WO1999029114A1 - Electronic watermarking in the compressed domain utilizing perceptual coding - Google Patents

Electronic watermarking in the compressed domain utilizing perceptual coding Download PDF

Info

Publication number
WO1999029114A1
WO1999029114A1 PCT/US1998/025532 US9825532W WO9929114A1 WO 1999029114 A1 WO1999029114 A1 WO 1999029114A1 US 9825532 W US9825532 W US 9825532W WO 9929114 A1 WO9929114 A1 WO 9929114A1
Authority
WO
WIPO (PCT)
Prior art keywords
multipliers
compressed signal
hidden data
coder
scale factor
Prior art date
Application number
PCT/US1998/025532
Other languages
French (fr)
Other versions
WO1999029114B1 (en
Inventor
Schuyler Reynier Quackenbush
Amy Ruth Reibman
David Hilton Shur
James H. Snyder
Original Assignee
At & T Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by At & T Corp. filed Critical At & T Corp.
Publication of WO1999029114A1 publication Critical patent/WO1999029114A1/en
Publication of WO1999029114B1 publication Critical patent/WO1999029114B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • G06T1/0035Output size adaptive watermarking
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32187Transform domain methods with selective or adaptive application of the additional information, e.g. in selected frequency coefficients
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32277Compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32299Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image using more than one embedding method
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32304Embedding different sets of additional information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/146Data rate or code amount at the encoder output
    • H04N19/147Data rate or code amount at the encoder output according to rate distortion criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/189Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding
    • H04N19/19Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding using optimisation based on Lagrange multipliers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/189Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding
    • H04N19/196Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding being specially adapted for the computation of encoding parameters, e.g. by averaging previously computed encoding parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/48Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using compressed domain processing techniques other than decoding, e.g. modification of transform coefficients, variable length coding [VLC] data or run-length data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23892Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0053Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32128Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3239Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark using a plurality of different authentication information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering

Definitions

  • the present invention relates to electronic watermarking of datastreams and, in
  • IP intellectual property
  • Atypical protection system consists of three major building blocks. First, compressed content is stored in a cryptographic container before distribution to users. Second, a flexible licensing mechanism is utilized to answer questions about the trustworthiness of those seeking access to the content. Third, watermarks are embedded in the content in an imperceptible fashion in order that the content can be identified if the cryptograpliic container has been breached. A secure system design integrates these three components.
  • An electronic watermark is a data stream inserted into multimedia content. It contains information relevant to the ownership or authorized use of the content. Watermarks typically serve one of three functions: identification of the origin of the
  • every copy of the content can be marked identically, so the watermark needs to be inserted only once prior to distribution. Ide.ally, detection should not require a reference, because a search engine has no a priori way to identify the work from which it must recover the mark.
  • the watermark particularly needs to be detectable inside an edited work in which the original content may be either shortened or abutted with other works. Not only must the watermark be short enough to be detected
  • mark insertion should increase the data rate very little.
  • transaction identification watermark must be robust to collusion attacks.
  • Disabling access to content is generally best performed by mechanisms other than
  • watermarlcs If a watermark is used to disable access to content, the watermark recovery mechanism should be of low complexity. It should not be used as a protection of last resort, however, as disabling access clearly indicates the location of the watermark to anyone who can reverse-engineer the access mechanism.
  • Water ⁇ wl s used in conjunction with compression algorithms fall into one of three classes: cleartext (PCM) marldng, bitstream marking, and marking integrated with the compression algorithm. Each type has advantages and disadvantages. The intended use of the watermark directly affects the choice of algorithm.
  • SUBST ⁇ UTE SHEET (RULE 26) Cleartext marking relies on perceptual methods to imperceptibly embed a data stream in a signal.
  • the model for many cleartext marking algorithms is one in which a signal is injected into a noisy communication channel, where the audio/video signal is the interfering noise [J. Smith, B. Comisky, "Modulation and Infoimation Hiding in Images", Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June 1996, pp. 207-226]. Because the channel is so noisy and the interfering noise
  • the mechanism for mark recovery is generally of high complexity. Furthermore, if means for detecting these watermarks are embedded in a player, an attacker, by reverse engineering the player, may be able to
  • SUBS U I U rh SHEET (RULE 26) identify and remove the marlcs. Cleartext watermarks typically should not be used to gate access to content.
  • Bitstream marking algorithms manipulate the compressed digital bitstream without changing the semantics of the audio or video stream.
  • AAC MPEG-2 Advanced Audio Coding
  • ISO 13818-7 MPEG-2 Advanced Audio Coding, AAC
  • M.Bosi M. Brandenburg, S. Quackenbush, M. Dietz, J. Johnston, J.
  • support can be as high as the channel rate. This type of mark can be easily extracted by clients and is thus appropriate for gating access to content.
  • Integrating the marldng algorithm with the compression algorithm avoids an 'arms race' between marldng and compression. Since the perceptual model is available from the woridngs of the compression algorithm, integrated marking algorithms alter the semantics of the audio or video bitstream, thereby providing resistance to collusion attacks. Depending on the details of the marking algorithm, the mark may survive D/A conversion. An example of this approach is described by F. Hartung and B. Girod in "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain", Proc. IEEE ICASSP,
  • a watermark which can be recovered without a priori .knowledge of the identity of the content could be used by web search mechanisms to flag unauthorized distribution of the content. Since media are compressed on these sites, a mark detection algorithm that operates in the compressed domain is use&l. Accordingly, it is a primary object of the present invention to provide a robust integrated watermark that is inserted into audio or video data in the compressed domain utilizing perceptual techniques.
  • This invention integrates watermarking with perceptual coding mechanisms.
  • a first generation technique is described which inserts data, typically a watermark, into an audio or video bitstream cooperatively with the compression algorithm.
  • the data may be
  • the watermarldng technique of the present invention can be detected in the compressed domain without a reference, thereby avoiding a complete decode.
  • An overall watermarking system inco ⁇ orating the invention combines source (cleartext), bitstream (non-semantic altering), and integrated (semantic altering) watermarldng.
  • the audio or video data enters the filterbank, where it is processed into multiple separate coefficients.
  • SUBST ⁇ UTE SHEET (RULE 26) perceptual model module computes noise threshold information for the coefficients.
  • the rate/distortion control module uses this information, together with bit-count information received from a noiseless coding module, to compute the scale factors to be used.
  • the scale factors module multiplies the coefficients received from the filterbank by the scale factors received from rate/distortion control and sends the resulting quantities to the Quantizer.
  • the scale factors are used by the Quantizer to quantize
  • the quantized coefficients from Quantizer are noiseless coded and then sent to the bitstream multiplexor.
  • the coded data is then output from the bitstream multiplexor for .further processing and transmission.
  • integrated marking technique of the present invention is particularly implemented by the perceptual modeling, rate/distortion control, quantization, and noiseless coding modules.
  • A ⁇ fj, Hj, ⁇ qy ⁇ is the set of triples of scale factors ⁇ , Huffinan tables H j , and quantized coefficients ⁇ qy ⁇ .
  • M is the set of indices associated with the set of SFB chosen for marking.
  • a set of multipliers ieM ⁇ is chosen.
  • Each triple ( Hi, ⁇ qj j ⁇ : ieM ⁇ is modified by dividing the scale factor by Xj, multiplying the quantized value
  • the watermark data is represented via two particular characteristics of the bitstream data.
  • watermark data is present is that the Huffman table used to encode the SFB is not the table that would ordinarily be used.
  • the watermark data bit is set according to any one of
  • Another embodiment is a method for watermarking which is integrated with quantization.
  • the watermark is therefore difficult to remove without perceptible effects.
  • the fact that marking data is present is again indicated by characteristics of the bitstream data.
  • the watermark bit(s) are set before quantization.
  • the modification factors ⁇ xj ⁇ are all now close to unity.
  • the resulting Hu.ffrnan table for an SFB therefore will be the original Huffinan table or the next larger codebook. Because the modification to the spectral coefficients occurs before quantization, the changes to the reconstructed coefficients will be below the perceptual threshold.
  • Fig. 1 is an ove ew block diagram of an embodiment of a watermarking system inco ⁇ orating one embodiment of the present invention
  • FIG. 2 is a simplified block diagram of an embodiment of a generic perceptual coder according to the present invention.
  • Fig. 3 illustrates an embodiment of the method of perceptual coding according to the present invention
  • Fig. 4 illustrates an alternate embodiment of the method of perceptual coding
  • Fig. 5 illustrates another embodiment of the method of perceptual coding according to the present invention
  • Fig. 6 is a table displaying the results of an audio simulation utilizing the
  • Fig. 7 is a table displaying the results of a video simulation utilizing the
  • an overall watermarldng system inco ⁇ orating the invention is a first generation system that combines source, bitstream, and integrated watermarking.
  • the -source (cleartext) data 110 is optionally injected 120 with a source watermark 130.
  • this cleartext (source) watermarking is PCM (Pulse Code Modulation) marldng, but any of the many other forms of cleartext marldng .known in the .art would be
  • SUBST ⁇ UTE SHEET (RULE 26)
  • the source data with its (optional) newly added cleartext watermark is then passed to the perceptual coder (encoder) 150, where the data is farther marked with a second watermark 140 via a process that is integral to the compression process.
  • the invention specifically comprises these integrated watermarldng components 140 and 150 of Fig. 1, embodiments of which are described in detail in conjunction with Figs. 3 - 5.
  • integrated watermarldng and coding process of the invention is a semantic altering process.
  • the compressed data is optionally
  • bitstream marking process typically involves one or more XOR operations, but any bitstream marking technique lenown in the art would be suitable.
  • the bitstream watermarking process is non-semantic altering. .After (optional) bitstream watermarldng, the compressed and watermarked data is transmitted or otherwise provided to the output device, where it is decoded 160 and
  • the integrated watermarldng system of the invention can be configured to support
  • the three primary marldng functions As depicted in Fig. 1, it does not include, but is compatible with, use of front-end cleartext marldng algoritlim. It is assumed that the cleartext original is not available to any parties, except possibly auditors seeking to recover the watermark. In particular, the cleartext original is not available to attackers. The decompressed and marked content will generally be available to everyone.
  • spectral lines are grouped into 49 “.scale factor bands” (SFB), each band containing between 4 and 32 lines.
  • FFB scaling factor bands
  • each band is a single scale factor, which sets the quantizer step-size, and a single Huffinan table (AAC employs 11 non-trivial Huffman tables).
  • the coefficient for each spectral line is represented by an integer (quantized) value.
  • a block consists of 64 coefficients, and each set (termed a macroblock) of 6 blocks has an associated quantization step-size Q p .
  • the same Huffinan table is used for the coefficients for all Q p values.
  • each coefficient is represented by an integer after quantization.
  • Fig. 2 is a simplified block diagram of an embodiment of a generic perceptual coder according to the present invention.
  • the audio or video data 210 enters the filterbank 220, where it is processed into multiple separate coefficients.
  • Information about what type of filterbank 220 was used is sent to the bitstream multiplexor 280.
  • the coefficients themselves are passed to the scale factor module 250 and to the perceptual model module 230.
  • the perceptual model module 230 computes noise threshold information for the coefficients and passes this information to the rate/distortion control module 240.
  • the rate/distortion control module 240 uses this info ⁇ nation, together with bit-count information received from a noiseless coding module 270, to compute the scale factors to be used, which are then passed to the scale factor
  • the scale factors module 250 multiplies the coefficients received from the filterbank 220 by the scale factors received from rate/distortion control 240 and sends the resulting quantities to the Quantizer 260.
  • the scale factors are used by the Quantizer 260 to quantize the coefficients.
  • the quantized coefficients from Quantizer 260 are noiseless coded 270 and then sent to the bitstream multiplexor 280.
  • the coded data is then output 290 from the bitstream multiplexor 280 for farther processing and transmission.
  • a ⁇ ⁇ • ⁇ " ⁇ , H;
  • ⁇ qy ⁇ ⁇ is the set of triples of scale factors ⁇ , Hufiman tables Hj, and quantized coefficients ⁇ qy ⁇ . Note that only one Hufiman table is used in video.
  • the present invention supports three different embodiments for inserting a mark into the bitstream imperceptibly. It is assumed in these embodiments that some set of scale factor bands have been selected, into which .mark data will be inserted. The specific method by which SFB are chosen for marking is not specified; however, for audio, SFB encoded with the null Huffinan table H,, should probably not be marked. For video, zero coefficients should remain zero and not be modified. Hence, the marldng set will be dynamic.
  • M is the set of indices associated with the set of SFB chosen for marldng.
  • FIG. 3 One embodiment of the method for electronic watermarking in the compressed domain utiliang perceptual coding is illustrated by the flow diagram in Fig. 3.
  • SUBST ⁇ TUTE SHEET (RULE 26) illustrated in Fig. 3, first a set of triples is established 310 for each S.FB that is to receive watermark data. Next, a set of multipliers ieM ⁇ is chosen 320. Each triple ⁇ , H;, ⁇ qy ⁇ : ieM ⁇ is modified by dividing 330 the scale factor by X j , multiplying 340 the quantized value ⁇ qy ⁇ by ⁇ x , and adding 350 mark data ⁇ my ⁇ to the non-zero modified quantized values. Finally, the integrally watermarked encoded source is output 360 from
  • Fig. 4 An alternate embodiment, applicable only to audio data, is illustrated by the flow diagram in Fig. 4.
  • the watermark data is represented via two particular characteristics of the bitstream data.
  • the indication that watermark data is present is that the Huffman table used to encode the SFB is not the table that would
  • SUBST ⁇ SHEET (RUI_E 26) ordinarily be used.
  • the value of the watermark data bit (one bit per SFB) can be indicated in many ways; for example, if the SFB index is even, the value is 0, otherwise 1. Mathematically, this is represented: ⁇ , Hi, ⁇ qy ⁇ - ⁇ , Hr", ⁇ qy ⁇ .
  • the scale factor is established 410 for the SFB to receive watermark data.
  • a Huffman table is then selected 420 for encoding SFB that can still encode all the coefficients with
  • the watermark data bit is set 430 according to any desired
  • perceptual coder 150 of Fig. 1 It should be noted that, in this method, sectioning, a process by which codebooks are "promoted" to reduce bit rate, introduces similar changes in the choice of codebooks. That is, sectioning itself can erase the mark data indication. Also, this marking is
  • FIG. 5 Another embodiment of the invention, illustrated by the flow diagram in Fig. 5, is a method for watermarldng which is fally integrated with quantization. The watermark is therefore difficult to remove without perceptible effects. As in the embodiment of Fig. 4,
  • SUBST ⁇ UTE SHEET (RULE 26) the fact that marldng data is present is indicated by characteristics of the bitstream data.
  • the watermark data bit(s) are set before a quantization step. .As in the embodiment of Fig. 3, the scale factor f and the normalized spectral coefficients ⁇ q ⁇ are modified by a factor Xj , but now all ⁇ xj ⁇ are close to unity.
  • H j ' H; or the next larger codebook appropriate for qy'; and X j " 1 Because the modification to the spectral coefficients occurs before quantization, the changes to the reconstructed coefficients will be below the perceptual threshold. If this
  • the change in some quantized values would be greater than the perceptual noise floor. Equivalently, an attacker who modifies the quantized values to eradicate or modify the m.ark will be introducing energy changes that exceed the noise floor. Because the changes in step-sizes will be small, because not all coefficients will change, and because the attacker will not have access to the uncompressed cleartext source material, the attacker will generally not be able to identify those SFB which are used for marldng. Further, the change in bit rate associated with marking should be small. In this third embodiment method, the value of the watermark bit
  • SUBST ⁇ UTE SHEET (RULE 26) can be indicated in a variety of ways, e.g. it might take on the value of the Least Significant Bit (LSB) of the scale factor value, in which case a scale factor needs to be modified only if its LSB differs from the desired value. For both audio and video, the increase in bit count incurred by this method must be monitored. As illustrated in the flow diagram in Fig. 5, the watermark data bit(s) are set according to any desired scheme in step 510. Then, the scale factors are established from
  • the next step is to establish a plurality of scale factor bands, M, in which to
  • step 530 locate the set watermark bit(s) at step 530.
  • the next step is to choose an appropriate set of multipliers ⁇ Xi a 1: ieM ⁇ at step 540.
  • each triple ⁇ f j , Hj, ⁇ qy ⁇ : ieM ⁇ is modified by dividing the scale factor by Xj. This results in modified set ⁇ 1 .
  • step 570 a Huffinan Table H is chosen to be appropriate for qy' . This may be H or the next larger codebook appropriate for q '.
  • the integrally watermarked encoded source is output from the perceptual coder 150 of Fig. 1.
  • watermark sequences are inserted a few bits per frame.
  • the data to be carried by the stream is typically mapped into a marking sequence prior to embedding, where the characteristics of the mapping function depend on the type of attack expected.
  • synchroniazation is tied to frame boundaries.
  • the scale factors included at the beginning of the frame are modified by modifying the LSBs so that they represent a sequence which contains one or more synchronization codes. Specifically, when a frame is selected for synchronization insertion, and a scale
  • LSB does not match (e.g. 0 where a 1 is indicated, or a 1 instead of a 0), that scale factor is decremented and all the coefficients in the SFB are adjusted accordingly.
  • synchronization code can be damaged, random flipping of scale factor LSB by an attacker will introduce artifacts.
  • a synchronization code is sought and the data is recovered a manner appropriate to the watermarldng method.
  • Watermark synchronization is indicated by the sequence comprising the LSB of the first 44 decoded scale factors in a long block.
  • the value of the LSB of a scale factor does not match the corresponding bit in the synchronization code then the
  • scale factor is decremented and the spectral coefficients adjusted accordingly, resulting in perceptually irrelevant overcoding of the associated spectral data.
  • the table of Fig. 6 shows the cost of carrying watermark data inserted by the embodiment of Fig. 5 into every frame of an AAC bitstream for a stereo signal sampled at 44.1 kHz and coded at 96 kbps. Cost is expressed as increase in bits per frame 610
  • SUBST ⁇ UTE SHEET (RULE 26) per marked frame 610 was 5.2 for synchronization 630 and 9.0 for synchro.nization+32 640.
  • the increase in rate 620 was 0.25% and 0.44%, respectively.
  • the baseline system for video compression uses a rudimentary perceptual model.
  • a variance-based activity measure is used to select the quantization step-size for each
  • step 3 of the .MPEG-2 TM5 rate control [MPEG video committee, "Test Model 5", ISO-IE ⁇ JCl/SC29/WGl 1 N0400, April 1993].
  • I frames are generated every half second; all other frames are P frames.
  • Watermark data was inserted into both I and P frames, and the results were taken from an average over two different 10 second
  • the first 44 macroblocks of a frame are used for synchronization.
  • the next several macroblocks (100 or 600 in the Table, out of 1320) of a frame carry mark bits using the embodiment of Fig. 5.
  • Q p is decremented.
  • a dead-zone is applied to the original Q p to ensure that zero coefficients remain zero.
  • FIG. 7 A table showing the results of this simulation is shown in Fig. 7. As seen in Fig. 7, the increase in bits per marked frame 710 was 124 for synchronization 730, 138 for synchronization-HOO bits 740, and 557 for synchronization+600 bits 750.
  • the increase in bits per marked frame 710 was 124 for synchronization 730, 138 for synchronization-HOO bits 740, and 557 for synchronization+600 bits 750.

Abstract

A method and apparatus are described for inserting a watermark in the compressed domain. The watermark inserted does not require a reference. An overall watermarking system incorporating the invention combines cleartext, bitstream, and integrated watermarking. In a perceptual coder, the data enters a filterbank, where it is processed into multiple separate coefficients. A rate/distortion control module uses noise threshold information from a perceptual coder, together with bit-count information from a noiseless coder, to compute scale factors. The coefficients are multiplied by the scale factors and quantized, then noiseless coded and then output for further processing/transmission. The invention supports three embodiments for inserting a mark into the bitstream imperceptibly. It is assumed that some set of scale factor bands have been selected, into which mark data will be inserted. In one embodiment, a set of multipliers {xi=2Ni: i ⊂M} is chosen. Each triple is modified by dividing the scale factor by x¿i?, multiplying the quantized coefficients by {xi}, and adding mark data to the non-zero modified quantized coefficients. In an alternate embodiment, watermark data is represented via two characteristics of the bitstream data. A Huffman table is selected for encoding the Scale Factor Band receiving watermark data which is not the table that would normally be used. The watermark data bit is set according to any desired scheme, and the quantized coefficients are derived using the alternate Huffman table. In another embodiment, watermarking is integrated with quantization. The watermark is therefore difficult to remove without perceptible effects. The fact that marking data is present is again indicated by characteristics of the bitstream data. The modification factors {xi} are now all close to unity.

Description

ELECTRONIC WATERMARKING IN THE COMPRESSED DOMAIN UTILIZING PERCEPTUAL CODING
Related Applications
This application claims priority under Title 35, United States Code §120 from Provisional Application Serial No. 60/067,225, filed December 3, 1997.
Field of the Invention
The present invention relates to electronic watermarking of datastreams and, in
particular, to an imperceptible watermark which is inserted in the compressed domain and can be detected without a reference.
Background of the Invention
Electronic distribution of multimedia content is an important byproduct of the confluence of recent technological advances. Increasing network bandwidth, compression algorithms that preserve audio and video quality while reducing bit rate dramatically,
.higher density .storage devices, and network .search engines, when taken together, support network services which are revolutionizing the distribution of music and video.
Content owners naturally wish to maintain control over the distribution of their wares. To effectively protect their intellectual property (IP), an integrated system design is necessary [J. Lacy, D.P. Maher, and J.H. Snyder, "Music on the Internet and the Intellectual Property Protection Problem", Proc. International Symposium on Industrial
-1-
SUBSTTTUTE SHEET (RULΈ 2B) Electronic, Guimaraes, Portug^ July 1997]. Atypical protection system consists of three major building blocks. First, compressed content is stored in a cryptographic container before distribution to users. Second, a flexible licensing mechanism is utilized to answer questions about the trustworthiness of those seeking access to the content. Third, watermarks are embedded in the content in an imperceptible fashion in order that the content can be identified if the cryptograpliic container has been breached. A secure system design integrates these three components.
An electronic watermark is a data stream inserted into multimedia content. It contains information relevant to the ownership or authorized use of the content. Watermarks typically serve one of three functions: identification of the origin of the
content, tracing of illegally distributed copies of the content, and disabling of unauthorized access to the content. No single marking method is best suited to all three functions, both because of complexity and because different functions and marking algorithms are resistant to different lands of attacks. Any single piece of music or video can therefore be expected to be marked with a variety of different methods.
For copyright identification, every copy of the content can be marked identically, so the watermark needs to be inserted only once prior to distribution. Ide.ally, detection should not require a reference, because a search engine has no a priori way to identify the work from which it must recover the mark. The watermark particularly needs to be detectable inside an edited work in which the original content may be either shortened or abutted with other works. Not only must the watermark be short enough to be detected
in a shortened version of the worlς but some means must be provided to synchronize the
-2-
SUBS I I I U ΓE SHEET (RULE 26) detection process in order that the watermark can be located in the processed bitstream.
Finally, a watermark used for copyright identification must be robust to fiirther processing. Any attempt to remove it, including re-encoding the content, should lead to perceptible distortion.
Transaction identification requires a distinct mark for each transaction. The primary challenge of point-of-sale rn.ar.king is to move the content through the
watermarking engine quickly, meaning that the algorithm used must be of low complexity.
One strategy that meets this requirement is to insert the watermark in the compressed domain. Ideally, mark insertion should increase the data rate very little. In contrast to copyright ownership marldng, the transaction identification watermark must be robust to collusion attacks.
Disabling access to content is generally best performed by mechanisms other than
watermarlcs. If a watermark is used to disable access to content, the watermark recovery mechanism should be of low complexity. It should not be used as a protection of last resort, however, as disabling access clearly indicates the location of the watermark to anyone who can reverse-engineer the access mechanism.
Waterπwl s used in conjunction with compression algorithms fall into one of three classes: cleartext (PCM) marldng, bitstream marking, and marking integrated with the compression algorithm. Each type has advantages and disadvantages. The intended use of the watermark directly affects the choice of algorithm.
-3-
SUBSTΓΓUTE SHEET (RULE 26) Cleartext marking relies on perceptual methods to imperceptibly embed a data stream in a signal. The model for many cleartext marking algorithms is one in which a signal is injected into a noisy communication channel, where the audio/video signal is the interfering noise [J. Smith, B. Comisky, "Modulation and Infoimation Hiding in Images", Proc. First International Information Hiding Workshop, LNCS 1174, Springer-Verlag, Cambridge, U.K., May/June 1996, pp. 207-226]. Because the channel is so noisy and the
mark signal must be imperceptible, the maximum bit rates that are achievable for audio are
generally less than 100bps.
A cleartext .mark appears in all processed generations of the worlc, since by design the marldng algorithm is both secure and robust in the face of typical processing. It is therefore well .suited to identification of the work. There are two major disadvantages to cleartext marking. First, because such algorithms compute a perceptual model, they tend
to be too complex for point-of-.sale applications. Second, a potentially significant problem, is that these algorithms are susceptible to advances in the perceptual models used in compression algorithms. Many cleartext marldng algorithms have been reported [see, e.g. Proceedings of the Fourth International Conference on Image Processing, Santa Barbara
CA, October 1997].
Retrieval mechanisms for cleartext watermarks fall into two classes: reference
necessary and reference unnecessary. In either case, the mechanism for mark recovery is generally of high complexity. Furthermore, if means for detecting these watermarks are embedded in a player, an attacker, by reverse engineering the player, may be able to
SUBS U I U rh SHEET (RULE 26) identify and remove the marlcs. Cleartext watermarks typically should not be used to gate access to content.
Bitstream marking algorithms manipulate the compressed digital bitstream without changing the semantics of the audio or video stream. For example, a data envelope in an MPEG-2 Advanced Audio Coding (AAC) [IS 13818-7 (MPEG-2 Advanced Audio Coding, AAC), M.Bosi, K. Brandenburg, S. Quackenbush, M. Dietz, J. Johnston, J.
Herre, H. Fuchs, Y. Oikawa, K. Akagiri, M. Coleman, M. Iwadare, C. Lueck, U. Gbur, B. Teichmann] audio frame could contain a watermarlc, albeit one which could easily be removed. Bitstream marking is low-complexity, so it can be used to carry transaction infoimation. However these marks cannot survive D/A conversion and are generally not very robust againtf attack; for example, they are susceptible to collusion attacks. Because the mark signal is unrelated to the media signal, the bit rate that these techniques can
support can be as high as the channel rate. This type of mark can be easily extracted by clients and is thus appropriate for gating access to content.
Integrating the marldng algorithm with the compression algorithm avoids an 'arms race' between marldng and compression. Since the perceptual model is available from the woridngs of the compression algorithm, integrated marking algorithms alter the semantics of the audio or video bitstream, thereby providing resistance to collusion attacks. Depending on the details of the marking algorithm, the mark may survive D/A conversion. An example of this approach is described by F. Hartung and B. Girod in "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain", Proc. IEEE ICASSP,
-5-
SUBSTI I U l h SHEET (RULE 26) pp. 2621-4, April 1997. The method of Hartung and Girod does not use perceptual techniques.
A watermark which can be recovered without a priori .knowledge of the identity of the content could be used by web search mechanisms to flag unauthorized distribution of the content. Since media are compressed on these sites, a mark detection algorithm that operates in the compressed domain is use&l. Accordingly, it is a primary object of the present invention to provide a robust integrated watermark that is inserted into audio or video data in the compressed domain utilizing perceptual techniques.
Summary of the Invention
This invention integrates watermarking with perceptual coding mechanisms. A first generation technique is described which inserts data, typically a watermark, into an audio or video bitstream cooperatively with the compression algorithm. The data may be
recovered with a simple decoding process. It is robust to attacks which modify bitstream scale factors, in the sense that damaging the mark produces perceptible artifacts. The watermarldng technique of the present invention can be detected in the compressed domain without a reference, thereby avoiding a complete decode. An overall watermarking system incoφorating the invention combines source (cleartext), bitstream (non-semantic altering), and integrated (semantic altering) watermarldng. In a generic perceptual coder according to the invention, the audio or video data enters the filterbank, where it is processed into multiple separate coefficients. The
-6-
SUBSTΓΓUTE SHEET (RULE 26) perceptual model module computes noise threshold information for the coefficients. The rate/distortion control module uses this information, together with bit-count information received from a noiseless coding module, to compute the scale factors to be used. For audio data, the scale factors module multiplies the coefficients received from the filterbank by the scale factors received from rate/distortion control and sends the resulting quantities to the Quantizer. For video data, the scale factors are used by the Quantizer to quantize
the coefficients. For both audio and video data, the quantized coefficients from Quantizer are noiseless coded and then sent to the bitstream multiplexor. The coded data is then output from the bitstream multiplexor for .further processing and transmission. The
integrated marking technique of the present invention is particularly implemented by the perceptual modeling, rate/distortion control, quantization, and noiseless coding modules. In the methods of the present invention, A = {fj, Hj, {qy}} is the set of triples of scale factors ζ, Huffinan tables Hj, and quantized coefficients {qy}. The present invention
supports three different embodiments for inserting a mark into the bitstream imperceptibly. It is assumed in these embodiments that some set of scale factor bands have been selected,
into which mark data will be inserted. The specific method by which SFB are chosen for marldng is not specified; however the marking set will be dynamic. M is the set of indices associated with the set of SFB chosen for marking.
In one embodiment, a set of multipliers
Figure imgf000009_0001
ieM} is chosen. Each triple ( Hi, {qjj}: ieM} is modified by dividing the scale factor by Xj, multiplying the quantized value
{qjj} by {x , and adding mark data {.my} to the non-zero modified quantized values. The
Huffinan table for the modified SFB is now the smallest codebook that accommodates the
-7-
SUBSTΓΓUTE SHEET (RULE 26) largest value qyXXi + mi. Finally, the integrally watermarked encoded source is output from the perceptual coder. Since the origin.al scale factors were chosen perceptually, the resulting mark is imperceptible.
In an alternate embodiment, applicable only to audio, the watermark data is represented via two particular characteristics of the bitstream data. The indication that
watermark data is present is that the Huffman table used to encode the SFB is not the table that would ordinarily be used. The watermark data bit is set according to any
desired scheme, and the quantized coefficients are derived using the alternate Huffman table. Finally, the integrally watermarked encoded source is output from the perceptual
coder.
Another embodiment is a method for watermarking which is integrated with quantization. The watermark is therefore difficult to remove without perceptible effects. The fact that marking data is present is again indicated by characteristics of the bitstream data. The watermark bit(s) are set before quantization. The modification factors {xj } are all now close to unity. The resulting Hu.ffrnan table for an SFB therefore will be the original Huffinan table or the next larger codebook. Because the modification to the spectral coefficients occurs before quantization, the changes to the reconstructed coefficients will be below the perceptual threshold.
Brief Description of the Drawings
Fig. 1 is an ove ew block diagram of an embodiment of a watermarking system incoφorating one embodiment of the present invention;
-8-
SUBS l l l U I b SHEET (RULE 26) Fig. 2 is a simplified block diagram of an embodiment of a generic perceptual coder according to the present invention;
Fig. 3 illustrates an embodiment of the method of perceptual coding according to the present invention: Fig. 4 illustrates an alternate embodiment of the method of perceptual coding
according to the present invention;
Fig. 5 illustrates another embodiment of the method of perceptual coding according to the present invention;
Fig. 6 is a table displaying the results of an audio simulation utilizing the
embodiment of Fig. 5; and
Fig. 7 is a table displaying the results of a video simulation utilizing the
embodiment of Fig. 5.
Detailed Description The watermarking technique of the present invention can be detected in the compressed domain without a reference, thereby avoiding a complete decode. As shown in Fig. 1, an overall watermarldng system incoφorating the invention is a first generation system that combines source, bitstream, and integrated watermarking. In the system of Fig. 1, the -source (cleartext) data 110 is optionally injected 120 with a source watermark 130. Typically, this cleartext (source) watermarking is PCM (Pulse Code Modulation) marldng, but any of the many other forms of cleartext marldng .known in the .art would be
suitable.
-9-
SUBSTΓΓUTE SHEET (RULE 26) The source data with its (optional) newly added cleartext watermark is then passed to the perceptual coder (encoder) 150, where the data is farther marked with a second watermark 140 via a process that is integral to the compression process. The invention specifically comprises these integrated watermarldng components 140 and 150 of Fig. 1, embodiments of which are described in detail in conjunction with Figs. 3 - 5. The
integrated watermarldng and coding process of the invention is a semantic altering process.
After the compression and marking process 150, the compressed data is optionally
combined 160 with a third watermark 170 via a bitstream marking process. Typically, this involves one or more XOR operations, but any bitstream marking technique lenown in the art would be suitable. The bitstream watermarking process is non-semantic altering. .After (optional) bitstream watermarldng, the compressed and watermarked data is transmitted or otherwise provided to the output device, where it is decoded 160 and
provided to the user. The integrated watermarldng system of the invention can be configured to support
the three primary marldng functions. As depicted in Fig. 1, it does not include, but is compatible with, use of front-end cleartext marldng algoritlim. It is assumed that the cleartext original is not available to any parties, except possibly auditors seeking to recover the watermark. In particular, the cleartext original is not available to attackers. The decompressed and marked content will generally be available to everyone.
In MPEG Advanced Audio Coding (AAC), spectral lines are grouped into 49 ".scale factor bands" (SFB), each band containing between 4 and 32 lines. Associated with
-10-
SUBS I I I U ΓE SHEET (RULE 26) each band is a single scale factor, which sets the quantizer step-size, and a single Huffinan table (AAC employs 11 non-trivial Huffman tables). The coefficient for each spectral line is represented by an integer (quantized) value. In MPEG video, a block consists of 64 coefficients, and each set (termed a macroblock) of 6 blocks has an associated quantization step-size Qp. The same Huffinan table is used for the coefficients for all Qp values. As with audio, each coefficient is represented by an integer after quantization.
Because the watermarking algorithms for audio and video are essentially identical, for
consistency audio terminology (scale factor) is used herein when techniques are discussed. When the results for video are discussed in connection with Figures 6 and 7, terminology
specific to video is used.
Fig. 2 is a simplified block diagram of an embodiment of a generic perceptual coder according to the present invention. As seen in Fig. 2, the audio or video data 210 enters the filterbank 220, where it is processed into multiple separate coefficients. Information about what type of filterbank 220 was used is sent to the bitstream multiplexor 280. The coefficients themselves are passed to the scale factor module 250 and to the perceptual model module 230. The perceptual model module 230 computes noise threshold information for the coefficients and passes this information to the rate/distortion control module 240. The rate/distortion control module 240 uses this infoπnation, together with bit-count information received from a noiseless coding module 270, to compute the scale factors to be used, which are then passed to the scale factor
module 250.
-11-
SUBSTΓΓUTE SHEET (RUI_E 26) For audio data, the scale factors module 250 multiplies the coefficients received from the filterbank 220 by the scale factors received from rate/distortion control 240 and sends the resulting quantities to the Quantizer 260. For video data, the scale factors are used by the Quantizer 260 to quantize the coefficients. For both audio and video data, the quantized coefficients from Quantizer 260 are noiseless coded 270 and then sent to the bitstream multiplexor 280. The coded data is then output 290 from the bitstream multiplexor 280 for farther processing and transmission. The integrated marking
technique of the present invention is particularly implemented by the perceptual modeling 230, rate/distortion control 240, quantization 260, and noiseless coding 270 modules of
Fig. 2.
In the description of the methods of the present invention, A =■• {"ξ, H;, {qy} } is the set of triples of scale factors ζ, Hufiman tables Hj, and quantized coefficients {qy}. Note that only one Hufiman table is used in video. The present invention supports three different embodiments for inserting a mark into the bitstream imperceptibly. It is assumed in these embodiments that some set of scale factor bands have been selected, into which .mark data will be inserted. The specific method by which SFB are chosen for marking is not specified; however, for audio, SFB encoded with the null Huffinan table H,, should probably not be marked. For video, zero coefficients should remain zero and not be modified. Hence, the marldng set will be dynamic. M is the set of indices associated with the set of SFB chosen for marldng.
One embodiment of the method for electronic watermarking in the compressed domain utiliang perceptual coding is illustrated by the flow diagram in Fig. 3. As
-12-
SUBSTΪTUTE SHEET (RULE 26) illustrated in Fig. 3, first a set of triples is established 310 for each S.FB that is to receive watermark data. Next, a set of multipliers
Figure imgf000015_0001
ieM} is chosen 320. Each triple {ζ, H;, {qy}: ieM} is modified by dividing 330 the scale factor by Xj, multiplying 340 the quantized value {qy} by {x , and adding 350 mark data {my} to the non-zero modified quantized values. Finally, the integrally watermarked encoded source is output 360 from
the perceptual coder 150 of Fig. 1. Mathematically, the result of this perceptual coding step can be represented: A- A1, where
Vi: icM, {f/, Hi', {qij ,}} = {ζ, Hi, {qij}},
Vi: ieM, {£ Hi1, {qy'}} = røxt H,", {-v + my}}, where Hj" is the smallest codebook that accommodates the largest value qyXXj + my.
Since the original scale factors were chosen perceptually, the resulting mark is imperceptible. A feedback mechanism similar to the one described by Hartung and Girod can be used to prevent modification of scale factors that would increase the bit rate significantly. It should be noted that if the attacker can identify the frame and SFB containing the mark data, then that data can easily be removed. A possible attack on this method would be to run a perceptual model on the decompressed output. While it is
unlikely that the perceptual model could indicate unambiguously eveiy marked location, it seems likely that many could be identified.
.An alternate embodiment, applicable only to audio data, is illustrated by the flow diagram in Fig. 4. In this embodiment, the watermark data is represented via two particular characteristics of the bitstream data. The indication that watermark data is present is that the Huffman table used to encode the SFB is not the table that would
-13-
SUBSTΓΠΠΈ SHEET (RUI_E 26) ordinarily be used. The value of the watermark data bit (one bit per SFB) can be indicated in many ways; for example, if the SFB index is even, the value is 0, otherwise 1. Mathematically, this is represented: {ξ, Hi, {qy}} -{ξ, Hr", {qy}}. As illustrated in Fig. 4, the scale factor is established 410 for the SFB to receive watermark data. A Huffman table is then selected 420 for encoding SFB that can still encode all the coefficients with
the required dynamic range . The watermark data bit is set 430 according to any desired
scheme, and the quantized coefficients are derived 440 using the alternate (non-usual) Huffinan table. Finally, the integrally watermarked encoded source is output 450 from the
perceptual coder 150 of Fig. 1. It should be noted that, in this method, sectioning, a process by which codebooks are "promoted" to reduce bit rate, introduces similar changes in the choice of codebooks. That is, sectioning itself can erase the mark data indication. Also, this marking is
particularly easy to identify, since an attacker looking at the bitstream can observe that the codebook used to encode the coefficients in the SFB is not the minimum codebook required. However, by a sensible choice of SFB, it is possible to insert mark data in a way that will not be modified by sectioning but rather mimics the action of sectioning and
therefore is somewhat less obvious to an attacker.
The methods of Figs. 3 and 4 are coupled to the encoder 150 of Fig. 1 only via the
overall bit rate limit. Another embodiment of the invention, illustrated by the flow diagram in Fig. 5, is a method for watermarldng which is fally integrated with quantization. The watermark is therefore difficult to remove without perceptible effects. As in the embodiment of Fig. 4,
-14-
SUBSTΓΓUTE SHEET (RULE 26) the fact that marldng data is present is indicated by characteristics of the bitstream data. The watermark data bit(s) are set before a quantization step. .As in the embodiment of Fig. 3, the scale factor f and the normalized spectral coefficients {q^} are modified by a factor Xj , but now all {xj } are close to unity. The normalized spectral coefficients {qy} refeπed to in audio will also be referred to herein as simply "coefficients." If {vy} is the set of spectral coefficients prior to quantization, and Qj is the quantizer for SFB i, i.e. Vi {qy} = Qi[{vy}], then mathematically:
{4 Hb {q,}} - W, Hi,, {q,,}}, 'where
Figure imgf000017_0001
Hj' = H; or the next larger codebook appropriate for qy'; and Xj " 1 Because the modification to the spectral coefficients occurs before quantization, the changes to the reconstructed coefficients will be below the perceptual threshold. If this
change were introduced after quantization, the change in some quantized values would be greater than the perceptual noise floor. Equivalently, an attacker who modifies the quantized values to eradicate or modify the m.ark will be introducing energy changes that exceed the noise floor. Because the changes in step-sizes will be small, because not all coefficients will change, and because the attacker will not have access to the uncompressed cleartext source material, the attacker will generally not be able to identify those SFB which are used for marldng. Further, the change in bit rate associated with marking should be small. In this third embodiment method, the value of the watermark bit
-15-
SUBSTΓΓUTE SHEET (RULE 26) can be indicated in a variety of ways, e.g. it might take on the value of the Least Significant Bit (LSB) of the scale factor value, in which case a scale factor needs to be modified only if its LSB differs from the desired value. For both audio and video, the increase in bit count incurred by this method must be monitored. As illustrated in the flow diagram in Fig. 5, the watermark data bit(s) are set according to any desired scheme in step 510. Then, the scale factors are established from
perceptual thresholds at step 520. With the watermark bit(s) set and the scale factors established, the next step is to establish a plurality of scale factor bands, M, in which to
locate the set watermark bit(s) at step 530. With the bands established, the next step is to choose an appropriate set of multipliers {Xi a 1: ieM} at step 540. Then, at step 550, each triple {fj, Hj, {qy}: ieM} is modified by dividing the scale factor by Xj. This results in modified set ζ1. The noimalized spectral coefficients then are multiplied at step 560 by respective multipliers and quantized resulting in qy' = Qj[Xiχvs]. Now, in step 570, a Huffinan Table H is chosen to be appropriate for qy' . This may be H or the next larger codebook appropriate for q '. Finally, the integrally watermarked encoded source is output from the perceptual coder 150 of Fig. 1.
Generally watermark sequences are inserted a few bits per frame. The data to be carried by the stream is typically mapped into a marking sequence prior to embedding, where the characteristics of the mapping function depend on the type of attack expected.
Indeed, since there may be a wide range of attacks, the data may be redundantly mapped in different ways in the hope that at least one mapping will survive all attacks. Tliis leads to the issue of recognizing where a marking sequence begins. One approach is to use
-16-
SUBS I I l U rE SHEET (RULE 26) synchronizing codes. However the attacker may be able to identify these codes, and if the attacker can eliminate or damage the codes, recovery of mark data may not be possible.
In the .system of the present invention, synchroniazation is tied to frame boundaries.
The scale factors included at the beginning of the frame are modified by modifying the LSBs so that they represent a sequence which contains one or more synchronization codes. Specifically, when a frame is selected for synchronization insertion, and a scale
factor LSB does not match (e.g. 0 where a 1 is indicated, or a 1 instead of a 0), that scale factor is decremented and all the coefficients in the SFB are adjusted accordingly.
.Although the synchronization code can be damaged, random flipping of scale factor LSB by an attacker will introduce artifacts. To recover the watermark, a synchronization code is sought and the data is recovered a manner appropriate to the watermarldng method.
To evaluate the audio watermarking system of Fig. 5, AT&T's implementation of AAC was used. Watermark synchronization is indicated by the sequence comprising the LSB of the first 44 decoded scale factors in a long block. When the value of the LSB of a scale factor does not match the corresponding bit in the synchronization code then the
scale factor is decremented and the spectral coefficients adjusted accordingly, resulting in perceptually irrelevant overcoding of the associated spectral data.
The table of Fig. 6 shows the cost of carrying watermark data inserted by the embodiment of Fig. 5 into every frame of an AAC bitstream for a stereo signal sampled at 44.1 kHz and coded at 96 kbps. Cost is expressed as increase in bits per frame 610
(21.3 ms of audio) and increase in rate 620, and was measured for both synchronization
630 and synchronization+32 bits 640 cases. As can be seen in Fig. 6, the increase in bits
-17-
SUBSTΓΓUTE SHEET (RULE 26) per marked frame 610 was 5.2 for synchronization 630 and 9.0 for synchro.nization+32 640. The increase in rate 620 was 0.25% and 0.44%, respectively.
An important issue for any watermarking algoritrim is the quality of the reconstructed signal following an attack which erases the watermark. A naive attack on this marking algorithm has been simulated by zeroing all scale factor LSB. Ttøs attack results in unacceptable distortion in the reconstructed audio signal.
The baseline system for video compression uses a rudimentary perceptual model. A variance-based activity measure is used to select the quantization step-size for each
macroblock, as in step 3 of the .MPEG-2 TM5 rate control [MPEG video committee, "Test Model 5", ISO-IEσJCl/SC29/WGl 1 N0400, April 1993]. I frames are generated every half second; all other frames are P frames. Watermark data was inserted into both I and P frames, and the results were taken from an average over two different 10 second
sequences.
The first 44 macroblocks of a frame are used for synchronization. The next several macroblocks (100 or 600 in the Table, out of 1320) of a frame carry mark bits using the embodiment of Fig. 5. For each macroblock, when the LSB of the step-size Qp does not match, Qp is decremented. However, a dead-zone is applied to the original Qp to ensure that zero coefficients remain zero.
A table showing the results of this simulation is shown in Fig. 7. As seen in Fig. 7, the increase in bits per marked frame 710 was 124 for synchronization 730, 138 for synchronization-HOO bits 740, and 557 for synchronization+600 bits 750. The
corresponding increases in rate 720 were 0.005%, 0.006%, and 0.024%, respectively.
-18-
SUBSTΓΓUTE SHEET (RULE 26) Simulation of a naive attack on this algorithm by zeroing all scale factor LSBs demonstrates that this attack results in a perceptible 1.6 dB degradation in PSNR of the reconstructed video signal.
What has been described is merely illustrative of the application of the principles of the present invention. Other arrangements, methods, modifications and substitutions by one of ordinary skill in the art are also considered to be within the scope of the present
invention, which is not to be limited except by the claims which follow.
-19-
SUBS M I U ΓE SHEET (RULE 26)

Claims

What Is Claimed Is: 1. A perceptual coder for encoding at least one compressed audio or video signal to include hidden data, comprising, in combination: means for setting quantization step sizes to obtain a set of integer values after quantization of said at least one compressed signal, said means for setting step sizes
employing at least one perceptual technique;
means for adding hidden data to said at least one compressed signal; and means for quantizing said at least one compressed signal.
2. The coder of claim 1, farther including means for selecting a specific Hufiman Table for encoding said at least one compressed signal.
3. The coder of claim 2, wherein said selected Huffinan Table is not the Huffinan Table that would noπnally be selected for encoding said at least one compressed signal.
4. The coder of claim 1, wherein said hidden data has a watermarldng function.
5. The coder of claim 4, wherein said hidden data has the foπn of at least one
watermark data bit.
-20-
SUBS I I 1 U 1 E SHEET (RUL£ 26)
6. The coder of claim 1, farther including, in combination: means for selecting a set of multipliers; and means for modifying said encoded compressed signal by utiUzing said set of multipliers.
7. The coder of claim 6, wherein each member of said set of multipliers is
close to unity.
8. The coder of claim 7, wherein said compressed signal has at least one associated scale factor and said means for modifying comprises, in combination: means for dividing said at least one scale factor by a respective one of said multipliers; and means for multiplying said integer values by respective ones of said
multipliers.
9. The coder of claim 6, wherein said compressed signal has at least one
associated scale factor and said means for modifying comprises, in combination: means for dividing said at least one scale factor by a respective one of said
multipliers; and means for multiplying said integer values by respective ones of said multipliers.
-21-
SUBS 111 U 1 b SHEET (RULE 26)
10. The coder of claim 1 wherein said means for adding hidden data is responsive to said means for quantizing said at least one compressed signal.
11. A perceptual coder for encoding at least one of compressed audio or video signal to include hidden data, comprising, in combination:
means for setting quantization step sizes to obtain a set of integer values after quantization of said at least one compressed signal, said means for setting step sizes
employing at least one perceptual technique; means for quantizing said at least one compressed signal containing said .hidden data; and noiseless coding means for adding hidden data to said quantized compressed signal.
12. The coder of claim 11, wherein said hidden data has a watermarldng function.
13. The coder of claim 12, wherein said hidden data is added to at least one non-zero one of said integer values.
-22-
SUBSTΓΠJTE SHEET (RULE 26)
14. The coder of claim 11, farther including, in combination: means for selecting a set of multipliers; and means for modifying said encoded compressed signal by utih^ing said set of multipliers.
15. The coder of claim 14, wherein said compressed signal has at least one associated scale factor and said means for modifying comprises, in combination: means for dividing said at least one scale factor by a respective one of said multipliers; and means for multiplying said integer values by respective ones of said multipliers.
16. The coder of claim 14, wherein each member, X; , of said set of multipliers is equal to 2M.
17. The coder of claim 16, wherein said compressed signal has at least one associated scale factor and said means for modifying comprises, in combination: means for dividing said at least one scale factor by a respective one of said multipliers; and means for multiplying said integer values by respective ones of said multipliers.
-23-
SUBSTΓΓUTE SHEET (RULE 26)
18. A method of perceptually encoding at least one compressed audio or video signals to include hidden data comprising, in combination, the steps of: setting quantization step sizes to obtain a set of integer values after quantization of said at least one compressed signal, said setting of step sizes employing at least one perceptual technique;
adding hidden data to said at least one compressed signal; and quantizing said at least one compressed signal.
19. The method of claim 18, farther including the step of selecting a specific Hufiman Table for encoding said at least one compressed signal.
20. The method of claim 19, wherein said selected Hufiman Table is not the Huffinan Table that would normally be selected for encoding said at least one compressed
signal.
21. The method of claim 18, wherein said hidden data has a watermarldng function.
22. The method of claim 21, wherein said hidden data has the form of at least
one watermark data bit.
23. The method of claim 18, farther including the steps, in combination, of:
-24-
SUBSTTTUTE SHEET (RULE 26) selecting a set of multipliers; and modifying said encoded compressed signal by utilizing said set of multipliers.
24. The method of claim 23, wherein each member of said set of multipliers is close to unity.
25. The method of claim 24, wherein said compressed signal has at least one associated scale factor and step of modifying comprises the steps, in combination, of: dividing said at least one scale factor by a respective one of said multipliers; and multiplying said integer values by respective ones of said multipliers.
26. The method of claim 23, wherein said compressed signal has at least one associated scale factor and .said step of modifying comprises the steps, in combination, of: dividing said at least one scale factor by a respective one of said multipliers; and multiplying said integer values by respective ones of said multipliers.
27. The method of claim 18, further including the step of marldng said at least one audio or video signal with hidden data before compression.
-25-
SUBS 111 U I k SHEET (RULE 26)
28. The method of claim 18, farther including the step of bitstream marldng said quantized compressed signal with hidden data.
29. The method of claim 28, further including the step of marking said at least one audio or video signal with hidden data before compression.
30. The method of claim 18 wherein said step of adding hidden data occurs
simultaneously with said step of quantizing said at least one compressed signal.
31. The method of claim 18 wherein said step of adding hidden data occurs after said step of quantising said at least one compressed signal.
32. A method of perceptually encoding at least one compressed audio or video
signal to include hidden data comprising, in combination, the steps of: setting quantization step sizes to obtain a set of integer values after quantization of said at least one compressed signal, said setting of step sizes employing at least one perceptual technique; quantizing said at least one compressed signal containing said hidden data;
and adding hidden data to said quantized compressed signal.
-26-
SUBSTΓΓUTE SHEET (RULE 26)
33. The method of claim 32, wherein said hidden data has a watermarking function.
34. The method of claim 33, wherein said hidden data is added to at least one non-zero one of said integer values.
35. The method of claim 32, farther including, in combination: selecting a set of multipliers; and modifying said encoded compressed signal by uti zing said set of multipliers.
36. The coder of claim 35, wherein said compressed signal has at least one associated scale factor and said step of modifying comprises, in combination: dividing said at least one scale factor by a respective one of said multipliers; and multiplying said integer values by respective ones of said multipliers.
37. The method of claim 35, wherein each member, j , of said set of multipliers is equal to 2 l.
38. The method of claim 37, wherein said compressed signal has at least one associated scale factor and said step of modifying comprises, in combination:
-27-
SUBSTΓΓUTE SHEET (RULE 26) dividing said at least one scale factor by a respective one of said multipliers; and multiplying said integer values by respective ones of said multipliers.
39. The method of claim 32, farther including the step of marldng said at least one audio or video signal with hidden data before compression.
40. The method of claim 32, further including the step of bitstream marking said quantized compressed signal with hidden data.
41. The method of claim 40, further including the step of marking said at least one audio or video signal with hidden data before compression.
42. A method of perceptually coding a signal characterized by the steps of: establiSahing scale factors from perceptual thresholds; establishing scale factor bands to watermark;
choosing a set of multipliers approximately equal to one; and dividing the scale factors by respective multipliers of said set of multipliers.
-28-
SUBS I I I U l h SHEET (RULE 26)
PCT/US1998/025532 1997-12-03 1998-12-03 Electronic watermarking in the compressed domain utilizing perceptual coding WO1999029114A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US6722597P 1997-12-03 1997-12-03
US60/067,225 1997-12-03

Publications (2)

Publication Number Publication Date
WO1999029114A1 true WO1999029114A1 (en) 1999-06-10
WO1999029114B1 WO1999029114B1 (en) 1999-07-29

Family

ID=22074557

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/025532 WO1999029114A1 (en) 1997-12-03 1998-12-03 Electronic watermarking in the compressed domain utilizing perceptual coding

Country Status (2)

Country Link
US (2) US6330672B1 (en)
WO (1) WO1999029114A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013642A1 (en) * 1999-08-12 2001-02-22 Sarnoff Corporation Watermarking data streams at multiple distribution stages
EP1104969A1 (en) * 1999-12-04 2001-06-06 Deutsche Thomson-Brandt Gmbh Method and apparatus for encoding/decoding and watermarking a data stream
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
WO2002015587A2 (en) * 2000-08-16 2002-02-21 Dolby Laboratories Licensing Corporation Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
FR2816154A1 (en) * 2000-10-31 2002-05-03 Canon Kk INSERTION OF ADDITIONAL INFORMATION INTO DIGITAL DATA
WO2002060182A1 (en) * 2001-01-23 2002-08-01 Koninklijke Philips Electronics N.V. Watermarking a compressed information signal
EP1331820A1 (en) * 2000-10-19 2003-07-30 Sony Corporation Data processing device
WO2008084457A3 (en) * 2007-01-12 2008-08-28 Koninkl Philips Electronics Nv Video watermarking
US7461002B2 (en) 2001-04-13 2008-12-02 Dolby Laboratories Licensing Corporation Method for time aligning audio signals using characterizations based on auditory events
US7508947B2 (en) 2004-08-03 2009-03-24 Dolby Laboratories Licensing Corporation Method for combining audio signals using auditory scene analysis
US7610205B2 (en) 2002-02-12 2009-10-27 Dolby Laboratories Licensing Corporation High quality time-scaling and pitch-scaling of audio signals
US7711123B2 (en) 2001-04-13 2010-05-04 Dolby Laboratories Licensing Corporation Segmenting audio signals into auditory events
US8170882B2 (en) 2004-03-01 2012-05-01 Dolby Laboratories Licensing Corporation Multichannel audio coding
US8280743B2 (en) 2005-06-03 2012-10-02 Dolby Laboratories Licensing Corporation Channel reconfiguration with side information
EP2881942A1 (en) * 2013-12-04 2015-06-10 ViXS Systems Inc. Watermark insertion in frequency domain for audio encoding/decoding/transcoding
US9685924B2 (en) 2006-04-27 2017-06-20 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US11962279B2 (en) 2023-06-01 2024-04-16 Dolby Laboratories Licensing Corporation Audio control using auditory event detection

Families Citing this family (213)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6614914B1 (en) 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US8505108B2 (en) 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
US6449377B1 (en) 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US6345104B1 (en) 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6882738B2 (en) * 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US8094949B1 (en) * 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US7007166B1 (en) * 1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US7805500B2 (en) 1995-05-08 2010-09-28 Digimarc Corporation Network linking methods and apparatus
US6738495B2 (en) * 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7006661B2 (en) 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US9630443B2 (en) 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US7562392B1 (en) * 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7107451B2 (en) * 1996-07-02 2006-09-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US6078664A (en) * 1996-12-20 2000-06-20 Moskowitz; Scott A. Z-transform implementation of digital watermarks
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7457962B2 (en) * 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6625295B1 (en) * 1996-09-13 2003-09-23 Purdue Research Foundation Authentication of signals using watermarks
US7730317B2 (en) 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
JPH11234264A (en) * 1998-02-17 1999-08-27 Canon Inc Electronic papermarking system, electronic information distribution system using the same and storage medium
US7756892B2 (en) * 2000-05-02 2010-07-13 Digimarc Corporation Using embedded data with file sharing
US7602940B2 (en) 1998-04-16 2009-10-13 Digimarc Corporation Steganographic data hiding using a device clock
US6233347B1 (en) * 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
WO1999064973A1 (en) * 1998-06-10 1999-12-16 Auckland Uniservices Limited Software watermarking techniques
US6683957B1 (en) * 1998-07-01 2004-01-27 Samsung Electronics Co., Ltd. Digital image coding/decoding apparatus and method for correcting distorted data in transmitted signals that use watermarking
AU5675499A (en) * 1998-08-17 2000-03-06 Hughes Electronics Corporation Turbo code interleaver with near optimal performance
HUP0105014A3 (en) * 1998-08-27 2002-11-28 Ibm System for embedding additional information in video data, and embedding method
US7532740B2 (en) 1998-09-25 2009-05-12 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US7197156B1 (en) 1998-09-25 2007-03-27 Digimarc Corporation Method and apparatus for embedding auxiliary information within original data
US7373513B2 (en) 1998-09-25 2008-05-13 Digimarc Corporation Transmarking of multimedia signals
JP2000115517A (en) * 1998-10-06 2000-04-21 Canon Inc Information processor capable of making electronic watermark and communication network capable of accepting connection of the information processor
JP3768705B2 (en) * 1998-11-27 2006-04-19 キヤノン株式会社 Digital watermark embedding device, output control device, and computer-readable storage medium
FR2787604B1 (en) * 1998-11-30 2001-08-31 Canon Kk METHOD FOR INSERTING A SECRET MARK AND AUTHENTICATING A DIGITAL SIGNAL
CN100356475C (en) * 1999-02-26 2007-12-19 日本胜利株式会社 Method and device for recording and reproducing digital data, and recording medium therefor
US6847949B1 (en) * 1999-05-10 2005-01-25 Koninklijke Philips Electronics N.V. Indicator system for screening protected material
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7730300B2 (en) 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
IL129725A (en) * 1999-05-02 2011-06-30 Nds Ltd Watermark system
US6801999B1 (en) * 1999-05-20 2004-10-05 Microsoft Corporation Passive and active software objects containing bore resistant watermarking
US6952774B1 (en) * 1999-05-22 2005-10-04 Microsoft Corporation Audio watermarking with dual watermarks
US7543148B1 (en) * 1999-07-13 2009-06-02 Microsoft Corporation Audio watermarking with covert channel and permutations
US7020285B1 (en) * 1999-07-13 2006-03-28 Microsoft Corporation Stealthy audio watermarking
US7475246B1 (en) 1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server
US6792129B1 (en) * 1999-08-25 2004-09-14 Sharp Laboratories Of America Digital watermarking in a perceptually uniform domain
US7272718B1 (en) * 1999-10-29 2007-09-18 Sony Corporation Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis
US7039614B1 (en) 1999-11-09 2006-05-02 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US8296228B1 (en) * 1999-11-22 2012-10-23 Harry Thomas Kloor Dual transaction authorization system and method
WO2001052178A1 (en) 2000-01-13 2001-07-19 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US8977621B1 (en) 2000-02-24 2015-03-10 Richard Paiz Search engine optimizer
US9355352B1 (en) 2000-02-24 2016-05-31 Richard Paiz Personal search results
US20030141375A1 (en) * 2000-03-09 2003-07-31 Spectra Systems Corporation Information bearing marking used with a digitally watermarked background
US6735561B1 (en) * 2000-03-29 2004-05-11 At&T Corp. Effective deployment of temporal noise shaping (TNS) filters
JP3630071B2 (en) * 2000-04-05 2005-03-16 日本電気株式会社 Digital watermark detector and digital watermark detection method used therefor
JP2002057882A (en) * 2000-04-21 2002-02-22 Sony Corp Apparatus and method for embedding information, image processor and processing method, content processor and processing method, monitor and monitoring method, and storage medium
US7111168B2 (en) * 2000-05-01 2006-09-19 Digimarc Corporation Digital watermarking systems
US8121843B2 (en) 2000-05-02 2012-02-21 Digimarc Corporation Fingerprint methods and systems for media signals
JP2001346170A (en) * 2000-05-31 2001-12-14 Nec Corp Data insertion strength adjustment method and data insertion circuit
US7508944B1 (en) * 2000-06-02 2009-03-24 Digimarc Corporation Using classification techniques in digital watermarking
US6631198B1 (en) 2000-06-19 2003-10-07 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US6633654B2 (en) * 2000-06-19 2003-10-14 Digimarc Corporation Perceptual modeling of media signals based on local contrast and directional edges
US20030206631A1 (en) * 2000-06-22 2003-11-06 Candelore Brant L. Method and apparatus for scrambling program data for furture viewing
US7006631B1 (en) * 2000-07-12 2006-02-28 Packet Video Corporation Method and system for embedding binary data sequences into video bitstreams
US20020029384A1 (en) * 2000-07-20 2002-03-07 Griggs Theodore L. Mechanism for distributing content data
US6952485B1 (en) 2000-09-11 2005-10-04 Digimarc Corporation Watermark encoding and decoding in imaging devices and imaging device interfaces
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
JP2002176550A (en) * 2000-12-07 2002-06-21 Nec Corp Inserting and detecting device for digital watermark data
US6738744B2 (en) 2000-12-08 2004-05-18 Microsoft Corporation Watermark detection via cardinality-scaled correlation
US7266704B2 (en) * 2000-12-18 2007-09-04 Digimarc Corporation User-friendly rights management systems and methods
EP1231767B1 (en) * 2001-02-09 2011-04-13 Canon Kabushiki Kaisha Information processing apparatus and its control method, computer program, and storage medium
KR20020067853A (en) * 2001-02-19 2002-08-24 주식회사 마크애니 Apparatus and Method for controlling the copy and play of a digital audio contents using digital watermarking
US7042470B2 (en) * 2001-03-05 2006-05-09 Digimarc Corporation Using embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms
US20020168082A1 (en) * 2001-03-07 2002-11-14 Ravi Razdan Real-time, distributed, transactional, hybrid watermarking method to provide trace-ability and copyright protection of digital content in peer-to-peer networks
US6993050B2 (en) 2001-03-14 2006-01-31 At&T Corp. Transmit and receive system for cable data service
US8050452B2 (en) * 2001-03-22 2011-11-01 Digimarc Corporation Quantization-based data embedding in mapped data
US7376242B2 (en) * 2001-03-22 2008-05-20 Digimarc Corporation Quantization-based data embedding in mapped data
JP3983993B2 (en) * 2001-04-13 2007-09-26 株式会社日立製作所 Method for creating application data with face photo, apparatus for implementing the same, and processing program therefor
US7822969B2 (en) * 2001-04-16 2010-10-26 Digimarc Corporation Watermark systems and methods
US7607016B2 (en) * 2001-04-20 2009-10-20 Digimarc Corporation Including a metric in a digital watermark for media authentication
US6996273B2 (en) * 2001-04-24 2006-02-07 Microsoft Corporation Robust recognizer of perceptually similar content
US7020775B2 (en) * 2001-04-24 2006-03-28 Microsoft Corporation Derivation and quantization of robust non-local characteristics for blind watermarking
US7356188B2 (en) * 2001-04-24 2008-04-08 Microsoft Corporation Recognizer of text-based work
US6973574B2 (en) 2001-04-24 2005-12-06 Microsoft Corp. Recognizer of audio-content in digital signals
US7958359B2 (en) 2001-04-30 2011-06-07 Digimarc Corporation Access control systems
JP2004525430A (en) * 2001-05-08 2004-08-19 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Digital watermark generation and detection
US20020169963A1 (en) * 2001-05-10 2002-11-14 Seder Phillip Andrew Digital watermarking apparatus, systems and methods
MY138481A (en) * 2001-05-17 2009-06-30 Sony Corp Data distribution system, terminal apparatus, distribution center apparatus, highefficiency encoding method, high-efficiency encoding apparatus, encoded data decoding method, encoded data decoding apparatus, data transmission method, data transmission apparatus, sub information attaching method, sub information attaching apparatus, and recording medium
US7747853B2 (en) 2001-06-06 2010-06-29 Sony Corporation IP delivery of secure digital content
CA2350029A1 (en) * 2001-06-08 2002-12-08 Cloakware Corporation Sustainable digital watermarking via tamper-resistant software
EP1399884B1 (en) * 2001-06-13 2006-03-22 Koninklijke Philips Electronics N.V. Device for detecting a watermark
BR0205803A (en) * 2001-07-27 2003-07-22 Koninkl Philips Electronics Nv Methods and systems for integrating and detecting auxiliary data in an information signal, recording and / or reproducing devices and for transmitting an information signal, information signal and storage medium
JP4934923B2 (en) * 2001-08-09 2012-05-23 ソニー株式会社 Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, and computer program
JP3832289B2 (en) * 2001-08-20 2006-10-11 ソニー株式会社 Information recording apparatus, video signal output apparatus, stream output method, program, recording medium, and data structure
EP1433175A1 (en) * 2001-09-05 2004-06-30 Koninklijke Philips Electronics N.V. A robust watermark for dsd signals
US7316032B2 (en) * 2002-02-27 2008-01-01 Amad Tayebi Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
US7562397B1 (en) 2002-02-27 2009-07-14 Mithal Ashish K Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
US7515730B2 (en) * 2001-12-13 2009-04-07 Digimarc Corporation Progressive image quality control using watermarking
US7006662B2 (en) 2001-12-13 2006-02-28 Digimarc Corporation Reversible watermarking using expansion, rate control and iterative embedding
US20030131350A1 (en) * 2002-01-08 2003-07-10 Peiffer John C. Method and apparatus for identifying a digital audio signal
US7321667B2 (en) 2002-01-18 2008-01-22 Digimarc Corporation Data hiding through arrangement of objects
US7886151B2 (en) * 2002-01-22 2011-02-08 Purdue Research Foundation Temporal synchronization of video and audio signals
US7567721B2 (en) 2002-01-22 2009-07-28 Digimarc Corporation Digital watermarking of low bit rate video
WO2003062960A2 (en) * 2002-01-22 2003-07-31 Digimarc Corporation Digital watermarking and fingerprinting including symchronization, layering, version control, and compressed embedding
JP3554825B2 (en) * 2002-03-11 2004-08-18 東北大学長 Digital watermark system
AU2003225052A1 (en) * 2002-04-16 2003-11-03 Sky Kruse Method and system for watermarking digital content and for introducing failure points into digital content
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US20030202659A1 (en) * 2002-04-29 2003-10-30 The Boeing Company Visible watermark to protect media content from server to projector
US20030226020A1 (en) * 2002-06-04 2003-12-04 Ripley Michael S. Protecting digital broadcast content from unauthorized redistribution
JP2004054710A (en) * 2002-07-22 2004-02-19 Sony Corp Information processor, information processing method and information processing system
EP1547337B1 (en) 2002-07-26 2006-03-22 Green Border Technologies Watermarking at the packet level
JP2004064582A (en) * 2002-07-31 2004-02-26 Hitachi Ltd Broadcast content copyright protection system
JP3976183B2 (en) * 2002-08-14 2007-09-12 インターナショナル・ビジネス・マシーンズ・コーポレーション Content receiving apparatus, network system, and program
AU2003282763A1 (en) 2002-10-15 2004-05-04 Verance Corporation Media monitoring, management and information system
NZ539596A (en) * 2002-10-23 2008-11-28 Nielsen Media Res Inc Digital data insertion apparatus and methods for use with compressed audio/video data
CN100474928C (en) * 2002-10-30 2009-04-01 皇家飞利浦电子股份有限公司 Watermarking of a variable bit-rate signal
US7724907B2 (en) 2002-11-05 2010-05-25 Sony Corporation Mechanism for protecting the transfer of digital content
US8572408B2 (en) 2002-11-05 2013-10-29 Sony Corporation Digital rights management of a digital device
US8667525B2 (en) 2002-12-13 2014-03-04 Sony Corporation Targeted advertisement selection from a digital stream
US8645988B2 (en) 2002-12-13 2014-02-04 Sony Corporation Content personalization for digital content
FR2851110B1 (en) 2003-02-07 2005-04-01 Medialive METHOD AND DEVICE FOR THE PROTECTION AND VISUALIZATION OF VIDEO STREAMS
US20040246524A1 (en) * 2003-05-30 2004-12-09 Masaichi Sawada Document output device, document output system, and document output method
US7460684B2 (en) 2003-06-13 2008-12-02 Nielsen Media Research, Inc. Method and apparatus for embedding watermarks
US7206649B2 (en) * 2003-07-15 2007-04-17 Microsoft Corporation Audio watermarking with dual watermarks
JP4253546B2 (en) * 2003-08-20 2009-04-15 株式会社リコー Document output device and printing program
WO2005031634A1 (en) * 2003-08-29 2005-04-07 Nielsen Media Research, Inc. Methods and apparatus for embedding and recovering an image for use with video content
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US7616776B2 (en) * 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
JP3999191B2 (en) * 2003-11-07 2007-10-31 株式会社リコー Identification mark generation method and identification mark generation program
US9076132B2 (en) * 2003-11-07 2015-07-07 Emc Corporation System and method of addressing email and electronic communication fraud
WO2005057356A2 (en) * 2003-12-05 2005-06-23 Motion Picture Association Of America System and method for controlling display of copy-never content
KR100595202B1 (en) * 2003-12-27 2006-06-30 엘지전자 주식회사 Apparatus of inserting/detecting watermark in Digital Audio and Method of the same
US7831832B2 (en) 2004-01-06 2010-11-09 Microsoft Corporation Digital goods representation based upon matrix invariances
US7539870B2 (en) * 2004-02-10 2009-05-26 Microsoft Corporation Media watermarking by biasing randomized statistics
TWI404419B (en) 2004-04-07 2013-08-01 Nielsen Media Res Inc Data insertion methods , sysytems, machine readable media and apparatus for use with compressed audio/video data
DE102004021404B4 (en) * 2004-04-30 2007-05-10 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Watermark embedding
US7770014B2 (en) * 2004-04-30 2010-08-03 Microsoft Corporation Randomized signal transforms and their applications
KR101087588B1 (en) 2004-07-02 2011-11-29 닐슨 미디어 리서치 인코퍼레이티드 Methods And Apparatus For Mixing Compressed Digital Bit Streams
US11468128B1 (en) 2006-10-20 2022-10-11 Richard Paiz Search engine optimizer
US10959090B1 (en) 2004-08-25 2021-03-23 Richard Paiz Personal search results
KR100617165B1 (en) * 2004-11-19 2006-08-31 엘지전자 주식회사 Apparatus and method for audio encoding/decoding with watermark insertion/detection function
US8234638B2 (en) * 2004-12-28 2012-07-31 Hercules Software, Llc Creating a relatively unique environment for computing platforms
US7581106B1 (en) 2005-04-20 2009-08-25 Adobe Systems Incorporated Using digital certificates to facilitate enforcement of product licenses
US7840489B2 (en) * 2005-07-01 2010-11-23 Sony Corporation Key sharing for DRM interoperability
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US20070021196A1 (en) * 2005-07-19 2007-01-25 Campbell Steven M Watermarking downloadable game content in a gaming system
US7760903B2 (en) * 2005-08-30 2010-07-20 Microsoft Corporation Tamper-resistant text stream watermarking
US20070076869A1 (en) * 2005-10-03 2007-04-05 Microsoft Corporation Digital goods representation based upon matrix invariants using non-negative matrix factorizations
TWI288892B (en) * 2005-12-28 2007-10-21 Inst Information Industry Content protection method for vector graph format
US20070282750A1 (en) * 2006-05-31 2007-12-06 Homiller Daniel P Distributing quasi-unique codes through a broadcast medium
WO2007145954A2 (en) * 2006-06-07 2007-12-21 Wms Gaming Inc. Processing metadata in wagering game systems
US8107669B2 (en) * 2006-06-14 2012-01-31 Samsung Electronics Co., Ltd. Video watermarking apparatus in compression domain and method using the same
US8094997B2 (en) * 2006-06-28 2012-01-10 Cyberlink Corp. Systems and method for embedding scene processing information in a multimedia source using an importance value
DE102007007627A1 (en) * 2006-09-15 2008-03-27 Rwth Aachen Method for embedding steganographic information into signal information of signal encoder, involves providing data information, particularly voice information, selecting steganographic information, and generating code word
US8078301B2 (en) 2006-10-11 2011-12-13 The Nielsen Company (Us), Llc Methods and apparatus for embedding codes in compressed audio data streams
WO2008054796A2 (en) * 2006-10-31 2008-05-08 Janssen Pharmaceutica, N.V. Triazolopyrimidine derivatives as adp p2y12 receptor antagonists
US20080201490A1 (en) * 2007-01-25 2008-08-21 Schuyler Quackenbush Frequency domain data mixing method and apparatus
US8681129B2 (en) * 2007-11-12 2014-03-25 Hewlett-Packard Development Company, L.P. Associating auxiliary data with digital ink
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US10915523B1 (en) 2010-05-12 2021-02-09 Richard Paiz Codex search patterns
US11048765B1 (en) 2008-06-25 2021-06-29 Richard Paiz Search engine optimizer
US10922363B1 (en) 2010-04-21 2021-02-16 Richard Paiz Codex search patterns
US8878041B2 (en) * 2009-05-27 2014-11-04 Microsoft Corporation Detecting beat information using a diverse set of correlations
US11423018B1 (en) 2010-04-21 2022-08-23 Richard Paiz Multivariate analysis replica intelligent ambience evolving system
US11379473B1 (en) 2010-04-21 2022-07-05 Richard Paiz Site rank codex search patterns
US10936687B1 (en) 2010-04-21 2021-03-02 Richard Paiz Codex search patterns virtual maestro
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
JP2012141497A (en) * 2011-01-05 2012-07-26 Canon Inc Printer, control method thereof, and program
US8880404B2 (en) * 2011-02-07 2014-11-04 Qualcomm Incorporated Devices for adaptively encoding and decoding a watermarked signal
US9767822B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and decoding a watermarked signal
US9767823B2 (en) 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and detecting a watermarked signal
EP2544153A1 (en) * 2011-07-04 2013-01-09 ZF Friedrichshafen AG Identification technique
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US11452153B2 (en) 2012-05-01 2022-09-20 Lisnr, Inc. Pairing and gateway connection using sonic tones
US11126394B2 (en) 2012-05-01 2021-09-21 Lisnr, Inc. Systems and methods for content delivery and management
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
WO2014080232A1 (en) * 2012-11-23 2014-05-30 Omarco Network Solutions Limited Security improvements for tickets
US11741090B1 (en) 2013-02-26 2023-08-29 Richard Paiz Site rank codex search patterns
US11809506B1 (en) 2013-02-26 2023-11-07 Richard Paiz Multivariant analyzing replicating intelligent ambience evolving system
PL403052A1 (en) * 2013-03-07 2014-09-15 Agnieszka Piotrowska Method and a filter for removing hidden data
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
WO2015138798A1 (en) 2014-03-13 2015-09-17 Verance Corporation Interactive content acquisition using embedded codes
EP3207639A4 (en) * 2014-10-15 2018-04-11 Lisnr, Inc. Inaudible signaling tone
US9628830B1 (en) 2014-12-22 2017-04-18 Sorenson Media, Inc. Automatic content recognition (ACR) fingerprinting and video encoding
EP3363210A1 (en) * 2015-10-15 2018-08-22 Nagravision S.A. A system for inserting a mark into a video content
JP6463710B2 (en) 2015-10-16 2019-02-06 グーグル エルエルシー Hot word recognition
US9928840B2 (en) * 2015-10-16 2018-03-27 Google Llc Hotword recognition
US9747926B2 (en) 2015-10-16 2017-08-29 Google Inc. Hotword recognition
US10291814B2 (en) * 2016-10-14 2019-05-14 Intel Corporation Transmission of encrypted image data
US11189295B2 (en) 2017-09-28 2021-11-30 Lisnr, Inc. High bandwidth sonic tone generation
US20240038249A1 (en) * 2022-07-27 2024-02-01 Cerence Operating Company Tamper-robust watermarking of speech signals

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4939515A (en) * 1988-09-30 1990-07-03 General Electric Company Digital signal encoding and decoding apparatus
EP0663773A2 (en) * 1994-01-18 1995-07-19 Daewoo Electronics Co., Ltd Variable length coder using two VLC tables
EP0705025A2 (en) * 1994-09-30 1996-04-03 Eastman Kodak Company Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
EP0851679A2 (en) * 1996-12-25 1998-07-01 Nec Corporation Identification data insertion and detection system for digital data

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2762941B2 (en) * 1994-12-06 1998-06-11 日本電気株式会社 Background noise generator
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5778102A (en) * 1995-05-17 1998-07-07 The Regents Of The University Of California, Office Of Technology Transfer Compression embedding
CA2184949C (en) * 1995-09-28 2000-05-30 Ingemar J. Cox Secure spread spectrum watermarking for multimedia data
US5822432A (en) * 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US5664018A (en) * 1996-03-12 1997-09-02 Leighton; Frank Thomson Watermarking process resilient to collusion attacks
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6061793A (en) * 1996-08-30 2000-05-09 Regents Of The University Of Minnesota Method and apparatus for embedding data, including watermarks, in human perceptible sounds
US6282299B1 (en) * 1996-08-30 2001-08-28 Regents Of The University Of Minnesota Method and apparatus for video watermarking using perceptual masks
CA2227381C (en) * 1997-02-14 2001-05-29 Nec Corporation Image data encoding system and image inputting apparatus
KR100323441B1 (en) * 1997-08-20 2002-06-20 윤종용 Mpeg2 motion picture coding/decoding system
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
US6064764A (en) * 1998-03-30 2000-05-16 Seiko Epson Corporation Fragile watermarks for detecting tampering in images
US6285774B1 (en) * 1998-06-08 2001-09-04 Digital Video Express, L.P. System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies
US6285775B1 (en) * 1998-10-01 2001-09-04 The Trustees Of The University Of Princeton Watermarking scheme for image authentication
US6209094B1 (en) * 1998-10-14 2001-03-27 Liquid Audio Inc. Robust watermark method and apparatus for digital signals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4939515A (en) * 1988-09-30 1990-07-03 General Electric Company Digital signal encoding and decoding apparatus
EP0663773A2 (en) * 1994-01-18 1995-07-19 Daewoo Electronics Co., Ltd Variable length coder using two VLC tables
EP0705025A2 (en) * 1994-09-30 1996-04-03 Eastman Kodak Company Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
EP0851679A2 (en) * 1996-12-25 1998-07-01 Nec Corporation Identification data insertion and detection system for digital data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SWANSON ET AL.: "Transparent Robust Image Watermarking", ICIP '96, vol. 3, 16 September 1996 (1996-09-16), Lausanne, CH, pages 211 - 214, XP002097961 *

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
WO2001013642A1 (en) * 1999-08-12 2001-02-22 Sarnoff Corporation Watermarking data streams at multiple distribution stages
EP1104969A1 (en) * 1999-12-04 2001-06-06 Deutsche Thomson-Brandt Gmbh Method and apparatus for encoding/decoding and watermarking a data stream
AU2001284910B2 (en) * 2000-08-16 2007-03-22 Dolby Laboratories Licensing Corporation Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
WO2002015587A2 (en) * 2000-08-16 2002-02-21 Dolby Laboratories Licensing Corporation Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
KR100898879B1 (en) * 2000-08-16 2009-05-25 돌비 레버러토리즈 라이쎈싱 코오포레이션 Modulating One or More Parameter of An Audio or Video Perceptual Coding System in Response to Supplemental Information
CN100431355C (en) * 2000-08-16 2008-11-05 多尔拜实验特许公司 Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
US7395211B2 (en) 2000-08-16 2008-07-01 Dolby Laboratories Licensing Corporation Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
WO2002015587A3 (en) * 2000-08-16 2003-03-13 Dolby Lab Licensing Corp Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information
EP1331820A1 (en) * 2000-10-19 2003-07-30 Sony Corporation Data processing device
EP1331820A4 (en) * 2000-10-19 2006-04-19 Sony Corp Data processing device
WO2002037833A2 (en) * 2000-10-31 2002-05-10 Canon Kabushiki Kaisha Insertion of supplementary information in digital data
WO2002037833A3 (en) * 2000-10-31 2002-07-18 Canon Kk Insertion of supplementary information in digital data
US7499546B2 (en) 2000-10-31 2009-03-03 Canon Kabushiki Kaisha Insertion of supplementary information in digital data
FR2816154A1 (en) * 2000-10-31 2002-05-03 Canon Kk INSERTION OF ADDITIONAL INFORMATION INTO DIGITAL DATA
WO2002060182A1 (en) * 2001-01-23 2002-08-01 Koninklijke Philips Electronics N.V. Watermarking a compressed information signal
CN100459708C (en) * 2001-01-23 2009-02-04 皇家菲利浦电子有限公司 Watermarking a compressed niformation signal
US7711123B2 (en) 2001-04-13 2010-05-04 Dolby Laboratories Licensing Corporation Segmenting audio signals into auditory events
US7461002B2 (en) 2001-04-13 2008-12-02 Dolby Laboratories Licensing Corporation Method for time aligning audio signals using characterizations based on auditory events
US8195472B2 (en) 2001-04-13 2012-06-05 Dolby Laboratories Licensing Corporation High quality time-scaling and pitch-scaling of audio signals
US7610205B2 (en) 2002-02-12 2009-10-27 Dolby Laboratories Licensing Corporation High quality time-scaling and pitch-scaling of audio signals
US9672839B1 (en) 2004-03-01 2017-06-06 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques and differentially coded parameters
US10269364B2 (en) 2004-03-01 2019-04-23 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques
US8170882B2 (en) 2004-03-01 2012-05-01 Dolby Laboratories Licensing Corporation Multichannel audio coding
US11308969B2 (en) 2004-03-01 2022-04-19 Dolby Laboratories Licensing Corporation Methods and apparatus for reconstructing audio signals with decorrelation and differentially coded parameters
US10796706B2 (en) 2004-03-01 2020-10-06 Dolby Laboratories Licensing Corporation Methods and apparatus for reconstructing audio signals with decorrelation and differentially coded parameters
US10460740B2 (en) 2004-03-01 2019-10-29 Dolby Laboratories Licensing Corporation Methods and apparatus for adjusting a level of an audio signal
US8983834B2 (en) 2004-03-01 2015-03-17 Dolby Laboratories Licensing Corporation Multichannel audio coding
US10403297B2 (en) 2004-03-01 2019-09-03 Dolby Laboratories Licensing Corporation Methods and apparatus for adjusting a level of an audio signal
US9779745B2 (en) 2004-03-01 2017-10-03 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques and differentially coded parameters
US9715882B2 (en) 2004-03-01 2017-07-25 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques
US9704499B1 (en) 2004-03-01 2017-07-11 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques and differentially coded parameters
US9640188B2 (en) 2004-03-01 2017-05-02 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques
US9697842B1 (en) 2004-03-01 2017-07-04 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques and differentially coded parameters
US9691404B2 (en) 2004-03-01 2017-06-27 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques
US9691405B1 (en) 2004-03-01 2017-06-27 Dolby Laboratories Licensing Corporation Reconstructing audio signals with multiple decorrelation techniques and differentially coded parameters
US7508947B2 (en) 2004-08-03 2009-03-24 Dolby Laboratories Licensing Corporation Method for combining audio signals using auditory scene analysis
US8280743B2 (en) 2005-06-03 2012-10-02 Dolby Laboratories Licensing Corporation Channel reconfiguration with side information
US9866191B2 (en) 2006-04-27 2018-01-09 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US11711060B2 (en) 2006-04-27 2023-07-25 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US10103700B2 (en) 2006-04-27 2018-10-16 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9685924B2 (en) 2006-04-27 2017-06-20 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9762196B2 (en) 2006-04-27 2017-09-12 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9768749B2 (en) 2006-04-27 2017-09-19 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9768750B2 (en) 2006-04-27 2017-09-19 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9774309B2 (en) 2006-04-27 2017-09-26 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9780751B2 (en) 2006-04-27 2017-10-03 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US10523169B2 (en) 2006-04-27 2019-12-31 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9787269B2 (en) 2006-04-27 2017-10-10 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9787268B2 (en) 2006-04-27 2017-10-10 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US11362631B2 (en) 2006-04-27 2022-06-14 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9698744B1 (en) 2006-04-27 2017-07-04 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9742372B2 (en) 2006-04-27 2017-08-22 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US10284159B2 (en) 2006-04-27 2019-05-07 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US10833644B2 (en) 2006-04-27 2020-11-10 Dolby Laboratories Licensing Corporation Audio control using auditory event detection
US9253485B2 (en) 2007-01-12 2016-02-02 Civolution B.V. Video watermarking
US8467445B2 (en) 2007-01-12 2013-06-18 Civolution B.V. Video watermarking
WO2008084457A3 (en) * 2007-01-12 2008-08-28 Koninkl Philips Electronics Nv Video watermarking
CN101663690A (en) * 2007-01-12 2010-03-03 塞沃路森公司 video watermarking
CN104700840B (en) * 2013-12-04 2020-01-17 Vixs系统公司 Watermark insertion in frequency domain for audio encoding/decoding/transcoding
EP2881942A1 (en) * 2013-12-04 2015-06-10 ViXS Systems Inc. Watermark insertion in frequency domain for audio encoding/decoding/transcoding
US9620133B2 (en) 2013-12-04 2017-04-11 Vixs Systems Inc. Watermark insertion in frequency domain for audio encoding/decoding/transcoding
CN104700840A (en) * 2013-12-04 2015-06-10 Vixs系统公司 Watermark insertion in frequency domain for audio encoding/decoding/transcoding
US11962279B2 (en) 2023-06-01 2024-04-16 Dolby Laboratories Licensing Corporation Audio control using auditory event detection

Also Published As

Publication number Publication date
US6330672B1 (en) 2001-12-11
WO1999029114B1 (en) 1999-07-29
US20010049788A1 (en) 2001-12-06
US6493457B1 (en) 2002-12-10

Similar Documents

Publication Publication Date Title
US6493457B1 (en) Electronic watermarking in the compressed domain utilizing perceptual coding
Lacy et al. Intellectual property protection systems and digital watermarking
Lacy et al. On combining watermarking with perceptual coding
US7460667B2 (en) Digital hidden data transport (DHDT)
Checcacci et al. Robust video watermarking for wireless multimedia communications
Barni et al. Watermarking systems engineering: enabling digital assets security and other applications
Su et al. Steganography in JPEG2000 compressed images
JP4568732B2 (en) Method and system for processing digital images
Qiao et al. Noninvertible watermarking methods for mpeg-encoded audio
US20070064937A1 (en) Method and apparatus for encoding or decoding a bitstream
Chauhan et al. A survey: Digital audio watermarking techniques and applications
JP3991249B2 (en) Encoding apparatus and encoding method, decoding apparatus and decoding method, information processing apparatus and information processing method, and recording medium
RU2434356C2 (en) Creating watermarks in coded information content
Luo et al. Fast and robust watermarking of JPEG files
Abdulaziz et al. Robust data hiding for images
Inoue et al. A digital watermark method using the wavelet transform for video data
Liu et al. Error concealment for digital images using data hiding
US7940954B2 (en) Watermarking digital representations that have undergone lossy compression
Xu et al. Digital audio watermarking and its application in multimedia database
WO2009007876A2 (en) Warermarking and encryption of entropy-coded data using additive huffman table
Masmoudi et al. A New Blind IoT-Based MP3 Audio Watermarking Scheme for Content Integrity Checking and Copyright Protection
Li et al. Design and analysis of a scalable watermarking scheme for the scalable audio coder
Cheng et al. Combined Audio and Videowatermarking Using Mel-Frequency Cepstra
Cheng et al. Error concealment of mpeg-2 aac audio using modulo watermarks
Chae Robust techniques for hiding data in images and video

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

AK Designated states

Kind code of ref document: B1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase