WO2001059689A1 - Self-orienting watermarking method embedding frequency shift keying - Google Patents

Self-orienting watermarking method embedding frequency shift keying Download PDF

Info

Publication number
WO2001059689A1
WO2001059689A1 PCT/US2001/003138 US0103138W WO0159689A1 WO 2001059689 A1 WO2001059689 A1 WO 2001059689A1 US 0103138 W US0103138 W US 0103138W WO 0159689 A1 WO0159689 A1 WO 0159689A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
watermark
fsk
message
host
Prior art date
Application number
PCT/US2001/003138
Other languages
French (fr)
Other versions
WO2001059689A8 (en
Inventor
Brett A. Bradley
Original Assignee
Digimarc Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digimarc Corporation filed Critical Digimarc Corporation
Priority to AU2001234680A priority Critical patent/AU2001234680A1/en
Publication of WO2001059689A1 publication Critical patent/WO2001059689A1/en
Publication of WO2001059689A8 publication Critical patent/WO2001059689A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark

Definitions

  • the invention relates to digital watermarking.
  • Digital watermarking is a process for modifying a host signal or object to embed a machine-readable code into the host.
  • the host may be modified such that the embedded code is imperceptible or nearly imperceptible to the ordinary observer upon viewing or playback, yet may be detected through an automated detection process.
  • digital watermarking is applied to media such as images, audio signals, and video signals. However, it may also be applied to other types of media, including documents (e.g., through line, word or character shifting), software, multidimensional graphics models, and surface textures of objects.
  • Digital watermarking systems have two primary components: an embedding component that embeds the watermark in the host, and a reading component that detects and reads the embedded watermark.
  • the embedding component embeds a watermark pattern by altering data samples of the host in the spatial, frequency, or other transform domains.
  • the reading component analyzes target content to detect whether a watermark pattern is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark.
  • the watermark may be corrupted intentionally, so as to bypass its copy protection or anti-counterfeiting functions, or unintentionally through various transformations that result from routine manipulation of the content. In the case of watermarked images, such manipulation of the image may distort the watermark pattern embedded in the image.
  • the invention provides a watermarking method in which attributes of the watermark used to embed information also serve to orient the watermark in the reading process.
  • One aspect of the invention is a self orienting watermark that carries a message and has attributes that provide an orientation of the watermark signal in a host signal.
  • Another aspect of the invention is a method of embedding a self orienting watermark in a host signal.
  • This method converts a message into a watermark signal having an attribute that orients the watermark in the host signal, and applies the watermark signal to the host signal.
  • the method converts the message to an FSK signal.
  • the FSK signaling frequencies have spectral attributes that orient the watermark in the host signal.
  • Another aspect of the invention is a method of decoding a self orienting watermark in a host signal.
  • This decoding method uses an attribute of the watermark to determine orientation of the watermark in a host signal.
  • the attribute provides a dual functionality of determining a watermark's orientation and carrying a message.
  • this attribute is an FSK signal whose signaling frequencies help identify the orientation of the watermark and also encode a message. After finding the watermark in the host signal, the method proceeds to read the message encoded into it.
  • Fig. 1 A illustrates an example of a binary signal converted to a square wave.
  • Fig. IB illustrates an example of the binary signal converted to a continuous phase FSK signal.
  • Fig. 2 is a plot illustrating the FFT magnitude of the FSK signal shown in Fig. IB.
  • Fig. 3 is a diagram of a watermark embedder and detector system.
  • Fig. 4 is a diagram illustrating an example of a watermark embedder.
  • Fig. 5 is a diagram illustrating another example of a watermark embedder.
  • Fig. 6 is a flow diagram illustrating a process for determining the orientation of a watermark signal in a signal suspected of containing a watermark.
  • Fig. 7 is a flow diagram illustrating a more detailed implementation of the process depicted in Fig. 6.
  • Fig. 8 is a flow diagram illustrating a process for extracting a message from a watermark signal embedded in another signal.
  • Fig. 9 illustrates an example of a computer system that serves as an operating environment for software implementations of watermarking systems described below.
  • the following sections describe a watermarking method that converts a watermark message into a self-orienting watermark signal and embeds the watermark signal in a host signal.
  • the spectral properties of the watermark signal facilitate its detection, even in applications where the watermarked signal is corrupted. Because of these properties, the watermark signal can perform the dual function of identifying the watermark's presence and orientation in potentially corrupted media, and also conveying a hidden message in the host signal.
  • Such a watermark may be referred to as a self-orienting watermark.
  • the self-orienting watermarking systems described below have an embedder that embeds the watermark in a host signal to create a watermarked signal, and a reader that detects the watermark in a potentially corrupted watermarked signal and reads the watermark message.
  • the embedder converts the desired message into a FSK signal. It then identifies parts of the host signal to receive the watermark and alters host signal values in those parts with corresponding values from the FSK signal.
  • the objective of the embedder is to encode the watermark to make it imperceptible during ordinary playback of the watermarked signal, yet recoverable by the reader despite intentional or unintentional corruption.
  • the host signal is multi-dimensional.
  • the samples in a still image have spatial coordinates (e.g., x and y coordinates for a 2-D image), and one or more color values depending on the color space.
  • the samples in an audio file have a discrete time value and an intensity value.
  • the samples in video have spatial coordinates, temporal coordinates (e.g., the frame or field), and one or more color values.
  • the FSK signal may be inserted along one dimension, e.g., a row of luminance values of an image, or along multiple dimensions.
  • each dimension may encode a version of the same message, or a different message.
  • 1- and 2-D signals are most commonly watermarked
  • 3- and more-dimension signals may also be watermarked, e.g., wire-frame or mesh computer models of 3-D objects.
  • FSK signaling is a digital communications technique in which data is conveyed by shifting between distinct frequencies of transmission.
  • Figs. 1 A-B For example, that one wishes to transmit some arbitrary sequence of zeros and ones.
  • the sequence is first being converted to a square wave, where the instantaneous amplitude of the square wave is represented by its corresponding binary value in the original sequence as shown in Fig. 1 A.
  • an amplitude to frequency conversion is performed, where a lower frequency is transmitted when the square wave is in a trough and a higher frequency is sent when the square wave is cresting as shown in Fig. IB.
  • the result of the amplitude to frequency conversion is a typical FSK signal.
  • a Watermark System The following sections describe implementations of a watermark embedder, detector, and reader that operate on media signals (e.g., images, audio, etc.).
  • the embedder encodes a message into a digital signal by modifying its sample values such that the message is imperceptible to the ordinary observer in output form.
  • the detector captures a representation of the signal suspected of containing a watermark and then processes it to detect the watermark and determine its orientation.
  • the reader uses the orientation to approximate the position of samples at encoding time and decodes the message.
  • Fig. 3 is a block diagram summarizing image processing operations involved in embedding and reading a watermark.
  • the control parameters may include one or more keys. One key may be used to encrypt the message. Another key may be used to control the generation of a watermark carrier signal, a mapping of information bits in the message to positions in a watermark information signal, and an application of the watermark information signal to the host signal. Other parameters may include control bits added to the message.
  • the watermark embedding process 106 performs a watermarking function on the message to convert it to a watermark information signal. It then combines this signal with the host signal to create a watermarked signal 108.
  • the watermark detector 110 operates on a digitized signal suspected of containing a watermark. As depicted generally in Fig. 1 , the signal may undergo various transformations 112, such as conversion to and from an analog domain, copying, editing, compression/decompression, transmission etc. Using parameters 114 from the embedder (e.g., carrier signal properties, control bits, key(s)), it performs a series of correlation or other operations on the captured signal to detect the presence of a watermark and to determine its orientation. For image signals, the orientation may be expressed in the form of orientation parameters, such as translation, rotation, scale, differential scale (shear), etc. Using these parameters to approximate the orientation of the watermark signal, the reader 116 extracts the message from the suspect signal. Some implementations do not perform correlation, but instead, use some other detection process or proceed directly to extract the watermark signal.
  • parameters 114 from the embedder e.g., carrier signal properties, control bits, key(s)
  • the orientation may be expressed in the form of orientation parameters, such as translation,
  • Fig. 2 is a block diagram illustrating an implementation of an exemplary embedder in more detail.
  • the embedding process begins with the message 200.
  • the message is binary number suitable for conversion to a watermark signal. For additional security, it may be encrypted with an encryption key 202.
  • the embedder may also add control bit values to the message to assist in verifying the accuracy of a read operation. These control bits, along with the bits representing the message, are input to an error correction coding process 204 designed to increase the likelihood that the message can be recovered accurately in the reader.
  • error correction coding schemes There are several alternative error correction coding schemes that may be employed. Some examples include BCH, convolution coding, and turbo codes. These forms of error correction coding are sometimes used in communication applications where data is encoded in a carrier signal that transfers the encoded data from one place to another. In the digital watermarking application discussed here, the raw bit data is encoded in a fundamental carrier signal.
  • the embedder and reader may also use a Cyclic Redundancy Check (CRC) to facilitate detection of errors in the decoded message data.
  • CRC Cyclic Redundancy Check
  • the error correction coding function 204 produces a string of bits, termed raw bits 206, that are embedded into a watermark information signal.
  • the illustrated embedder encodes the raw bits in a watermark information signal 212, 214.
  • the carrier signal may be a random or pseudorandom signal.
  • the assignment map specifies where to place the watermark information in the host signal.
  • the embedder may encode a different message in different locations of the signal. While the precise functions and processing order may vary with the implementation, the embedding process proceeds generally as follows.
  • the embedder modulates the carrier signal with the raw bit signal. It then FSK modulates the resulting carrier signal. Finally, it maps the FSK signal to a location or locations in the host signal. This process creates a watermark information signal.
  • the processing order may be rearranged, and some processing stages may be omitted in some implementations. For instance, some implementations may apply FSK modulation to the raw bit signal without modulating the raw bits with a carrier signal.
  • the carrier signal may be used to spread a raw bit over a pseudo-random signal. While advantageous in some applications, this spreading operation is not necessary.
  • the embedder may perform a similar approach in any transform domain.
  • the FSK modulated signal may be mapped to samples in the spatial or temporal domain or some other transform domain.
  • the specific mathematical relationship among the raw bits, the carrier, the FSK modulator, and the assignment map may vary with the implementation.
  • the message may be convolved with the carrier, multiplied with the carrier, added to the carrier, etc.
  • the carrier signal may remain constant for a particular application, or it may vary from one message to another.
  • a secret key may be used to generate the carrier signal.
  • the assignment map may map a raw bit (or its corresponding modulated signal) to a single location or many locations or orientations, in one or more transform domains.
  • the FSK signal could be applied to the rows and columns of image samples in the spatial domain.
  • the assignment map may remain constant, or it may vary from one message to another.
  • the carrier signal and map may vary depending on properties of the host signal.
  • the embedder makes a perceptual analysis 218 of the host signal 220 to identify portions of the signal that can withstand more watermark signal content without substantially impacting fidelity.
  • the perceptual analysis identifies portions where there is more image activity. In these areas, the sample values are changing more than other areas and have more signal strength.
  • the output of the perceptual analysis is a perceptual mask 222 that represents signal activity.
  • the mask may be implemented as an array of multipliers, which selectively increase the signal strength of the watermark information signals in areas of greater signal activity.
  • the embedder combines (224) the watermark information signal and the perceptual mask to yield the watermark signal 226. Finally, it combines (228) the host signal 220 and the watermark signal 226 to create the watermarked signal 230.
  • the embedder adds the image samples in the watermark signal to the corresponding samples in the input image to create the watermarked image 230.
  • the embedder may perform alternative functions to combine the watermark signal and the input image (e.g., multiplication). The net effect is that some image samples in the input image are adjusted upward, while others are adjusted downward. The extent of the adjustment is greater in areas of the image having greater signal activity.
  • the embedder inserts a self-orienting watermark into the spatial domain of the host image.
  • the watermark serves a dual function of conveying a message and identifying the watermark location in the image.
  • the embedder inserts watermark components in rows and columns of luminance samples of the host image at a pre-determined resolution (e.g., 100 dpi - 300 dpi).
  • the message payload size varies from one application to the next. Typically, the payload ranges from 2-128 bits.
  • the embedder converts binary message bits into a series of binary raw bits that it hides in the host image.
  • a message encoder 300 appends certain known bits to the message bits 802. It performs an error detection process (e.g., parity, Cyclic Redundancy Check (CRC), etc.) to generate error detection bits and adds the error detection bits to the message.
  • An error correction coding operation then generates raw bits from the combined known and message bit string.
  • the embedder For the error correction operation, the embedder employs convolution coding.
  • Other alternatives include BCH and turbo coding.
  • the embedder uses spread spectrum modulation as part of the process of creating a watermark signal from the raw bits.
  • a spread spectrum modulator 304 spreads each raw bit into a number of "chips.”
  • the embedder generates a pseudo random number that acts as the carrier signal of the message.
  • the modulator performs an exclusive OR (XOR) operation between the raw bit and each bit of a pseudo random binary number of a pre-determined length.
  • the pseudo random number should contain roughly the same number of zeros and ones.
  • the spread spectrum modulator produces a binary sequence having a set of binary numbers corresponding to each raw bit.
  • an FSK modulator 305 converts the spread spectrum signal into an FSK signal.
  • the FSK modulator uses 2-FSK with continuous phase: a first frequency represents a zero; and a second frequency represents a one.
  • the FSK modulated signal is applied to rows and columns of the host image.
  • Each binary value in the input signal corresponds to a contiguous string of at least two samples in a row or column of the host image.
  • Each of the two frequencies therefore, is at most half the sampling rate of the image. For example, the higher frequency may be set at half the sampling rate, and the lower frequency may be half the higher frequency.
  • the embedder maps the FSK modulated signal to locations in the host image.
  • An assignment map 306 assigns the FSK modulated signal, or segments of it, to selected rows and columns of the host image.
  • the embedder may map the same message to each row and column.
  • the embedder may map parts of a message, or different messages, to different rows or columns of the image. Also, it is possible to map the FSK signal in different directions other than the vertical and horizontal directions.
  • the embedder applies the watermark information signal to the host image by adding samples of the watermark to corresponding samples in the host image. Before adding the watermark information signal to the host, it converts the watermark information signals to delta values that alter corresponding samples in the host image so as to embed the watermark information (330).
  • the embedder has produced an FSK modulated signal and mapped it into a two dimensional image space.
  • it assigns a delta to each sample of the watermark based on the value of the FSK signal (or signals) mapped to that location. In particular, for a mapped sample having a value of one, it adds to the corresponding luminance value, and for a mapped sample having a value of zero, it subtracts from the corresponding luminance value.
  • the embedder may apply the watermark signal by multiplying it with the host image.
  • a gain controller may then adjust the magnitude of each sample in the watermark information signal.
  • the embedder may increase the strength of the signal while reducing its perceptibility to ordinary observers.
  • the embedder shown in Fig. 5 provides an example of a gain controller that takes into account the image and the watermark information signal to calculate an array of gain multipliers to be applied to the watermark information signal.
  • Fig. 5 depicts the gain controller used in the embedder. Note that the gain controller operates on the luminance data 308, the watermark signal, and a global gain input 310, which may be specified by the user.
  • a perceptual analyzer component (312) of the gain controller performs a perceptual analysis on the luminance samples to identify areas that can tolerate a stronger watermark signal without substantially impacting visibility. In places where the naked eye is less likely to notice the watermark, the perceptual analyzer increases the strength of the watermark. Conversely, it decreases the watermark strength where the eye is more likely to notice the watermark.
  • the perceptual analyzer shown in Fig. 5 performs a series of filtering operations on the image block to compute an array of gain values.
  • filters suitable for this task. These filters include an edge detector filter that identifies edges of objects in the image, a non-linear filter to map gain values into a desired range, and averaging or median filters to smooth the gain values.
  • Each of these filters may be implemented as a series of one-dimensional filters (one operating on rows and the other on columns) or two-dimensional filters.
  • the size of the filters i.e. the number of samples processed to compute a value for a given location
  • the shape of the filters may vary as well (e.g., cross-shaped, square etc.).
  • the perceptual analyzer process produces a detailed gain multiplier.
  • the multiplier is a vector with elements corresponding to image samples.
  • the embedder may optionally compute another type of gain, called asymmetric gain (318).
  • Asymmetric gain helps to increase the chances of an accurate read of the watermark message.
  • This component of the gain controller analyzes the filtered luminance samples to determine whether they have values that are consistent with the watermark information signal. To illustrate the concept, consider a segment of the FSK signal representing a value of one. In the watermark information signal, this segment may correspond to a row of four luminance samples forming a wave with energy concentrated at the FSK frequency that represents a one. If the corresponding samples in the host signal already oscillate in a similar fashion, then the asymmetric gain may leave the watermark information signal unchanged. Conversely, if the corresponding samples do not oscillate in the same fashion, the asymmetric gain for selected samples may be set so that the resulting watermarked samples are more likely to produce the desired value in a read operation.
  • the gain controller shown in Fig. 5 has three sources of gain: the detailed gain from a perceptual analysis of the host image, the global gain provided as input, and the asymmetric gain from a comparison of the host image to the watermark information signal.
  • the embedder multiplies the individual gain components together to get the composite gain.
  • the embedder multiplies the delta values produced in block 330 by the composite gain. It then adds the samples of the watermark signal to corresponding samples of the host signal to produce the watermarked image.
  • Fig. 6 is a flow diagram illustrating a process for detecting a watermark and determining its orientation in a signal suspected of containing a self-orienting watermark.
  • the detector transforms the image data 400 to another domain 402, (e.g., a spatial frequency domain, and then performs a series of correlation or other detection operations 404.
  • the correlation operations match the watermark pattern with the target image data to detect the presence of the watermark and its orientation parameters 406.
  • Fig. 7 is a flow diagram illustrating a detector implementation in more detail.
  • the detector transforms the image samples (410) to the color space in which the watermark was embedded (e.g., into luminance samples) (412).
  • it may perform various filtering operations to enhance the detection process.
  • one form of enhancement is to identify and remove signal content that would otherwise tend to obscure the watermark pattern and make it more difficult to compute its orientation. Since this detector determines the watermark's rotation angle and scale based on an FSK signal at known frequency ranges, it may improve the correlation process by removing signal content at other frequency ranges.
  • a filter may be used to highlight edges in the signal and then reduce or eliminate them (414).
  • One type of filter suitable for this task is a multi-axis high pass filter (e.g., LaPlacian, Sobol, etc.).
  • FFT Fast Fourier Transform
  • the detector maps the signal to a log-polar coordinate space (422) and correlates the mapped signal with a detection pattern (424).
  • One axis in the log-polar space represents a log of the scale parameter, and the other represents the rotation angle parameter.
  • This mapping process is sometimes referred to as a Fourier Mellin transform.
  • the detector correlates the resulting sample array in the log polar coordinate system with a log polar representation of a detection pattern.
  • the detection pattern represents cosine waves at the FSK signaling frequencies.
  • the detection pattern In the spatial frequency domain (e.g., FFT magnitude plot of the detection pattern), the detection pattern has energy focused at grid points located at the signaling frequencies.
  • the FFT magnitude of pure cosine waves at the signaling frequencies produces grid points along the vertical and horizontal axes in a two-dimensional frequency spectrum. If different signaling frequencies are used for the rows and columns, these grid points will fall at different distances from the origin. These grid points, therefore, may form a detection pattern that helps identify the rotation angle of the watermark in a suspect signal. Also, if an image has been rotated or scaled, the FFT of this image will have a different frequency spectrum than the original image. In particular, the peaks once located at the FSK signaling frequencies will be rotated and scaled. By aligning the peaks in the distorted image with the original peaks, the detector can re-align the image to its original orientation.
  • a variety of correlation methods may be used to find the rotation and scale parameters that optimize the correlation between the suspect signal and the detection pattern.
  • This detector implementation uses a form of a generalized matching filter (GMF) (424).
  • the GMF performs yet another FFT on the suspect signal and the pattern, multiplies the resulting signals (i.e. computes the dot product of the two FFT arrays), and then computes the inverse FFT of the product.
  • the product comprises an array of correlation values in log-polar space.
  • the detector may use interpolation to find the inter-sample location of the rotation and scale vector that provides the best correlation. It may use the same approach to find a set of rotation-scale vectors with the top correlation values (426).
  • the detector has recovered rotation and scale parameters that estimate the orientation of the watermark in the suspect signal.
  • the FFT magnitude of the FSK signal has peaks at the signaling frequencies as shown in Fig. 2.
  • One way to determine the rotation is to step through a set of candidate rotation angles, apply the candidates to the image, and find the rotation angle that yields an FFT magnitude with the highest peak at the signaling frequencies. Since the image is two dimensional, the embedder can insert the FSK signal in the rows and columns of the image. Thus, this process may be applied separately to the rows and columns to find rotation angles that maximize the peaks in each dimension. Alternatively, a similar process may be applied to both rows and columns simultaneously. In this case, the approach is similar, except that the FFT magnitude is two-dimensional, and there are four peaks (two for the rows and two for the columns).
  • the detector derives the scale parameter from the location of the peaks. If the resolution of the image has been increased relative to its resolution at embedding, then the location of the peaks will shift toward the origin in the Fourier spectrum. Conversely, the location of the peaks will shift away from the origin if the resolution has decreased. If the watermark is embedded in both the rows and columns, a separate scale parameter may be established for each dimension. As another alternative, the detector may employ projection techniques to ascertain orientation. In one such approach, the detector takes the absolute value of the FFT of each row of the watermarked image, and accumulates the result for all rows. If the watermarked image is correctly aligned, this process will produce two peaks exactly at the FSK signaling frequencies. If there is scaling, the location of the peaks changes. If the image is rotated, the result will appear like scaling combined with a loss in peak strength. The amount of rotation and scale can be derived from the position and amplitude of the peaks.
  • the implementer of the system can address this challenge by giving the watermark an attribute that enables the detector to derive it, even if the signal has been corrupted in some fashion.
  • the embedder may give the watermark another attribute that allows the detector to recover translation parameters that specify an origin or point of reference from which to orient the reader. After correcting for rotation and scale, the detector can then search for the attribute for recovering the translation parameters.
  • One such attribute is a sequence of phase offsets. Notice that in Fig.
  • the value of the FSK signal at a bit transition is always "1."
  • the signal contains only integer cycles of a pure cosine, i.e. no phase offset.
  • the embedder may insert an offset that is row dependent. Knowing how the embedded phase offset varies with each row, the detector can establish a row of origination. The same procedure could be used to find the column of origination. The intersection of the two then defines the origin.
  • Another attribute is a sequence of FSK signaling frequencies.
  • the embedder may vary the FSK signaling frequencies over a sequence of two or more rows and columns.
  • the detector can then identify these frequencies by computing the FFT magnitude of the rows and columns and identifying the peaks. Knowing the sequence of signaling frequencies, the detector can establish a row of origination. The same procedure can be used to find the column of origination. Again, the intersection of the row and column of origination defines the origin. Note that the detector may perform the process of identifying these peaks as part of the process of determining the rotation angle.
  • the embedder inserts an FSK watermark in each row (or column) at the same phase offset and signaling frequencies, artifacts will be noticeable.
  • Yet another attribute is a sequence of known bits appended to the watermark.
  • the detector may then search for these known bits, after adjusting for rotation and scale. To search, the detector invokes a reader to extract a message from the rows and columns. It then looks for the known bits to identify the row and column of origination.
  • Fig. 5 is flow diagram illustrating a process of extracting a message from re-oriented image data 500.
  • the detector invokes the reader on the rows and columns.
  • the reader scans the input image row of interest into two independent channels (502), each of which is band-pass filtered at one of the two possible FSK frequencies (504). Then, for a given bit location, the reader decides that the bit is a zero if there is more energy in the output channel of the lower frequency filter (506). The reader decides that the bit is a one if there is more energy in the higher frequency filter (506).
  • An exemplary implementation embeds on the order of four pixels per bit at 100dpi, or 40 bits per inch. In general, with more pixels per bit, the individual decisions on the bits will be more reliable. As is known from the assignee's prior art, redundant signaling would be used here as well.
  • the reader converts the bit value to a corresponding raw bit value and buffers the value for the associated raw bit (508).
  • the reader performs an inverse of the modulation operation to recover a candidate value for a corresponding raw bit and buffers the candidate value.
  • the reader uses the assignment map to map the extracted candidate value to its corresponding raw bit position.
  • the reader compiles the candidate values for each raw bit to compute a final value for each raw bit position (510). It compiles the candidates for the raw bits extracted from each of the tows. For a given raw bit, if more candidates are a one, then the final value is set to a one (and vice versa if more candidates are a zero). Finally, it performs error correction decoding to reconstruct the original message (512).
  • the self-orienting watermark described above may be embedded along with other watermarks into a host signal.
  • an FSK watermark may be combined with a spatial domain watermark, or other type of watermark inserted in another transform domain (e.g., wavelet, Discrete Cosine Transform, Discrete Fourier Transform domains).
  • the self-orienting watermark may be used to establish orientation of other watermarks in the host signal.
  • the detector can mitigate the impact of interference due to the self-orienting watermark.
  • the detector could apply a band-stop filter at the FSK signaling frequencies. This filtering operation would mitigate the interference due to the FSK signal when attempting to read other watermark messages.
  • the watermarks may carry data, machine instructions, and/or links to other data or instructions.
  • the link may be implemented as an address or reference to a database or other resource located on the same device as the detector or on a remote device (e.g., a computer on the Internet).
  • the data and/or machine instructions may be used to authenticate the host signal, monitor the host signal (e.g., broadcast monitoring), identify its owner, control copying of the host signal, provide additional information related to the host signal, etc.
  • Figure 9 illustrates an example of a computer system that serves as an operating environment for software implementations of the watermarking systems described above.
  • the embedder and detector implementations are implemented in C/C++ and are portable to many different computer systems.
  • Fig. 9 generally depicts one such system.
  • the computer system shown in Fig. 9 includes a computer 1220, including a processing unit 1221, a system memory 1222, and a system bus 1223 that interconnects various system components including the system memory to the processing unit 1221.
  • the system bus may comprise any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using a bus architecture such as PCI, VESA, MicroChannel (MCA), ISA and EISA, to name a few.
  • a bus architecture such as PCI, VESA, MicroChannel (MCA), ISA and EISA, to name a few.
  • the system memory includes read only memory (ROM) 1224 and random access memory (RAM) 1225.
  • ROM read only memory
  • RAM random access memory
  • the computer 1220 further includes a hard disk drive 1227, a magnetic disk drive 1228, e.g., to read from or write to a removable disk 1229, and an optical disk drive 1230, e.g., for reading a CD-ROM or DVD disk 1231 or to read from or write to other optical media.
  • the hard disk drive 1227, magnetic disk drive 1228, and optical disk drive 1230 are connected to the system bus 1223 by a hard disk drive interface 1232, a magnetic disk drive interface 1233, and an optical drive interface 1234, respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions (program code such as dynamic link libraries, and executable files), etc. for the computer 1220.
  • computer-readable media refers to a hard disk, a removable magnetic disk and an optical disk, it can also include other types of media that are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks, and the like.
  • a number of program modules may be stored in the drives and RAM 1225, including an operating system 1235, one or more application programs 1236, other program modules 1237, and program data 1238.
  • a user may enter commands and information into the personal computer 1220 through a keyboard 1240 and pointing device, such as a mouse 1242.
  • Other input devices may include a microphone, sound card, radio or television tuner, joystick, game pad, satellite dish, digital camera, scanner, or the like.
  • a digital camera or scanner 43 may be used to capture the target image for the detection process described above.
  • the camera and scanner are each connected to the computer via a standard interface 44.
  • USB Universal Serial Bus
  • PCI Peripheral Component Interconnect
  • parallel port interface Two emerging standard peripheral interfaces for cameras include USB2 and 1394 (also known as firewire and iLink).
  • watermarked images or video may be provided from other sources, such as a packaged media devices (e.g., CD, DVD, flash memory, etc), streaming media from a network connection, television tuner, etc.
  • a packaged media devices e.g., CD, DVD, flash memory, etc
  • streaming media from a network connection
  • television tuner etc.
  • watermarked audio may be provided from packaged devices, streaming media, radio tuner, etc.
  • a port interface 1246 that is coupled to the system bus, either directly or indirectly.
  • Examples of such interfaces include a serial port, parallel port, game port or universal serial bus (USB).
  • a monitor 1247 or other type of display device is also connected to the system bus 1223 via an interface, such as a video adapter 1248.
  • personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the computer 1220 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 1249.
  • the remote computer 1249 may be a server, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 1220, although only a memory storage device 1250 has been illustrated in Figure 9.
  • the logical connections depicted in Figure 9 include a local area network (LAN) 1251 and a wide area network (WAN) 1252.
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • the computer 1220 When used in a LAN networking environment, the computer 1220 is connected to the local network 1251 through a network interface or adapter 1253.
  • the personal computer 1220 When used in a WAN networking environment, the personal computer 1220 typically includes a modem 1254 or other means for establishing communications over the wide area network 1252, such as the Internet.
  • the modem 1254 which may be internal or external, is connected to the system bus 1223 via the serial port interface 1246.
  • program modules depicted relative to the personal computer 1220 may be stored in the remote memory storage device.
  • the processes detailed above can be implemented in a distributed fashion, and as parallel processes. It will be appreciated that the network connections shown are exemplary and that other means of establishing a communications link between the computers may be used.

Abstract

A watermarking method converts a watermark message (108) into a Frequency Shift Keying (FSK) signal (305) and embeds the FSK signal in a host signal (308). The spectral properties of the FSK watermark signal facilitate its detection (110), even in applications where the watermarked signal is corrupted. Because of these properties, the FSK watermark signal can perform the dual function of identifying the watermark's presence and orientation (406) in potentially corrupted media, and also conveying a hidden message in the host signal. Such a watermark may be referred to as a self-orienting watermark.

Description

SELF-ORIENTING WATERMARKS
Technical Field
The invention relates to digital watermarking.
Background and Summary
Digital watermarking is a process for modifying a host signal or object to embed a machine-readable code into the host. The host may be modified such that the embedded code is imperceptible or nearly imperceptible to the ordinary observer upon viewing or playback, yet may be detected through an automated detection process. Most commonly, digital watermarking is applied to media such as images, audio signals, and video signals. However, it may also be applied to other types of media, including documents (e.g., through line, word or character shifting), software, multidimensional graphics models, and surface textures of objects. Digital watermarking systems have two primary components: an embedding component that embeds the watermark in the host, and a reading component that detects and reads the embedded watermark. The embedding component embeds a watermark pattern by altering data samples of the host in the spatial, frequency, or other transform domains. The reading component analyzes target content to detect whether a watermark pattern is present. In applications where the watermark encodes information, the reader extracts this information from the detected watermark.
One challenge to the developers of watermark embedding and reading systems is to ensure that the watermark is detectable even if the watermarked media content is corrupted in some fashion. The watermark may be corrupted intentionally, so as to bypass its copy protection or anti-counterfeiting functions, or unintentionally through various transformations that result from routine manipulation of the content. In the case of watermarked images, such manipulation of the image may distort the watermark pattern embedded in the image.
The invention provides a watermarking method in which attributes of the watermark used to embed information also serve to orient the watermark in the reading process. One aspect of the invention is a self orienting watermark that carries a message and has attributes that provide an orientation of the watermark signal in a host signal.
Another aspect of the invention is a method of embedding a self orienting watermark in a host signal. This method converts a message into a watermark signal having an attribute that orients the watermark in the host signal, and applies the watermark signal to the host signal. In one implementation, the method converts the message to an FSK signal. The FSK signaling frequencies have spectral attributes that orient the watermark in the host signal.
Another aspect of the invention is a method of decoding a self orienting watermark in a host signal. This decoding method uses an attribute of the watermark to determine orientation of the watermark in a host signal. The attribute provides a dual functionality of determining a watermark's orientation and carrying a message. In one implementation, this attribute is an FSK signal whose signaling frequencies help identify the orientation of the watermark and also encode a message. After finding the watermark in the host signal, the method proceeds to read the message encoded into it.
Further features and advantages of the invention will be apparent from the following detailed description and accompanying drawings.
Brief Description of the Drawings Fig. 1 A illustrates an example of a binary signal converted to a square wave.
Fig. IB illustrates an example of the binary signal converted to a continuous phase FSK signal.
Fig. 2 is a plot illustrating the FFT magnitude of the FSK signal shown in Fig. IB. Fig. 3 is a diagram of a watermark embedder and detector system.
Fig. 4 is a diagram illustrating an example of a watermark embedder. Fig. 5 is a diagram illustrating another example of a watermark embedder. Fig. 6 is a flow diagram illustrating a process for determining the orientation of a watermark signal in a signal suspected of containing a watermark. Fig. 7 is a flow diagram illustrating a more detailed implementation of the process depicted in Fig. 6. Fig. 8 is a flow diagram illustrating a process for extracting a message from a watermark signal embedded in another signal.
Fig. 9 illustrates an example of a computer system that serves as an operating environment for software implementations of watermarking systems described below.
Detailed Description
1.0 Overview of Watermarking Method
The following sections describe a watermarking method that converts a watermark message into a self-orienting watermark signal and embeds the watermark signal in a host signal. The spectral properties of the watermark signal facilitate its detection, even in applications where the watermarked signal is corrupted. Because of these properties, the watermark signal can perform the dual function of identifying the watermark's presence and orientation in potentially corrupted media, and also conveying a hidden message in the host signal. Such a watermark may be referred to as a self-orienting watermark.
Like conventional watermarking systems, the self-orienting watermarking systems described below have an embedder that embeds the watermark in a host signal to create a watermarked signal, and a reader that detects the watermark in a potentially corrupted watermarked signal and reads the watermark message. The embedder converts the desired message into a FSK signal. It then identifies parts of the host signal to receive the watermark and alters host signal values in those parts with corresponding values from the FSK signal. Typically, the objective of the embedder is to encode the watermark to make it imperceptible during ordinary playback of the watermarked signal, yet recoverable by the reader despite intentional or unintentional corruption.
In many applications, the host signal is multi-dimensional. For example, the samples in a still image have spatial coordinates (e.g., x and y coordinates for a 2-D image), and one or more color values depending on the color space. The samples in an audio file have a discrete time value and an intensity value. Similarly, the samples in video have spatial coordinates, temporal coordinates (e.g., the frame or field), and one or more color values. The FSK signal may be inserted along one dimension, e.g., a row of luminance values of an image, or along multiple dimensions. In addition, each dimension may encode a version of the same message, or a different message. (Although 1- and 2-D signals are most commonly watermarked, 3- and more-dimension signals may also be watermarked, e.g., wire-frame or mesh computer models of 3-D objects.)
While the following description provides specific implementation details of an image watermarking method, the general approach may be applied to other watermarkable objects (including video and audio).
2.0 FSK Signaling Background
FSK signaling is a digital communications technique in which data is conveyed by shifting between distinct frequencies of transmission. To illustrate the concept, consider the example shown in Figs. 1 A-B. Suppose, for example, that one wishes to transmit some arbitrary sequence of zeros and ones. Conceptually, one can visualize the sequence as first being converted to a square wave, where the instantaneous amplitude of the square wave is represented by its corresponding binary value in the original sequence as shown in Fig. 1 A. Following conversion to a square wave representation, an amplitude to frequency conversion is performed, where a lower frequency is transmitted when the square wave is in a trough and a higher frequency is sent when the square wave is cresting as shown in Fig. IB. The result of the amplitude to frequency conversion is a typical FSK signal.
In this example, notice that when the lower frequency is transmitted the signal goes through exactly one cycle per bit. When the higher frequency is transmitted the signal goes through exactly two cycles.
This particular example is known in the literature as 2-FSK with continuous phase. See E.A. Lee, D. G. Messershmitt, Digital Communication, Second Edition, Chapter 6, 1994. The "2" comes from the fact that there are only two frequency states of the signal; generally M different frequencies can be used. The term "continuous phase" arises from the fact that there are no phase discontinuities between adjacent bits. There are frequency domain implications as well for continuous phase FSK as shown in Fig. 2. The peaks in the magnitude spectrum are distinct, and as such, can be used to identify the FSK signal when embedded in a host signal in watermarking applications.
3.0 A Watermark System The following sections describe implementations of a watermark embedder, detector, and reader that operate on media signals (e.g., images, audio, etc.). The embedder encodes a message into a digital signal by modifying its sample values such that the message is imperceptible to the ordinary observer in output form. The detector captures a representation of the signal suspected of containing a watermark and then processes it to detect the watermark and determine its orientation. To extract the message, the reader uses the orientation to approximate the position of samples at encoding time and decodes the message.
Fig. 3 is a block diagram summarizing image processing operations involved in embedding and reading a watermark. There are three primary inputs to the embedding process: a host signal 100, the message 102, and a series of control parameters 104. The control parameters may include one or more keys. One key may be used to encrypt the message. Another key may be used to control the generation of a watermark carrier signal, a mapping of information bits in the message to positions in a watermark information signal, and an application of the watermark information signal to the host signal. Other parameters may include control bits added to the message. The watermark embedding process 106 performs a watermarking function on the message to convert it to a watermark information signal. It then combines this signal with the host signal to create a watermarked signal 108.
The watermark detector 110 operates on a digitized signal suspected of containing a watermark. As depicted generally in Fig. 1 , the signal may undergo various transformations 112, such as conversion to and from an analog domain, copying, editing, compression/decompression, transmission etc. Using parameters 114 from the embedder (e.g., carrier signal properties, control bits, key(s)), it performs a series of correlation or other operations on the captured signal to detect the presence of a watermark and to determine its orientation. For image signals, the orientation may be expressed in the form of orientation parameters, such as translation, rotation, scale, differential scale (shear), etc. Using these parameters to approximate the orientation of the watermark signal, the reader 116 extracts the message from the suspect signal. Some implementations do not perform correlation, but instead, use some other detection process or proceed directly to extract the watermark signal.
3.1 Embedding
Fig. 2 is a block diagram illustrating an implementation of an exemplary embedder in more detail. The embedding process begins with the message 200. As noted above, the message is binary number suitable for conversion to a watermark signal. For additional security, it may be encrypted with an encryption key 202. In addition to the information conveyed in the message, the embedder may also add control bit values to the message to assist in verifying the accuracy of a read operation. These control bits, along with the bits representing the message, are input to an error correction coding process 204 designed to increase the likelihood that the message can be recovered accurately in the reader.
There are several alternative error correction coding schemes that may be employed. Some examples include BCH, convolution coding, and turbo codes. These forms of error correction coding are sometimes used in communication applications where data is encoded in a carrier signal that transfers the encoded data from one place to another. In the digital watermarking application discussed here, the raw bit data is encoded in a fundamental carrier signal.
In addition to the error correction coding schemes mentioned above, the embedder and reader may also use a Cyclic Redundancy Check (CRC) to facilitate detection of errors in the decoded message data. The error correction coding function 204 produces a string of bits, termed raw bits 206, that are embedded into a watermark information signal. Using a carrier signal 208 and an assignment map 210, the illustrated embedder encodes the raw bits in a watermark information signal 212, 214. The carrier signal may be a random or pseudorandom signal. The assignment map specifies where to place the watermark information in the host signal. In some applications, the embedder may encode a different message in different locations of the signal. While the precise functions and processing order may vary with the implementation, the embedding process proceeds generally as follows. The embedder modulates the carrier signal with the raw bit signal. It then FSK modulates the resulting carrier signal. Finally, it maps the FSK signal to a location or locations in the host signal. This process creates a watermark information signal. The processing order may be rearranged, and some processing stages may be omitted in some implementations. For instance, some implementations may apply FSK modulation to the raw bit signal without modulating the raw bits with a carrier signal. The carrier signal may be used to spread a raw bit over a pseudo-random signal. While advantageous in some applications, this spreading operation is not necessary.
Having summarized a general embedding framework, a number of points can be made. First, the embedder may perform a similar approach in any transform domain. For example, the FSK modulated signal may be mapped to samples in the spatial or temporal domain or some other transform domain. Second, the specific mathematical relationship among the raw bits, the carrier, the FSK modulator, and the assignment map may vary with the implementation. For example, the message may be convolved with the carrier, multiplied with the carrier, added to the carrier, etc.
Third, the carrier signal may remain constant for a particular application, or it may vary from one message to another. For example, a secret key may be used to generate the carrier signal.
Fourth, the assignment map may map a raw bit (or its corresponding modulated signal) to a single location or many locations or orientations, in one or more transform domains. For example, the FSK signal could be applied to the rows and columns of image samples in the spatial domain.
Fifth, the assignment map may remain constant, or it may vary from one message to another. In addition, the carrier signal and map may vary depending on properties of the host signal. In sum, there are many possible design choices within the implementation framework described above. Returning to Fig. 2, the embedder makes a perceptual analysis 218 of the host signal 220 to identify portions of the signal that can withstand more watermark signal content without substantially impacting fidelity. For images, the perceptual analysis identifies portions where there is more image activity. In these areas, the sample values are changing more than other areas and have more signal strength. The output of the perceptual analysis is a perceptual mask 222 that represents signal activity. For example, the mask may be implemented as an array of multipliers, which selectively increase the signal strength of the watermark information signals in areas of greater signal activity.
The embedder combines (224) the watermark information signal and the perceptual mask to yield the watermark signal 226. Finally, it combines (228) the host signal 220 and the watermark signal 226 to create the watermarked signal 230.
In one implementation where the watermark signal is inserted in the spatial domain of an image, the embedder adds the image samples in the watermark signal to the corresponding samples in the input image to create the watermarked image 230. In other implementations, the embedder may perform alternative functions to combine the watermark signal and the input image (e.g., multiplication). The net effect is that some image samples in the input image are adjusted upward, while others are adjusted downward. The extent of the adjustment is greater in areas of the image having greater signal activity.
3.2 Example Embedder Implementation
The following sections describe an implementation of the digital image watermark embedder depicted in Fig. 5. The embedder inserts a self-orienting watermark into the spatial domain of the host image. The watermark serves a dual function of conveying a message and identifying the watermark location in the image. The embedder inserts watermark components in rows and columns of luminance samples of the host image at a pre-determined resolution (e.g., 100 dpi - 300 dpi). The message payload size varies from one application to the next. Typically, the payload ranges from 2-128 bits. 3.2.1 Encoding the Message
The embedder converts binary message bits into a series of binary raw bits that it hides in the host image. As part of this process, a message encoder 300 appends certain known bits to the message bits 802. It performs an error detection process (e.g., parity, Cyclic Redundancy Check (CRC), etc.) to generate error detection bits and adds the error detection bits to the message. An error correction coding operation then generates raw bits from the combined known and message bit string.
For the error correction operation, the embedder employs convolution coding. Other alternatives include BCH and turbo coding.
3.2.2 Spread Spectrum Modulation
The embedder uses spread spectrum modulation as part of the process of creating a watermark signal from the raw bits. A spread spectrum modulator 304 spreads each raw bit into a number of "chips." The embedder generates a pseudo random number that acts as the carrier signal of the message. To spread each raw bit, the modulator performs an exclusive OR (XOR) operation between the raw bit and each bit of a pseudo random binary number of a pre-determined length. Preferably, the pseudo random number should contain roughly the same number of zeros and ones. The spread spectrum modulator produces a binary sequence having a set of binary numbers corresponding to each raw bit.
3.2.3 FSK Modulation
Next, an FSK modulator 305 converts the spread spectrum signal into an FSK signal. In particular, the FSK modulator uses 2-FSK with continuous phase: a first frequency represents a zero; and a second frequency represents a one. The FSK modulated signal is applied to rows and columns of the host image. Each binary value in the input signal corresponds to a contiguous string of at least two samples in a row or column of the host image. Each of the two frequencies, therefore, is at most half the sampling rate of the image. For example, the higher frequency may be set at half the sampling rate, and the lower frequency may be half the higher frequency. 3.2.4 Mapping the Watermark Information Signal
The embedder maps the FSK modulated signal to locations in the host image. An assignment map 306 assigns the FSK modulated signal, or segments of it, to selected rows and columns of the host image. Depending on the message and image size, the embedder may map the same message to each row and column. In some applications, the embedder may map parts of a message, or different messages, to different rows or columns of the image. Also, it is possible to map the FSK signal in different directions other than the vertical and horizontal directions.
3.2.5 Computing the Watermark Information Signal
The embedder applies the watermark information signal to the host image by adding samples of the watermark to corresponding samples in the host image. Before adding the watermark information signal to the host, it converts the watermark information signals to delta values that alter corresponding samples in the host image so as to embed the watermark information (330).
At this stage, the embedder has produced an FSK modulated signal and mapped it into a two dimensional image space. Next, it assigns a delta to each sample of the watermark based on the value of the FSK signal (or signals) mapped to that location. In particular, for a mapped sample having a value of one, it adds to the corresponding luminance value, and for a mapped sample having a value of zero, it subtracts from the corresponding luminance value.
In an alternative implementation, the embedder may apply the watermark signal by multiplying it with the host image.
Optionally, a gain controller may then adjust the magnitude of each sample in the watermark information signal.
3.2.6 Gain Control and Perceptual Analysis
Though not necessary, it is often useful to control the gain of the watermark information signal. Through gain control, the embedder may increase the strength of the signal while reducing its perceptibility to ordinary observers. The embedder shown in Fig. 5 provides an example of a gain controller that takes into account the image and the watermark information signal to calculate an array of gain multipliers to be applied to the watermark information signal.
Fig. 5 depicts the gain controller used in the embedder. Note that the gain controller operates on the luminance data 308, the watermark signal, and a global gain input 310, which may be specified by the user. A perceptual analyzer component (312) of the gain controller performs a perceptual analysis on the luminance samples to identify areas that can tolerate a stronger watermark signal without substantially impacting visibility. In places where the naked eye is less likely to notice the watermark, the perceptual analyzer increases the strength of the watermark. Conversely, it decreases the watermark strength where the eye is more likely to notice the watermark.
The perceptual analyzer shown in Fig. 5 performs a series of filtering operations on the image block to compute an array of gain values. There are a variety of filters suitable for this task. These filters include an edge detector filter that identifies edges of objects in the image, a non-linear filter to map gain values into a desired range, and averaging or median filters to smooth the gain values. Each of these filters may be implemented as a series of one-dimensional filters (one operating on rows and the other on columns) or two-dimensional filters. The size of the filters (i.e. the number of samples processed to compute a value for a given location) may vary (e.g., 3 by 3, 5 by 5, etc.). The shape of the filters may vary as well (e.g., cross-shaped, square etc.). The perceptual analyzer process produces a detailed gain multiplier. The multiplier is a vector with elements corresponding to image samples.
The embedder may optionally compute another type of gain, called asymmetric gain (318). Asymmetric gain helps to increase the chances of an accurate read of the watermark message. This component of the gain controller analyzes the filtered luminance samples to determine whether they have values that are consistent with the watermark information signal. To illustrate the concept, consider a segment of the FSK signal representing a value of one. In the watermark information signal, this segment may correspond to a row of four luminance samples forming a wave with energy concentrated at the FSK frequency that represents a one. If the corresponding samples in the host signal already oscillate in a similar fashion, then the asymmetric gain may leave the watermark information signal unchanged. Conversely, if the corresponding samples do not oscillate in the same fashion, the asymmetric gain for selected samples may be set so that the resulting watermarked samples are more likely to produce the desired value in a read operation.
In summary, the gain controller shown in Fig. 5 has three sources of gain: the detailed gain from a perceptual analysis of the host image, the global gain provided as input, and the asymmetric gain from a comparison of the host image to the watermark information signal. The embedder multiplies the individual gain components together to get the composite gain.
3.2.7 Forming the Watermarked Signal
To compute the watermark signal, the embedder multiplies the delta values produced in block 330 by the composite gain. It then adds the samples of the watermark signal to corresponding samples of the host signal to produce the watermarked image.
3.3 Detecting an FSK Watermark 3.3.1 Establishing Orientation
Fig. 6 is a flow diagram illustrating a process for detecting a watermark and determining its orientation in a signal suspected of containing a self-orienting watermark. First, the detector transforms the image data 400 to another domain 402, (e.g., a spatial frequency domain, and then performs a series of correlation or other detection operations 404. The correlation operations match the watermark pattern with the target image data to detect the presence of the watermark and its orientation parameters 406.
Fig. 7 is a flow diagram illustrating a detector implementation in more detail. The detector transforms the image samples (410) to the color space in which the watermark was embedded (e.g., into luminance samples) (412). Optionally, it may perform various filtering operations to enhance the detection process. For example, one form of enhancement is to identify and remove signal content that would otherwise tend to obscure the watermark pattern and make it more difficult to compute its orientation. Since this detector determines the watermark's rotation angle and scale based on an FSK signal at known frequency ranges, it may improve the correlation process by removing signal content at other frequency ranges. As such, a filter may be used to highlight edges in the signal and then reduce or eliminate them (414). One type of filter suitable for this task is a multi-axis high pass filter (e.g., LaPlacian, Sobol, etc.).
Next, it prepares the image signal for a Fast Fourier Transform (FFT) by applying a window function (416). It then performs an FFT on the luminance signal to produce a Fourier magnitude signal (418). Optionally, it may filter the FFT magnitude array to boost peaks and suppress the fall-off region around these peaks.
To determine rotation and scale parameters of the watermark's orientation, the detector maps the signal to a log-polar coordinate space (422) and correlates the mapped signal with a detection pattern (424). One axis in the log-polar space represents a log of the scale parameter, and the other represents the rotation angle parameter. This mapping process is sometimes referred to as a Fourier Mellin transform. The detector correlates the resulting sample array in the log polar coordinate system with a log polar representation of a detection pattern. The detection pattern represents cosine waves at the FSK signaling frequencies. In the spatial frequency domain (e.g., FFT magnitude plot of the detection pattern), the detection pattern has energy focused at grid points located at the signaling frequencies. (This arrangement is further detailed in patent 5,862,260, and in application 09/452,023, the complete disclosures of which are incorporated herein by reference.)
When FSK signaling is applied to the rows and columns, the FFT magnitude of pure cosine waves at the signaling frequencies produces grid points along the vertical and horizontal axes in a two-dimensional frequency spectrum. If different signaling frequencies are used for the rows and columns, these grid points will fall at different distances from the origin. These grid points, therefore, may form a detection pattern that helps identify the rotation angle of the watermark in a suspect signal. Also, if an image has been rotated or scaled, the FFT of this image will have a different frequency spectrum than the original image. In particular, the peaks once located at the FSK signaling frequencies will be rotated and scaled. By aligning the peaks in the distorted image with the original peaks, the detector can re-align the image to its original orientation.
A variety of correlation methods may be used to find the rotation and scale parameters that optimize the correlation between the suspect signal and the detection pattern. This detector implementation uses a form of a generalized matching filter (GMF) (424). The GMF performs yet another FFT on the suspect signal and the pattern, multiplies the resulting signals (i.e. computes the dot product of the two FFT arrays), and then computes the inverse FFT of the product. The product comprises an array of correlation values in log-polar space. The detector may use interpolation to find the inter-sample location of the rotation and scale vector that provides the best correlation. It may use the same approach to find a set of rotation-scale vectors with the top correlation values (426).
At this stage, the detector has recovered rotation and scale parameters that estimate the orientation of the watermark in the suspect signal. Before proceeding, it is worth noting that there are several alternative approaches to estimating the rotation and scale parameters. Recall that the FFT magnitude of the FSK signal has peaks at the signaling frequencies as shown in Fig. 2. One way to determine the rotation is to step through a set of candidate rotation angles, apply the candidates to the image, and find the rotation angle that yields an FFT magnitude with the highest peak at the signaling frequencies. Since the image is two dimensional, the embedder can insert the FSK signal in the rows and columns of the image. Thus, this process may be applied separately to the rows and columns to find rotation angles that maximize the peaks in each dimension. Alternatively, a similar process may be applied to both rows and columns simultaneously. In this case, the approach is similar, except that the FFT magnitude is two-dimensional, and there are four peaks (two for the rows and two for the columns).
Once rotation is established, the detector derives the scale parameter from the location of the peaks. If the resolution of the image has been increased relative to its resolution at embedding, then the location of the peaks will shift toward the origin in the Fourier spectrum. Conversely, the location of the peaks will shift away from the origin if the resolution has decreased. If the watermark is embedded in both the rows and columns, a separate scale parameter may be established for each dimension. As another alternative, the detector may employ projection techniques to ascertain orientation. In one such approach, the detector takes the absolute value of the FFT of each row of the watermarked image, and accumulates the result for all rows. If the watermarked image is correctly aligned, this process will produce two peaks exactly at the FSK signaling frequencies. If there is scaling, the location of the peaks changes. If the image is rotated, the result will appear like scaling combined with a loss in peak strength. The amount of rotation and scale can be derived from the position and amplitude of the peaks.
If the message content within the watermark is unknown, finding the origin of the watermark in the suspect signal presents a challenge. Generally, the implementer of the system can address this challenge by giving the watermark an attribute that enables the detector to derive it, even if the signal has been corrupted in some fashion. Just as the FSK frequencies represent an attribute that allows the detector to recover rotation and scale, the embedder may give the watermark another attribute that allows the detector to recover translation parameters that specify an origin or point of reference from which to orient the reader. After correcting for rotation and scale, the detector can then search for the attribute for recovering the translation parameters. One such attribute is a sequence of phase offsets. Notice that in Fig. IB, the value of the FSK signal at a bit transition is always "1." Measured from bit to bit, the signal contains only integer cycles of a pure cosine, i.e. no phase offset. Instead of embedding with the same phase offset every row, the embedder may insert an offset that is row dependent. Knowing how the embedded phase offset varies with each row, the detector can establish a row of origination. The same procedure could be used to find the column of origination. The intersection of the two then defines the origin.
Another attribute is a sequence of FSK signaling frequencies. For example, the embedder may vary the FSK signaling frequencies over a sequence of two or more rows and columns. The detector can then identify these frequencies by computing the FFT magnitude of the rows and columns and identifying the peaks. Knowing the sequence of signaling frequencies, the detector can establish a row of origination. The same procedure can be used to find the column of origination. Again, the intersection of the row and column of origination defines the origin. Note that the detector may perform the process of identifying these peaks as part of the process of determining the rotation angle. Note that if the embedder inserts an FSK watermark in each row (or column) at the same phase offset and signaling frequencies, artifacts will be noticeable. Thus, it is advantageous to vary the phase offset and/or signaling frequencies across rows (or columns) to improve image fidelity. Also, it is advantageous to use different signaling frequencies in the rows and columns. Yet another attribute is a sequence of known bits appended to the watermark.
The detector may then search for these known bits, after adjusting for rotation and scale. To search, the detector invokes a reader to extract a message from the rows and columns. It then looks for the known bits to identify the row and column of origination.
3.4 Reading the FSK Watermark
If a watermark is detected, the reader extracts the watermark information signal from the image data (optionally by first re-orienting the data based on the orientation parameters). Fig. 5 is flow diagram illustrating a process of extracting a message from re-oriented image data 500.
Once orientation is established, the detector invokes the reader on the rows and columns. For the rows, the reader scans the input image row of interest into two independent channels (502), each of which is band-pass filtered at one of the two possible FSK frequencies (504). Then, for a given bit location, the reader decides that the bit is a zero if there is more energy in the output channel of the lower frequency filter (506). The reader decides that the bit is a one if there is more energy in the higher frequency filter (506). An exemplary implementation embeds on the order of four pixels per bit at 100dpi, or 40 bits per inch. In general, with more pixels per bit, the individual decisions on the bits will be more reliable. As is known from the assignee's prior art, redundant signaling would be used here as well. The reader converts the bit value to a corresponding raw bit value and buffers the value for the associated raw bit (508). In particular, if the message has been spread spectrum modulated, then the reader performs an inverse of the modulation operation to recover a candidate value for a corresponding raw bit and buffers the candidate value. In this reading process, the reader uses the assignment map to map the extracted candidate value to its corresponding raw bit position.
Next, the reader compiles the candidate values for each raw bit to compute a final value for each raw bit position (510). It compiles the candidates for the raw bits extracted from each of the tows. For a given raw bit, if more candidates are a one, then the final value is set to a one (and vice versa if more candidates are a zero). Finally, it performs error correction decoding to reconstruct the original message (512).
To extend to reading in the other dimension, one may use a similar approach. One could either embed the same bit at identical locations in both directions, or embed directionally dependent information. In the former case, the reader can achieve a more accurate message recovery by combining candidates from both rows and columns. In the latter, potentially more information would be embedded. 4.0 Embedding Multiple Watermarks
The self-orienting watermark described above may be embedded along with other watermarks into a host signal. For example, an FSK watermark may be combined with a spatial domain watermark, or other type of watermark inserted in another transform domain (e.g., wavelet, Discrete Cosine Transform, Discrete Fourier Transform domains). In such multi-watermark schemes, the self-orienting watermark may be used to establish orientation of other watermarks in the host signal. Before reading another watermark, the detector can mitigate the impact of interference due to the self-orienting watermark. For an FSK watermark, for example, the detector could apply a band-stop filter at the FSK signaling frequencies. This filtering operation would mitigate the interference due to the FSK signal when attempting to read other watermark messages. 5.0 Applications
There are many applications for self-orienting watermarks. The watermarks may carry data, machine instructions, and/or links to other data or instructions. The link may be implemented as an address or reference to a database or other resource located on the same device as the detector or on a remote device (e.g., a computer on the Internet). Whether stored within the message, or linked by the message, the data and/or machine instructions may be used to authenticate the host signal, monitor the host signal (e.g., broadcast monitoring), identify its owner, control copying of the host signal, provide additional information related to the host signal, etc.
6.0 Operating Environment for Computer Implementations
Figure 9 illustrates an example of a computer system that serves as an operating environment for software implementations of the watermarking systems described above. The embedder and detector implementations are implemented in C/C++ and are portable to many different computer systems. Fig. 9 generally depicts one such system.
The computer system shown in Fig. 9 includes a computer 1220, including a processing unit 1221, a system memory 1222, and a system bus 1223 that interconnects various system components including the system memory to the processing unit 1221.
The system bus may comprise any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using a bus architecture such as PCI, VESA, MicroChannel (MCA), ISA and EISA, to name a few.
The system memory includes read only memory (ROM) 1224 and random access memory (RAM) 1225. A basic input/output system 1226 (BIOS), containing the basic routines that help to transfer information between elements within the computer 1220, such as during start-up, is stored in ROM 1224.
The computer 1220 further includes a hard disk drive 1227, a magnetic disk drive 1228, e.g., to read from or write to a removable disk 1229, and an optical disk drive 1230, e.g., for reading a CD-ROM or DVD disk 1231 or to read from or write to other optical media. The hard disk drive 1227, magnetic disk drive 1228, and optical disk drive 1230 are connected to the system bus 1223 by a hard disk drive interface 1232, a magnetic disk drive interface 1233, and an optical drive interface 1234, respectively. The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions (program code such as dynamic link libraries, and executable files), etc. for the computer 1220.
Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and an optical disk, it can also include other types of media that are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks, and the like.
A number of program modules may be stored in the drives and RAM 1225, including an operating system 1235, one or more application programs 1236, other program modules 1237, and program data 1238.
A user may enter commands and information into the personal computer 1220 through a keyboard 1240 and pointing device, such as a mouse 1242. Other input devices may include a microphone, sound card, radio or television tuner, joystick, game pad, satellite dish, digital camera, scanner, or the like. A digital camera or scanner 43 may be used to capture the target image for the detection process described above. The camera and scanner are each connected to the computer via a standard interface 44. Currently, there are digital cameras designed to interface with a Universal Serial Bus (USB), Peripheral Component Interconnect (PCI), and parallel port interface. Two emerging standard peripheral interfaces for cameras include USB2 and 1394 (also known as firewire and iLink).
In addition to a camera or scanner, watermarked images or video may be provided from other sources, such as a packaged media devices (e.g., CD, DVD, flash memory, etc), streaming media from a network connection, television tuner, etc. Similarly, watermarked audio may be provided from packaged devices, streaming media, radio tuner, etc.
These and other input devices are often connected to the processing unit 1221 through a port interface 1246 that is coupled to the system bus, either directly or indirectly. Examples of such interfaces include a serial port, parallel port, game port or universal serial bus (USB). A monitor 1247 or other type of display device is also connected to the system bus 1223 via an interface, such as a video adapter 1248. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The computer 1220 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 1249. The remote computer 1249 may be a server, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 1220, although only a memory storage device 1250 has been illustrated in Figure 9. The logical connections depicted in Figure 9 include a local area network (LAN) 1251 and a wide area network (WAN) 1252. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet. When used in a LAN networking environment, the computer 1220 is connected to the local network 1251 through a network interface or adapter 1253. When used in a WAN networking environment, the personal computer 1220 typically includes a modem 1254 or other means for establishing communications over the wide area network 1252, such as the Internet. The modem 1254, which may be internal or external, is connected to the system bus 1223 via the serial port interface 1246.
In a networked environment, program modules depicted relative to the personal computer 1220, or portions of them, may be stored in the remote memory storage device. The processes detailed above can be implemented in a distributed fashion, and as parallel processes. It will be appreciated that the network connections shown are exemplary and that other means of establishing a communications link between the computers may be used.
7.0 Concluding Remarks The watermarking technology detailed herein can be employed in numerous diverse applications. See, e.g., the applications for watermarking detailed in commonly-owned patent 5,862,260, and copending applications 09/292,569, 60/134,782, 09/343,104, 09/473,396, 09/476,686, and 60/141,763.
Having described and illustrated the principles of the invention with reference to a specific embodiment, it will be recognized that the principles thereof can be implemented in other, different, forms. The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by-reference patents/applications are also contemplated.
In view of the wide variety of embodiments to which the principles of the invention can be applied, it should be recognized that the detailed embodiment is illustrative only and should not be taken as limiting the scope of the invention. Rather, I claim as my invention all such embodiments as may come within the scope and spirit of the following claims, and equivalents thereto.

Claims

I claim:
1. A storage media comprising: a self-orienting watermark signal that carries a message and has attributes that provide an orientation of the watermark signal in a host signal.
2. The storage media of claim 1 wherein the self-orienting watermark signal comprises an FSK signal.
3. The storage media of claim 2 wherein the message is converted to the FSK signal.
4. The storage media of claim 3 wherein the host signal is an audio signal.
5. The storage media of claim 3 wherein the host signal is an image.
6. The storage media of claim 3 wherein the FSK signal is combined with the host signal in the spatial domain.
7. The storage media of claim 6 wherein the FSK signal is added to the image.
8. The storage media of claim 5 wherein the FSK signal is redundantly encoded in different parts of the image.
9. The storage media of claim 8 wherein the FSK signal is redundantly encoded in rows or columns of the image.
10. The storage media of claim 5 wherein different messages are encoded in FSK signals, which are located in different parts of the image.
11. The storage media of claim 10 wherein different messages are encoded in the rows and columns of the image.
12. A method of embedding a self orienting watermark in a host signal comprising: converting a message into a watermark signal having an attribute that orients the watermark in the host signal; and applying the watermark signal to the host signal.
13. The method of claim 12 including: converting the message to an FSK signal and the attribute is set of two or more FSK signaling frequencies of the FSK signal.
14. The method of claim 13 wherein a message is encoded by converting symbols of the message into signals at selected FSK signaling frequencies.
15. The method of claim 14 wherein the symbols are binary numbers.
16. The method of claim 12 wherein the host signal is an image.
17. The method of claim 16 including: converting the message to an FSK signal and the attribute is set of two or more signaling frequencies.
18. The method of claim 17 wherein the FSK signal comprises a one dimensional signal that varies over a spatial dimension and is applied to the image in the spatial domain.
19. The method of claim 17 wherein the FSK signal is redundantly encoded in different parts of the image.
20. The method of claim 17 wherein the watermark has two or more FSK signal components, each carrying a different message.
21. The method of claim 12 wherein the host signal is an audio signal.
22. The method of claim 21 wherein the message is converted to an FSK signal and is applied to the audio signal.
23. The method of claim 22 wherein the message is comprised of two or more symbols, and the symbols are converted to signals at selected FSK signaling frequencies.
24. The method of claim 22 wherein the FSK signal is applied to the host signal in the temporal domain.
25. The method of claim 12 wherein the message is converted to an FSK signal and the attribute is an FSK signaling frequency.
26 The method of claim 25 wherein the signaling frequency facilitates detection of the scale of the watermark in the host signal.
27. The method of claim 25 wherein the signaling frequency facilitates detection of the rotation angle of the watermark in the host signal.
28. The method of claim 25 wherein the FSK signal has two or more components, each with a phase offset that facilitates detection of the position of the watermark in the host signal.
29. The method of claim 25 wherein the FSK signal has two or more components, each with a selected set of signaling frequencies, the components being arranged in the host signal so that the sets of signaling frequencies facilitate detection of the position of the watermark in the host signal.
30. The method of claim 25 wherein the message includes a known message that facilitates detection of the watermark in the host signal.
31. A computer readable medium on whish is stored software for executing the method of claim 12.
32. A method of decoding a self orienting watermark in a host signal comprising: using an attribute of the watermark to determine orientation of the watermark in a host signal, the attribute being used to determine orientation and to carry a message.
33. The method of claim 32 including: reading a message encoded in the watermark.
34. The method of claim 32 wherein the watermark comprises an FSK signal wherein the message is encoded by converting symbols to selected FSK signaling frequencies.
35. The method of claim 34 wherein the attribute is a signaling frequency.
36. The method of claim 35 wherein the signaling frequency facilitates detection of scale of the watermark in the host signal.
37. The method of claim 35 wherein the signaling frequency facilitates detection of rotation angle of the watermark in the host signal.
38. The method of claim 34 wherein the watermark has two or more components, each having a phase offset; and using the phase offset to determine position of the message in the host signal.
39. The method of claim 34 wherein the watermark has two or more components, each having a set of FSK signaling frequencies; and using the signaling frequencies to determine position of the message in the host signal.
40. The method of claim 34 wherein the watermark includes a known message, and using the known message to identify position of the watermark in the host message.
41. The method of claim 32 wherein the host signal is an image signal.
42. The method of claim 32 wherein the host signal is an audio signal.
PCT/US2001/003138 2000-02-10 2001-01-31 Self-orienting watermarking method embedding frequency shift keying WO2001059689A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001234680A AU2001234680A1 (en) 2000-02-10 2001-01-31 Self-orienting watermarks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/502,543 US6625297B1 (en) 2000-02-10 2000-02-10 Self-orienting watermarks
US09/502,543 2000-02-10

Publications (2)

Publication Number Publication Date
WO2001059689A1 true WO2001059689A1 (en) 2001-08-16
WO2001059689A8 WO2001059689A8 (en) 2001-09-20

Family

ID=23998286

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/003138 WO2001059689A1 (en) 2000-02-10 2001-01-31 Self-orienting watermarking method embedding frequency shift keying

Country Status (3)

Country Link
US (2) US6625297B1 (en)
AU (1) AU2001234680A1 (en)
WO (1) WO2001059689A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2834854A1 (en) * 2002-01-11 2003-07-18 Thales Sa METHOD AND SYSTEM FOR TATTOO DECODING
EP1509873A1 (en) * 2002-06-05 2005-03-02 Sony Electronics Inc. Method and apparatus to detect watermark that are resistant to resizing, rotation and translation
US7602936B2 (en) 2001-03-08 2009-10-13 Sony Corporation Method to make wavelet watermarks resistant to affine transformations
CN110290126A (en) * 2019-06-19 2019-09-27 华中科技大学 A kind of radio frequency watermark transmission method based on fsk signal modulation

Families Citing this family (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6229924B1 (en) * 1996-05-16 2001-05-08 Digimarc Corporation Method and apparatus for watermarking video images
US6912315B1 (en) * 1998-05-28 2005-06-28 Verance Corporation Pre-processed information embedding system
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6625297B1 (en) * 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US7346184B1 (en) 2000-05-02 2008-03-18 Digimarc Corporation Processing methods combining multiple frames of image data
US7061510B2 (en) 2001-03-05 2006-06-13 Digimarc Corporation Geo-referencing of aerial imagery using embedded image identifiers and cross-referenced data sets
US7197160B2 (en) 2001-03-05 2007-03-27 Digimarc Corporation Geographic information systems using digital watermarks
US7249257B2 (en) 2001-03-05 2007-07-24 Digimarc Corporation Digitally watermarked maps and signs and related navigational tools
US9363409B2 (en) 2001-03-05 2016-06-07 Digimarc Corporation Image management system and methods using digital watermarks
US7254249B2 (en) * 2001-03-05 2007-08-07 Digimarc Corporation Embedding location data in video
US7042470B2 (en) 2001-03-05 2006-05-09 Digimarc Corporation Using embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms
US6950519B2 (en) 2001-03-05 2005-09-27 Digimarc Corporation Geographically watermarked imagery and methods
FR2822565B1 (en) * 2001-03-23 2004-09-10 Schlumberger Systems & Service SECURE ELECTRONIC COMPONENT
US8457346B2 (en) 2001-04-24 2013-06-04 Digimarc Corporation Digital watermarking image signals on-chip
US6996248B2 (en) * 2001-06-13 2006-02-07 Qualcomm, Incorporated Apparatus and method for watermarking a digital image
US20080036886A1 (en) * 2001-06-29 2008-02-14 Hannigan Brett T Methods For Generating Enhanced Digital Images
US7218751B2 (en) * 2001-06-29 2007-05-15 Digimarc Corporation Generating super resolution digital images
BR0205803A (en) * 2001-07-27 2003-07-22 Koninkl Philips Electronics Nv Methods and systems for integrating and detecting auxiliary data in an information signal, recording and / or reproducing devices and for transmitting an information signal, information signal and storage medium
JP2003169205A (en) * 2001-11-30 2003-06-13 Toshiba Corp Method and apparatus for embedding digital watermark, and method and apparatus for detecting digital watermark
US6873744B2 (en) * 2002-04-17 2005-03-29 Regents Of The University Of Minnesota Image restoration from transformed component data
US7567721B2 (en) * 2002-01-22 2009-07-28 Digimarc Corporation Digital watermarking of low bit rate video
US7076659B2 (en) * 2002-02-25 2006-07-11 Matsushita Electric Industrial Co., Ltd. Enhanced method for digital data hiding
US6782116B1 (en) * 2002-11-04 2004-08-24 Mediasec Technologies, Gmbh Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation
US9349411B2 (en) * 2002-07-16 2016-05-24 Digimarc Corporation Digital watermarking and fingerprinting applications for copy protection
US7577841B2 (en) 2002-08-15 2009-08-18 Digimarc Corporation Watermark placement in watermarking of time varying media signals
EP2442566A3 (en) 2002-10-15 2012-08-08 Verance Corporation Media Monitoring, Management and Information System
US7590293B2 (en) * 2003-05-05 2009-09-15 Regents Of The University Of Minnesota Non-iterative method to restore image from transformed component data
US8301893B2 (en) * 2003-08-13 2012-10-30 Digimarc Corporation Detecting media areas likely of hosting watermarks
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
JP2009516457A (en) * 2005-11-17 2009-04-16 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Perceptual masking for secure watermark embedding
TWI288892B (en) * 2005-12-28 2007-10-21 Inst Information Industry Content protection method for vector graph format
US7656556B2 (en) * 2007-02-28 2010-02-02 Xerox Corporation Detection of a differential gloss region in a cluster-screen halftone image using filters each having a different polarization
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US10943030B2 (en) * 2008-12-15 2021-03-09 Ibailbonding.Com Securable independent electronic document
US9749607B2 (en) 2009-07-16 2017-08-29 Digimarc Corporation Coordinated illumination and image signal capture for enhanced signal detection
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
US8382486B2 (en) 2010-12-22 2013-02-26 Research In Motion Limited Self-orienting electrical connector
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9317872B2 (en) 2013-02-06 2016-04-19 Muzak Llc Encoding and decoding an audio watermark using key sequences comprising of more than two frequency components
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9635378B2 (en) 2015-03-20 2017-04-25 Digimarc Corporation Sparse modulation for robust signaling and synchronization
US10424038B2 (en) 2015-03-20 2019-09-24 Digimarc Corporation Signal encoding outside of guard band region surrounding text characters, including varying encoding strength
EP3117626A4 (en) 2014-03-13 2017-10-25 Verance Corporation Interactive content acquisition using embedded codes
US9712714B2 (en) 2014-04-30 2017-07-18 Wal-Mart Stores, Inc. Digital watermark feature for device to device duplication of a digital receipt
US9716807B2 (en) 2014-10-13 2017-07-25 Digimarc Corporation Methods for estimating watermark signal strength, an embedding process using the same, and related arrangements
US9747656B2 (en) 2015-01-22 2017-08-29 Digimarc Corporation Differential modulation for robust signaling and synchronization
US9892301B1 (en) 2015-03-05 2018-02-13 Digimarc Corporation Localization of machine-readable indicia in digital capture systems
US9892478B2 (en) 2015-03-06 2018-02-13 Digimarc Corporation Digital watermarking applications
CN107615330B (en) 2015-03-20 2021-07-27 数字标记公司 Sparse modulation for robust signaling and synchronization
US10783601B1 (en) 2015-03-20 2020-09-22 Digimarc Corporation Digital watermarking and signal encoding with activable compositions
US9754341B2 (en) 2015-03-20 2017-09-05 Digimarc Corporation Digital watermarking and data hiding with narrow-band absorption materials
US10198648B1 (en) 2015-04-10 2019-02-05 Digimarc Corporation Decoding 1D-barcodes in digital capture systems
US10217182B1 (en) 2015-10-29 2019-02-26 Digimarc Corporation Construction of signal maps for images with encoded signals
US10594689B1 (en) 2015-12-04 2020-03-17 Digimarc Corporation Robust encoding of machine readable information in host objects and biometrics, and associated decoding and authentication
US10262176B1 (en) 2016-02-23 2019-04-16 Digimarc Corporation Scanner with control logic for resolving package labeling
US10686963B1 (en) 2016-05-20 2020-06-16 Digimarc Corporation Encoding and decoding digital signals in conductive ink structures
US10515429B2 (en) 2016-07-01 2019-12-24 Digimarc Corporation Image-based pose determination
US10445849B1 (en) 2016-08-15 2019-10-15 Digimarc Corporation Signal encoding based on spectral requirements
US10580103B1 (en) 2016-08-15 2020-03-03 Digimarc Corporation Signal encoding for difficult environments
US10255649B2 (en) 2016-08-15 2019-04-09 Digimarc Corporation Signal encoding for difficult environments
US10304149B2 (en) 2016-08-15 2019-05-28 Digimarc Corporation Signal encoding for difficult environments
US10198782B1 (en) 2016-09-15 2019-02-05 Digimarc Corporation Detecting conflicts between multiple different encoded signals within imagery
US10853903B1 (en) 2016-09-26 2020-12-01 Digimarc Corporation Detection of encoded signals and icons
US10803272B1 (en) 2016-09-26 2020-10-13 Digimarc Corporation Detection of encoded signals and icons
US10783602B1 (en) 2017-02-24 2020-09-22 Digimarc Corporation Signal encoding for inks with low reflectivity
US11257198B1 (en) 2017-04-28 2022-02-22 Digimarc Corporation Detection of encoded signals and icons
US10986245B2 (en) 2017-06-16 2021-04-20 Digimarc Corporation Encoded signal systems and methods to ensure minimal robustness
US10506128B1 (en) 2017-06-16 2019-12-10 Digimarc Corporation Encoded signal systems and methods to ensure minimal robustness
US10872392B2 (en) 2017-11-07 2020-12-22 Digimarc Corporation Generating artistic designs encoded with robust, machine-readable data
US11062108B2 (en) 2017-11-07 2021-07-13 Digimarc Corporation Generating and reading optical codes with variable density to adapt for visual quality and reliability
US10896307B2 (en) 2017-11-07 2021-01-19 Digimarc Corporation Generating and reading optical codes with variable density to adapt for visual quality and reliability
US20190213705A1 (en) 2017-12-08 2019-07-11 Digimarc Corporation Artwork generated to convey digital messages, and methods/apparatuses for generating such artwork
US10958807B1 (en) 2018-02-08 2021-03-23 Digimarc Corporation Methods and arrangements for configuring retail scanning systems
EP3743881B1 (en) 2018-02-25 2021-07-14 Digimarc Corporation Generating and reading optical codes with variable density to adapt for visual quality and reliability
US10880451B2 (en) 2018-06-08 2020-12-29 Digimarc Corporation Aggregating detectability metrics to determine signal robustness
US10748232B2 (en) 2018-06-08 2020-08-18 Digimarc Corporation Generating signal bearing art using stipple, voronoi and delaunay methods and reading same
WO2019246132A1 (en) 2018-06-18 2019-12-26 Digimarc Corporation Methods and arrangements for reconciling data from disparate data carriers
US10559052B1 (en) 2018-08-02 2020-02-11 Digimarc Corporation Signal encoding for physical objects including dark ink
WO2020055397A1 (en) 2018-09-12 2020-03-19 Digimarc Corporation Generating artistic designs encoded with robust, machine-readable data
US11055805B1 (en) 2018-11-09 2021-07-06 Digimarc Corporation Utilizing dependency between watermark visibility and location of image sample in color space for embedded signal color direction
US11250535B1 (en) 2019-02-08 2022-02-15 Digimarc Corporation Detecting conflicts between multiple different encoded signals within imagery, using only a subset of available image data, and robustness checks
US10789438B1 (en) 2019-02-08 2020-09-29 Digimarc Corporation Detecting conflicts between multiple different encoded signals within imagery, using only a subset of available image data
US11070701B2 (en) 2019-10-11 2021-07-20 Digimarc Corporation Color managed embedding system for embedding signals in color artwork
US11233918B1 (en) 2019-10-11 2022-01-25 Digimarc Corporation PDF embedder for artwork elements with PDF files
US11188996B2 (en) 2019-10-11 2021-11-30 Digimarc Corporation Color managed embedding system for embedding signals in color artwork
EP4042667A1 (en) 2019-10-11 2022-08-17 Digimarc Corporation Color managed embedding system for embedding signals in color artwork
US11922532B2 (en) 2020-01-15 2024-03-05 Digimarc Corporation System for mitigating the problem of deepfake media content using watermarking
US11694047B2 (en) 2020-07-31 2023-07-04 Digimarc Corporation Encoding signals on flexographic printing plates to enable tracking and management
US11643253B1 (en) 2020-12-15 2023-05-09 Digimarc Corporation Signal encoding for aluminum alloy containers
US11665302B1 (en) 2020-12-15 2023-05-30 Digimarc Corporation Signal encoding for aluminum alloy containers

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778102A (en) * 1995-05-17 1998-07-07 The Regents Of The University Of California, Office Of Technology Transfer Compression embedding
US5809139A (en) * 1996-09-13 1998-09-15 Vivo Software, Inc. Watermarking method and apparatus for compressed digital video
US5901178A (en) * 1996-02-26 1999-05-04 Solana Technology Development Corporation Post-compression hidden data transport for video
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US5944608A (en) * 1991-05-28 1999-08-31 Tci Technology, Inc. Computer software delivery system
US6005605A (en) * 1995-03-17 1999-12-21 Bell Atlantic Network Services, Inc. Television distribution system and method
US6008737A (en) * 1995-05-30 1999-12-28 Motorola, Inc. Apparatus for controlling utilization of software added to a portable communication device

Family Cites Families (360)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE1260295B (en) 1964-12-04 1968-02-01 Agfa Gevaert Ag Method and apparatus for making copies
US3493674A (en) 1965-05-28 1970-02-03 Rca Corp Television message system for transmitting auxiliary information during the vertical blanking interval of each television field
US3585290A (en) 1968-01-29 1971-06-15 Rca Corp Coding arrangements for multiplexed messages
US4231113A (en) 1968-03-11 1980-10-28 International Business Machines Corporation Anti-jam communications system
US3569619A (en) 1968-06-27 1971-03-09 Luther G Simjian Verification system using coded identifying and storage means
US3845391A (en) * 1969-07-08 1974-10-29 Audicom Corp Communication including submerged identification signal
US3655162A (en) 1970-10-08 1972-04-11 Symons Corp Self-contained waler clamp assembly for concrete wall form
US4944036A (en) 1970-12-28 1990-07-24 Hyatt Gilbert P Signature filter system
US3703628A (en) 1971-03-29 1972-11-21 Recognition Equipment Inc System for document coding and identification
US3971917A (en) 1971-08-27 1976-07-27 Maddox James A Labels and label readers
JPS4953817A (en) 1972-09-25 1974-05-25
US3809806A (en) 1972-10-18 1974-05-07 Columbia Broadcasting Syst Inc Banding correction system for film recording apparatus
US3838444A (en) 1972-10-30 1974-09-24 Hazeltine Research Inc System for transmitting auxiliary information in low energy density portion of color tv spectrum
GB1467240A (en) 1973-09-04 1977-03-16 Gen Electric Co Ltd Television systems
GB1488483A (en) * 1973-10-23 1977-10-12 Emi Ltd Credit cards and other security documents
US3914877A (en) 1974-04-08 1975-10-28 Marion E Hines Image scrambling technique
US4186944A (en) * 1974-04-17 1980-02-05 Emi Limited Security document
GB1519142A (en) * 1974-07-04 1978-07-26 Emi Ltd Detection of magnetic patterns
US3984624A (en) 1974-07-25 1976-10-05 Weston Instruments, Inc. Video system for conveying digital and analog information
US3977785A (en) 1975-01-06 1976-08-31 Xerox Corporation Method and apparatus for inhibiting the operation of a copying machine
US4184700A (en) 1975-11-17 1980-01-22 Lgz Landis & Gyr Zug Ag Documents embossed with optical markings representing genuineness information
US4025851A (en) 1975-11-28 1977-05-24 A.C. Nielsen Company Automatic monitor for programs broadcast
US4081831A (en) * 1976-04-08 1978-03-28 Twin County Trans-Video, Inc. High security subscription television system employing real time control of subscriber's program reception
NL7702019A (en) 1977-02-25 1978-08-29 Philips Nv RADIO BROADCASTING SYSTEM WITH TRANSMITTER CHARACTERIZATION.
US4297729A (en) 1977-11-24 1981-10-27 Emi Limited Encoding and decoding of digital recordings
DE2757171C3 (en) 1977-12-22 1980-07-10 Standard Elektrik Lorenz Ag, 7000 Stuttgart Method and arrangement for the transmission of two different pieces of information in a single transmission channel with a given bandwidth on a carrier wave
US4225967A (en) 1978-01-09 1980-09-30 Fujitsu Limited Broadcast acknowledgement method and system
US4262329A (en) 1978-03-27 1981-04-14 Computation Planning, Inc. Security system for data processing
US4379947A (en) 1979-02-02 1983-04-12 Teleprompter Corporation System for transmitting data simultaneously with audio
GB2047402B (en) 1979-03-06 1983-03-09 De La Rue Thomas & Co Ltd Watermark detection
US4230990C1 (en) 1979-03-16 2002-04-09 John G Lert Jr Broadcast program identification method and system
GB2063018B (en) 1979-10-08 1984-03-28 Gen Electric Co Ltd Telecommunication systems
GB2067871A (en) 1980-01-19 1981-07-30 Marconi Co Ltd Information Encoding Systems
US4313197A (en) 1980-04-09 1982-01-26 Bell Telephone Laboratories, Incorporated Spread spectrum arrangement for (de)multiplexing speech signals and nonspeech signals
US4476468A (en) 1981-06-22 1984-10-09 Light Signatures, Inc. Secure transaction card and verification system
CA1160749A (en) 1980-06-23 1984-01-17 Robert N. Goldman Non-counterfeitable document system
CA1183950A (en) 1980-09-26 1985-03-12 Bo Lofberg Method for processing an information signal and means for carrying out the method
US4389671A (en) 1980-09-29 1983-06-21 Harris Corporation Digitally-controlled analog encrypton
US4395600A (en) 1980-11-26 1983-07-26 Lundy Rene R Auditory subliminal message system and method
US4416001A (en) 1980-11-26 1983-11-15 News Log International, Inc. Method and apparatus for optically reading digital data inscribed in an arcuate pattern on a data carrier
US4367488A (en) 1980-12-08 1983-01-04 Sterling Television Presentations Inc. Video Data Systems Division Data encoding for television
US4380027A (en) 1980-12-08 1983-04-12 William Leventer Data encoding for television
US4420829A (en) * 1981-01-08 1983-12-13 Carlson John E Holographic system for the storage of audio, video and computer data
US4425642A (en) 1982-01-08 1984-01-10 Applied Spectrum Technologies, Inc. Simultaneous transmission of two information signals within a band-limited communications channel
US4665431A (en) 1982-06-24 1987-05-12 Cooper J Carl Apparatus and method for receiving audio signals transmitted as part of a television video signal
US4805020A (en) 1983-03-21 1989-02-14 Greenberg Burton L Television program transmission verification method and apparatus
US4967273A (en) 1983-03-21 1990-10-30 Vidcode, Inc. Television program transmission verification method and apparatus
US4547804A (en) 1983-03-21 1985-10-15 Greenberg Burton L Method and apparatus for the automatic identification and verification of commercial broadcast programs
US4639779A (en) 1983-03-21 1987-01-27 Greenberg Burton L Method and apparatus for the automatic identification and verification of television broadcast programs
US4532508A (en) 1983-04-01 1985-07-30 Siemens Corporate Research & Support, Inc. Personal authentication system
US4908873A (en) 1983-05-13 1990-03-13 Philibert Alex C Document reproduction security system
US4553261A (en) 1983-05-31 1985-11-12 Horst Froessl Document and data handling and retrieval system
SE463897B (en) 1983-07-01 1991-02-04 Esselte Security Syst Ab PROCEDURE PROVIDES TO SAY SIMPLE CODES
US4660221A (en) 1983-07-18 1987-04-21 Pitney Bowes Inc. System for printing encrypted messages with bar-code representation
US4637051A (en) 1983-07-18 1987-01-13 Pitney Bowes Inc. System having a character generator for printing encrypted messages
US4675746A (en) 1983-07-22 1987-06-23 Data Card Corporation System for forming picture, alphanumeric and micrographic images on the surface of a plastic card
US4703476A (en) 1983-09-16 1987-10-27 Audicom Corporation Encoding of transmitted program material
US4618257A (en) 1984-01-06 1986-10-21 Standard Change-Makers, Inc. Color-sensitive currency verifier
CA1226914A (en) 1984-01-26 1987-09-15 The University Of British Columbia Modem for pseudo noise communication on a.c. lines
JPS60171475A (en) 1984-02-15 1985-09-04 アイデンティフィケ−ション・デバイセス・インコ−ポレ−テッド Discriminating system
US4672605A (en) 1984-03-20 1987-06-09 Applied Spectrum Technologies, Inc. Data and voice communications system
JPS61502720A (en) 1984-07-13 1986-11-20 モトロ−ラ・インコ−ポレ−テツド Cell voice and data wireless telephone system
FR2567947B1 (en) 1984-07-23 1986-12-26 Euratom SURFACE TEXTURE READING ACCESS CONTROL SYSTEM
US4663518A (en) 1984-09-04 1987-05-05 Polaroid Corporation Optical storage identification card and read/write system
CN85100700A (en) 1985-04-01 1987-01-31 陆伯祥 Computing machine Moire fringe certificate and recognition system thereof
US4647974A (en) 1985-04-12 1987-03-03 Rca Corporation Station signature system
US4888798A (en) 1985-04-19 1989-12-19 Oms, Inc. Modular software security
US4723149A (en) 1985-05-08 1988-02-02 Kabushiki Kaisha Toshiba Image forming apparatus having a function for checking to copy a secret document
DE3523809A1 (en) 1985-05-21 1986-11-27 Polygram Gmbh, 2000 Hamburg METHOD FOR TIME COMPRESSION OF INFORMATION IN DIGITAL FORM
US5053956A (en) 1985-06-17 1991-10-01 Coats Viyella Interactive system for retail transactions
US4682794A (en) 1985-07-22 1987-07-28 Photon Devices, Ltd. Secure identification card and system
NL8502567A (en) 1985-09-19 1987-04-16 Bekaert Sa Nv METHOD AND APPARATUS FOR VERIFYING ARTICLES FOR OBJECTS AND OBJECTS SUITABLE FOR THE USE OF THIS METHOD
ATE84751T1 (en) 1985-10-15 1993-02-15 Gao Ges Automation Org MEDIA WITH AN OPTICAL MARK OF AUTHENTICATION, METHODS OF MAKING AND VERIFYING THE MEDIA.
US4712103A (en) 1985-12-03 1987-12-08 Motohiro Gotanda Door lock control system
JPH0743825B2 (en) 1985-12-04 1995-05-15 ソニー株式会社 Dubbing method
IL78541A (en) 1986-04-18 1989-09-28 Rotlex Optics Ltd Method and apparatus for encryption of optical images
GB8611014D0 (en) 1986-05-06 1986-06-11 Emi Plc Thorn Signal identification
US4718106A (en) 1986-05-12 1988-01-05 Weinblatt Lee S Survey of radio audience
GB2196167B (en) 1986-10-01 1991-01-02 Emi Plc Thorn Apparatus for marking a recorded signal
US4739377A (en) 1986-10-10 1988-04-19 Eastman Kodak Company Confidential document reproduction method and apparatus
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
IT1213530B (en) 1986-11-05 1989-12-20 Audemars R S A IDENTIFICATION SYSTEM.
US4864618A (en) 1986-11-26 1989-09-05 Wright Technologies, L.P. Automated transaction system with modular printhead having print authentication feature
FR2609228B1 (en) 1986-12-24 1989-12-01 France Etat METHOD OF DIGITAL BROADCASTING IN TELEVISION CHANNELS
US4866771A (en) 1987-01-20 1989-09-12 The Analytic Sciences Corporation Signaling system
US4972475A (en) 1987-02-10 1990-11-20 Veritec Inc. Authenticating pseudo-random code and apparatus
US4903301A (en) 1987-02-27 1990-02-20 Hitachi, Ltd. Method and system for transmitting variable rate speech signal
GB2204984B (en) 1987-04-29 1992-01-02 John Henry Jenkins Secure distance production method for objects covered by intellectual property rights
JPS63275233A (en) 1987-05-06 1988-11-11 Victor Co Of Japan Ltd Spread spectrum communication system
GB2204975B (en) 1987-05-19 1990-11-21 Gen Electric Co Plc Authenticator
EP0298691B1 (en) 1987-07-08 1994-10-05 Matsushita Electric Industrial Co., Ltd. Method and apparatus for protection of signal copy
US4855827A (en) 1987-07-21 1989-08-08 Worlds Of Wonder, Inc. Method of providing identification, other digital data and multiple audio tracks in video systems
US5040059A (en) 1987-08-03 1991-08-13 Vexcel Corporation Method and apparatus of image mensuration with selectively visible and invisible reseau grid marks
DE3827172A1 (en) 1987-08-13 1989-03-16 Peter Elsner MESSAGE IDENTIFICATION DEVICE
JPH01102539A (en) 1987-10-16 1989-04-20 Fuji Photo Film Co Ltd Frame number discriminating method for photographic film
US4807031A (en) 1987-10-20 1989-02-21 Interactive Systems, Incorporated Interactive video method and apparatus
US4811408A (en) 1987-11-13 1989-03-07 Light Signatures, Inc. Image dissecting document verification system
US5075773A (en) 1987-12-07 1991-12-24 British Broadcasting Corporation Data transmission in active picture period
US4811357A (en) 1988-01-04 1989-03-07 Paradyne Corporation Secondary channel for digital modems using spread spectrum subliminal induced modulation
US5394274A (en) 1988-01-22 1995-02-28 Kahn; Leonard R. Anti-copy system utilizing audible and inaudible protection signals
US4885632A (en) 1988-02-29 1989-12-05 Agb Television Research System and methods for monitoring TV viewing system including a VCR and/or a cable converter
DE3806411C2 (en) 1988-02-29 1996-05-30 Thomson Brandt Gmbh Method of transmitting a sound signal and an additional signal
US5235619A (en) * 1990-03-20 1993-08-10 Scientific-Atlanta, Inc. Cable television radio frequency subscriber data transmission apparatus and rf return method
US4879747A (en) 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US4874936A (en) 1988-04-08 1989-10-17 United Parcel Service Of America, Inc. Hexagonal, information encoding article, process and system
GB8809346D0 (en) 1988-04-20 1988-05-25 Emi Plc Thorn Improvements relating to marked recorded signals
GB8809347D0 (en) 1988-04-20 1988-05-25 Emi Plc Thorn Apparatus for marking recorded signal
US5321470A (en) 1988-05-13 1994-06-14 Canon Kabushiki Kaisha Apparatus with anti-forgery provision
US4920503A (en) 1988-05-27 1990-04-24 Pc Connection, Inc. Computer remote control through a video signal
US4945412A (en) * 1988-06-14 1990-07-31 Kramer Robert A Method of and system for identification and verification of broadcasting television and radio program segments
US5213337A (en) 1988-07-06 1993-05-25 Robert Sherman System for communication using a broadcast audio signal
GB2220824A (en) * 1988-07-13 1990-01-17 Philips Electronic Associated Transmission system for sending two signals simultaneously on the same communications channel
US4947028A (en) 1988-07-19 1990-08-07 Arbor International, Inc. Automated order and payment system
US5144660A (en) 1988-08-31 1992-09-01 Rose Anthony M Securing a computer against undesired write operations to or read operations from a mass storage device
JPH069348B2 (en) 1988-09-16 1994-02-02 日本ビクター株式会社 Spread spectrum communication system
NL8802291A (en) 1988-09-16 1990-04-17 Koninkl Philips Electronics Nv DEVICE FOR TRANSMITTING DATA WORDS WHICH REPRESENT A DIGITIZED ANALOGUE SIGNAL AND A DEVICE FOR RECEIVING THE TRANSMITTED DATA WORDS.
US4969041A (en) 1988-09-23 1990-11-06 Dubner Computer Systems, Inc. Embedment of data in a video signal
US5023907A (en) 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1990003706A1 (en) 1988-09-30 1990-04-05 Right Hemisphere Pty. Limited Television programme distribution system
US4939515A (en) 1988-09-30 1990-07-03 General Electric Company Digital signal encoding and decoding apparatus
US4908836A (en) 1988-10-11 1990-03-13 Unisys Corporation Method and apparatus for decoding multiple bit sequences that are transmitted simultaneously in a single channel
GB8824969D0 (en) 1988-10-25 1988-11-30 Emi Plc Thorn Identification codes
NL8901032A (en) 1988-11-10 1990-06-01 Philips Nv CODER FOR INCLUDING ADDITIONAL INFORMATION IN A DIGITAL AUDIO SIGNAL WITH A PREFERRED FORMAT, A DECODER FOR DERIVING THIS ADDITIONAL INFORMATION FROM THIS DIGITAL SIGNAL, AN APPARATUS FOR RECORDING A DIGITAL SIGNAL ON A CODE OF RECORD. OBTAINED A RECORD CARRIER WITH THIS DEVICE.
JP2793658B2 (en) 1988-12-28 1998-09-03 沖電気工業株式会社 Automatic screening device
US5034982A (en) 1989-01-03 1991-07-23 Dittler Brothers, Inc. Lenticular security screen production method
US5010405A (en) 1989-02-02 1991-04-23 Massachusetts Institute Of Technology Receiver-compatible enhanced definition television system
SG102585A1 (en) 1989-02-10 2004-03-26 Canon Kk Apparatus for image reading or processing
US5245329A (en) 1989-02-27 1993-09-14 Security People Inc. Access control system with mechanical keys which store data
US4943973A (en) 1989-03-31 1990-07-24 At&T Company Spread-spectrum identification signal for communications system
US4972476A (en) 1989-05-11 1990-11-20 Nathans Robert L Counterfeit proof ID card having a scrambled facial image
US5185736A (en) 1989-05-12 1993-02-09 Alcatel Na Network Systems Corp. Synchronous optical transmission system
US4972471A (en) * 1989-05-15 1990-11-20 Gary Gross Encoding system
US5036513A (en) 1989-06-21 1991-07-30 Academy Of Applied Science Method of and apparatus for integrated voice (audio) communication simultaneously with "under voice" user-transparent digital data between telephone instruments
US5319453A (en) 1989-06-22 1994-06-07 Airtrax Method and apparatus for video signal encoding, decoding and monitoring
US5063446A (en) 1989-08-11 1991-11-05 General Electric Company Apparatus for transmitting auxiliary signal in a TV channel
US5212551A (en) 1989-10-16 1993-05-18 Conanan Virgilio D Method and apparatus for adaptively superimposing bursts of texts over audio signals and decoder thereof
NL8902818A (en) 1989-11-15 1991-06-03 Nedap Nv AUTOMATED CHECKOUT SYSTEM.
US4996530A (en) 1989-11-27 1991-02-26 Hewlett-Packard Company Statistically based continuous autocalibration method and apparatus
DE69028185T2 (en) 1989-12-15 1997-02-20 Toshiba Kawasaki Kk System for recording an image with an image of the face and with identification information
US5003590A (en) 1989-12-18 1991-03-26 Eidak Corporation Encoding an optical video disc to inhibit video tape recording
US5113445A (en) 1990-07-09 1992-05-12 Symbol Technologies Inc. System for encoding data in machine readable graphic form
US5337361C1 (en) * 1990-01-05 2001-05-15 Symbol Technologies Inc Record with encoded data
EP0513156B1 (en) 1990-01-31 1996-05-29 Thomas De La Rue Limited Image handling
US5062666A (en) 1990-02-01 1991-11-05 The Standard Register Company Financial instrument and method of making
DE4002979A1 (en) 1990-02-01 1991-08-08 Gao Ges Automation Org Banknote with optically variable security elements - are transformed and pressed onto smooth surface to form hologram or relief pattern
US5790697A (en) 1990-02-05 1998-08-04 Cummins-Allion Corp. Method and apparatus for discriminating and counting documents
US5790693A (en) 1990-02-05 1998-08-04 Cummins-Allison Corp. Currency discriminator and authenticator
US5905810A (en) 1990-02-05 1999-05-18 Cummins-Allison Corp. Automatic currency processing system
US5253078A (en) 1990-03-14 1993-10-12 C-Cube Microsystems, Inc. System for compression and decompression of video data using discrete cosine transform and coding techniques
US5319724A (en) 1990-04-19 1994-06-07 Ricoh Corporation Apparatus and method for compressing still images
NL9001368A (en) 1990-06-15 1992-01-02 Tel Developments B V SECURITY OF OBJECTS OR DOCUMENTS.
US5103459B1 (en) * 1990-06-25 1999-07-06 Qualcomm Inc System and method for generating signal waveforms in a cdma cellular telephone system
US5027401A (en) 1990-07-03 1991-06-25 Soltesz John A System for the secure storage and transmission of data
US5128525A (en) 1990-07-31 1992-07-07 Xerox Corporation Convolution filtering for decoding self-clocking glyph shape codes
US5168147A (en) 1990-07-31 1992-12-01 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
US5091966A (en) 1990-07-31 1992-02-25 Xerox Corporation Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes
US5148498A (en) 1990-08-01 1992-09-15 Aware, Inc. Image coding apparatus and method utilizing separable transformations
US5396559A (en) 1990-08-24 1995-03-07 Mcgrew; Stephen P. Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns
US5905248A (en) 1990-09-11 1999-05-18 Metrologic Instruments, Inc. System and method for carrying out information-related transactions using web documents embodying transaction enabling applets automatically launched and executed in response to reading URL-encoded symbols pointing thereto
US5869819A (en) 1994-08-17 1999-02-09 Metrologic Instuments Inc. Internet-based system and method for tracking objects bearing URL-encoded bar code symbols
US5963916A (en) 1990-09-13 1999-10-05 Intouch Group, Inc. Network apparatus and method for preview of music products and compilation of market data
US5077608A (en) 1990-09-19 1991-12-31 Dubner Computer Systems, Inc. Video effects system able to intersect a 3-D image with a 2-D image
US5077795A (en) 1990-09-28 1991-12-31 Xerox Corporation Security system for electronic printing systems
US5305400A (en) 1990-12-05 1994-04-19 Deutsche Itt Industries Gmbh Method of encoding and decoding the video data of an image sequence
US5228056A (en) 1990-12-14 1993-07-13 Interdigital Technology Corporation Synchronous spread-spectrum communications system and method
NL192610C (en) 1990-12-13 1997-11-04 Enschede & Zonen Grafisch Image carrier and method for printing an image on an image carrier.
US5315098A (en) 1990-12-27 1994-05-24 Xerox Corporation Methods and means for embedding machine readable digital data in halftone images
CA2063785C (en) 1991-03-25 1998-09-29 Masahiro Funada Image processing apparatus
US5200822A (en) 1991-04-23 1993-04-06 National Broadcasting Company, Inc. Arrangement for and method of processing data, especially for identifying and verifying airing of television broadcast programs
US5408642A (en) 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
AU657510B2 (en) 1991-05-24 1995-03-16 Apple Inc. Improved image encoding/decoding method and apparatus
CA2110182C (en) 1991-05-29 2005-07-05 Keith O. Johnson Electronic signal encoding and decoding
US5327237A (en) 1991-06-14 1994-07-05 Wavephore, Inc. Transmitting data with video
US5559559A (en) 1991-06-14 1996-09-24 Wavephore, Inc. Transmitting a secondary signal with dynamic injection level control
US5617148A (en) 1991-06-14 1997-04-01 Wavephore, Inc. Filter by-pass for transmitting an additional signal with a video signal
US5387941A (en) 1991-06-14 1995-02-07 Wavephore, Inc. Data with video transmitter
JP3084796B2 (en) 1991-06-14 2000-09-04 ソニー株式会社 Video signal processing device
US5288976A (en) 1991-07-15 1994-02-22 Nynex Corporation Bar code use in information, transactional and other system and service applications
US5450122A (en) 1991-11-22 1995-09-12 A.C. Nielsen Company In-station television program encoding and monitoring system and method
JP2554219B2 (en) 1991-11-26 1996-11-13 日本電信電話株式会社 Digital signal superposition transmission method
US5247364A (en) 1991-11-29 1993-09-21 Scientific-Atlanta, Inc. Method and apparatus for tuning data channels in a subscription television system having in-band data transmissions
US5319735A (en) 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling
US5243423A (en) 1991-12-20 1993-09-07 A. C. Nielsen Company Spread spectrum digital data transmission over TV video
US5245165A (en) 1991-12-27 1993-09-14 Xerox Corporation Self-clocking glyph code for encoding dual bit digital values robustly
US6166750A (en) 1992-01-31 2000-12-26 Canon Kabushiki Kaisha Image processing apparatus and method for adding predetermined additional information to an image by adding a predetermined number of unit dots to partial color component data of the image
JP2942837B2 (en) 1992-01-31 1999-08-30 株式会社セガ・エンタープライゼス Security check method, game device, and information storage medium used for them
US5495581A (en) 1992-02-25 1996-02-27 Tsai; Irving Method and apparatus for linking a document with associated reference information using pattern matching
US5838458A (en) 1992-02-25 1998-11-17 Tsai; Irving Method and apparatus for linking designated portions of a received document image with an electronic address
KR100206261B1 (en) 1992-02-28 1999-07-01 윤종용 Video signal band compression device for a digital vtr
US5295203A (en) 1992-03-26 1994-03-15 General Instrument Corporation Method and apparatus for vector coding of video transform coefficients
JPH05292331A (en) 1992-03-30 1993-11-05 Internatl Business Mach Corp <Ibm> Method for decoding run length code, video controller, and data processing system
JP2659896B2 (en) 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5325167A (en) 1992-05-11 1994-06-28 Canon Research Center America, Inc. Record document authentication by microscopic grain structure and method
US5408542A (en) 1992-05-12 1995-04-18 Apple Computer, Inc. Method and apparatus for real-time lossless compression and decompression of image data
DE69314224T2 (en) 1992-05-19 1998-01-29 Thomson Multimedia Sa Method and device for device control with data transmission in television lines
EP0597056A1 (en) 1992-05-29 1994-05-18 Ecole Polytechnique Federale De Lausanne Method for the marking of documents
JP2615401B2 (en) 1992-06-04 1997-05-28 大蔵省印刷局長 Anti-counterfeit latent image pattern forming body and method of manufacturing the same
US5259025A (en) 1992-06-12 1993-11-02 Audio Digitalimaging, Inc. Method of verifying fake-proof video identification data
JPH0644755A (en) 1992-07-24 1994-02-18 Sony Corp Method for transmitting video signal and recorder therefor
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US5502576A (en) 1992-08-24 1996-03-26 Ramsay International Corporation Method and apparatus for the transmission, storage, and retrieval of documents in an electronic domain
US5432542A (en) 1992-08-31 1995-07-11 Television Computer, Inc. Television receiver location identification
US5321749A (en) 1992-09-21 1994-06-14 Richard Virga Encryption device
US5735547A (en) 1992-10-01 1998-04-07 Morelle; Fredric T. Anti-photographic/photocopy imaging process and product made by same
CA2109266C (en) 1992-11-05 2002-05-07 Edward Schmid Method of and system and apparatus for automatically creating, identifying, routing and storing digitally scanned documents
NZ259776A (en) 1992-11-16 1997-06-24 Ceridian Corp Identifying recorded or broadcast audio signals by mixing with encoded signal derived from code signal modulated by narrower bandwidth identification signal
CA2106143C (en) 1992-11-25 2004-02-24 William L. Thomas Universal broadcast code and multi-level encoded signal monitoring system
US5469222A (en) 1992-12-23 1995-11-21 Intel Corporation Non-linear pixel interpolator function for video and graphic processing
US5809317A (en) 1992-12-30 1998-09-15 Intel Corporation Creating and maintaining hypertext links among heterogeneous documents by the establishment of anchors and connections among anchors
US5379345A (en) * 1993-01-29 1995-01-03 Radio Audit Systems, Inc. Method and apparatus for the processing of encoded data in conjunction with an audio broadcast
US5291243A (en) 1993-02-05 1994-03-01 Xerox Corporation System for electronically printing plural-color tamper-resistant documents
US5546462A (en) 1993-04-09 1996-08-13 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
US5337362A (en) 1993-04-15 1994-08-09 Ricoh Corporation Method and apparatus for placing data onto plain paper
US5428731A (en) 1993-05-10 1995-06-27 Apple Computer, Inc. Interactive multimedia delivery engine
US5351302A (en) 1993-05-26 1994-09-27 Leighton Frank T Method for authenticating objects identified by images or other identifying information
US5404160A (en) 1993-06-24 1995-04-04 Berkeley Varitronics Systems, Inc. System and method for identifying a television program
US5857038A (en) 1993-06-29 1999-01-05 Canon Kabushiki Kaisha Image processing apparatus and method for synthesizing first and second image data
US5432870A (en) 1993-06-30 1995-07-11 Ricoh Corporation Method and apparatus for compressing and decompressing images of documents
US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange
CA2129317A1 (en) 1993-08-02 1995-02-03 Margaret A. Walsh Article identity on printed works
US5461426A (en) 1993-08-20 1995-10-24 Samsung Electronics Co., Ltd. Apparatus for processing modified NTSC television signals, with digital signals buried therewithin
US5416307A (en) 1993-09-03 1995-05-16 Danek; Robert Currency paper verification and denomination device
DE69417661T2 (en) 1993-09-03 1999-11-11 Toshiba Kawasaki Kk Device for the steganographic insertion of information into color images
US5422963A (en) 1993-10-15 1995-06-06 At&T Corp. Block transform coder for arbitrarily shaped image segments
US5481294A (en) 1993-10-27 1996-01-02 A. C. Nielsen Company Audience measurement system utilizing ancillary codes and passive signatures
US6681028B2 (en) * 1995-07-27 2004-01-20 Digimarc Corporation Paper-based control of computer systems
US20020009208A1 (en) 1995-08-09 2002-01-24 Adnan Alattar Authentication of physical and electronic media objects using digital watermarks
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6549638B2 (en) * 1998-11-03 2003-04-15 Digimarc Corporation Methods for evidencing illicit use of a computer system or device
US5862260A (en) 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5748763A (en) * 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US5841978A (en) 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5905251A (en) 1993-11-24 1999-05-18 Metrologic Instruments, Inc. Hand-held portable WWW access terminal with visual display panel and GUI-based WWW browser program integrated with bar code symbol reader in a hand-supportable housing
US5499294A (en) 1993-11-24 1996-03-12 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Digital camera with apparatus for authentication of images produced from an image file
US5463209A (en) 1993-11-29 1995-10-31 Hmg Worldwide In-Store Marketing, Inc. Point-of-sale product information dissemination arrangement and method
US5515081A (en) 1993-11-30 1996-05-07 Borland International, Inc. System and methods for improved storage and processing of BITMAP images
US6086706A (en) 1993-12-20 2000-07-11 Lucent Technologies Inc. Document copying deterrent method
US5428607A (en) 1993-12-20 1995-06-27 At&T Corp. Intra-switch communications in narrow band ATM networks
US6522770B1 (en) * 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US5872589A (en) 1994-03-18 1999-02-16 Interactive Return Service, Inc. Interactive TV system for mass media distribution
US5450490A (en) 1994-03-31 1995-09-12 The Arbitron Company Apparatus and methods for including codes in audio signals and decoding
US5974141A (en) 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
US5404377A (en) 1994-04-08 1995-04-04 Moses; Donald W. Simultaneous transmission of data and audio signals by means of perceptual coding
US5488664A (en) 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
US5950173A (en) 1996-10-25 1999-09-07 Ipf, Inc. System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents
US5539471A (en) 1994-05-03 1996-07-23 Microsoft Corporation System and method for inserting and recovering an add-on data signal for transmission with a video signal
US5932863A (en) 1994-05-25 1999-08-03 Rathus; Spencer A. Method and apparatus for accessing electric data via a familiar printed medium
US5537223A (en) 1994-06-02 1996-07-16 Xerox Corporation Rotating non-rotationally symmetrical halftone dots for encoding embedded data in a hyperacuity printer
US5493677A (en) 1994-06-08 1996-02-20 Systems Research & Applications Corporation Generation, archiving, and retrieval of digital images with evoked suggestion-set captions and natural language interface
GB9411868D0 (en) 1994-06-14 1994-08-03 Wiggins Teape Group The Limite Paper carrying a surface relief pattern
US5719948A (en) * 1994-06-24 1998-02-17 Angstrom Technologies, Inc. Apparatus and methods for fluorescent imaging and optical character reading
US5469506A (en) 1994-06-27 1995-11-21 Pitney Bowes Inc. Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic
US5530751A (en) 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
US5594226A (en) 1994-07-11 1997-01-14 Steger; Paul Automated check verification and tracking system using bar code information
US5583933A (en) 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
US5640193A (en) 1994-08-15 1997-06-17 Lucent Technologies Inc. Multimedia service access by reading marks on an object
US5544255A (en) 1994-08-31 1996-08-06 Peripheral Vision Limited Method and system for the capture, storage, transport and authentication of handwritten signatures
US5548646A (en) 1994-09-15 1996-08-20 Sun Microsystems, Inc. System for signatureless transmission and reception of data packets between computer networks
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5568570A (en) 1994-09-30 1996-10-22 Eastman Kodak Company Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
US5541662A (en) 1994-09-30 1996-07-30 Intel Corporation Content programmer control of video and data display using associated data
JP3224480B2 (en) 1994-09-30 2001-10-29 キヤノン株式会社 Color image processing equipment
US5568550A (en) 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
US5614940A (en) 1994-10-21 1997-03-25 Intel Corporation Method and apparatus for providing broadcast information with indexing
EP0709760B1 (en) 1994-10-27 2006-05-31 Intarsia Software LLC Data copyright management system
EP0710022A3 (en) 1994-10-31 1998-08-26 AT&T Corp. System and method for encoding digital information in a television signal
US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5613012A (en) 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5530852A (en) 1994-12-20 1996-06-25 Sun Microsystems, Inc. Method for extracting profiles and topics from a first file written in a first markup language and generating files in different markup languages containing the profiles and topics for use in accessing data described by the profiles and topics
US5576532A (en) 1995-01-03 1996-11-19 Xerox Corporation Interleaved and interlaced sync codes and address codes for self-clocking glyph codes
US5611575A (en) 1995-01-03 1997-03-18 Xerox Corporation Distributed state flags or other unordered information for embedded data blocks
US5572010A (en) 1995-01-03 1996-11-05 Xerox Corporation Distributed type labeling for embedded data blocks
US5848413A (en) 1995-01-13 1998-12-08 Ricoh Company, Ltd. Method and apparatus for accessing and publishing electronic documents
US5671282A (en) 1995-01-23 1997-09-23 Ricoh Corporation Method and apparatus for document verification and tracking
US5530759A (en) 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
US5598526A (en) 1995-02-23 1997-01-28 Alliance Semiconductor Corporation Method and system for displaying images using a dynamically reconfigurable display memory architecture
US5774452A (en) 1995-03-14 1998-06-30 Aris Technologies, Inc. Apparatus and method for encoding and decoding information in audio signals
US5590197A (en) 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
US5727092A (en) 1995-05-17 1998-03-10 The Regents Of The University Of California Compression embedding
US5602920A (en) 1995-05-31 1997-02-11 Zenith Electronics Corporation Combined DCAM and transport demultiplexer
DE19520232C1 (en) 1995-06-01 1996-08-14 Siemens Ag Sequence coding for ASCII text encryption
US5710636A (en) 1995-06-05 1998-01-20 Xerox Corporation Method and apparatus for generating halftone images having human readable patterns formed therein
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5818441A (en) 1995-06-15 1998-10-06 Intel Corporation System and method for simulating two-way connectivity for one way data streams
DE19521969C1 (en) 1995-06-16 1997-02-27 Fraunhofer Ges Forschung Method for marking binary coded data sets
US5978773A (en) 1995-06-20 1999-11-02 Neomedia Technologies, Inc. System and method for using an ordinary article of commerce to access a remote computer
US5742845A (en) 1995-06-22 1998-04-21 Datascape, Inc. System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network
US5666487A (en) 1995-06-28 1997-09-09 Bell Atlantic Network Services, Inc. Network providing signals of different formats to a user by multplexing compressed broadband data with data of a different format into MPEG encoded data stream
US6311214B1 (en) 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US6505160B1 (en) * 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US5638446A (en) 1995-08-28 1997-06-10 Bell Communications Research, Inc. Method for the secure distribution of electronic files in a distributed environment
US5668636A (en) 1995-12-20 1997-09-16 Xerox Corporation Embedded data controlled digital highlight color copier
US5822432A (en) * 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US5938727A (en) 1996-02-01 1999-08-17 Ikeda; Takashi Communication system and method via digital codes
US5752152A (en) 1996-02-08 1998-05-12 Eastman Kodak Company Copy restrictive system
US5665951A (en) 1996-02-08 1997-09-09 Newman; Gary H. Customer indicia storage and utilization system
US5862218A (en) 1996-04-04 1999-01-19 Fotonation, Inc. Method and apparatus for in-camera image marking and authentication
US6035177A (en) 1996-02-26 2000-03-07 Donald W. Moses Simultaneous transmission of ancillary and audio signals by means of perceptual coding
US6512796B1 (en) * 1996-03-04 2003-01-28 Douglas Sherwood Method and system for inserting and retrieving data in an audio signal
GB9604659D0 (en) * 1996-03-05 1996-05-01 Central Research Lab Ltd Audio signal identification
US5664018A (en) 1996-03-12 1997-09-02 Leighton; Frank Thomson Watermarking process resilient to collusion attacks
US5852673A (en) 1996-03-27 1998-12-22 Chroma Graphics, Inc. Method for general image manipulation and composition
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
AU2435297A (en) 1996-04-02 1997-11-07 Theodore G Handel Data embedding
US5804803A (en) 1996-04-02 1998-09-08 International Business Machines Corporation Mechanism for retrieving information using data encoded on an object
JPH09274660A (en) 1996-04-05 1997-10-21 Omron Corp Method, device for recognizing image, copy machine mounting the same and scanner
US5761686A (en) 1996-06-27 1998-06-02 Xerox Corporation Embedding encoded information in an iconic version of a text image
US5974548A (en) 1996-07-12 1999-10-26 Novell, Inc. Media-independent document security method and apparatus
JP3982836B2 (en) 1996-07-16 2007-09-26 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Method for detecting watermark information embedded in an information signal
US5979757A (en) 1996-09-05 1999-11-09 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US5938726A (en) 1996-10-04 1999-08-17 Motorola, Inc. Apparatus for reading an electronic network navigation device and a peripheral for use therewith
US5930767A (en) 1997-05-28 1999-07-27 Motorola, Inc. Transaction methods systems and devices
US5940595A (en) 1996-09-23 1999-08-17 Motorola, Inc. Electronic network navigation device and method for linking to an electronic address therewith
US5902353A (en) 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US5903729A (en) 1996-09-23 1999-05-11 Motorola, Inc. Method, system, and article of manufacture for navigating to a resource in an electronic network
US5848144A (en) 1996-10-03 1998-12-08 Pacific Bell Switch cutover with paced transition
US5825892A (en) 1996-10-28 1998-10-20 International Business Machines Corporation Protecting images with an image watermark
EP1012694A4 (en) 1996-11-08 2005-04-06 Neomedia Tech Inc Automatic access of electronic information through machine-readable codes on printed documents
CA2221282C (en) 1996-11-28 2001-07-31 Nec Corporation Card type recording medium, certifying method and apparatus for the recording medium, forming system for recording medium, enciphering system, decoder therefor, and recording medium
US5875249A (en) 1997-01-08 1999-02-23 International Business Machines Corporation Invisible image watermark for image verification
US5973692A (en) 1997-03-10 1999-10-26 Knowlton; Kenneth Charles System for the capture and indexing of graphical representations of files, information sources and the like
US5898779A (en) 1997-04-14 1999-04-27 Eastman Kodak Company Photograhic system with selected area image authentication
US5939695A (en) 1997-05-20 1999-08-17 Lucent Technologies, Inc. Product identification system using hand-held customer assistant unit with a code reader
CA2235002A1 (en) 1997-06-18 1998-12-18 Gary Stuart Morris Network-based search engine using scanner codes
US5983218A (en) 1997-06-30 1999-11-09 Xerox Corporation Multimedia database for use over networks
US5900608A (en) 1997-10-16 1999-05-04 Iida; Takahito Method of purchasing personal recording media, system for purchasing personal recording media, and media recorded with personal recording media purchasing program
US5949055A (en) 1997-10-23 1999-09-07 Xerox Corporation Automatic geometric image transformations using embedded signals
US6324574B1 (en) 1997-11-07 2001-11-27 International Business Machines Corporation Relay server for unsigned applets
US5913210A (en) 1998-03-27 1999-06-15 Call; Charles G. Methods and apparatus for disseminating product information via the internet
US6064764A (en) 1998-03-30 2000-05-16 Seiko Epson Corporation Fragile watermarks for detecting tampering in images
US6243480B1 (en) 1998-04-30 2001-06-05 Jian Zhao Digital authentication with analog documents
JP3156667B2 (en) * 1998-06-01 2001-04-16 日本電気株式会社 Digital watermark insertion system, digital watermark characteristic table creation device
JP4130503B2 (en) * 1998-11-30 2008-08-06 株式会社東芝 Digital watermark embedding device
US5991426A (en) 1998-12-18 1999-11-23 Signafy, Inc. Field-based watermark insertion and detection
US6321981B1 (en) 1998-12-22 2001-11-27 Eastman Kodak Company Method and apparatus for transaction card security utilizing embedded image data
JP3607521B2 (en) * 1999-03-24 2005-01-05 株式会社東芝 Digital watermark embedding device, digital watermark detection device, digital information distribution device, and storage medium
US7185201B2 (en) * 1999-05-19 2007-02-27 Digimarc Corporation Content identifiers triggering corresponding responses
TW451171B (en) * 1999-07-16 2001-08-21 Cyberlink Corp A method to embed and extract hidden digital watermark
US6343204B1 (en) 1999-08-25 2002-01-29 Hewlett-Packard Company Detection and deterrence of counterfeiting of documents with tokens characteristic color and spacing
US6571144B1 (en) * 1999-10-20 2003-05-27 Intel Corporation System for providing a digital watermark in an audio signal
EP1122939A3 (en) 2000-01-31 2003-08-27 Canon Kabushiki Kaisha Image processing system
US6801636B2 (en) 2000-01-31 2004-10-05 Canon Kabushiki Kaisha Image processing apparatus and method, and storage medium
JP3619101B2 (en) 2000-01-31 2005-02-09 キヤノン株式会社 Image processing apparatus and image processing method
JP2001218011A (en) 2000-01-31 2001-08-10 Canon Inc Picture processor, picture processing method and storage medium
US6876460B2 (en) 2000-01-31 2005-04-05 Canon Kabushiki Kaisha Image processing apparatus, image processing method and storage medium
US7142689B2 (en) 2000-01-31 2006-11-28 Canon Kabushiki Kaisha Image processing apparatus for determining specific images
US6625297B1 (en) * 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US6321648B1 (en) 2000-02-14 2001-11-27 Xerox Corporation Systems and methods for unforgeable document tagging
JP3789069B2 (en) 2000-02-29 2006-06-21 キヤノン株式会社 Digital watermark embedding apparatus and method, program and storage medium, and digital watermark extraction apparatus and method, program and storage medium
US7016538B2 (en) 2000-04-27 2006-03-21 Minolta Co., Ltd. Image processor for detecting specified pattern
JP3956583B2 (en) 2000-06-05 2007-08-08 富士ゼロックス株式会社 Recording medium output device and recording medium output system
JP2002024905A (en) 2000-07-06 2002-01-25 Nec Kofu Ltd Method of originating electronic journal
US6714683B1 (en) * 2000-08-24 2004-03-30 Digimarc Corporation Wavelet based feature modulation watermarks and related applications
US6694041B1 (en) * 2000-10-11 2004-02-17 Digimarc Corporation Halftone watermarking and related applications
US6512837B1 (en) * 2000-10-11 2003-01-28 Digimarc Corporation Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5944608A (en) * 1991-05-28 1999-08-31 Tci Technology, Inc. Computer software delivery system
US6005605A (en) * 1995-03-17 1999-12-21 Bell Atlantic Network Services, Inc. Television distribution system and method
US5778102A (en) * 1995-05-17 1998-07-07 The Regents Of The University Of California, Office Of Technology Transfer Compression embedding
US6008737A (en) * 1995-05-30 1999-12-28 Motorola, Inc. Apparatus for controlling utilization of software added to a portable communication device
US5901178A (en) * 1996-02-26 1999-05-04 Solana Technology Development Corporation Post-compression hidden data transport for video
US5809139A (en) * 1996-09-13 1998-09-15 Vivo Software, Inc. Watermarking method and apparatus for compressed digital video
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
COX I.J.: "A secure, robust watermark for multimedia", 30 May 1996, FIRST INTERNATIONAL WORKSHOP, U.K., XP002940356 *
HARTUNG F.: "Digital watermarking of MPEG-2 coded video in the bitstream domain", IEEE, 1997, pages 2621 - 2624, XP002940355 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7602936B2 (en) 2001-03-08 2009-10-13 Sony Corporation Method to make wavelet watermarks resistant to affine transformations
FR2834854A1 (en) * 2002-01-11 2003-07-18 Thales Sa METHOD AND SYSTEM FOR TATTOO DECODING
EP1330110A1 (en) * 2002-01-11 2003-07-23 Thales Method and system for watermark decoding
US7085398B2 (en) 2002-01-11 2006-08-01 Thales Method and system to decode image watermarks
EP1509873A1 (en) * 2002-06-05 2005-03-02 Sony Electronics Inc. Method and apparatus to detect watermark that are resistant to resizing, rotation and translation
EP1509873A4 (en) * 2002-06-05 2008-01-02 Sony Electronics Inc Method and apparatus to detect watermark that are resistant to resizing, rotation and translation
AU2003237373B2 (en) * 2002-06-05 2008-10-30 Sony Electronics Inc. Method and apparatus to detect watermark that are resistant to resizing, rotation and translation
CN110290126A (en) * 2019-06-19 2019-09-27 华中科技大学 A kind of radio frequency watermark transmission method based on fsk signal modulation
CN110290126B (en) * 2019-06-19 2020-11-17 华中科技大学 Radio frequency watermark transmission method based on FSK signal modulation

Also Published As

Publication number Publication date
US6625297B1 (en) 2003-09-23
WO2001059689A8 (en) 2001-09-20
US20040057598A1 (en) 2004-03-25
AU2001234680A1 (en) 2001-08-20
US6993153B2 (en) 2006-01-31

Similar Documents

Publication Publication Date Title
US6625297B1 (en) Self-orienting watermarks
US7319775B2 (en) Wavelet domain watermarks
US7062069B2 (en) Digital watermark embedding and decoding using encryption keys
US7508955B2 (en) Authentication of objects using steganography
US8175329B2 (en) Authentication of physical and electronic media objects using digital watermarks
US6535617B1 (en) Removal of fixed pattern noise and other fixed patterns from media signals
US7424131B2 (en) Authentication of physical and electronic media objects using digital watermarks
US7158654B2 (en) Image processor and image processing method
US8792675B2 (en) Color image or video processing

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: C1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

CFP Corrected version of a pamphlet front page

Free format text: REVISED TITLE RECEIVED BY THE INTERNATIONAL BUREAU AFTER COMPLETION OF THE TECHNICAL PREPARATIONS FOR INTERNATIONAL PUBLICATION

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP