure microprocessor) or distributed encrypted itself with yet another key.
  • the key as will be described below, may be provided to a legitimate recipient of an original (for example, if authentication must take place before the data can be decoded.)
  • the watermark location (index) selector 120 operates via a signal from the transformation function 104 as to what coefficients are below the threshold.
  • the above process of transformation 104 leads to a sequence of spectral samples whose coefficients are below the perceptual threshold which may referred to as a candidate watermarking sequence B(i).
  • the sequence generated at block 124 represents all candidate opportunities for inserting watermarking data.
  • the sequence is fed to a logical AND block 125 which receives an input that is generated, in one embodiment of the present invention, involving a seed 121 for generating an encryption key K and a selector 122 for selecting a desired percent of watermarking overhead.
  • watermarking overhead is intended the degree of watermarking, for example, measured by the amount of watermark information to be carried by the watermark as well as other factors.
  • a B(i) output sequence of a random number generator (RNG) 123 may be generated by any one of a number of approaches.
  • Other ways of generating a B(i) sequence may come to mind of those ordinarily skilled in the art as well.
  • the seed and the watermark overhead selection are used as inputs to a random number generator 123 which outputs a binary sequence. While a random number generator (RNG) 123 is depicted, the generator 123 may comprise a pseudorandom number generator or other more predictable generator than one that is assumed to be more random, especially when it operates responsive to a seed.
  • RNG random number generator
  • the output binary sequence of the RNG 123 and the candidate sequence B(i) are ANDed at logical AND gate 125 and its output result is used to index where in the quantizer 106 output a digital watermark is to be inserted.
  • the digital hidden data (watermark) generator 130 comprises an input 131 of a plurality of watermark parameters.
  • watermark input parametric data may comprise relatively constant data such as data indicating the owner of the protected content and the identity of the protected work and relatively variable data, for example, the distributor, the customer name, the date and time of transaction, the date and time of making of a master, the type of transaction (gift, sale, license or lease), date of expiration, number of permitted plays or other parameter relating to the expiration of any license or lease, the encoding algorithm that was used to encode the signal via perceptual coder 110 or any other related parameter.
  • variable data such as point of distribution data together (time, date, type of arrangement, identity of recipient, location of distribution) in a separate location from constant data such as copyright owner and identity of the work, for example, by title, track and artist.
  • constant data such as copyright owner and identity of the work, for example, by title, track and artist.
  • Some of the data such as customer identity and date and place of transaction, serves the purpose of assisting one in tracking a would-be pirate.
  • Other data serves to identify the protected information.
  • Yet other data depending, for example, on the transaction, may prevent a player from further playing or otherwise decoding and utilizing the compressed data stream of protected information.
  • the parametric data of watermarking parameters entered at block 131 is encrypted with key K at block 132 which may be the same key K generated by seed 121 or a different key.
  • key K protects the parametric data from piracy or tampering.
  • the encryption may be by any known means and results in a multi-bit digital watermark at block 133 . Encryption processes that may be utilized include well known processes such as the DES algorithm, the Cylink algorithm, the algorithm known as pgp (pretty good privacy) and other algorithms known in the art.
  • the generated watermark is input to coefficient quantizer 106 and inserted at the indexed locations selected by the watermark index selector 120 .
  • the encryption may involve two, three or more tiers of encryption, for example, involving keys which change periodically as well as fixed keys determined at the time of manufacture (such as secret serial number of a decoder) and are distributed to points in the distribution channel in a protected manner, such as keys of the month.
  • memory cards or smart cards including a secure microprocessor with embedded decryption algorithm may be utilized to distribute new keys periodically or different encryption algorithms for use in decoder devices distributed in the distribution channel to keep pirates guessing.
  • the watermark is inserted in such a manner that it is imperceptible and has no impact on the perceived quality of a coded analog signal 101 .
  • the watermark itself is not recognizable, even as a digital binary bitstream because 1) it has been encrypted with a key K and 2) the watermark is distributed throughout the output bitstream of quantizer 106 according to a selected percent of watermarking overhead and a seed. It is not easily recognizable and locatable, for example, at the beginning or end of the protected work.
  • the seed, the key, the selected watermarking overhead, even the characteristics and order of the parametric data comprising the watermark are unknown to the pirate and, consequently, must be generated by the pirate in order to be able to unwatermark the signal. If the pirate is the purchaser and freely distributes copies without authorization, unauthorized copies may include the purchaser's identity in the watermark.
  • the watermarking of a protected signal may occur anywhere in the distribution channel. At such a point of distribution, all components of the perceptual coder are not required for watermarking a signal.
  • the digital data may already be coded and recorded. It is then fed through a generator for generating a candidate watermarking sequence 124 and requantized and restored with a digital watermark or watermark portion.
  • watermark it may be desirable to extract the watermark from the encoded data stream. For example, an already included watermark may be extracted and new data added to the digital watermark, for example, at a point of distribution. As another example, a personal computer disc player or other means of utilizing the digital bitstream may extract the watermark and be operative to deny use of the recorded data. In such situations, what will be necessary, depending on the level of encryption applied, is to have access to the key K or keys, the random number sequence and the perceptual coding function applied at transformation and perceptual threshold calculation blocks 104 and 105 respectively.
  • the watermark may be extracted from the decoded bitstream by transforming the decoded time series into the frequency domain, extracting the watermark bits using the watermarking sequence B(i) and decrypting using key K.
  • Multiple frequency domain transformations may be carried out based on various encoding parameters (segment length, encoding rate and the like) and watermark extraction steps before the correct combination of encoding parameters corresponding to the original watermarking are arrived upon.
  • the synchronization marker may comprise constant data that need not necessarily comprise the watermark such as data representing the copyright owner, the source, and the identity of the protected work for example by title, track and artist, as some of these should be well known from the protected work itself. Title, track and artist may be present for display, for example, in digital program delivery systems known in the art.
  • a specific field for example, the encoding algorithm type
  • the encryption key and the watermarking sequence are derived from a private key issued to the purchaser at the point of distribution.
  • a decoder apparatus associated with any player will receive the private key and decrypt the watermark to extract the specific field. Play can cease shortly after play begins if the field cannot be found.
  • FIG. 3 there is shown a decoder for playing protected information according to the present invention, the protected compressed information including hidden data such as a watermark as described above.
  • a compressed digital bitstream is received at point 300 and is presented to a key extractor 305 and to a bitstream decoder 310 .
  • the key extractor 305 extracts a key used to encrypt the watermark.
  • a key extractor is optional if the key is transmitted in another way than in the compressed digital bitstream.
  • the key extractor delivers the key, preferably in a secure manner to a watermark detector 315 .
  • the bitstream decoder 310 outputs a decoded bitstream which is presented to watermark detector 315 and for presentation, for example, for listening, for playing or for display or other output at presentation box 320 .
  • the watermark detector 315 first detects the location of the watermark and then extracts the watermark at the indexed locations. As already indicated, the watermark may indicate an expiration date or a finite number of plays. If the expiration date has expired or the number of plays exceeded, then an authorization signal to deny play is presented to presentation step 320 ; otherwise, play is permitted by the authorization signal.

Abstract

A signal is encoded, for example, perceptually and, during or after the perceptual coding process, a digital watermark is inserted into a quantized digital information signal resulting from the perceptual coding process in such a manner that its insertion is imperceptible to one later listening to, displaying or otherwise utilizing the information signal. Moreover, the digital watermark may be inserted in accordance with a key indicative of the location of the mark in the digitally encoded signal. The key may be protected with a trusted entity and distributed in such a manner as to be not detectable by a pirate. Consequently, the key may be utilized at watermarking apparatus that can be located anywhere in the distribution channel of a copyright protected work. The key may be embedded in a secure microprocessor of validating apparatus at a point of distribution or even at a point of sale. In this manner, when or after a digital bitstream is fixed in a medium of expression or broadcast, the watermark can be applied at the time of fixing in a copy, thus validating an original legitimate copy. For example, a compact disc recording may be validated at the point of sale as an authorized copy through watermarking (validating) apparatus according to the present invention or, at the time of broadcast over radio frequencies or distribution via the Internet, information may be watermarked. In this manner, even though a work may be pirated, further information may be included or otherwise indicated by the watermark to assist in, not only recognizing a pirated work and the original from which the pirate copy was produced, but the identity of the pirate who later makes an unauthorized copy of the original.

Description

  • This application claims priority to and is based in part on [0001] provisional application 60/067,225 filed Dec. 3, 1997 and entitled “On Combining Watermarking with Perceptual Coding” of J. Lacy et al.
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field [0002]
  • The present invention relates to the field of protecting copyrighted works from piracy by fingerprinting or watermarking the copyrighted information and, more particularly, to a method and apparatus for inserting hidden data such as a digital watermark into a signal representing a copyrighted work simultaneously with or immediately after 1) perceptually encoding a digital representation of an audio signal or 2) perceptually or otherwise coding a digital representation of a video signal or other information carrying signal. [0003]
  • 2. Description of the Related Arts [0004]
  • Piracy of copyrighted works is a serious problem. By way of example, street vendors in metropolitan areas offer videotapes, audio compact discs, audio tapes and the like which appear on their surface to have been properly distributed and offered for sale with the permission of or under license to the copyright owner, when, in fact, they are not. Computer software and games are distributed freely via the Internet and pirate copies abound. There are many ways a pirate can obtain free access to a copyrighted work that is original. By “original” as intended herein, we define “original” as an original or master copy from which other copyright owner authorized copies have been made or an “original” is an authorized copy made from the original or master copy. All other copies will be defined herein as “pirate” copies and comprise copies that are not authorized by a copyright owner. [0005]
  • By way of example of the ease with which a pirate is able to make a pirate copy, the pirate can produce a high quality, perhaps, perfect reproduction from an original that they have legitimately purchased or otherwise legitimately obtained, can record a live performance for which copyright protection is asserted or can record from a broadcast performance of a live or copied performance. Other means of pirating are best known to the pirates themselves. [0006]
  • It is an objective of the present invention to protect a copyrighted work. Protection methods are known. Despite efforts by pirates to make a copyrighted work appear to be an original, a method is known to attempt to hide in the copyrighted work itself indicia of the copyright owner's identity and source. The burying of such indicia perhaps began with early map-makers who would “fingerprint” their work by intentionally placing an error in the map. The map maker could quickly look at a copy, recognize their fingerprint (intentional error) and then accuse the individual offering the map of infringement, knowing the offeror to not be authorized to do so. Today, it is known to embed in integrated circuits a fingerprint or indicia of ownership that may appear on the surface to comprise a circuit component, when in fact, the indicia comprises a fingerprint intended by the owner to deceive a pirate. [0007]
  • With works created on paper, it is known to “watermark” the paper itself with indicia of its source. For example, since the mid-1800's, it became known and desirable to protect the authenticity of such items of value as postage stamps and currency from copying/counterfeiting by watermarking the item of value. A watermarked item of value or legal document can both identify and verify the source of the document. [0008]
  • As used herein, by fingerprinting and watermarking, no distinction is intended between them regardless of their historical distinctions. Watermarking as used herein is intended to refer to either term and to signify the same process; namely, it is an objective of watermarking to identify and to verify the source of an original as defined above. [0009]
  • According to the prior art, it is not only known to use watermarking for works created on paper but also for protecting analog or digital signals representative of a copyrighted work. For example, in binary digital bitstreams for transmitting digital audio signals in a cable television system, it is known to identify, for example, the title, track and artist in a header portion of blocks of data representative of a copyrighted work. The problem with such systems is that the location of the header carrying such a watermark can be easily become known to a would-be pirate. It always appears at the beginning of the work. Consequently, the watermark can be easily removed. [0010]
  • Digimark Corporation of Portland, Oregon offers a method of watermarking images that may represent copyrighted works. In particular, pixels within digital photographic images carry a digital watermark prior to distribution of the images, for example, over the Internet. By hiding the watermark within the image itself, it is expected that a pirate will have difficulty locating the watermark. Consequently, it is a further objective of the present invention to not only apply a watermark but apply a watermark in such a manner as to disguise its location from a pirate so the pirate cannot simply remove it. [0011]
  • In the art of coding copyrighted works, there has been a recent movement toward perceptual coding. Perceptual coding relates to coding and decoding designed to recognize that the signal fidelity perceived by humans is a better quality measure than “fidelity” computed by traditional distortion measures. Traditionally, for example, it might be a measure of quality to assert that a speaker has a flat frequency response across the spectrum of frequencies between 0 frequency and 20,000 Hertz. On the other hand, the human ear may not be able to even hear frequencies at the lower or higher end of the spectrum. Now, for example, in audio, quality is defined to mean “listener indistinguishable from compact disc audio,” generally regarded today as the best quality audio in comparison with tape, record or earlier forms of recording a live performance. [0012]
  • Patents describing audio perceptual coding include U.S. Pat. No. 5,285,498 of Johnston issued in 1994. FIGS. 1 and 2 of the '498 patent generally describe prior art perceptual coders, typically involving the conversion of analog data to digital, a transformation of the digital data in association with a perceptual model and a quantizer. Recent articles on perceptual encoding/decoding include: “AT&T Perceptual Audio Coding (PAC)” of Johnston et al., Collected Papers on Digital Audio Bit-Rate Reduction, Feb. 13, 1996 and the following three papers “MPEG-2 Audio Stereo and Multichannel Coding Methods” by Johnston et al.; “ISO/IEC MPEG-@ Advanced Audio Coding” by Bosi et al.; and “Enhancing the Performance of Perceptual Audio Coders by Using Temporal Noise Shaping (TNS)” by Herre et al., all published with Conference Papers of the 101st Convention of the Audio Engineering Society, Nov. 8-11, 1996. The recent papers describe alternative embodiments and enhancements to the original perceptual coding apparatus and methods described, for example, by Johnston in the '498 patent and his predecessors. Recently filed patent applications on related subject matter incorporated by reference herein include attorney docket no. Lacy 1-4 entitled “Quality Degradation Through Compression/Decompression” mailed Jul. 3, 1997 and Lacy 3-5-6 entitled “Custom Character Coding Compression for Encoding and Watermarking Media Content,” also mailed Jul. 3, 1997. Also, this application claims priority to U.S. provisional application serial No. 60/067,225 (attorney docket no. Lacy 4-8-12-16-8) filed Dec. 3, 1997 entitled “On Combining Watermarking with Perceptual Coding.”[0013]
  • By perceptual coder as used herein is intended a general form of coder which may comprise simple perceptual coders or more complex perceptual coders, for example, hybrid coders, integrated source-model perceptual coders and perceptual coders using temporal noise shaping among other coders. [0014]
  • Information carrying signals that have high information content do not appear to be susceptible to elimination of “irrelevance” and perceptual coding. For example, a digital data computer program may have an undiscovered and so not particularly “relevant” embedded subroutine. Nevertheless, compression principles may still be applied to such a signal to eliminate redundancy. Yet, perceptual coding may be applied to such a signal for at least the latter reason. [0015]
  • The ability to easily replicate digital audio, video, computer program, game and other data, protectable by copyright, by simply copying binary bitstreams is a major impediment to the use of the Internet or other telecommunications channels for content distribution/sale. Consequently, it is a further objective of the present invention to eliminate such an impediment to commerce over the “information superhighways” of the future. [0016]
  • Thus, in view of the above, it is an object of the present invention to provide apparatus and a method of watermarking a video television signal as well as an audio or other information carrying signal and open up the information superhighway to free commerce in protected data. [0017]
  • SUMMARY OF THE INVENTION
  • According to the principles of the present invention, a signal is encoded, for example, perceptually and, during or after the perceptual coding process, a digital data sequence, for example, a digital watermark is inserted into a quantized digital signal resulting from the perceptual coding process in such a manner that its insertion is imperceptible to one later listening to, displaying or otherwise utilizing the signal. Moreover, the digital watermark may be inserted in accordance with a key indicative of the location of the mark in the digitally encoded signal. The key may be protected and secured with a trusted entity and distributed in such a manner as to be not detectable by a pirate. Consequently, it is a principle of the present invention that the key may be utilized at watermarking apparatus that can be located anywhere in the distribution channel of a copyright protected work. The key may be embedded in a secure microprocessor of validating apparatus at a point of distribution or even a point of sale. In this manner, when or after a digital bitstream is fixed in a medium of expression or broadcast, the watermark can be applied at the time of fixing in a copy, thus validating a copy. For example, a compact disc recording may be validated at the point of sale as an authorized copy through watermarking (validating) apparatus according to the present invention or, at the time of broadcast over radio frequencies or distribution via the Internet, information may be watermarked. In this manner, even though a work may be pirated, further information may be included or otherwise indicated by the watermark to assist in not only recognizing a pirated work and the original from which the pirate copy was produced but the identity of the pirate. [0018]
  • In U.S. patent application Ser. No., entitled “Custom Character-Coding Compression for Encodng and Watermarking Media Content” (Attorney Docket Number Lacy 3-5-6) filed Jul. 3, 1997, it has already been suggested to use designated symbols in one or more Huffman codebooks for embedding a watermark in a compressed bit stream. The value of the watermark bits recovered from the bitstream depend either on the values associated with the symbols or the position of the symbol in the compressed bit stream. [0019]
  • Thus, the present invention also includes dependent features directed to the information contained within the watermark itself. Not only will the watermark identify the work, identify the source of the work, and identify the author but may identify variable information such as the date and time the original was distributed or broadcast, the identity of the seller, the identity of the purchaser and the location from which the original was distributed or broadcast. While purchase/sale is presumed in this comment, the actual form of contractual arrangement may differ between parties in the distribution channel. For example, the work may be legitimately sold, licensed, leased for a period of time and the like all within the boundaries of being an original. Consequently, an applied digital watermark may further comprise indicia of the form of the transaction, and, for example, if the transaction represents a lease, the expiration date of the lease. If the transaction is a limited play license defined by a number of plays, the watermark may comprise data indicating the number of licensed plays. On the other hand, from the transaction date or expiration date forward or after the number of licensed plays has been spent, if a copy of the original appears after that date, the copy can be identified as a pirate copy and the pirate identified. [0020]
  • The invention also considers the player, computer or other device upon which a legitimate recipient or pirate uses or plays the protected work. The device may require the key to play the work. The key may be extracted from the compressed digital bitstream or distributed personally, for example, as a memory or “smart” card or the decoder require both kinds of keys to operate. Even if the key is provided, the device may comprise a time-of-day clock that, upon expiration of the period of the lease, actuates the device to preclude further play. [0021]
  • In summary then, apparatus for inserting a digital watermark into protected information comprises a perceptual coder for coding an information signal representative of the protected information, a watermark location selector responsive to the perceptual coder for selecting a location for inserting a digital watermark, a digital watermark generator for generating a digital watermark and a quantizer of the perceptual coder responsive to the digital watermark detector and the watermark location selector for inserting a digital watermark at selected locations within an output bitstream including the perceptually coded information signal. [0022]
  • A method for inserting a digital watermark into protected information comprises the steps of perceptually encoding an information signal representative of the protected information, selecting, responsive to the perceptual coding step, a location for inserting a digital watermark, generating a digital watermark, and during perceptual coding, quantizing the information signal to insert the generated digital watermark at selected locations within an output bitstream including the perceptually coded information signal. [0023]
  • Other features and advantages of the present invention will become clear from an understanding of the following detailed description with reference to the drawings. [0024]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block schematic diagram of apparatus for watermarking copyright protected information according to the present invention comprising a perceptual encoder, a watermark location (index) selector responsive to transformation processes of the perceptual coder for selecting a location within the perceptual coded bitstream for a watermark and a digital watermark generator, a quantizer of the perceptual coder outputting a digitally watermarked bitstream with a watermark inserted at the selected location; FIG. 1([0025] a) provides details of a generalized digital encoder and FIG. 1(b) provides more specific details directed to the design of a particular digital encoder involving the encoding of an analog signal.
  • FIG. 2 comprises a typical power versus frequency spectrum of a trumpet useful for explaining principles of perceptual coding. [0026]
  • FIG. 3 is a functional block schematic diagram of a decoder/player for use in playing a digital bitstream of information having an embedded, hidden data watermark.[0027]
  • DETAILED DESCRIPTION
  • Now the present invention will be described referring to the drawings for one exemplary embodiment of the invention. FIG. 1([0028] a) represents a block schematic diagram of a generalized digital encoder for embedding a hidden data stream into a digital information signal to be perceptually encoded according to the present invention. FIG. 1(b) represents a specific analog signal implementation of FIG. 1(a) including specific recommendations for implementation of encryption. Similar reference characters used in each drawing represent similar components. As has been described above, perceptual coding has evolved over the past several years from a concept to practical application. Moreover, several enhancements to perceptual coding/decoding techniques have evolved which describe enhanced or improved performance in one or another step or component of the encoding/decoding process.
  • Referring to FIG. 1([0029] a), there is shown a perceptual coder 110, a hidden data index selector 120 for selecting an index or location to insert a hidden data sequence, for example, a digital watermark, into an information signal that is being perceptually coded and a digital hidden data generator 130. The entirety of perceptual coder 110 is drawn to generically describe the process of perceptual coding and is not intended to describe the most current or best manner of implementation. The method and means for perceptual encoding does not comprise the present invention, rather it is the manner and apparatus for inserting (and when appropriate, removing) a hidden data sequence such as a digital watermark into the coded, compressed signal as will be further described below. Each of the components of the perceptual coder 110 is known from the prior art and may comprise hardware, a software programed processor or firmware in implementation. Similarly, each of the components of the hidden data index selector 120 and digital hidden data generator 130 is known from the prior art individually. It is the combination of elements described by the claims which comprises the present invention.
  • An uncompressed digital data stream is presented to [0030] perceptual coder 110 at point 100. The uncompressed digital data stream may comprise audio, video, software algorithm, or other protectable digital data stream. What is intended by “protectable” is the protection of intellectual property by copyright, for example, any work that has been reduced to a tangible medium of expression including, but not limited to, audio, video, software or other work protectable by copyright.
  • The first task of the perceptual decoder as represented by [0031] step 80 is the generation of N sample points for the input digital stream of protectable information according to a compression algorithm. The compression algorithm is typically predetermined or selectable according to the type of presented data. For example, audio may be compressed differently from video data and the like. As a result of the sample point generation step 80, N samples are presented to an N-point transform step 104. N-point transform step 104 may comprise any one of a plurality of possible N-point transformations as will be further described herein. The result of the N-point transform step is N coefficients which are provided to quantization step 140 and to perceptual threshold determination step 105. Perceptual threshold determination step 105 may vary among types of information signals such as audio and video. Nevertheless, the objective of the perceptual threshold determination is a threshold for human perception such that below the threshold may be data points that are not perceptible to human perception but above the threshold are data points that are perceptible to human perception and thus represent data points that during compression and the quantization process may not be discounted.
  • [0032] Quantization step 140 may be generally described as the process of manipulating perceptual coding coefficients to insert a digital water mark into the perceptually coded bitstream. Quantization step 140 in one one embodiment of the present invention represents three steps. The first and second of these relate to the expected tasks of the perceptual coder. The first step is to select a scale factor. The quantization scale factor may be different for different types of data, such as audio or video. The scale factor selection may be responsive to the perceptual threshold determination process. Once the scale factor is selected for the input N coefficients, the coefficients are quantized according to the selected scale factor. The output is N quantized coefficients representing the compressed digital bitstream.
  • The non-typical third step of [0033] quantizer 140 is the process of injecting a hidden data sequence or stream in indexed locations of the output compressed data stream according to, for example, an N-point transformation process 104 as will be further described herein. The hidden data stream may represent a watermark for not only marking protected information as protected but assisting one in tracing a pirate of the protected information as will be further discussed herein. Hidden data index selector 120 responds to the N-point transform process 104 by identifying locations in the compressed digital information stream that a watermark may occupy. Digital hidden data generator 130 provides the data to be introduced or inserted onto the compressed information stream at the selected indices.
  • The output of [0034] quantizer 140 is N quantized coefficients representing a compressed information data stream including digital hidden data. The data stream is presented to an entropy encoder 107. Entropy encoder 107 performs the final stage of compression in a lossless (invertible) manner by encoding frequently occurring symbols using shorter codewords and less frequently occurring symbols using longer codewords. The use of shorter codewords exceeds the use of longer codewords and hence there is compression.
  • [0035] Entropy coder 107 provides an output which fills an output buffer 108 of compressed digital information signal (including hidden data). If the buffer is full, a buffer fullness indicator is fed back to the quantizer 140 to throttle or stop the quantization process. Otherwise, the output buffer 108 outputs an output compressed bitstream for, for example, recording, broadcast or other signal distribution.
  • One skilled in the art will be familiar with a variety of embodiments for implementing [0036] quantizer block 140 including all three steps of selecting a scale factor, quantizing coefficients and injecting the hidden data (watermark). Two embodiments are known for audio (the Advanced Audio Coding, AAC and Perceptual Audio Coding, PAC audio compression algorithms). Also, further embodiments are described for known (MPEG-2) video compression algorithms in the above-identified U.S. provisional application serial No. 60/067,225 filed Dec. 3, 1997.
  • In both AAC and PAC audio compression algorithms, coefficients (also known as spectral values) are grouped into scale factor bands that are quantized with the same scale factor. Once coefficients are grouped into scale factor bands, an algorithm is used to quantize them according to the present invention. Distinct hidden data (watermark) bits can be inserted into each coefficient in a scale factor band that has at least one non-zero coefficient. As can be seen, the objectives, in either an audio or video embodiment, are achieved of embedding hidden data according to the modified scale factors generated by the algorithm into the output compressed information bit stream. [0037]
  • Now referring to FIG. 1([0038] b), FIG. 1(b) represents an embodiment for perceptually encoding an analog signal containing protectable information and provides particular recommendations for generating a hidden data index and encrypting the hidden data (watermark). Generally, an analog signal for encoding is received into perceptual coder 110 at analog source 101. The analog signal comprises according to the present invention a signal representing protected information. The protected information itself may represent an audio performance, a video or visual performance, a computer software algorithm, a bitstream representing a book or novel or even be descriptive of other sensory signal (taste, touch or smell) that may be capable of perceptual coding. By way of example, the analog source may be a source of a combination of audio and visual signals and so represent the protected information content of a movie, computer game or live audio/visual performance such as a ballet or opera.
  • Typically, a low pass or [0039] other filter 102 is applied for filtering noise or segregating the bandwidth of the analog signal or related purpose. In this manner, the analog signal presented to the analog to digital converter 102 can be considered to be relatively pure of adverse influences and confined to a known or expected bandwidth of the signal.
  • Analog to [0040] digital converter 103 converts the analog signal (for example, voice or visual) to digital data. The digital data output from the A/D converter 103 may be considered a faithful representation of the filtered analog signal, except in binary form. Of course, if the data presented to the perceptual coder is already in digital form, neither steps 102 or 103 are required, for example, if the input is a digital computer software algorithm or game program.
  • [0041] Block 104 represents the transformation block of a perceptual coder, which for example, according to the prior art, may comprise an N point fast Fourier transform or a Modified Discrete Cosine Transform (MDCT) or other transform for perceptual coding. These are variously implemented according to the prior art; for example, an MDCT transform is implemented via a filter bank for transforming audio signals according to the '948 patent. The encoding process slices the time series into contiguous time segments and transforms each segment into the frequency domain. Once in the frequency domain, the spectral coefficients are compared with a perceptual threshold function T(f). This comparison step is shown in the diagram as calculation of perceptual thresholds step 105. If the coefficients are below the thresholds, the coefficients potentially can be discarded without any loss in perceived quality. Yet, these coefficients represent candidate locations for placement of at least a portion of a digital watermark. If above the thresholds, the coefficients are quantized and output as necessary data representative of the original analog signal 101.
  • Referring briefly to FIG. 2, for example, there is shown a power versus frequency spectrum for the sound of a trumpet. Also, shown is the perceptual threshold function T(f) shown as a stair step curve C over the sound wave W. A great deal of the trumpet signal is below the perceptual threshold and may be discarded in a perceptual coder. All of these signal portions below the threshold function are candidate watermark locations. For example, humans can hardly, if at all, hear an audio signal at very low frequency. Neither can we humans hear an ultrasonic frequency. The peak in the threshold function T(f) model shown rises rapidly and then decreases steadily from approximately 1000 Hz out to 12,000 Hz. Thus, the highest fidelity sound may be considered wasted on the human ear and perceptibly equivalent quality can be achieved by only sending data indicative of the signal above the threshold function. [0042]
  • The [0043] quantizing step 106 follows the perceptual coding transformation. What is above the threshold is quantized and output as necessary data for reconstruction of the original analog signal 101. Quantization is the three step process described above in considerable detail. The output of the transformation process 104 is operated upon by the coefficient quantizer 106 in accordance with the calculated perceptual thresholds of the threshold function output from calculation block 105. For example, in an audio signal such as a power level of 40 dB at 1,000 Hz, it may be appropriate to quantize that level using a high resolution quantizer having a larger number of steps, for example, 8 or 16 bit coding. In perceptual coding, one probably would not quantize a DC signal at all, because the human ear cannot perceive 0 frequency, regardless of the power level.
  • The binary output of the [0044] coefficient quantizer 107 is, in the depicted embodiment, provided to an entropy encoder 107, already described above. The output of the entropy encoder is the digital bitstream that may be recorded on disc, tape or otherwise recorded or may be broadcast, transmitted or otherwise distributed from the point of sale or distribution. The output buffer 108, described above, is believed unnecessary especially in an embodiment contemplating immediate distribution at higher data rates than the rate of the compressed data stream output of entropy encoder 107.
  • In accordance with the present invention, the output binary bitstream contains a recoverable watermark generated by [0045] generator 130 and located in the bitstream according to the output of watermark location (index) selector 120. It is assumed that it is possible and desirable to alter some bits of an encoded audio, video or other digital bitstream without affecting the perceived quality of what is played out. A digital signature is created for a specific protected media stream. The signature may be a function of a number of identifying parameters as will be further described below, for example, associated with a specific location in the distribution channel, date and time of distribution and type of distribution transaction. The digital watermark or signature is created by encrypting the chosen set of parameters. The encryption key is intended to be kept secret and protected and secured by a trusted entity and only distributed in a protected manner, for example, embedded in a secure manner (for example, in a secure microprocessor) or distributed encrypted itself with yet another key. The key, as will be described below, may be provided to a legitimate recipient of an original (for example, if authentication must take place before the data can be decoded.)
  • The watermark location (index) [0046] selector 120 operates via a signal from the transformation function 104 as to what coefficients are below the threshold. The above process of transformation 104 leads to a sequence of spectral samples whose coefficients are below the perceptual threshold which may referred to as a candidate watermarking sequence B(i). The sequence generated at block 124 represents all candidate opportunities for inserting watermarking data. The sequence is fed to a logical AND block 125 which receives an input that is generated, in one embodiment of the present invention, involving a seed 121 for generating an encryption key K and a selector 122 for selecting a desired percent of watermarking overhead. By watermarking overhead is intended the degree of watermarking, for example, measured by the amount of watermark information to be carried by the watermark as well as other factors.
  • A B(i) output sequence of a random number generator (RNG) [0047] 123 may be generated by any one of a number of approaches. One known approach assumes the addition of some percent of watermarking overhead, for example, the probability of B(i)=1 equals x/100, where x, for example, may be 1%. Also assume a random number generator 123 generates numbers uniformly between 0 and m. Then, such a uniform random number generator is initialized with a starting rate. For each member of the candidate watermarking sequence output at candidate generator 124, the random number generator is called to output a random number. If the output is greater that (1×/100)*m, then, set B(i)=1; otherwise, we set B(i)=0. Other ways of generating a B(i) sequence may come to mind of those ordinarily skilled in the art as well.
  • There are likewise various possibilities for encoding the digital watermark data via [0048] watermark generator 130 as well. For example, where B(i), as above, equals one. For example, if T(f), the threshold function, is the perceptual threshold at spectral coefficient f for the ith member of the candidate watermarking sequence, then a one may be encoded as 2T(f)/3 and a zero as T(f)/3.
  • Referring again to watermark [0049] selector 120, the seed and the watermark overhead selection are used as inputs to a random number generator 123 which outputs a binary sequence. While a random number generator (RNG) 123 is depicted, the generator 123 may comprise a pseudorandom number generator or other more predictable generator than one that is assumed to be more random, especially when it operates responsive to a seed. The output binary sequence of the RNG 123 and the candidate sequence B(i) are ANDed at logical AND gate 125 and its output result is used to index where in the quantizer 106 output a digital watermark is to be inserted.
  • Now an exemplary hidden data (watermark) [0050] generator 130 will be described with reference to FIG. 1(b). The digital hidden data (watermark) generator 130 comprises an input 131 of a plurality of watermark parameters. For example, watermark input parametric data may comprise relatively constant data such as data indicating the owner of the protected content and the identity of the protected work and relatively variable data, for example, the distributor, the customer name, the date and time of transaction, the date and time of making of a master, the type of transaction (gift, sale, license or lease), date of expiration, number of permitted plays or other parameter relating to the expiration of any license or lease, the encoding algorithm that was used to encode the signal via perceptual coder 110 or any other related parameter. No particular order is asserted for the parametric data of the watermark. Nevertheless, data representing the various parameters should be advantageously grouped upon input. For example, it may be appropriate to collect variable data such as point of distribution data together (time, date, type of arrangement, identity of recipient, location of distribution) in a separate location from constant data such as copyright owner and identity of the work, for example, by title, track and artist. Some of the data, such as customer identity and date and place of transaction, serves the purpose of assisting one in tracking a would-be pirate. Other data serves to identify the protected information. Yet other data, depending, for example, on the transaction, may prevent a player from further playing or otherwise decoding and utilizing the compressed data stream of protected information.
  • In the depicted embodiment of FIG. 1([0051] b), the parametric data of watermarking parameters entered at block 131 is encrypted with key K at block 132 which may be the same key K generated by seed 121 or a different key. Of course, the use of such an encryption key K protects the parametric data from piracy or tampering. The encryption may be by any known means and results in a multi-bit digital watermark at block 133. Encryption processes that may be utilized include well known processes such as the DES algorithm, the Cylink algorithm, the algorithm known as pgp (pretty good privacy) and other algorithms known in the art. The generated watermark is input to coefficient quantizer 106 and inserted at the indexed locations selected by the watermark index selector 120. Also, in alternative embodiments, the encryption may involve two, three or more tiers of encryption, for example, involving keys which change periodically as well as fixed keys determined at the time of manufacture (such as secret serial number of a decoder) and are distributed to points in the distribution channel in a protected manner, such as keys of the month. In alternative embodiments, memory cards or smart cards including a secure microprocessor with embedded decryption algorithm may be utilized to distribute new keys periodically or different encryption algorithms for use in decoder devices distributed in the distribution channel to keep pirates guessing.
  • It may now be apparent that the watermark is inserted in such a manner that it is imperceptible and has no impact on the perceived quality of a coded [0052] analog signal 101. Moreover, the watermark itself is not recognizable, even as a digital binary bitstream because 1) it has been encrypted with a key K and 2) the watermark is distributed throughout the output bitstream of quantizer 106 according to a selected percent of watermarking overhead and a seed. It is not easily recognizable and locatable, for example, at the beginning or end of the protected work. Of course, the seed, the key, the selected watermarking overhead, even the characteristics and order of the parametric data comprising the watermark are unknown to the pirate and, consequently, must be generated by the pirate in order to be able to unwatermark the signal. If the pirate is the purchaser and freely distributes copies without authorization, unauthorized copies may include the purchaser's identity in the watermark.
  • Also, it is important to note that in furtherance of the objective of the present invention that the watermarking of a protected signal may occur anywhere in the distribution channel. At such a point of distribution, all components of the perceptual coder are not required for watermarking a signal. The digital data may already be coded and recorded. It is then fed through a generator for generating a candidate watermarking sequence [0053] 124 and requantized and restored with a digital watermark or watermark portion.
  • It may be desirable to extract the watermark from the encoded data stream. For example, an already included watermark may be extracted and new data added to the digital watermark, for example, at a point of distribution. As another example, a personal computer disc player or other means of utilizing the digital bitstream may extract the watermark and be operative to deny use of the recorded data. In such situations, what will be necessary, depending on the level of encryption applied, is to have access to the key K or keys, the random number sequence and the perceptual coding function applied at transformation and perceptual threshold calculation blocks [0054] 104 and 105 respectively.
  • In an alternative embodiment of a watermark extractor, the watermark may be extracted from the decoded bitstream by transforming the decoded time series into the frequency domain, extracting the watermark bits using the watermarking sequence B(i) and decrypting using key K. Multiple frequency domain transformations may be carried out based on various encoding parameters (segment length, encoding rate and the like) and watermark extraction steps before the correct combination of encoding parameters corresponding to the original watermarking are arrived upon. [0055]
  • In a further alternative embodiment, it may be advantageous to detect and extract a watermark in the decoded bitstream to intentionally insert a synchronization marker at the beginning of the stream. (Placing synchronization markers, however, may assist the pirate in locating the digital watermark.) Nevertheless, the synchronization marker may comprise constant data that need not necessarily comprise the watermark such as data representing the copyright owner, the source, and the identity of the protected work for example by title, track and artist, as some of these should be well known from the protected work itself. Title, track and artist may be present for display, for example, in digital program delivery systems known in the art. [0056]
  • In the design of apparatus for playing a watermarked original or pirate copy, a specific field (for example, the encoding algorithm type) is inserted into the watermark. The encryption key and the watermarking sequence are derived from a private key issued to the purchaser at the point of distribution. A decoder apparatus associated with any player will receive the private key and decrypt the watermark to extract the specific field. Play can cease shortly after play begins if the field cannot be found. [0057]
  • Now referring to FIG. 3, there is shown a decoder for playing protected information according to the present invention, the protected compressed information including hidden data such as a watermark as described above. A compressed digital bitstream is received at [0058] point 300 and is presented to a key extractor 305 and to a bitstream decoder 310. The key extractor 305 extracts a key used to encrypt the watermark. A key extractor is optional if the key is transmitted in another way than in the compressed digital bitstream. The key extractor delivers the key, preferably in a secure manner to a watermark detector 315. The bitstream decoder 310 outputs a decoded bitstream which is presented to watermark detector 315 and for presentation, for example, for listening, for playing or for display or other output at presentation box 320. The watermark detector 315 first detects the location of the watermark and then extracts the watermark at the indexed locations. As already indicated, the watermark may indicate an expiration date or a finite number of plays. If the expiration date has expired or the number of plays exceeded, then an authorization signal to deny play is presented to presentation step 320; otherwise, play is permitted by the authorization signal.
  • Thus, there has been shown and described a method and apparatus for digitally watermarking a binary bitstream output of a perceptual coder, simultaneously with or after perceptual coding that meets the objectives sought. Any United States Patents or patent applications referenced herein should be deemed to be incorporated by reference as to their entire contents. Variations and alternative embodiments of the present invention which may become readily apparent to one of ordinary skill reading the above description of the invention should be deemed to be encompassed within its scope which should only be construed to be limited by the claims which follow. [0059]

Claims (33)

What we claim is:
1. Apparatus for inserting a digital watermark into protected information comprises
a transformation function of a perceptual coder for coding an information signal representative of the protected information,
a watermark location selector responsive to the perceptual coder for selecting a location for inserting a digital watermark,
a digital watermark generator for generating a digital watermark and
a quantizer of the perceptual coder responsive to the digital watermark detector and the watermark location selector for inserting a digital watermark at selected locations within an output bitstream including the perceptually coded information signal.
2. Apparatus as recited in
claim 1
wherein said transformation function comprises a modified discrete cosine transform.
3. Apparatus as recited in
claim 1
wherein said transformation function comprises a discrete cosine transform.
4. Apparatus as recited in
claim 1
wherein said transformation function comprises an N point fast Fourier transform.
5. Apparatus as recited in
claim 1
wherein said watermark location selector comprises a random number generator and a logical AND gate responsive to an output of said random number generator and a candidate watermarking sequence.
6. Apparatus as recited in
claim 5
wherein said random number generator is responsive to a seed and a selection of a watermarking overhead.
7. Apparatus as recited in
claim 1
wherein said digital watermark generator comprises an input comprising a plurality of watermarking parameters.
8. Apparatus as recited in
claim 7
wherein said plurality of watermarking parameters comprises one of data representing an identity of a recipient of said protected information and data representing an identity of a perceptual coding transformation algorithm.
9. Apparatus as recited in
claim 7
wherein said plurality of watermarking parameters comprises once of data representing an identity of a contractual arrangement and data representing an identity of the date of said contractual relationship.
10. Apparatus as recited in
claim 9
wherein said contractual arrangement comprises a lease and said plurality of watermarking parameters further comprises data indicative of an expiration date of said lease.
11. Apparatus as recited in
claim 7
wherein said plurality of watermarking parameters is encrypted prior to insertion.
12. Apparatus as recited in
claim 6
wherein said watermark generator comprises means for encrypting a plurality of watermarking parameters with a key K related to said seed.
13. Apparatus as recited in
claim 6
wherein said watermark generator comprises means for encrypting a plurality of watermarking parameters with a key K unrelated to said seed.
14. Apparatus as recited in
claim 1
wherein said protected data comprises video data and said quantization has a step size selected according to the magnitude of errors that will not be visible.
15. A method for inserting a digital watermark into protected information comprising the steps of
perceptually encoding an information signal representative of the protected information,
selecting, responsive to the perceptual coding step, a location for inserting a digital watermark,
generating a digital watermark, and
during perceptual coding, quantizing the information signal to insert the generated digital watermark at selected locations within an output bitstream including the perceptually coded information signal.
16. A method as recited in
claim 15
wherein said perceptual coding comprises a transformation function of a modified discrete cosine transform.
17. A method as recited in
claim 15
wherein said perceptual coding comprises a transformation function of a discrete cosine transform.
18. A method as recited in
claim 15
wherein said perceptual coding comprises a transformation function of an N point fast Fourier transform.
19. A method as recited in
claim 15
wherein said steps of selecting a watermark location comprises generating a random number and logical ANDing an output of said random number generator and a candidate watermarking sequence.
20. A method as recited in
claim 19
wherein said step of generating a random number is responsive to inputing a seed and selecting a watermarking overhead.
21. A method as recited in
claim 15
wherein said step of generating a digital watermark comprises an input comprising a plurality of watermarking parameters.
22. A method as recited in
claim 21
wherein said plurality of watermarking parameters comprises one of data representing an identity of a recipient of said protected information and data representing an identity of a perceptual coding transformation algorithm.
23. A method as recited in
claim 21
wherein said plurality of watermarking parameters comprises one of data representing an identity of a contractual arrangement and data representing an identity of the date of said contractual relationship.
24. A method as recited in
claim 23
wherein said contractual arrangement comprises a lease and said plurality of watermarking parameters further comprises data indicative of an expiration date of said lease.
25. A method as recited in
claim 21
wherein said plurality of watermarking parameters is encrypted prior to insertion.
26. A method as recited in
claim 20
wherein said watermark generator comprises means for encrypting a plurality of watermarking parameters with a key K related to said seed.
27. A method as recited in
claim 20
wherein said step of generating a watermark comprises encrypting a plurality of watermarking parameters with a key K unrelated to said seed.
28. A method as recited in
claim 15
wherein said protected data comprises video data and said quantization step has a step size selected according to the magnitude of errors that will not be visible.
29. Apparatus for inserting a hidden data stream into a perceptually encoded media stream comprising
an N point transform for outputting N coefficients and
a quantizer for selecting a scale factor, quantizing the input N coefficients and inserting the hidden data stream.
30. Decoder apparatus for detecting a watermark for authorizing play comprising
a key receiver for receiving a key relating to a location of a watermark,
a watermark detector responsive to the key receiver for locating the watermark and for analyzing if the watermark and
a presentation circuit for presenting a decoded information signal responsive to the watermark detector.
31. Decoder apparatus for detecting a watermark in an information signal, the watermark indicating the name of a customer and the date and location of a transaction, and for outputting the watermark for tracing a copy of the information signal to a pirate.
32. A method for inserting a digital watermark into protected information comprising the steps of
perceptually encoding an information signal representative of the protected information,
selecting, responsive to the perceptual coding step, a location for inserting a digital watermark,
generating a digital watermark, and
during perceptual coding, manipulating pereptual coding coefficients to insert the generated digital watermark at selected locations within an output bitstream including the perceptually coded information signal.
33. A method for inserting a digital watermark into protected information as recited in
claim 32
wherein said protected information comprises audio information.
US09/108,135 1997-12-03 1998-06-30 Method and apparatus for watermarking digital bitstreams Expired - Lifetime US6330672B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/108,135 US6330672B1 (en) 1997-12-03 1998-06-30 Method and apparatus for watermarking digital bitstreams

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US6722597P 1997-12-03 1997-12-03
US09/108,135 US6330672B1 (en) 1997-12-03 1998-06-30 Method and apparatus for watermarking digital bitstreams

Publications (2)

Publication Number Publication Date
US20010049788A1 true US20010049788A1 (en) 2001-12-06
US6330672B1 US6330672B1 (en) 2001-12-11

Family

ID=22074557

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/108,135 Expired - Lifetime US6330672B1 (en) 1997-12-03 1998-06-30 Method and apparatus for watermarking digital bitstreams
US09/192,359 Expired - Lifetime US6493457B1 (en) 1997-12-03 1998-11-16 Electronic watermarking in the compressed domain utilizing perceptual coding

Family Applications After (1)

Application Number Title Priority Date Filing Date
US09/192,359 Expired - Lifetime US6493457B1 (en) 1997-12-03 1998-11-16 Electronic watermarking in the compressed domain utilizing perceptual coding

Country Status (2)

Country Link
US (2) US6330672B1 (en)
WO (1) WO1999029114A1 (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US6631198B1 (en) 2000-06-19 2003-10-07 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US20030202659A1 (en) * 2002-04-29 2003-10-30 The Boeing Company Visible watermark to protect media content from server to projector
US20030221106A1 (en) * 2002-01-22 2003-11-27 Delp Edward J. Temporal synchronization of video and audio signals
WO2004040913A1 (en) * 2002-10-30 2004-05-13 Koninklijke Philips Electronics N.V. Watermarking of a variable bit-rate signal
US20040136565A1 (en) * 2000-06-19 2004-07-15 Hannigan Brett T. Perceptual modeling of media signals based on local contrast and directional edges
US6771796B2 (en) 1994-10-21 2004-08-03 Digimarc Corporation Methods for identifying equipment used in counterfeiting
US20040156529A1 (en) * 1994-03-17 2004-08-12 Davis Bruce L. Methods and tangible objects employing textured machine readable data
US20040228502A1 (en) * 2001-03-22 2004-11-18 Bradley Brett A. Quantization-based data embedding in mapped data
US20040246524A1 (en) * 2003-05-30 2004-12-09 Masaichi Sawada Document output device, document output system, and document output method
US20040264735A1 (en) * 1995-05-08 2004-12-30 Rhoads Geoffrey B. Digital watermark embedding and decoding using encryption keys
US20050063011A1 (en) * 2003-08-20 2005-03-24 Masaichi Sawada Document output device and program for printing
US20050097790A1 (en) * 2003-11-07 2005-05-12 Masaichi Sawada Identification marker generating apparatus, method, storage medium and computer data signal
US20050144006A1 (en) * 2003-12-27 2005-06-30 Lg Electronics Inc. Digital audio watermark inserting/detecting apparatus and method
US20050175179A1 (en) * 2004-02-10 2005-08-11 Mustafa Kesal Media watermarking by biasing randomized statistics
US20050207615A1 (en) * 2002-01-18 2005-09-22 John Stach Data hiding through arrangement of objects
US6952485B1 (en) 2000-09-11 2005-10-04 Digimarc Corporation Watermark encoding and decoding in imaging devices and imaging device interfaces
US20070021196A1 (en) * 2005-07-19 2007-01-25 Campbell Steven M Watermarking downloadable game content in a gaming system
US20070147655A1 (en) * 2005-12-28 2007-06-28 Institute For Information Industry Method for protecting content of vector graphics formats
US20070291980A1 (en) * 2006-06-14 2007-12-20 Hwan Joon Kim Video watermarking apparatus in compression domain and method using the same
US20070294173A1 (en) * 2000-12-18 2007-12-20 Levy Kenneth L Rights Management System and Methods
US20080019665A1 (en) * 2006-06-28 2008-01-24 Cyberlink Corp. Systems and methods for embedding scene processing information in a multimedia source
US20080056671A1 (en) * 1998-08-27 2008-03-06 International Business Machines Corporation System and method for embedding additional information in video data
US20100086170A1 (en) * 2001-12-13 2010-04-08 Jun Tian Progressive Image Quality Control Using Watermarking
US20100281545A1 (en) * 2000-07-20 2010-11-04 Levy Kenneth L Using Embedded Data with File Sharing
US20110044494A1 (en) * 2001-03-22 2011-02-24 Brett Alan Bradley Quantization-Based Data Embedding in Mapped Data
US7958359B2 (en) 2001-04-30 2011-06-07 Digimarc Corporation Access control systems
US20110183763A1 (en) * 2006-06-07 2011-07-28 Wms Gaming Inc. Processing metadata in wagering game systems
US8036419B2 (en) 1998-04-16 2011-10-11 Digimarc Corporation Digital watermarks
US8098883B2 (en) 2001-12-13 2012-01-17 Digimarc Corporation Watermarking of data invariant to distortion
US20120203561A1 (en) * 2011-02-07 2012-08-09 Qualcomm Incorporated Devices for adaptively encoding and decoding a watermarked signal
US20120210357A1 (en) * 2000-07-20 2012-08-16 Resource Consortium Limited Mechanism for Distributing Content Data
US8505108B2 (en) 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
US20140254797A1 (en) * 2013-03-07 2014-09-11 Agnieszka Piotrowska Method and filter for erasing hidden data
US9628830B1 (en) * 2014-12-22 2017-04-18 Sorenson Media, Inc. Automatic content recognition (ACR) fingerprinting and video encoding
US9630443B2 (en) 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US9767822B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and decoding a watermarked signal
US9767823B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and detecting a watermarked signal
US20180302690A1 (en) * 2015-10-15 2018-10-18 Nagravision S.A. A system for inserting a mark into a video content
US10291814B2 (en) * 2016-10-14 2019-05-14 Intel Corporation Transmission of encrypted image data
US11074033B2 (en) 2012-05-01 2021-07-27 Lisnr, Inc. Access control and validation using sonic tones
US11189295B2 (en) 2017-09-28 2021-11-30 Lisnr, Inc. High bandwidth sonic tone generation
US11330319B2 (en) * 2014-10-15 2022-05-10 Lisnr, Inc. Inaudible signaling tone
US11452153B2 (en) 2012-05-01 2022-09-20 Lisnr, Inc. Pairing and gateway connection using sonic tones
US20240038249A1 (en) * 2022-07-27 2024-02-01 Cerence Operating Company Tamper-robust watermarking of speech signals

Families Citing this family (184)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6345104B1 (en) 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US8094949B1 (en) * 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US7007166B1 (en) * 1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US6738495B2 (en) * 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US7805500B2 (en) 1995-05-08 2010-09-28 Digimarc Corporation Network linking methods and apparatus
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7562392B1 (en) * 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US7006661B2 (en) 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7457962B2 (en) 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6078664A (en) * 1996-12-20 2000-06-20 Moskowitz; Scott A. Z-transform implementation of digital watermarks
US7107451B2 (en) * 1996-07-02 2006-09-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
EP1012747A4 (en) * 1996-09-13 2001-01-31 Purdue Research Foundation Authentication of signals using watermarks
US7730317B2 (en) 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
JPH11234264A (en) * 1998-02-17 1999-08-27 Canon Inc Electronic papermarking system, electronic information distribution system using the same and storage medium
US6233347B1 (en) * 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
WO1999064973A1 (en) * 1998-06-10 1999-12-16 Auckland Uniservices Limited Software watermarking techniques
US6683957B1 (en) * 1998-07-01 2004-01-27 Samsung Electronics Co., Ltd. Digital image coding/decoding apparatus and method for correcting distorted data in transmitted signals that use watermarking
WO2000010257A1 (en) * 1998-08-17 2000-02-24 Hughes Electronics Corporation Turbo code interleaver with near optimal performance
US7373513B2 (en) 1998-09-25 2008-05-13 Digimarc Corporation Transmarking of multimedia signals
US7532740B2 (en) 1998-09-25 2009-05-12 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US7197156B1 (en) 1998-09-25 2007-03-27 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
JP2000115517A (en) * 1998-10-06 2000-04-21 Canon Inc Information processor capable of making electronic watermark and communication network capable of accepting connection of the information processor
JP3768705B2 (en) * 1998-11-27 2006-04-19 キヤノン株式会社 Digital watermark embedding device, output control device, and computer-readable storage medium
FR2787604B1 (en) * 1998-11-30 2001-08-31 Canon Kk METHOD FOR INSERTING A SECRET MARK AND AUTHENTICATING A DIGITAL SIGNAL
CN1143292C (en) * 1999-02-26 2004-03-24 日本胜利株式会社 Information recording method, recording device, record reproducing method and record media
US6847949B1 (en) * 1999-05-10 2005-01-25 Koninklijke Philips Electronics N.V. Indicator system for screening protected material
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7730300B2 (en) 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
IL129725A (en) * 1999-05-02 2011-06-30 Nds Ltd Watermark system
US6801999B1 (en) * 1999-05-20 2004-10-05 Microsoft Corporation Passive and active software objects containing bore resistant watermarking
US6952774B1 (en) * 1999-05-22 2005-10-04 Microsoft Corporation Audio watermarking with dual watermarks
US7543148B1 (en) * 1999-07-13 2009-06-02 Microsoft Corporation Audio watermarking with covert channel and permutations
US7020285B1 (en) * 1999-07-13 2006-03-28 Microsoft Corporation Stealthy audio watermarking
WO2001018628A2 (en) 1999-08-04 2001-03-15 Blue Spike, Inc. A secure personal content server
WO2001013642A1 (en) * 1999-08-12 2001-02-22 Sarnoff Corporation Watermarking data streams at multiple distribution stages
US6792129B1 (en) * 1999-08-25 2004-09-14 Sharp Laboratories Of America Digital watermarking in a perceptually uniform domain
WO2001031629A1 (en) * 1999-10-29 2001-05-03 Sony Corporation Signal processing device and method therefor and program storing medium
US7039614B1 (en) 1999-11-09 2006-05-02 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US8296228B1 (en) * 1999-11-22 2012-10-23 Harry Thomas Kloor Dual transaction authorization system and method
EP1104969B1 (en) * 1999-12-04 2006-06-14 Deutsche Thomson-Brandt Gmbh Method and apparatus for decoding and watermarking a data stream
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US9355352B1 (en) 2000-02-24 2016-05-31 Richard Paiz Personal search results
US8977621B1 (en) 2000-02-24 2015-03-10 Richard Paiz Search engine optimizer
US20030141375A1 (en) * 2000-03-09 2003-07-31 Spectra Systems Corporation Information bearing marking used with a digitally watermarked background
US6735561B1 (en) * 2000-03-29 2004-05-11 At&T Corp. Effective deployment of temporal noise shaping (TNS) filters
JP3630071B2 (en) * 2000-04-05 2005-03-16 日本電気株式会社 Digital watermark detector and digital watermark detection method used therefor
JP2002057882A (en) * 2000-04-21 2002-02-22 Sony Corp Apparatus and method for embedding information, image processor and processing method, content processor and processing method, monitor and monitoring method, and storage medium
US7111168B2 (en) * 2000-05-01 2006-09-19 Digimarc Corporation Digital watermarking systems
US8121843B2 (en) 2000-05-02 2012-02-21 Digimarc Corporation Fingerprint methods and systems for media signals
JP2001346170A (en) * 2000-05-31 2001-12-14 Nec Corp Data insertion strength adjustment method and data insertion circuit
US7508944B1 (en) * 2000-06-02 2009-03-24 Digimarc Corporation Using classification techniques in digital watermarking
US20030206631A1 (en) * 2000-06-22 2003-11-06 Candelore Brant L. Method and apparatus for scrambling program data for furture viewing
US7006631B1 (en) * 2000-07-12 2006-02-28 Packet Video Corporation Method and system for embedding binary data sequences into video bitstreams
CA2418722C (en) * 2000-08-16 2012-02-07 Dolby Laboratories Licensing Corporation Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
JP4214440B2 (en) * 2000-10-19 2009-01-28 ソニー株式会社 Data processing apparatus, data processing method, and recording medium
FR2816154A1 (en) * 2000-10-31 2002-05-03 Canon Kk INSERTION OF ADDITIONAL INFORMATION INTO DIGITAL DATA
JP2002176550A (en) * 2000-12-07 2002-06-21 Nec Corp Inserting and detecting device for digital watermark data
US6738744B2 (en) 2000-12-08 2004-05-18 Microsoft Corporation Watermark detection via cardinality-scaled correlation
RU2288546C2 (en) * 2001-01-23 2006-11-27 Конинклейке Филипс Электроникс Н.В. Embedding watermark into a compressed informational signal
ATE505905T1 (en) * 2001-02-09 2011-04-15 Canon Kk INFORMATION PROCESSING DEVICE AND ITS CONTROL METHODS, COMPUTER PROGRAM, AND STORAGE MEDIUM
KR20020067853A (en) * 2001-02-19 2002-08-24 주식회사 마크애니 Apparatus and Method for controlling the copy and play of a digital audio contents using digital watermarking
US7042470B2 (en) * 2001-03-05 2006-05-09 Digimarc Corporation Using embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms
US20020168082A1 (en) * 2001-03-07 2002-11-14 Ravi Razdan Real-time, distributed, transactional, hybrid watermarking method to provide trace-ability and copyright protection of digital content in peer-to-peer networks
US6993050B2 (en) 2001-03-14 2006-01-31 At&T Corp. Transmit and receive system for cable data service
US7461002B2 (en) 2001-04-13 2008-12-02 Dolby Laboratories Licensing Corporation Method for time aligning audio signals using characterizations based on auditory events
JP3983993B2 (en) * 2001-04-13 2007-09-26 株式会社日立製作所 Method for creating application data with face photo, apparatus for implementing the same, and processing program therefor
US7610205B2 (en) 2002-02-12 2009-10-27 Dolby Laboratories Licensing Corporation High quality time-scaling and pitch-scaling of audio signals
US7711123B2 (en) 2001-04-13 2010-05-04 Dolby Laboratories Licensing Corporation Segmenting audio signals into auditory events
US7822969B2 (en) * 2001-04-16 2010-10-26 Digimarc Corporation Watermark systems and methods
US7607016B2 (en) * 2001-04-20 2009-10-20 Digimarc Corporation Including a metric in a digital watermark for media authentication
US6973574B2 (en) 2001-04-24 2005-12-06 Microsoft Corp. Recognizer of audio-content in digital signals
US7020775B2 (en) 2001-04-24 2006-03-28 Microsoft Corporation Derivation and quantization of robust non-local characteristics for blind watermarking
US6996273B2 (en) * 2001-04-24 2006-02-07 Microsoft Corporation Robust recognizer of perceptually similar content
US7356188B2 (en) * 2001-04-24 2008-04-08 Microsoft Corporation Recognizer of text-based work
CN1284135C (en) * 2001-05-08 2006-11-08 皇家菲利浦电子有限公司 Generation and detection of watermark robust against resampling of audio signal
US20020169963A1 (en) * 2001-05-10 2002-11-14 Seder Phillip Andrew Digital watermarking apparatus, systems and methods
MY138481A (en) * 2001-05-17 2009-06-30 Sony Corp Data distribution system, terminal apparatus, distribution center apparatus, highefficiency encoding method, high-efficiency encoding apparatus, encoded data decoding method, encoded data decoding apparatus, data transmission method, data transmission apparatus, sub information attaching method, sub information attaching apparatus, and recording medium
US7747853B2 (en) 2001-06-06 2010-06-29 Sony Corporation IP delivery of secure digital content
CA2350029A1 (en) * 2001-06-08 2002-12-08 Cloakware Corporation Sustainable digital watermarking via tamper-resistant software
MXPA03001242A (en) * 2001-06-13 2003-05-27 Koninklije Philips Electronics Method and device for detecting a watermark.
BR0205803A (en) * 2001-07-27 2003-07-22 Koninkl Philips Electronics Nv Methods and systems for integrating and detecting auxiliary data in an information signal, recording and / or reproducing devices and for transmitting an information signal, information signal and storage medium
JP4934923B2 (en) * 2001-08-09 2012-05-23 ソニー株式会社 Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, and computer program
JP3832289B2 (en) * 2001-08-20 2006-10-11 ソニー株式会社 Information recording apparatus, video signal output apparatus, stream output method, program, recording medium, and data structure
EP1433175A1 (en) * 2001-09-05 2004-06-30 Koninklijke Philips Electronics N.V. A robust watermark for dsd signals
US7316032B2 (en) * 2002-02-27 2008-01-01 Amad Tayebi Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
US7562397B1 (en) 2002-02-27 2009-07-14 Mithal Ashish K Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
US20030131350A1 (en) * 2002-01-08 2003-07-10 Peiffer John C. Method and apparatus for identifying a digital audio signal
US7567721B2 (en) 2002-01-22 2009-07-28 Digimarc Corporation Digital watermarking of low bit rate video
WO2003062960A2 (en) * 2002-01-22 2003-07-31 Digimarc Corporation Digital watermarking and fingerprinting including symchronization, layering, version control, and compressed embedding
JP3554825B2 (en) * 2002-03-11 2004-08-18 東北大学長 Digital watermark system
AU2003225052A1 (en) * 2002-04-16 2003-11-03 Sky Kruse Method and system for watermarking digital content and for introducing failure points into digital content
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US20030226020A1 (en) * 2002-06-04 2003-12-04 Ripley Michael S. Protecting digital broadcast content from unauthorized redistribution
JP2004054710A (en) * 2002-07-22 2004-02-19 Sony Corp Information processor, information processing method and information processing system
WO2004012416A2 (en) * 2002-07-26 2004-02-05 Green Border Technologies, Inc. Transparent configuration authentication of networked devices
JP2004064582A (en) * 2002-07-31 2004-02-26 Hitachi Ltd Broadcast content copyright protection system
JP3976183B2 (en) * 2002-08-14 2007-09-12 インターナショナル・ビジネス・マシーンズ・コーポレーション Content receiving apparatus, network system, and program
EP2442566A3 (en) 2002-10-15 2012-08-08 Verance Corporation Media Monitoring, Management and Information System
KR101014309B1 (en) 2002-10-23 2011-02-16 닐슨 미디어 리서치 인코퍼레이티드 Digital Data Insertion Apparatus And Methods For Use With Compressed Audio/Video Data
US8572408B2 (en) 2002-11-05 2013-10-29 Sony Corporation Digital rights management of a digital device
US7724907B2 (en) 2002-11-05 2010-05-25 Sony Corporation Mechanism for protecting the transfer of digital content
US8645988B2 (en) 2002-12-13 2014-02-04 Sony Corporation Content personalization for digital content
US8667525B2 (en) 2002-12-13 2014-03-04 Sony Corporation Targeted advertisement selection from a digital stream
FR2851110B1 (en) * 2003-02-07 2005-04-01 Medialive METHOD AND DEVICE FOR THE PROTECTION AND VISUALIZATION OF VIDEO STREAMS
US7460684B2 (en) 2003-06-13 2008-12-02 Nielsen Media Research, Inc. Method and apparatus for embedding watermarks
US7206649B2 (en) * 2003-07-15 2007-04-17 Microsoft Corporation Audio watermarking with dual watermarks
WO2005031634A1 (en) 2003-08-29 2005-04-07 Nielsen Media Research, Inc. Methods and apparatus for embedding and recovering an image for use with video content
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US9076132B2 (en) * 2003-11-07 2015-07-07 Emc Corporation System and method of addressing email and electronic communication fraud
KR100907121B1 (en) * 2003-12-05 2009-07-09 모션 픽쳐 어쏘시에이션 오브 아메리카 System and method for controlling display of copy-never content
US7831832B2 (en) 2004-01-06 2010-11-09 Microsoft Corporation Digital goods representation based upon matrix invariances
CN102169693B (en) 2004-03-01 2014-07-23 杜比实验室特许公司 Multichannel audio coding
CA2562137C (en) 2004-04-07 2012-11-27 Nielsen Media Research, Inc. Data insertion apparatus and methods for use with compressed audio/video data
DE102004021404B4 (en) * 2004-04-30 2007-05-10 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Watermark embedding
US7770014B2 (en) * 2004-04-30 2010-08-03 Microsoft Corporation Randomized signal transforms and their applications
AU2005270105B2 (en) 2004-07-02 2011-03-31 Nielsen Media Research, Inc. Methods and apparatus for mixing compressed digital bit streams
US7508947B2 (en) 2004-08-03 2009-03-24 Dolby Laboratories Licensing Corporation Method for combining audio signals using auditory scene analysis
US11468128B1 (en) 2006-10-20 2022-10-11 Richard Paiz Search engine optimizer
US10959090B1 (en) 2004-08-25 2021-03-23 Richard Paiz Personal search results
KR100617165B1 (en) * 2004-11-19 2006-08-31 엘지전자 주식회사 Apparatus and method for audio encoding/decoding with watermark insertion/detection function
US8234638B2 (en) * 2004-12-28 2012-07-31 Hercules Software, Llc Creating a relatively unique environment for computing platforms
US7581106B1 (en) * 2005-04-20 2009-08-25 Adobe Systems Incorporated Using digital certificates to facilitate enforcement of product licenses
CA2610430C (en) 2005-06-03 2016-02-23 Dolby Laboratories Licensing Corporation Channel reconfiguration with side information
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US7840489B2 (en) * 2005-07-01 2010-11-23 Sony Corporation Key sharing for DRM interoperability
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US7760903B2 (en) * 2005-08-30 2010-07-20 Microsoft Corporation Tamper-resistant text stream watermarking
US20070076869A1 (en) * 2005-10-03 2007-04-05 Microsoft Corporation Digital goods representation based upon matrix invariants using non-negative matrix factorizations
EP2011234B1 (en) 2006-04-27 2010-12-29 Dolby Laboratories Licensing Corporation Audio gain control using specific-loudness-based auditory event detection
US20070282750A1 (en) * 2006-05-31 2007-12-06 Homiller Daniel P Distributing quasi-unique codes through a broadcast medium
DE102007007627A1 (en) * 2006-09-15 2008-03-27 Rwth Aachen Method for embedding steganographic information into signal information of signal encoder, involves providing data information, particularly voice information, selecting steganographic information, and generating code word
EP2095560B1 (en) 2006-10-11 2015-09-09 The Nielsen Company (US), LLC Methods and apparatus for embedding codes in compressed audio data streams
US8148385B2 (en) * 2006-10-31 2012-04-03 Janssen Pharmaceutica N.V. Substituted [1,2,3] triazolo[4,5-d]pyrimidine derivatives as ADP P2Y12 receptor antagonists
JP5300741B2 (en) 2007-01-12 2013-09-25 シフォルーション ベー フェー Method and apparatus for video watermarking
US20080201490A1 (en) * 2007-01-25 2008-08-21 Schuyler Quackenbush Frequency domain data mixing method and apparatus
US8681129B2 (en) * 2007-11-12 2014-03-25 Hewlett-Packard Development Company, L.P. Associating auxiliary data with digital ink
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US10915523B1 (en) 2010-05-12 2021-02-09 Richard Paiz Codex search patterns
US10922363B1 (en) 2010-04-21 2021-02-16 Richard Paiz Codex search patterns
US11048765B1 (en) 2008-06-25 2021-06-29 Richard Paiz Search engine optimizer
US8878041B2 (en) * 2009-05-27 2014-11-04 Microsoft Corporation Detecting beat information using a diverse set of correlations
US10936687B1 (en) 2010-04-21 2021-03-02 Richard Paiz Codex search patterns virtual maestro
US11423018B1 (en) 2010-04-21 2022-08-23 Richard Paiz Multivariate analysis replica intelligent ambience evolving system
US11379473B1 (en) 2010-04-21 2022-07-05 Richard Paiz Site rank codex search patterns
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
JP2012141497A (en) * 2011-01-05 2012-07-26 Canon Inc Printer, control method thereof, and program
EP2544153A1 (en) * 2011-07-04 2013-01-09 ZF Friedrichshafen AG Identification technique
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
WO2014080231A1 (en) * 2012-11-23 2014-05-30 Omarco Network Solutions Limited Method of compensating for signal degradation in transmission systems
US11741090B1 (en) 2013-02-26 2023-08-29 Richard Paiz Site rank codex search patterns
US11809506B1 (en) 2013-02-26 2023-11-07 Richard Paiz Multivariant analyzing replicating intelligent ambience evolving system
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9620133B2 (en) * 2013-12-04 2017-04-11 Vixs Systems Inc. Watermark insertion in frequency domain for audio encoding/decoding/transcoding
EP3117626A4 (en) 2014-03-13 2017-10-25 Verance Corporation Interactive content acquisition using embedded codes
US9747926B2 (en) 2015-10-16 2017-08-29 Google Inc. Hotword recognition
US9928840B2 (en) * 2015-10-16 2018-03-27 Google Llc Hotword recognition
CN107016999B (en) 2015-10-16 2022-06-14 谷歌有限责任公司 Hot word recognition

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4939515A (en) 1988-09-30 1990-07-03 General Electric Company Digital signal encoding and decoding apparatus
KR970009408B1 (en) 1994-01-18 1997-06-13 대우전자 주식회사 Inter/intra table selection circuit
US5568570A (en) 1994-09-30 1996-10-22 Eastman Kodak Company Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
JP2762941B2 (en) * 1994-12-06 1998-06-11 日本電気株式会社 Background noise generator
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5530759A (en) 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
US5778102A (en) * 1995-05-17 1998-07-07 The Regents Of The University Of California, Office Of Technology Transfer Compression embedding
EP0766468B1 (en) * 1995-09-28 2006-05-03 Nec Corporation Method and system for inserting a spread spectrum watermark into multimedia data
US5822432A (en) * 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US5664018A (en) * 1996-03-12 1997-09-02 Leighton; Frank Thomson Watermarking process resilient to collusion attacks
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6061793A (en) * 1996-08-30 2000-05-09 Regents Of The University Of Minnesota Method and apparatus for embedding data, including watermarks, in human perceptible sounds
US6282299B1 (en) * 1996-08-30 2001-08-28 Regents Of The University Of Minnesota Method and apparatus for video watermarking using perceptual masks
JP3106985B2 (en) 1996-12-25 2000-11-06 日本電気株式会社 Electronic watermark insertion device and detection device
CA2227381C (en) * 1997-02-14 2001-05-29 Nec Corporation Image data encoding system and image inputting apparatus
KR100323441B1 (en) * 1997-08-20 2002-06-20 윤종용 Mpeg2 motion picture coding/decoding system
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
US6064764A (en) * 1998-03-30 2000-05-16 Seiko Epson Corporation Fragile watermarks for detecting tampering in images
US6285774B1 (en) * 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
US6285775B1 (en) * 1998-10-01 2001-09-04 The Trustees Of The University Of Princeton Watermarking scheme for image authentication
US6209094B1 (en) * 1998-10-14 2001-03-27 Liquid Audio Inc. Robust watermark method and apparatus for digital signals

Cited By (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8505108B2 (en) 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
US20050180599A1 (en) * 1994-03-17 2005-08-18 Davis Bruce L. Methods and tangible objects employing textured machine readable data
US6882738B2 (en) 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US7076084B2 (en) 1994-03-17 2006-07-11 Digimarc Corporation Methods and objects employing machine readable data
US20040156529A1 (en) * 1994-03-17 2004-08-12 Davis Bruce L. Methods and tangible objects employing textured machine readable data
US6771796B2 (en) 1994-10-21 2004-08-03 Digimarc Corporation Methods for identifying equipment used in counterfeiting
US7062069B2 (en) 1995-05-08 2006-06-13 Digimarc Corporation Digital watermark embedding and decoding using encryption keys
US20040264735A1 (en) * 1995-05-08 2004-12-30 Rhoads Geoffrey B. Digital watermark embedding and decoding using encryption keys
US7369678B2 (en) 1995-05-08 2008-05-06 Digimarc Corporation Digital watermark and steganographic decoding
US9630443B2 (en) 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US8036419B2 (en) 1998-04-16 2011-10-11 Digimarc Corporation Digital watermarks
US8644548B2 (en) 1998-04-16 2014-02-04 Digimarc Corporation Digital watermarks
US20080117986A1 (en) * 1998-08-27 2008-05-22 International Business Machines Corporation System and method for embedding additional information in video data
US20080112490A1 (en) * 1998-08-27 2008-05-15 International Business Machines Corporation System and method for embedding additional information in video data
US20080056671A1 (en) * 1998-08-27 2008-03-06 International Business Machines Corporation System and method for embedding additional information in video data
US8121342B2 (en) 2000-01-13 2012-02-21 Digimarc Corporation Associating metadata with media signals, and searching for media signals using metadata
US7209571B2 (en) 2000-01-13 2007-04-24 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US8027510B2 (en) 2000-01-13 2011-09-27 Digimarc Corporation Encoding and decoding media signals
US7088844B2 (en) 2000-06-19 2006-08-08 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US8213674B2 (en) 2000-06-19 2012-07-03 Digimarc Corporation Perceptual modeling of media signals for data hiding
US20090207920A1 (en) * 2000-06-19 2009-08-20 Hannigan Brett T Perceptual Modeling of Media Signals for Data Hiding
US6631198B1 (en) 2000-06-19 2003-10-07 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US7822226B2 (en) 2000-06-19 2010-10-26 Digimarc Corporation Perceptual modeling of media signals for data hiding
US20040136565A1 (en) * 2000-06-19 2004-07-15 Hannigan Brett T. Perceptual modeling of media signals based on local contrast and directional edges
US20070183622A1 (en) * 2000-06-19 2007-08-09 Hannigan Brett T Perceptual modeling of media signals for data hiding
US7483547B2 (en) 2000-06-19 2009-01-27 Digimarc Corporation Perceptual modeling of media signals for data hiding
US20120210357A1 (en) * 2000-07-20 2012-08-16 Resource Consortium Limited Mechanism for Distributing Content Data
US8126918B2 (en) 2000-07-20 2012-02-28 Digimarc Corporatiion Using embedded data with file sharing
US20100281545A1 (en) * 2000-07-20 2010-11-04 Levy Kenneth L Using Embedded Data with File Sharing
US20160366457A1 (en) * 2000-07-20 2016-12-15 Resource Consortium Limited Mechanism for distributing content data
US10116978B2 (en) * 2000-07-20 2018-10-30 Resource Consortium Limited Mechanism for distributing content data
US6952485B1 (en) 2000-09-11 2005-10-04 Digimarc Corporation Watermark encoding and decoding in imaging devices and imaging device interfaces
US20070294173A1 (en) * 2000-12-18 2007-12-20 Levy Kenneth L Rights Management System and Methods
US8650128B2 (en) 2000-12-18 2014-02-11 Digimarc Corporation Rights management system and methods
US20040228502A1 (en) * 2001-03-22 2004-11-18 Bradley Brett A. Quantization-based data embedding in mapped data
US7769202B2 (en) 2001-03-22 2010-08-03 Digimarc Corporation Quantization-based data embedding in mapped data
US20110044494A1 (en) * 2001-03-22 2011-02-24 Brett Alan Bradley Quantization-Based Data Embedding in Mapped Data
US20090022360A1 (en) * 2001-03-22 2009-01-22 Bradley Brett A Quantization-Based Data Embedding in Mapped Data
US8050452B2 (en) 2001-03-22 2011-11-01 Digimarc Corporation Quantization-based data embedding in mapped data
US7376242B2 (en) 2001-03-22 2008-05-20 Digimarc Corporation Quantization-based data embedding in mapped data
US7958359B2 (en) 2001-04-30 2011-06-07 Digimarc Corporation Access control systems
US8098883B2 (en) 2001-12-13 2012-01-17 Digimarc Corporation Watermarking of data invariant to distortion
US20100086170A1 (en) * 2001-12-13 2010-04-08 Jun Tian Progressive Image Quality Control Using Watermarking
US8194917B2 (en) * 2001-12-13 2012-06-05 Digimarc Corporation Progressive image quality control using watermarking
US20090220121A1 (en) * 2002-01-18 2009-09-03 John Stach Arrangement of Objects in Images or Graphics to Convey a Machine-Readable Signal
US20080112590A1 (en) * 2002-01-18 2008-05-15 John Stach Data Hiding in Media
US7831062B2 (en) 2002-01-18 2010-11-09 Digimarc Corporation Arrangement of objects in images or graphics to convey a machine-readable signal
US7321667B2 (en) 2002-01-18 2008-01-22 Digimarc Corporation Data hiding through arrangement of objects
US8515121B2 (en) 2002-01-18 2013-08-20 Digimarc Corporation Arrangement of objects in images or graphics to convey a machine-readable signal
US7532741B2 (en) 2002-01-18 2009-05-12 Digimarc Corporation Data hiding in media
US20050207615A1 (en) * 2002-01-18 2005-09-22 John Stach Data hiding through arrangement of objects
US7886151B2 (en) * 2002-01-22 2011-02-08 Purdue Research Foundation Temporal synchronization of video and audio signals
US20030221106A1 (en) * 2002-01-22 2003-11-27 Delp Edward J. Temporal synchronization of video and audio signals
US20030202659A1 (en) * 2002-04-29 2003-10-30 The Boeing Company Visible watermark to protect media content from server to projector
WO2004040913A1 (en) * 2002-10-30 2004-05-13 Koninklijke Philips Electronics N.V. Watermarking of a variable bit-rate signal
US20040246524A1 (en) * 2003-05-30 2004-12-09 Masaichi Sawada Document output device, document output system, and document output method
US20050063011A1 (en) * 2003-08-20 2005-03-24 Masaichi Sawada Document output device and program for printing
US20050097790A1 (en) * 2003-11-07 2005-05-12 Masaichi Sawada Identification marker generating apparatus, method, storage medium and computer data signal
US20050144006A1 (en) * 2003-12-27 2005-06-30 Lg Electronics Inc. Digital audio watermark inserting/detecting apparatus and method
US7565296B2 (en) * 2003-12-27 2009-07-21 Lg Electronics Inc. Digital audio watermark inserting/detecting apparatus and method
US7539870B2 (en) * 2004-02-10 2009-05-26 Microsoft Corporation Media watermarking by biasing randomized statistics
US20050175179A1 (en) * 2004-02-10 2005-08-11 Mustafa Kesal Media watermarking by biasing randomized statistics
US20070021196A1 (en) * 2005-07-19 2007-01-25 Campbell Steven M Watermarking downloadable game content in a gaming system
US20070147655A1 (en) * 2005-12-28 2007-06-28 Institute For Information Industry Method for protecting content of vector graphics formats
US7831060B2 (en) * 2005-12-28 2010-11-09 Institute For Information Industry Method for protecting content of vector graphics formats
US20110183763A1 (en) * 2006-06-07 2011-07-28 Wms Gaming Inc. Processing metadata in wagering game systems
US8968084B2 (en) 2006-06-07 2015-03-03 Wms Gaming Inc. Processing metadata in wagering game systems
US8107669B2 (en) * 2006-06-14 2012-01-31 Samsung Electronics Co., Ltd. Video watermarking apparatus in compression domain and method using the same
US20070291980A1 (en) * 2006-06-14 2007-12-20 Hwan Joon Kim Video watermarking apparatus in compression domain and method using the same
US8094997B2 (en) 2006-06-28 2012-01-10 Cyberlink Corp. Systems and method for embedding scene processing information in a multimedia source using an importance value
US20080019665A1 (en) * 2006-06-28 2008-01-24 Cyberlink Corp. Systems and methods for embedding scene processing information in a multimedia source
US9767822B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and decoding a watermarked signal
US20120203561A1 (en) * 2011-02-07 2012-08-09 Qualcomm Incorporated Devices for adaptively encoding and decoding a watermarked signal
US9767823B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and detecting a watermarked signal
US11452153B2 (en) 2012-05-01 2022-09-20 Lisnr, Inc. Pairing and gateway connection using sonic tones
US11074033B2 (en) 2012-05-01 2021-07-27 Lisnr, Inc. Access control and validation using sonic tones
US11126394B2 (en) 2012-05-01 2021-09-21 Lisnr, Inc. Systems and methods for content delivery and management
US20140254797A1 (en) * 2013-03-07 2014-09-11 Agnieszka Piotrowska Method and filter for erasing hidden data
US11330319B2 (en) * 2014-10-15 2022-05-10 Lisnr, Inc. Inaudible signaling tone
US9628830B1 (en) * 2014-12-22 2017-04-18 Sorenson Media, Inc. Automatic content recognition (ACR) fingerprinting and video encoding
US11051055B1 (en) 2014-12-22 2021-06-29 Roku, Inc. Automatic content recognition (ACR) fingerprinting and video encoding
US10687092B1 (en) 2014-12-22 2020-06-16 The Nielsen Company (Us), Llc Automatic content recognition (ACR) fingerprinting and video encoding
US11539986B2 (en) 2014-12-22 2022-12-27 Roku, Inc. Automatic content recognition (ACR) fingerprinting and video encoding
US20180302690A1 (en) * 2015-10-15 2018-10-18 Nagravision S.A. A system for inserting a mark into a video content
US10291814B2 (en) * 2016-10-14 2019-05-14 Intel Corporation Transmission of encrypted image data
US11189295B2 (en) 2017-09-28 2021-11-30 Lisnr, Inc. High bandwidth sonic tone generation
US20240038249A1 (en) * 2022-07-27 2024-02-01 Cerence Operating Company Tamper-robust watermarking of speech signals

Also Published As

Publication number Publication date
US6330672B1 (en) 2001-12-11
US6493457B1 (en) 2002-12-10
WO1999029114B1 (en) 1999-07-29
WO1999029114A1 (en) 1999-06-10

Similar Documents

Publication Publication Date Title
US6330672B1 (en) Method and apparatus for watermarking digital bitstreams
JP5597860B2 (en) Method for tracking distribution information for multiple versions of printed material and method for tracking distribution information for multiple versions of a physical object
Lacy et al. Intellectual property protection systems and digital watermarking
US5889868A (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
JP4205624B2 (en) Verification / authentication encoding method and apparatus
US7457962B2 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
KR100799303B1 (en) An apparatus and method for inserting/extracting capturing-resistant audio watermark based on discrete wavelet transform, audio rights protection system using it
US7844074B2 (en) Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7971020B2 (en) Embedding data in an information signal
JP3522056B2 (en) Electronic watermark insertion method
US20050135613A1 (en) Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data
US20050033579A1 (en) Data hiding via phase manipulation of audio signals
JP2000508813A (en) Recording signal copy protection system
KR100746018B1 (en) Signal processing methods, devices, and applications for digital rights management
KR100375822B1 (en) Watermark Embedding/Detecting Apparatus and Method for Digital Audio
Alsalami et al. Digital audio watermarking: survey
US7114072B2 (en) Apparatus and method for watermark embedding and detection using linear prediction analysis
US7940954B2 (en) Watermarking digital representations that have undergone lossy compression
Xu et al. Digital audio watermarking and its application in multimedia database
JPH11316599A (en) Electronic watermark embedding device, audio encoding device, and recording medium
Horvatic et al. Robust audio watermarking: based on secure spread spectrum and auditory perception model
KR20020022904A (en) Digital Watermark Insertion Apparatus for Copyright Protection of Digital Audio/Video/Multimedia
US20050047627A1 (en) Method and apparatus for encoding and decoding digital representations of works
Krishnan et al. Time-frequency analysis of digital audio watermarking
Gurijala et al. Digital Watermarking Techniques for Audio and Speech Signals

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T CORP., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHUR, DAVID HILTON;REEL/FRAME:009299/0364

Effective date: 19980626

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: AT&T PROPERTIES, LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T CORP.;REEL/FRAME:027816/0440

Effective date: 20120306

AS Assignment

Owner name: AT&T INTELLECTUAL PROPERTY II, L.P., GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T PROPERTIES, LLC;REEL/FRAME:027824/0325

Effective date: 20120306

AS Assignment

Owner name: CHANYU HOLDINGS, LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T INTELLECTUAL PROPERTY II, L.P.;REEL/FRAME:028199/0415

Effective date: 20120330

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: HANGER SOLUTIONS, LLC, GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 158 LLC;REEL/FRAME:051486/0425

Effective date: 20191206

AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 158 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHANYU HOLDINGS, LLC;REEL/FRAME:051759/0752

Effective date: 20191126

Owner name: INTELLECTUAL VENTURES ASSETS 158 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHANYU HOLDINGS, LLC;REEL/FRAME:051753/0979

Effective date: 20191126