US20030070075A1 - Secure hybrid robust watermarking resistant against tampering and copy-attack - Google Patents

Secure hybrid robust watermarking resistant against tampering and copy-attack Download PDF

Info

Publication number
US20030070075A1
US20030070075A1 US10/194,278 US19427802A US2003070075A1 US 20030070075 A1 US20030070075 A1 US 20030070075A1 US 19427802 A US19427802 A US 19427802A US 2003070075 A1 US2003070075 A1 US 2003070075A1
Authority
US
United States
Prior art keywords
watermark
frag
data
authentication
robust
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/194,278
Inventor
Frederic Deguillaume
Sviatoslav Voloshynovskiy
Thierry Pun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/194,278 priority Critical patent/US20030070075A1/en
Publication of US20030070075A1 publication Critical patent/US20030070075A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0042Fragile watermarking, e.g. so as to detect tampering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0601Image watermarking whereby calibration information is embedded in the watermark, e.g. a grid, a scale, a list of transformations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3281Encryption; Ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information
    • H04N2201/3284Processing of the additional information for error correction

Definitions

  • interference cancellation which can be performed either at the encoder side by embedding the watermark using quantization as Quantization Index Modulation (QIM) [4] or using product codebooks of dithered uniform scalar quantizers in the Scalar Costa Scheme (CSC) [5], or at the decoder side based on the robust prediction of the embedded watermark as in our previous approach [1,6].
  • QIM Quantization Index Modulation
  • CSC Scalar Costa Scheme
  • geometrical synchronization aiming at compensating geometrical distortions which desynchronize the embedded signal and make it unreadable.
  • Solutions against geometrical transform can use either a transform invariant domain watermark like the Fourier-Mellin transform [7], or an additional template for resynchronization [8], or a self-reference watermark based on the Autocorrelation Function (ACF) of a repetitive watermark [9].
  • Self-reference watermarks have been shown to have as main advantage over other methods the fact that they exploit the redundancy of the regular structure of the watermark in order to robustly estimate the undergone geometrical distortions.
  • the watermark can be either fragile, meaning that any modification, even a limited change of a small set of pixels, is detected, or semi-fragile, offering a level of tolerance to some “acceptable” alterations such as low-level lossy compression or slight contrast adjustment.
  • the image is generally first divided into small blocks for locality, and a key-dependent hash function is applied to each of them, and the obtained hash-codes are embedded into their corresponding blocks, usually in the least significant bits (LSB) of pixels. Tampering is then detected where the recomputed codes do not match the stored codes.
  • LSB least significant bits
  • Wong [13] proposed such a blockwise approach. At the opposite, semi-fragile watermarks are more tolerant, and can even be used to measure the severity of the alteration; a robust watermarking scheme has sometimes been proposed for this, however this approach is insecure since robust watermarks are usually additive, making them vulnerable to the so-called copy attack: the signal can be easily estimated using denoising techniques and copied to another image [14].
  • the present invention describes a method for hybrid robust watermarking which: first, joins a highly robust watermark (which we will call w) with a fragile authentication watermark (called w frag ) for combined copyright protection, authentication and tamperproofing; secondly, which embeds the authentication watermark w frag in a way which preserves the resistance and the reliability of the robust watermark w.
  • the robust watermark w mainly consists in two parts which are: an informative watermark carrying the embedded message itself (called w inf ), and a key-dependent only reference watermark used as a pilot signal for synchronization as well as for channel state estimation purpose (called w ref ) at the decoder side.
  • the authentication watermark w frag could be embedded orthogonally with respect to the informative watermark w inf , using the positions of the reference watermark w ref only.
  • the density of the robust watermark w is less than 1, positions still remain which contain no robust watermark information at all, called w empty , and which could be used for the embedding of w frag too.
  • FIG. 1 An embodiment for the proposed hybrid embedding algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram, each block being identified by a unique number in parenthesis:
  • a Perceptual Model M is computed from the input cover image x (block 1 ) in order to achieve low visual impact; the message b to be embedded is encoded and encrypted ( 2 ) using a user secret key k, resulting into a codeword c; the codeword c is then spatially allocated (i.e. into k key-dependent positions) and embedded into x by the Robust Watermark (WM) Embedder ( 3 ) as a robust watermark w, using the perceptual mask M, to form the robustly marked image y.
  • Blocks 2 and 3 use the secret key k.
  • Fragile part spatial k key-dependent positions and bits are retained for the embedding of the fragile watermark w frag ; these positions can fit those used by w for the reference watermark (w ref ) as well as positions not containing any robust watermark information (w empty ), in order to achieve the orthogonality with respect to the informative watermark (w inf ); the bits retained can be the least significant bits (LSB) of the selected pixels; the Blockwise Bits Selector block ( 4 ) then clears these selected bits (i.e.
  • Blockwise Keyed Hashing ( 5 ) generates hash codes from y*, resulting into a set of signatures s which are embedded by the Blockwise Fragile WM Embedder ( 6 ) into y, using the perceptual mask M, to get the final stego image z.
  • Blocks 4 , 5 and 6 use the secret key k; blocks 4 and 6 also use the w ref and w empty positions transmitted from the robust part as shown by the dashed arrows.
  • FIG. 3 An embodiment for the proposed hybrid extraction and verification algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram:
  • Robust part the possibly attacked stego image z′ is processed by the Robust WM Extractor (block 9 ) which estimates the robust watermark ⁇ and extracts an estimated codeword ⁇ ; ⁇ is decrypted and decoded ( 10 ) using the secret key k, to get the estimated message ⁇ circumflex over (b) ⁇ .
  • Fragile part the Blockwise Fragile WM Extractor ( 11 ) estimates the embedded fragile watermark ⁇ frag and get the embedded signatures ⁇ ; the Blockwise Bits Selector ( 4 ) clears from z′ all bits reserved for w frag to get z′* on which the Blockwise Keyed Hashing ( 5 ) is performed, resulting into the recomputed set of signatures ⁇ tilde over (s) ⁇ ; then ⁇ and ⁇ tilde over (s) ⁇ are blockwise compared ( 12 ) (schematically denoted as “-”) to get a tampered-blocks map ⁇ circumflex over (T) ⁇ of changed blocks, with values 1 where tampering occurred—i.e.
  • a T (0 ⁇ A T ⁇ 1) can then be computed which counts the ratio of authentic blocks over all blocks (i.e. the ratio of 0's in ⁇ circumflex over (T) ⁇ ).
  • Hybrid diagnostic finally, by combining the robust message ⁇ circumflex over (b) ⁇ and a decoding diagnostic (i.e. is ⁇ circumflex over (b) ⁇ correctly decoded or not, based for example on some integrity check-code applied to the message and including into the binary string b), the tampered-blocks map ⁇ circumflex over (T) ⁇ , and the global authenticity value A T , a Final Decision ( 13 ) is taken about the authenticity or the possible tampering of z′, resulting into the tampering/authenticity diagnostic message d T .
  • a decoding diagnostic i.e. is ⁇ circumflex over (b) ⁇ correctly decoded or not, based for example on some integrity check-code applied to the message and including into the binary string b
  • the tampered-blocks map ⁇ circumflex over (T) ⁇ the global authenticity value A T
  • a Final Decision ( 13 ) is taken about the authenticity or the possible tampering of z′,
  • FIG. 5 Pseudo-code describing the fragile part embedding for all blocks: the robustly marked image y is divided into blocks y i,j , and the blocks processed for each index i,j (lines 1 , 2 ); from the current block y i,j and its neighbors y ⁇ (i,j) the bits which are to be used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into y* i,j and y* ⁇ (i,j) (line 3 ); then y* i,j and y* ⁇ (i,j) are hashed by the KeyedHash function, together with additional information if needed (denoted by the “ . .
  • FIG. 6 Pseudo-code describing the fragile part verification for all blocks: the possibly attacked image z′ is divided into blocks z′ i,j , and the blocks processed for each index i,j (lines 1 , 2 ); from the current block z′ i,j and its neighbors z′ ⁇ (i,j) the bits used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into z′* i,j and z′* ⁇ (i,j) (line 3 ); then z′* i,j and z′* ⁇ (i,j) are hashed by the KeyedHash function, together with the same additional information as for the embedding stage if needed (denoted by “ .
  • FIG. 1 shows the hybrid embedding process at the image level. This is a symmetrical tamperproofing/authentication scheme, that means that both the signature embedding and verification require the same user key k, which should be kept secret.
  • the robust watermark w further consists in the following two non-overlapping, i.e. orthogonal, components: the informative watermark w inf holding the copyright message b, encoded and encrypted to a codeword c with the secret key k (FIG. 1, block 2 ); and the reference watermark w ref only depending on k, used as a pilot e.g. for translation/cropping determination and for other side information which can be used for the decoding step.
  • the allocated positions within each block also depend on k.
  • w is embedded with a density less than 1, free positions still remain that contain no robust information and which we call w empty . Then w is embedded by the robust watermarking algorithm to the cover image x (FIG. 1, block 3 ), taking into account the perceptual model M (FIG. 1, block 2 ) computed from x to ensure low visual distortions.
  • the fragile component has to be applied after the robust one, in order to hash the robust watermark with the image.
  • the fragile watermark called w frag , is then based on a key-dependant blockwise cryptographically secure hash function (FIG. 1, block 5 ), of which input key is derived from k.
  • the resulting code is then embedded as a local signatures s (note that from the cryptographic point of view, we should talk about message digest code (MDC), however in this document we will use the term of secret key signature) is then embedded in a fragile way within each block (FIG.
  • MDC message digest code
  • a set of positions is pseudo-randomly selected in y based on k, and the bits of the signature embedded at these positions into the bits reserved for w frag in y (e.g. the LSB).
  • the hash function takes as input y*, a version of y where all bits (e.g. LSB) selected for the embedding of w frag have been cleared (i.e. set to 0) by the “Bits Selector” block (FIG. 1, block 4 ).
  • the “Keyed Hashing” block could be any keyed hash algorithm, or an unkeyed one encrypted afterwards.
  • the hash function requirements could be summarized as:
  • I and I′ are any input (not necessary visual data), and H k is a hash function depending on a random key k. Moreover, when I ⁇ I′ even for a single bit, H k (I) and H k (I′) are completely uncorrelated. Finally we obtain z, the stego image containing both robust and fragile watermarks.
  • M,N is the image size and m,n the block size in number of pixels (width and height respectively). Note that if the image size is not an exact multiple of the block size, one can actually take the lower integer bounds of M m
  • ⁇ (i,j) ((i ⁇ 1),j ⁇ 1),(i ⁇ 1,j),(i ⁇ 1,j+1),(i,j ⁇ 1),(i,j+1),(i+1,j ⁇ 1),(i+1,j),(i+1,j+1)) (the 8 neighbors)
  • ⁇ (i,j) ((i ⁇ 1,j),(i,j ⁇ 1),(i,j+1),(i+1,j)) (4 neighbors)
  • HBC In addition to HBC, other local or global contextual information can be included in the input of hash functions, such as current block indexes (i,j), the image size (M,N), owner-related data like in the case of robust watermarking, date and time, place, unique image identification name or number, etc.
  • hashed additional information is denoted by the “ . . . ” in pseudo-code in FIG. 5 (line 4 ). Linking individual block hashing with both local and global contextual information is important from the security point of view, in order to defeat a large class of substitution attacks dedicated to fragile watermarking schemes.
  • w frag fragile blocks may or may not coincide with w robust blocks; actually fragile blocks may be sub-blocks from robust blocks for better locality in the tamper detection.
  • an important issue is to preserve the original robustness of the robust watermark: first, embedding the fragile part by LSB modulation of selected pixels ensures very limited modification, which is very unlikely to destroy the robust watermark which has larger amplitude; secondly, we propose to embed the fragile watermark in selected positions not belonging to the robust watermark copyright information component w inf , i.e. we embed w frag in positions of the reference watermark w ref and in positions containing no watermark at all w empty ), thus fully preserving w inf .
  • FIG. 3 shows the extraction and authentication part.
  • the robust extractor (FIG. 3, block 9 ) first estimates the robust watermark ⁇ from the possibly attacked and tampered stego image z′, and decodes an estimate of the copyright message ⁇ circumflex over (b) ⁇ (FIG. 3, block 10 ); the possibly applied global (affine) and local geometrical distortions (RBA) are compensated for in this part.
  • the authentication part takes z′ as input; re-computes signatures (FIG. 3, block 5 ) ⁇ tilde over (s) ⁇ from z′* (a version of z′ where the LSB used for the embedding of w frag have been cleared, i.e. set to 0—FIG. 3, block 4 ); extract ⁇ frag from z′ and get the estimated embedded signatures ⁇ (FIG. 3, block 11 ); outputs a tamper map ⁇ circumflex over (T) ⁇ by comparing the signatures ⁇ tilde over (s) ⁇ and ⁇ for each block (FIG.
  • FIG. 4 and pseudo-code in FIG. 6 show the extraction and verification of the fragile signature at the block level.
  • One possible definition of the comparison operator is:
  • this situation can occur when different robust watermarks are present, all embedded with the same key; note that our robust watermarking algorithm, which works at the local level to achieve resistance to the RBA [2,11], can successfully decode different messages ⁇ circumflex over (b) ⁇ k .
  • the copied area comes from another image
  • two cases can be distinguished: either the other image is not watermarked or is watermarked with a different key, and the copied object will be detected as tampered; or the other image is watermarked with the same key, and the copied area can be seen as authentic. Therefore the problem arises when the images used are all watermarked using the same key.
  • This type of attack aiming at replacing parts or the entire image, are known as substitution attacks.
  • the different variants above could be named copy-and-paste attack when an object is pasted into a valid image, or the already mentioned collage attack when a composite image is generated from several marked source images.
  • an advanced version of the substitution attack can be mounted using vector-quantization (VQ) techniques [19], which is known as the vector quantization attack, or the Holliman-Memon attack.
  • VQ vector-quantization
  • This is an enhancement of the collage attack, which is able to construct an arbitrary composite image using the smallest possible areas—the blocks themselves.
  • the attacker first needs to gather a set of watermarked images, all marked with the same key. These blocks are sorted in order to regroup together blocks corresponding to the same embedded logo or the same block-synchronization used for the fragile watermark embedding; this is actually the case for all blocks having the same index i,j, if the division is made in the same order for all images.
  • the attacker can reconstruct a completely new image by picking up, for each block synchronization, a block from the group corresponding to the same synchronization, which is visually the closest to the image to be constructed.
  • This approach is merely the same as vector quantization, where we can think of a “code book” as the collection of all blocks that would be correctly decoded.
  • the gathering of a sufficient number of set of images marked with the same key is quite realistic, for example from a database; actually a small number of images (i.e. less than 10) is often sufficient to apply this attack, with very little visual artifact.
  • This attack can also be named the cut-and-paste attack [20].
  • Hash-Code Block Chaining HBC
  • HBC2 hash-code block chaining version 2
  • un-deterministic signature means that two strictly identical input hashed using the same key produce two randomly different signatures: consequently the assumption that images are all watermarked with the same key does not help anymore, since signatures always look random to an attacker.
  • any deterministic hash function may be turned into an un-deterministic one by using a random salt, taken as input and appended to the signature.
  • the salt consists in a random string r which is appended to the hash-code h or the signature s; at the embedding stage r is included in the input of the hash function as:
  • the time-stamp is included in the input of the hash functions, and at the verification stage is used before recomputing the signature.
  • signatures will be authenticated again in every copied area again, but the extraction of different time-stamps can alerts us that a collage attack probably occurred. With this method it is even possible to count the number of copied areas and to localize them.
  • the collage attack detection can be enhanced, since the robust algorithm could either fail, or decode different independent messages correctly when the RBA-resistant version of our robust method [2,11] is used (due to the fact that it extracts the watermark at the local level).
  • This feature corresponds to the item 3. of the decision enumeration given in the “Tamperproofing/authentication decision” paragraph.
  • the stamp/time-stamp approach we have then another criteria to detect such attacks; further, if the same robust message was embedded in all parts (resulting into only one decoded message), the embedded stamp approach can still distinguish the different parts.
  • hash-codes of sufficient lengths hash-codes of at least 128 bits should be used, and we propose the MD5 (128 bits) or the SHA (160 bits), in order to defeat the anniversary attack.
  • hash extra global and local information hashing the indexes i,j of the current block makes block synchronization necessary for an attack to succeed; hashing the image's size M,N restrict attacks to images of the same size; hashing an unique ID for each image makes substitutions attacks merely infeasible, but may be not practicable in many applications (this ID should be stored separately).
  • hash and embed an unique stamp hash an unique stamp for each image (e.g. a random ID), which is embedded beside the signatures, to defeat the collage attack, and to allow to distinguish and localize pasted areas; can also carry useful information such as a time-stamp. This method can be used in place of the unique ID approach of item 5.
  • This patent presents a hybrid robust watermarking scheme for visual data, which combines copyright protection, detection of tampering, and authentication.
  • the robust part exhibits high robustness to signal processing attacks, geometrical transforms as shown by the Stirmark [23] results, as well as robustness to printing and rescanning.
  • the algorithm is resistant against random local geometrical distortions too as well as to projective and non-linear transforms, and can also defeat collage attack by extracting and decoding the copyright information locally.
  • the fragile part does not decrease the robustness of the robust part, due to its nearly orthogonal embedding with respect to the robust information. Exploiting the diagnostics from both the robust and the fragile parts, the algorithm is resistant against different kinds of attacks, including the copy attack and the collage attack.

Abstract

The present invention relates to the methods for hybrid watermarking method joining a robust and a fragile watermark, and thus combining copyright protection, authentication and tamperproofing. As a result this approach is at the same time resistant against the copy attack. In addition, the fragile information is inserted in a way which preserves the resistance and reliability of the robust part.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • In some embodiment this application refers to the following robust watermarking related patents: [0001]
  • Self-reference multi-resolution watermarking in the European Patent Application PCT/IB00/01089 filed by Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Shelby Pereira, Alexander Herrigel and Thierry Pun on Aug. 3, 2000 and entitled “Method for adaptive digital watermarking robust against geometric transform”, accepted in May 2001 [1]; [0002]
  • Recovering of local non-linear distortions on the U.S. patent application USPTO 60/327,097 filled by Sviatoslav Voloshynovskiy, Frédéric Deguillaume and Thierry Pun in Oct. 4, 2001 and entitled “A Method for Digital Watermarking Robust Against Local and Global Geometrical Distortions and Projective Transforms” [2]; [0003]
  • Recovering of global affine transforms on the U.S. patent application USPTO 10/051,808 filled by Frédéric Deguillaume, Sviatoslav Voloshynovskiy and Thierry Pun in Jan. 17, 2002 and entitled “A Method for the Estimation and Recovering of General Affine Transform” [3]. [0004]
  • BACKGROUND OF THE INVENTION
  • These last years, the rapidly growing multimedia market and use of digital technologies in general has revealed an urgent need for securing documents. Numerous threats have been identified yet, but one of the first to be pointed out was the incredible ease with which exact copies could be done without any authorization. Classical protection such as cryptography soon appeared not to be a solution, since once a document has been decrypted, even by an authorized customer, this customer could always distribute the document in plain form without any restriction. Therefore more sophisticated document security methods have been proposed, aiming first at solving the copyright protection problem, based on watermarking technologies. [0005]
  • Copyright Protection [0006]
  • The main requirements for copyright-protection watermarking algorithms are robustness (denoting how the watermark can survive any kind of malicious or unintentional transformations), visibility (does the watermark introduce perceptible artifacts), and capacity (the amount of information which can be reliably hidden and extracted from the document after certain attacks). For copyright applications, robustness should be as high as possible, visibility as low as possible in order to preserve the value of the marked document. Note however that capacity can be low since copyright information generally requires a rather small amount of information, which can be an index inside a database holding copyright information. Other requirements can be outlined, which are: security (from the cryptographic point of view), and that the scheme should be oblivious (the original image is not needed for the extraction process). [0007]
  • Many robust watermarking schemes have been proposed, consisting in either spatial domain, or transform domain watermarks. Currently two main issues can be pointed out: first, interference cancellation, which can be performed either at the encoder side by embedding the watermark using quantization as Quantization Index Modulation (QIM) [4] or using product codebooks of dithered uniform scalar quantizers in the Scalar Costa Scheme (CSC) [5], or at the decoder side based on the robust prediction of the embedded watermark as in our previous approach [1,6]. Secondly, geometrical synchronization, aiming at compensating geometrical distortions which desynchronize the embedded signal and make it unreadable. [0008]
  • Solutions against geometrical transform can use either a transform invariant domain watermark like the Fourier-Mellin transform [7], or an additional template for resynchronization [8], or a self-reference watermark based on the Autocorrelation Function (ACF) of a repetitive watermark [9]. Self-reference watermarks have been shown to have as main advantage over other methods the fact that they exploit the redundancy of the regular structure of the watermark in order to robustly estimate the undergone geometrical distortions. We previously proposed a method based on this concept, which is robust to general affine transforms [6,10] as well as to non-linear distortions and to the Random Bending Attack (RBA) [2,11]; our approach uses the ACF or magnitude spectrum of a periodical watermark, at the global level to recover from affine transforms, and at the local level to recover from the RBA. [0009]
  • Tamperproofing and Authentication [0010]
  • Other important threats have recently been identified with respect to multimedia document, the most important of them being the ease offered by today technologies for tampering or counterfeiting. Digital cameras are constantly growing in quality while becomming widely available, and softwares such as Paintshop Pro or Addobe Photoshop make it very easy to perform complex modifications without visible artifact. Although this is useful for artistic applications, this is a serious problem for legal applications such as evidences in trials, for insurances in medical imaging, for counterfeiting, etc. Classical analysis techniques used for authenticating analog photographs are ineffective. Another important issue is the ability to authenticate the originator of a visual document. [0011]
  • Of course global cryptographic signatures can detect tampering and authenticate documents, but are unable either to highlight which areas have been modified, or to assess the severity of the alteration; moreover, format conversion kills this meta-data. Such a global authentication has been proposed by Friedman in his trusted digital camera [12]. Therefore one proposed solution to both tamperproofing and authentication is again watermarking, which is used here to attach check-codes of local areas inside the image itself, in order to achieve the ability to localize altered regions. Such watermarks do not need the same level of robustness than for copyright protection, since in case of removal or cancellation the image can just be considered as non authentic. Two cases can be distinguished: the watermark can be either fragile, meaning that any modification, even a limited change of a small set of pixels, is detected, or semi-fragile, offering a level of tolerance to some “acceptable” alterations such as low-level lossy compression or slight contrast adjustment. [0012]
  • For fragile watermarking, the image is generally first divided into small blocks for locality, and a key-dependent hash function is applied to each of them, and the obtained hash-codes are embedded into their corresponding blocks, usually in the least significant bits (LSB) of pixels. Tampering is then detected where the recomputed codes do not match the stored codes. Wong [13] proposed such a blockwise approach. At the opposite, semi-fragile watermarks are more tolerant, and can even be used to measure the severity of the alteration; a robust watermarking scheme has sometimes been proposed for this, however this approach is insecure since robust watermarks are usually additive, making them vulnerable to the so-called copy attack: the signal can be easily estimated using denoising techniques and copied to another image [14]. Note that the same attack can be applied to LSB-based technologies too. Another possibility is to compute robust or visual hashes which are tolerant to slight modifications, and to embed them robustly. We can mention also self-embedding watermarks where a low resolution version of the visual content is embbedded into the image itself; Wu and Liu [15] propose such a scheme which embeds the visual content using the look-up table (LUT) of the frequency domain coefficients, and Fridrich [16] proposes to embed the visual content in the bit representation of chosen discrete Cosine transform (DCT) coefficients. Self-embedding watermarks not only can detect tampered areas by locally analyzing mismatches between the stego image and the actually extracted visual information, but can even reconstruct these areas. [0013]
  • A Hybrid Solution [0014]
  • While robust watermarks are typically required for copyright protection, the fragile or semi-fragile watermarks have been proposed to solve tamperproofing and authentication. Watermarking methods above are either robust schemes, or fragile/semi-fragile schemes; however approaches combining both robust and fragile/semi-fragile schemes for copyright and tamperproofing/authentication application are rarely proposed. Fridrich [17] proposed such an hybrid method, but uses a watermark with relatively low robustness. Further, most of robust watermarking schemes are vulnerable to the copy attack, which allows copying a watermark from one document to another without need for any a priori knowledge [14]. Therefore, to this extent no real working scheme for hybrid robust watermarking, tamperproofing and authentication has been proposed yet. [0015]
  • The present invention describes a method for hybrid robust watermarking which: first, joins a highly robust watermark (which we will call w) with a fragile authentication watermark (called w[0016] frag) for combined copyright protection, authentication and tamperproofing; secondly, which embeds the authentication watermark wfrag in a way which preserves the resistance and the reliability of the robust watermark w. The robust watermark w mainly consists in two parts which are: an informative watermark carrying the embedded message itself (called winf), and a key-dependent only reference watermark used as a pilot signal for synchronization as well as for channel state estimation purpose (called wref) at the decoder side. Therefore the authentication watermark wfrag could be embedded orthogonally with respect to the informative watermark winf, using the positions of the reference watermark wref only. In the case where the density of the robust watermark w is less than 1, positions still remain which contain no robust watermark information at all, called wempty, and which could be used for the embedding of wfrag too. We further address the cryptography and security aspects of blockwise hash-coding. As a result this approach is at the same time resistant against local or global tampering, and against the copy attack which aims at copying a watermark from an image to another one without knowing the key.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The drawings shown in: [0017]
  • FIG. 1: An embodiment for the proposed hybrid embedding algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram, each block being identified by a unique number in parenthesis: [0018]
  • Robust part: a Perceptual Model M is computed from the input cover image x (block [0019] 1) in order to achieve low visual impact; the message b to be embedded is encoded and encrypted (2) using a user secret key k, resulting into a codeword c; the codeword c is then spatially allocated (i.e. into k key-dependent positions) and embedded into x by the Robust Watermark (WM) Embedder (3) as a robust watermark w, using the perceptual mask M, to form the robustly marked image y. Blocks 2 and 3 use the secret key k.
  • Fragile part: spatial k key-dependent positions and bits are retained for the embedding of the fragile watermark w[0020] frag; these positions can fit those used by w for the reference watermark (wref) as well as positions not containing any robust watermark information (wempty), in order to achieve the orthogonality with respect to the informative watermark (winf); the bits retained can be the least significant bits (LSB) of the selected pixels; the Blockwise Bits Selector block (4) then clears these selected bits (i.e. set them to zero) inside y which may be modified by wfrag, resulting into y*; then a Blockwise Keyed Hashing (5) generates hash codes from y*, resulting into a set of signatures s which are embedded by the Blockwise Fragile WM Embedder (6) into y, using the perceptual mask M, to get the final stego image z. Blocks 4, 5 and 6 use the secret key k; blocks 4 and 6 also use the wref and wempty positions transmitted from the robust part as shown by the dashed arrows.
  • FIG. 2: An embodiment for the proposed algorithm is shown for the fragile part embedding at the block level, this part corresponding to [0021] blocks 4, 5 and 6 of FIG. 1 but for one local block yi,j indexed by i,j, after division of the robustly marked image y into contiguous and non-overlapping blocks as y={yi,j}. The current block y*i,j and its neighbors y*η(i,j), obtained after setting to zero the bits where wfrag will be embedded in order to exclude them from the hash function input, are hashed together by the k key-dependent Keyed Hashing function (block 7) resulting into the signature si,j for this block i,j (s={si,j}); si,j is then embedded by the Fragile WM Embedder (8), using the perceptual mask M, into the current block yi,j; the positions where the fragile corresponding watermark block wfrag i,j is embedded are shown by the black square dots, these k key-dependent positions also fitting those corresponding to wref and wempty
  • of the robust part and being transmitted to the fragile algorithm (dashed arrows). [0022]
  • FIG. 3: An embodiment for the proposed hybrid extraction and verification algorithm, including both the robust and the authentication parts at the global level, is shown in this block-diagram: [0023]
  • Robust part: the possibly attacked stego image z′ is processed by the Robust WM Extractor (block [0024] 9) which estimates the robust watermark ŵ and extracts an estimated codeword ĉ; ĉ is decrypted and decoded (10) using the secret key k, to get the estimated message {circumflex over (b)}.
  • Fragile part: the Blockwise Fragile WM Extractor ([0025] 11) estimates the embedded fragile watermark ŵfrag and get the embedded signatures ŝ; the Blockwise Bits Selector (4) clears from z′ all bits reserved for wfrag to get z′* on which the Blockwise Keyed Hashing (5) is performed, resulting into the recomputed set of signatures {tilde over (s)}; then ŝ and {tilde over (s)} are blockwise compared (12) (schematically denoted as “-”) to get a tampered-blocks map {circumflex over (T)} of changed blocks, with values 1 where tampering occurred—i.e. 1 for different signatures, and 0 where no modification occurred—matching signatures; a global authenticity value AT (0≦AT≦1) can then be computed which counts the ratio of authentic blocks over all blocks (i.e. the ratio of 0's in {circumflex over (T)}).
  • Hybrid diagnostic: finally, by combining the robust message {circumflex over (b)} and a decoding diagnostic (i.e. is {circumflex over (b)} correctly decoded or not, based for example on some integrity check-code applied to the message and including into the binary string b), the tampered-blocks map {circumflex over (T)}, and the global authenticity value A[0026] T, a Final Decision (13) is taken about the authenticity or the possible tampering of z′, resulting into the tampering/authenticity diagnostic message dT.
  • FIG. 4: An embodiment for the proposed algorithm is shown for the fragile part extraction at the local block level, this part corresponding to [0027] blocks 4, 5, 11 and 12 of FIG. 3 but for one block z′i,j indexed by i,j, the marked and possibly attacked image z′ being divided into contiguous and non-overlapping blocks as z′={z′i,j}. From the current block z′i,j the fragile watermark block ŵfrag i,j is extracted and the local signature ŝi,j (as ŝ={ŝi,j}) given by the Fragile WM Extractor (block 14); the current block z′i,j and its neighbors z′η(i,j) are taken, inside them bits reserved for wfrag are set to zero as for the embedding stage, resulting into z′*i,j and z′*η(i,j) which are hashed by the k key-dependent Keyed Hashing function (7) to get the recomputed local signature {tilde over (s)}i,j, (as {tilde over (s)}={{tilde over (s)}i,j}); then ŝi,j and {tilde over (s)}i,j are matched together (15) (denoted as “-”) to get the local tampering value {circumflex over (T)}i,j in order to build the tampered-blocks map {circumflex over (T)}={{circumflex over (T)}i,j}, with {circumflex over (T)}i,j=0
    Figure US20030070075A1-20030410-P00900
    ŝi,j={tilde over (s)}i,j.
  • FIG. 5: Pseudo-code describing the fragile part embedding for all blocks: the robustly marked image y is divided into blocks y[0028] i,j, and the blocks processed for each index i,j (lines 1, 2); from the current block yi,j and its neighbors yη(i,j) the bits which are to be used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into y*i,j and y*η(i,j) (line 3); then y*i,j and y*η(i,j) are hashed by the KeyedHash function, together with additional information if needed (denoted by the “ . . . ”), giving the local signature si,j (line 4); at the end si,j is embedded into yi,j by FragileEmbed to form the final stego block zi,j (line 5); both keyedHash and FragileEmbed depend on the secret key k.
  • FIG. 6: Pseudo-code describing the fragile part verification for all blocks: the possibly attacked image z′ is divided into blocks z′[0029] i,j, and the blocks processed for each index i,j (lines 1, 2); from the current block z′i,j and its neighbors z′η(i,j) the bits used for the fragile watermark embedding are cleared by the BitsSelector function, resulting into z′*i,j and z′*η(i,j) (line 3); then z′*i,j and z′*η(i,j) are hashed by the KeyedHash function, together with the same additional information as for the embedding stage if needed (denoted by “ . . . ”), to recompute the local signature {tilde over (s)}i,j (line 4); the embedded local signature is estimated too as ŝi,j by the FragileExtract function (line 5); at the end {tilde over (s)}i,j and ŝi,j are compared (symbolized by “-”) to get the local authenticity value {circumflex over (T)}i,j, with {circumflex over (T)}i,j=1 if ŝi,j={tilde over (s)}i,j, or 0 otherwise; both keyedHash and FragileExtract depend on the secret key k.
  • In the drawings identical parts are designated by identical reference numerals. The pseudo-codes are given for the purpose to describe the algorithms as clearly as possible, and are not optimised. [0030]
  • DETAILED DESCRIPTION OF THE INVENTION
  • We propose to join the highly robust watermarking method that we previously developed (Voloshynovskiy et al. [6]) with a blockwise fragile algorithm based on cryptographically secure hash-codes similar to Wong's approach [13], but with various improvements for security reasons that are discussed later in this document. The robust watermarking scheme our hybrid technology is based on is a content adaptive multi-resolution algorithm with channel state estimation, exploiting a self-reference watermark in order to resist against geometrical transformations. The principles of this scheme are also explained in more details in our previous publications [6,10,11,18] and patents [1,2,3]. [0031]
  • Hybrid Watermark Embedding [0032]
  • The block diagram FIG. 1 shows the hybrid embedding process at the image level. This is a symmetrical tamperproofing/authentication scheme, that means that both the signature embedding and verification require the same user key k, which should be kept secret. The robust watermark w further consists in the following two non-overlapping, i.e. orthogonal, components: the informative watermark w[0033] inf holding the copyright message b, encoded and encrypted to a codeword c with the secret key k (FIG. 1, block 2); and the reference watermark wref only depending on k, used as a pilot e.g. for translation/cropping determination and for other side information which can be used for the decoding step. The allocated positions within each block also depend on k. Further, if w is embedded with a density less than 1, free positions still remain that contain no robust information and which we call wempty. Then w is embedded by the robust watermarking algorithm to the cover image x (FIG. 1, block 3), taking into account the perceptual model M (FIG. 1, block 2) computed from x to ensure low visual distortions.
  • Obviously, the fragile component has to be applied after the robust one, in order to hash the robust watermark with the image. The fragile watermark, called w[0034] frag, is then based on a key-dependant blockwise cryptographically secure hash function (FIG. 1, block 5), of which input key is derived from k. The resulting code is then embedded as a local signatures s (note that from the cryptographic point of view, we should talk about message digest code (MDC), however in this document we will use the term of secret key signature) is then embedded in a fragile way within each block (FIG. 1, block 6): a set of positions is pseudo-randomly selected in y based on k, and the bits of the signature embedded at these positions into the bits reserved for wfrag in y (e.g. the LSB). In order to keep hash codes valid, the hash function takes as input y*, a version of y where all bits (e.g. LSB) selected for the embedding of wfrag have been cleared (i.e. set to 0) by the “Bits Selector” block (FIG. 1, block 4). The “Keyed Hashing” block could be any keyed hash algorithm, or an unkeyed one encrypted afterwards. The hash function requirements could be summarized as:
  • I=I′
    Figure US20030070075A1-20030410-P00901
    Hk(I)=Hk(I′)
  • I≠I′
    Figure US20030070075A1-20030410-P00901
    Hk(I)≠Hk(I′)  (1)
  • where I and I′ are any input (not necessary visual data), and H[0035] k is a hash function depending on a random key k. Moreover, when I≠I′ even for a single bit, Hk(I) and Hk(I′) are completely uncorrelated. Finally we obtain z, the stego image containing both robust and fragile watermarks.
  • The robustly marked image I (containing w) is divided by the fragile algorithm into contiguous and non-overlapping blocks of indexes i,j, and result into a final stego image z (containing both w and w[0036] frag); therefore y and z can be written in term of these blocks as follows: y = { y i , j } , z = { z i , j } , w i t h i = 1 , , M m a n d j = 1 , , N n ( 2 )
    Figure US20030070075A1-20030410-M00001
  • where M,N is the image size and m,n the block size in number of pixels (width and height respectively). Note that if the image size is not an exact multiple of the block size, one can actually take the lower integer bounds of [0037] M m
    Figure US20030070075A1-20030410-M00002
  • and [0038] N n .
    Figure US20030070075A1-20030410-M00003
  • The embedding of the fragile part w[0039] frag is detailed for the block level in the pseudo-code in FIG. 5, and illustrated in FIG. 2.
  • In contrast to Wong's approach where blocks are independently hashed, our hash function takes as input the current i,j-block itself as well as some neighboring blocks (FIG. 2, block [0040] 7), but the resulting code being then embedded into the i,j-block only (FIG. 2, block 8): this has a crucial impact on the security of the method. Such hashing of the current block and neighboring blocks together is a first step to introduce local contextual dependencies, and could be called hash-code block chaining (HBC). In the pseudo-code of FIG. 5, for each block of indexes i,j, the neighboring indexes are denoted by η(i,j), with the possible configurations examples:
  • η(i,j)=((i−1),j−1),(i−1,j),(i−1,j+1),(i,j−1),(i,j+1),(i+1,j−1),(i+1,j),(i+1,j+1))  (the 8 neighbors)
  • η(i,j)=((i−1,j),(i,j−1),(i,j+1),(i+1,j))  (4 neighbors)
  • η(i,j)=((i,j−1),(i,j+1))  (2 neighbors)
  • η(i,j)=((i,j−1))  (only 1 neighbor)
  • For those blocks which are along the image borders (i.e. iε{1,M/m} or jε{1,N/n}) and for which the neighboring blocks fall outside of the image, one can just consider that the image is infinitely padded with the value 0 or just ignore out-of-range neighbors from the hash input. [0041]
  • In addition to HBC, other local or global contextual information can be included in the input of hash functions, such as current block indexes (i,j), the image size (M,N), owner-related data like in the case of robust watermarking, date and time, place, unique image identification name or number, etc. Such hashed additional information is denoted by the “ . . . ” in pseudo-code in FIG. 5 (line [0042] 4). Linking individual block hashing with both local and global contextual information is important from the security point of view, in order to defeat a large class of substitution attacks dedicated to fragile watermarking schemes.
  • Note that w[0043] frag fragile blocks may or may not coincide with w robust blocks; actually fragile blocks may be sub-blocks from robust blocks for better locality in the tamper detection. However an important issue is to preserve the original robustness of the robust watermark: first, embedding the fragile part by LSB modulation of selected pixels ensures very limited modification, which is very unlikely to destroy the robust watermark which has larger amplitude; secondly, we propose to embed the fragile watermark in selected positions not belonging to the robust watermark copyright information component winf, i.e. we embed wfrag in positions of the reference watermark wref and in positions containing no watermark at all wempty), thus fully preserving winf. This characteristic is shown by the dashed arrows transmitting the winf and wempty positions in FIG. 1 and FIG. 2, and by the squared points inside the image blocks in diagrams (FIG. 2). Thus winf is untouched, and on average at most 50% of positions in wref are altered by +1 or −1 due to the LSB modulation. Since wref and wempty usually cover not more than 20% of the area of w in practical cases, this makes w and wfrag almost orthogonal. At the same time the visual impact of the fragile part is much lower than the visual distortions of the robust part.
  • Hybrid Watermark Extraction And Verification [0044]
  • The block diagram FIG. 3 shows the extraction and authentication part. At the extraction stage, the robust extractor (FIG. 3, block [0045] 9) first estimates the robust watermark ŵ from the possibly attacked and tampered stego image z′, and decodes an estimate of the copyright message {circumflex over (b)} (FIG. 3, block 10); the possibly applied global (affine) and local geometrical distortions (RBA) are compensated for in this part.
  • The authentication part takes z′ as input; re-computes signatures (FIG. 3, block [0046] 5) {tilde over (s)} from z′* (a version of z′ where the LSB used for the embedding of wfrag have been cleared, i.e. set to 0—FIG. 3, block 4); extract ŵfrag from z′ and get the estimated embedded signatures ŝ (FIG. 3, block 11); outputs a tamper map {circumflex over (T)} by comparing the signatures {tilde over (s)} and ŝ for each block (FIG. 3, block 12); and finally takes a final decision dT based on the validity of {circumflex over (b)}, the authentication map {circumflex over (T)} and the global authenticity value AT (the ratio of authentic blocks over all blocks, Equation 5). The embedding positions of winf and wempty are transmitted as for the embedding stage to the fragile part (dashed arrows in FIG. 3 and FIG. 4, and squared points in FIG. 4).
  • For the authentication the input image z′ is divided into blocks of the same size and same positions as for the embedding process as: [0047] z = { z i , j } , w i t h i = 1 , , M m a n d j = 1 , , N n ( 3 )
    Figure US20030070075A1-20030410-M00004
  • The block diagram FIG. 4 and pseudo-code in FIG. 6 show the extraction and verification of the fragile signature at the block level. We can then define an estimated authenticity value {circumflex over (T)}[0048] i,j{0,1} for each block index i,j as 1 if the block z′i,j and its neighbors z′η(i,j) are unmodified, and 0 otherwise, as given by the comparison operator “-” in FIG. 4 and pseudo-code line 6 in FIG. 6. One possible definition of the comparison operator is:
  • {circumflex over (T)}i,j=1−δ({tilde over (s)}i,j−ŝi,j)  (4)
  • where δ(.) is the Kroneker symbol (δ(x)=1 if x=0, and δ(x)=0 otherwise) considering {tilde over (s)}[0049] i,j and ŝi,j as binary encoded integers). At the end a global normalized authenticity measure AT indicates the ratio of authentic blocks over the total number of blocks for the whole image, and could be defined for example as: A T = 1 M m N n i = 1 M / m j = 1 N / n 1 - T ^ i , j ( 5 )
    Figure US20030070075A1-20030410-M00005
  • with the following interpretation: [0050]
  • AT=1
    Figure US20030070075A1-20030410-P00901
    authentic image
  • 0<AT<1
    Figure US20030070075A1-20030410-P00901
    partially tampered image
  • AT=0
    Figure US20030070075A1-20030410-P00901
    non-authentic image  (6)
  • Tamperproofing/Authentication Decision [0051]
  • At the end the generic following decision d[0052] T can then be made concerning the authenticity or the tampering of the image z′, based on the diagnostics of both robust and fragile watermarks:
  • 1. {circumflex over (b)} is correctly decoded and A[0053] T=1: the image is fully authenticated and has not been tampered.
  • 2. {circumflex over (b)} is correctly decoded but A[0054] T<1: if AT>0 then only malicious local modification probably occurred: we partially authenticate the image and we point out modified regions (where {circumflex over (T)}i,j=1); if AT=0, we reject the image as globally non authentic, but since {circumflex over (b)} is valid at the same time, we can claim that a copy attack may have occurred, and the origin of the copied watermark may be easily verified.
  • 3. {circumflex over (b)} failed or multiple {circumflex over (b)}[0055] k, k=1,2, . . . are decoded, and AT>0: if AT=1, then we can immediately claim that an advanced substitution attack may have been applied, such as the collage attack; if AT<0, we can suspect the same for example if some of the {circumflex over (T)}i,j were 0 (i.e. authentic block) simultaneously for at least two regions containing distinct valid {circumflex over (b)}k and {circumflex over (b)}l.
  • 4. {circumflex over (b)} was not decoded and A[0056] T=0: we reject the image as globally non authentic, and at the same time we can not claim any copyright.
  • Simple attacks are easily detected in [0057] items 1, 2, and 4 above. If the marked image has been simply replaced by another one, the input will obviously be rejected; any local modification in a valid image will destroy signatures in the altered blocks. A copy attack further corresponds to the second item when AT=0: the copy of a robust watermark w from another image would make the robust message {circumflex over (b)} still decodable, but all signatures would not match ({circumflex over (T)}i,j=1 ∀i,j); therefore by rejecting this case, our hybrid approach is resistant to the copy attack.
  • [0058] Item 3 above is a particular case: if the robust watermark is altered or is not coherent, then we could expect {circumflex over (T)}i,j=1 at least in regions where the robust watermark w was destroyed or changed, resulting into signatures mismatches (since w is included in the hash functions input). However this situation can occur when different robust watermarks are present, all embedded with the same key; note that our robust watermarking algorithm, which works at the local level to achieve resistance to the RBA [2,11], can successfully decode different messages {circumflex over (b)}k. This situation appears if a sophisticated substitution attack was applied, which we can name as collage attack: the composition of an image from various source images, all watermarked with the same key, can be constructed without being detected by the fragile algorithm if this latter was not designed properly.
  • In general the analysis of the {circumflex over (T)}[0059] i,j locally, with respect to blocks from which {circumflex over (b)} or {circumflex over (b)}k were correctly decoded, can be useful for both items 2 and 3 in order to get more detailed diagnostics about what probably happened to the image.
  • Security Of Hybrid Watermarking [0060]
  • Many attacks or malicious changes can be mounted against hybrid-watermark documents, targeting the robust watermark and the fragile watermark, as well as interactions or relationship between both parts. Since attacks on robust watermarking have been already widely discussed, here we will mainly focus on intentional attacks specific to the fragile part. Unlike those dedicated to robust watermarks, the general goal of attacks on fragile watermark is not to remove the information (otherwise the host data would be invalidated), but rather to perform tampering or manipulations without being detected at the verification stage. [0061]
  • In a fragile approach, any change is in theory detected, since the change of one pixel would result into the mismatch of embedded and recomputed hash codes for the corresponding block. However, the retained method for the generation of signatures and their embedding should be carefully designed in order to keep resistance to various tampering attack. It has been noticed very soon that simple schemes based on the hashing of non-overlapping and independent blocks like in Wong's approach were vulnerable to various tampering attacks, and especially to substitutions attacks described by Holliman et Memon [19], and Barreto et al. [20]. Other weaknesses could result from the design of the used cryptographic primitives and the way they are implemented, the signatures lengths, etc. Many of these attacks have been pointed out and advanced solutions proposed, in particular by Barreto et al. [20]. Further, in a hybrid approach, the information given by the joint use of robust and fragile watermarks can be exploited in order to increase the security. Below we describe the most significant attacks, and then propose countermeasures against them, covered by the scope of this invention. [0062]
  • Substitution Attacks [0063]
  • The most simple of these attacks could consist in exchanging color planes in color images, in the case where each plane is hashed separately. Therefore an obvious solution would be to hash the three color planes together. Generally, the hashing and marking of independent blocks, without any other contextual information, is vulnerable to simple copy and paste inside the same watermarked image: a few valid blocks copied from a suitable area can be pasted in another place in order to hide or to replace an object, without visible artifact; the only restriction for this attack to succeed is to respect blocks synchronization, which is not difficult when the block size is publicly known. The knowledge of the key is not required, since each block is independently authenticated by itself. If the copied area comes from another image, two cases can be distinguished: either the other image is not watermarked or is watermarked with a different key, and the copied object will be detected as tampered; or the other image is watermarked with the same key, and the copied area can be seen as authentic. Therefore the problem arises when the images used are all watermarked using the same key. By this technique, it is even possible to construct a fake image by pasting together areas coming from different images. This type of attack, aiming at replacing parts or the entire image, are known as substitution attacks. The different variants above could be named copy-and-paste attack when an object is pasted into a valid image, or the already mentioned collage attack when a composite image is generated from several marked source images. [0064]
  • In the same framework, an advanced version of the substitution attack can be mounted using vector-quantization (VQ) techniques [19], which is known as the vector quantization attack, or the Holliman-Memon attack. This is an enhancement of the collage attack, which is able to construct an arbitrary composite image using the smallest possible areas—the blocks themselves. For this purpose the attacker first needs to gather a set of watermarked images, all marked with the same key. These blocks are sorted in order to regroup together blocks corresponding to the same embedded logo or the same block-synchronization used for the fragile watermark embedding; this is actually the case for all blocks having the same index i,j, if the division is made in the same order for all images. Then the attacker can reconstruct a completely new image by picking up, for each block synchronization, a block from the group corresponding to the same synchronization, which is visually the closest to the image to be constructed. This approach is merely the same as vector quantization, where we can think of a “code book” as the collection of all blocks that would be correctly decoded. The gathering of a sufficient number of set of images marked with the same key is quite realistic, for example from a database; actually a small number of images (i.e. less than 10) is often sufficient to apply this attack, with very little visual artifact. This attack can also be named the cut-and-paste attack [20]. [0065]
  • Cryptographic Attacks [0066]
  • The underlying cryptographic primitives are obviously important too. Secure and well-studied cryptographic algorithms should be used, using keys of sufficient lengths. However since the fragile watermarking is based on hash codes and signatures, one important point to mention is the lengths of such hash-codes. Wong's scheme uses hash-codes of 64 bits length. It could be believed 64 bits are secure enough, since an exhaustive search would take 2[0067] 64≈1.84×1019 tries to find an input resulting into a given hash code.
  • However the possible weakness here rather consists in the possibility to find hash-code collisions, i.e. two blocks from different images (watermarked with the same key) which result into the same hash-code—which would help for generating a faked image. Here the problem is not to find input which result into one particular hash-code, but to find two arbitrary codes which collide. Collision search can be performed on a set of images assuming they are all watermarked with the same key, without knowing the actual key by comparing the bits used for the embedding (the LSB selected positions in our case). This problem is subject to the anniversary paradox [21], which states that for hash-codes of n bits, the probability to obtain a collision is already equal to about 50% when only {square root}{square root over (n)} random blocks are gathered. With hash-codes of 64 bits, only 2[0068] 32≈4.29×109 block samples are needed to have already 1 chance over 2 to get a collision. In a concrete situation, an image of 1000×1500 pixels can be divided into about 5766 blocks of size 16×16; therefore 744879 images would contain the 232 blocks needed to mount an anniversary attack with 64 bits hash-codes. The possible availability of large databases of images all protected with the same key would make this attack almost realistic, therefore Wong's scheme is vulnerable to the so called anniversary attack. Then to achieve higher security level, it is recommended to use hash-codes of at least 128 bits: in this case the anniversary attack would actually require 264 block samples as previously expected.
  • We therefore discuss the following countermeasures to defeat all known cryptographic attacks described above on joint robust and fragile watermarking. [0069]
  • Hash-Code Block Chaining (HBC) [0070]
  • Substitutions attacks are made possible mainly due to the independence of blocks. The solution is therefore to introduce local dependencies as well as other local contextual information. First hashing the three planes together in color image prevents from color swapping. Secondly, hashing each block with some of its neighbors (HBC) makes substitution attacks more difficult to mount; HBC is equivalent to the overlapping blocks proposed by Coppersmith et al. [22]. Thirdly, we propose to hash additional global and local contextual information with each block, including the image size, the current block indexes, and other unique random information for each image. Fourthly, the anniversary attack could be simply defeated by using signatures of sufficient lengths. [0071]
  • Un-Deterministic Hash-Code Chaining (HBC) [0072]
  • Barreto et al. [20] further show that even with HBC, a fragile watermarking algorithm is not secure against a more sophisticated substitution attack which consider groups of chained blocks together instead of single blocks. They call this attack, which is an enhancement of the cut-and-paste attack, the transplantation attack; increasing the number of chained blocks does not help, since this attack would just need to consider larger groups of chained blocks. Therefore they proposed to enhance HBC by chaining previous hash-codes too as hash-code block chaining version 2 (HBC2), combined with un-deterministic signatures: first, the hash function takes as input not only the neighboring blocks, but also neighboring (and already computed) signatures; secondly, “un-deterministic signature” means that two strictly identical input hashed using the same key produce two randomly different signatures: consequently the assumption that images are all watermarked with the same key does not help anymore, since signatures always look random to an attacker. Note that any deterministic hash function may be turned into an un-deterministic one by using a random salt, taken as input and appended to the signature. The salt consists in a random string r which is appended to the hash-code h or the signature s; at the embedding stage r is included in the input of the hash function as: [0073]
  • h=Hk(r, . . . )
  • s=Sk(r, . . . )  (7)
  • and both r and h (or s) are embedded as (r,h) (or (s,h), since this salt r is needed for the verification stage (k being the user key). [0074]
  • Global And Local Contextual Information Hashing [0075]
  • Unfortunately, the previously given solutions are still not enough to ensure full resistance against the collage attack mentioned above, when areas large enough are copied and pasted: only the boundaries between areas coming from different images are detected as tampered, but nothing can tell us that these different areas come from different sources. We could then think of hashing the binary representation of blocks indexes (i,j), or the image size (M,N) as well. However the collage attack is still possible by preserving the blocks original positions and by using images of the same size. [0076]
  • A second solution we can think of is then to hash some global additional information, chosen unique for each image; an identification number (ID) could be used for this purpose. The consequence of this method is that given an image ID, only the corresponding areas will be authenticated, but the pasted areas will be rejected. Any additional global and local information hashed is then represented by the “ . . . ” in pseudo-codes in FIG. 6 (line [0077] 4).
  • Embedded Hashed Unique Stamps [0078]
  • Since any hashed additional information is also needed at the verification stage, it should be stored with its corresponding key, which could make the images ID method above inconvenient for many applications. We therefore propose a third solution, which is to store such additional information within the hash code—an unique stamp for each image, in encrypted form. In this case such stamp can be random and does not need to be stored separately from the image anymore, and just acts as an additional salt (equation 10) which is the same for all blocks of one image, but is different from one image to another. Moreover this stamp can even carry useful information, its only requirement being to be unique for each image. We actually propose to use a time-stamp indicating the date and time of embedding, plus other specific information if necessary. The time-stamp is included in the input of the hash functions, and at the verification stage is used before recomputing the signature. In this approach, signatures will be authenticated again in every copied area again, but the extraction of different time-stamps can alerts us that a collage attack probably occurred. With this method it is even possible to count the number of copied areas and to localize them. [0079]
  • Jointly Exploiting The Robust Watermark [0080]
  • Finally, the proposed hybrid watermarking scheme gives us an opportunity which current state-of-art fragile only schemes do not have. From our part, we propose to use the extraction result from both the robust part and the fragile part, in addition to every countermeasure detailed above. Consequently a more precise diagnostic can be given. [0081]
  • First, the collage attack detection can be enhanced, since the robust algorithm could either fail, or decode different independent messages correctly when the RBA-resistant version of our robust method [2,11] is used (due to the fact that it extracts the watermark at the local level). This feature corresponds to the [0082] item 3. of the decision enumeration given in the “Tamperproofing/authentication decision” paragraph. When used jointly with the stamp/time-stamp approach, we have then another criteria to detect such attacks; further, if the same robust message was embedded in all parts (resulting into only one decoded message), the embedded stamp approach can still distinguish the different parts.
  • Secondly, as we concluded in the “Tamperproofing/authentication decision” paragraph, joint robust and fragile watermarking is resistant to the copy attack: it is generally easy to estimate the robust watermark, and to copy it into another unmarked image. The robust watermark will still be correctly decoded from the new image, but the fragile watermark will fail. Even if the fragile part is also copied to the destination image (e.g. by copying the LSB), the signatures would not match since the input of the hash functions are changed. [0083]
  • Summary Of Security Measures [0084]
  • Consequently, we can summarize the main security measures that could be implemented by the following items: [0085]
  • 1. use hash-codes of sufficient lengths: hash-codes of at least 128 bits should be used, and we propose the MD5 (128 bits) or the SHA (160 bits), in order to defeat the anniversary attack. [0086]
  • 2. chain blocks in hash-coding (HBC): for each block compute the hash-code of this blocks plus neighboring blocks, in order to defeat simple substitution attacks and the cut-and-paste attack. [0087]
  • 3. chain signatures in hash-coding (HBC2): in addition to HBC, make hash-codes also dependent from at least one previously computed signature. [0088]
  • 4. use un-deterministic hash-coding: un-deterministic hash-codes or signatures, jointly used with HBC2 above, in order to defeat advanced attacks such as the transplantation attack. [0089]
  • 5. hash extra global and local information: hashing the indexes i,j of the current block makes block synchronization necessary for an attack to succeed; hashing the image's size M,N restrict attacks to images of the same size; hashing an unique ID for each image makes substitutions attacks merely infeasible, but may be not practicable in many applications (this ID should be stored separately). [0090]
  • 6. hash and embed an unique stamp: hash an unique stamp for each image (e.g. a random ID), which is embedded beside the signatures, to defeat the collage attack, and to allow to distinguish and localize pasted areas; can also carry useful information such as a time-stamp. This method can be used in place of the unique ID approach of [0091] item 5.
  • 7. use jointly information from the robust and fragile parts: analyzing the decoding of both parts gives us a more powerful diagnostic, in order to confirm the detection of the collage attack, and to defeat the copy attack. [0092]
  • Therefore, using first countermeasures suggested for the fragile part, and secondly by taking advantage of the hybrid approach by exploiting the additional information coming from the robust part, we can expect a highly robust and secure approach for both copyright protection, tamperproofing and authentication. [0093]
  • Conclusion [0094]
  • This patent presents a hybrid robust watermarking scheme for visual data, which combines copyright protection, detection of tampering, and authentication. For this purpose we jointly used the highly robust watermarking scheme we previously developed, and a fragile watermark based on local signatures. Note that little work has been done today on such hybrid robust and fragile. [0095]
  • The robust part exhibits high robustness to signal processing attacks, geometrical transforms as shown by the Stirmark [23] results, as well as robustness to printing and rescanning. The algorithm is resistant against random local geometrical distortions too as well as to projective and non-linear transforms, and can also defeat collage attack by extracting and decoding the copyright information locally. [0096]
  • The fragile part does not decrease the robustness of the robust part, due to its nearly orthogonal embedding with respect to the robust information. Exploiting the diagnostics from both the robust and the fragile parts, the algorithm is resistant against different kinds of attacks, including the copy attack and the collage attack. [0097]
  • REFERENCES
  • 1. S. Voloshynovskiy, F. Deguillaume, S. Pereira, A. Herrigel and Thierry Pun, “Method for adaptive digital watermarking robust against geometric transform”, European Patent Application PCT/IB00/01089, Aug. 3, 2000, accepted in May 2001. [0098]
  • 2. S. Voloshynovskiy, F. Deguillaume and T. Pun, “A Method for Digital Watermarking Robust Against Local and Global Geometrical Distortions and Projective Transforms”, U.S. patent application USPTO 60/327,097, Oct. 4, 2001. [0099]
  • 3. F. Deguillaume, S. Voloshynovskiy and T. Pun, “A Method for the Estimation and Recovering of General Affine Transform”, U.S. [0100] patent application USPTO 10/051,808, Jan. 17, 2002.
  • 4. B. Chen and G. W. Wornell, “Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding”, Proceedings of IEEE International Symposium on Information Theory, vol. 47 num. 3, pp. 1423-1443, May 2001. [0101]
  • 5. J. J. Eggers and J. K. Su and B. Girod, “A blind watermarking scheme based on structured codebooks”, IEE Conference on Secure Images and Image Authentication Proceedings, pp. 4/1-4/6, Apr. 10, 2000, London, UK. [0102]
  • 6. S. Voloshynovskiy, F. Deguillaume and T. Pun, “Content adaptive watermarking based on a stochastic multiresolution image modeling”, Tenth European Signal Processing Conference EUSIPCO′2000, September 2000, Tampere, Finland. [0103]
  • 7. J. J. K. Ó Ruanaidh and T. Pun, “Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking”, Signal Processing, vol. 66 num. 3, pp. 303-317, 1998. [0104]
  • 8. S. Pereira, J. J. K. Ó Ruanaidh, F. Deguillaume, G. Csurka and T. Pun, “Template Based Recovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps”, Int. Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, June 1999. [0105]
  • 9. M. Kutter, “Digital image watermarking: hiding information in images”, EPFL, August 1999, Lausanne, Switzerland. [0106]
  • 10.F. Deguillaume, S. Voloshynovskiy and T. Pun, “Method for the estimation and recovering of general affine transforms in digital watermarking applications”, IS&T/SPIE's 14th Annual Symposium, Electronic Imaging 2002: Security and Watermarking of Multimedia Content IV, vol. 4675, Jan. 20-25, 2001, San-Jose, Calif., USA. [0107]
  • 11.S. Voloshynovskiy, F. Deguillaume and T. Pun, “Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions”, IEEE ICIP2001, pp. 999-1002, October 2001, Thessaloniki, Greece. [0108]
  • 12.G. L. Friedman, “The trustworthy digital camera: restoring credibility to the photographic image”, IEEE Transactions on Consumer Electronics, vol. 39, pp. 905-910, November 1993. [0109]
  • 13.P. W. Wong, “A Public Key Watermark for Image Verification and Authentication”, IEEE International Conference on Image Processing ′98 (ICIP′98) Proceedings, vol. 1, MA11.07, 1998. [0110]
  • 14.M. Kutter, S. Voloshynovskiy and A. Herrigel, “Watermark copy attack”, Wah Wong, Ping and Edward J. Delp, IS&T/SPIE's Electronic Imaging 2000 SPIE Proceedings, vol. 3971, January 2000, San Jose, Calif., USA. [0111]
  • 15.M. Wu and B. Liu, “Watermarking for image authentication”, IEEE International Conference on Image Processing ′98 (ICIP′98) Proceedings, TA10.11, Focus Interactive Technology Inc., October 1998, Chicago, Ill., USA. [0112]
  • 16.J. Fridrich and M. Goljan, “Protection of Digital Images Using Self Embedding”, Symposium on Content Security and Data Hiding in Digital Media, May 1999, New Jersey Institute of Technology, USA. [0113]
  • 17.J. Fridrich, “A Hybrid Watermark for Tamper Detection in Digital Images”, ISSPA′99 Conference, August 1999, Brisbane, Australia. [0114]
  • 18.S. Voloshynovskiy, A. Herrigel, N. Baumgaertner and T. Pun, “A Stochastic Approach to Content Adaptive Digital Image Watermarking”, Lecture Notes in Computer Science: Third International Workshop on Information Hiding, Springer, vol. 1768, pp. 211-236, September/October 1999, Dresden, Germany. [0115]
  • 19.M. Holliman and N. Memon, “Couterfeting attacks on oblivious block-wise independent invisible watermarking schemes”, IEEE Transactions on Image Processing, vol. 9, num. 3, pp. 432-441, March 2000. [0116]
  • 20.P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, “Toward a Secure Public-key Blockwise Fragile Authentication Watermarking”, IEEE ICIP2001, pp. 494-497, October 2001, Thessaloniki, Greece. [0117]
  • 21.A. J. Menezes and P. C. van Oorschot and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN 0-8493-8523-7, October 1996. [0118]
  • 22.D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu and M. M. Yeung, “Fragile imperceptible digital watermark with privacy control”, IS&T/SPIE Electronic Imaging′99, Session: Security and Watermarking of Multimedia Contents”, January 1999, San Jose, Calif., USA. [0119]
  • 23.F. A. P. Petitcolas, “Stirmark benchmark 4.0”, http://www.cl.cam.ac.uk/˜fapp2/watermarking/stirmark/, 2002. [0120]

Claims (14)

We claim:
1. A method for generating watermarked data z based on some original data x, wherein said robust watermark w contains multi-bit informative winf and reference wref watermarks encoded and embedded in such a way as to resist against attacks, and an authentication watermark wfrag contextually encoded, encrypted and embedded in orthogonal or almost orthogonal positions with respect to the robust watermark w, comprising the steps of:
(a) encoding said multi-bit message b, possibly using any error correction code (ECC),
(b) generating said w as a function of said key k and said message b encoded and/or encrypted as codeword c, where said w consists in a said informative watermark winf and said reference watermark wref,
(c) generating said authentication watermark wfrag as a function of said key k and said contextual information,
(d) embedding said robust watermark w into said original data x to get said robustly marked data y,
(e) embedding said authentication watermark wfrag into said robustly marked data y in orthogonal manner to said informative watermark winf, resulting into the final marked data z
whereby said reference watermark wref assists amongst others in the estimation and recovering from local and global geometrical image alterations, channel state estimation, verification of reliability, fast detection of the said robust watermark w presence in said z and synchronized decoding of said error correction codes (ECC), and said authentication watermark wfrag assists in tampering detection, authentication and prevention of estimation of robust watermark w or informative watermark winf with following copying to another target media known as the copy attack, and identification of the reliability of said informative watermark winf, and furthermore whereby said z is visually indistinguishable from said x.
2. The method of claim 1 wherein said function uses perceptual masking M while adding said watermark w and said authentication watermark wfrag to said x in the spatial domain or some transform domain.
3. The method of claim 1 wherein said authentication watermark wfrag contains global and/or local encrypted contextual information about data x such as data size, unique data ID, name, index or random unique stamp that is the same for one data but is different to another data to resist against collage attack and copy attack, and produces local data dependent signatures or local message digest code (MDC).
4. The method of claim 1 and 3 wherein said unique stamp additionally carries information about date, time and other specific information identifying the particularities of embedding process that even enables the identification of copied areas and their localization.
5. The method of claim 1 wherein said encoded and encrypted authentication watermark wfrag uses as input global and local information about the original data x and/or the robustly watermarked data y, including local blocks of the data, local blocks indexes, data global size, etc., and wherein all key dependent positions and bit planes where said authentication watermark wfrag is to be embedded are excluded from the information used as input for the generation of this wfrag.
6. The method of claim 1 wherein said encoded and encrypted authentication watermark wfrag comprises a key-dependent regular (such as square blocks), or any irregular spatial allocation structure.
7. The method of claims 1, 5 and 6 wherein said blocks are hashed using information about neighboring blocks to defeat simple substitution attacks and cut-and-paste attacks.
8. The method of claims 1 wherein said authentication watermark wfrag is embedded into contiguous and non-overlapping blocks with predefined indexes which may be generally key-dependent.
9. The method of claim 1 wherein said informative winf and authentication watermarks wfrag are used jointly to detect the collage and the copy attacks that can not be achieved only based on their independent usage.
10. The method of claim 1 and 9 wherein said informative winf and authentication wfrag watermarks are used jointly on the local blockwise level to detect the sequence of the applied attacks and to distinguish the multiple watermarks embedded with the same technology and the same key but possibly with different messages, and to identify the original informative message b initially embedded into said media x.
11. The method of claim 1 wherein said informative watermark winf and/or authentication watermark wfrag is used to detect the tampered regions or the boundaries of objects, which have been copied from other medias even with the preservation of their block indexes and positions.
12. The method of claim 1 wherein said original data x is video, audio or image data.
13. The method of claim 1 applied to video data, wherein a plurality of watermarked video frames is generated.
14. The method of claim 1 wherein said function operates in the spatial domain, Discrete Cosine Transform (DCT) domain, Discrete Fourier Transform (DFT) domain, wavelet domain, or any other transform domain, or some combination thereof.
US10/194,278 2001-10-04 2002-07-15 Secure hybrid robust watermarking resistant against tampering and copy-attack Abandoned US20030070075A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/194,278 US20030070075A1 (en) 2001-10-04 2002-07-15 Secure hybrid robust watermarking resistant against tampering and copy-attack

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US32709701P 2001-10-04 2001-10-04
US10/194,278 US20030070075A1 (en) 2001-10-04 2002-07-15 Secure hybrid robust watermarking resistant against tampering and copy-attack

Publications (1)

Publication Number Publication Date
US20030070075A1 true US20030070075A1 (en) 2003-04-10

Family

ID=23275145

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/194,278 Abandoned US20030070075A1 (en) 2001-10-04 2002-07-15 Secure hybrid robust watermarking resistant against tampering and copy-attack
US10/491,681 Active 2025-07-27 US7664288B2 (en) 2001-10-04 2002-10-02 Digital watermarking method robust against local and global geometric distortions and projective transforms

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/491,681 Active 2025-07-27 US7664288B2 (en) 2001-10-04 2002-10-02 Digital watermarking method robust against local and global geometric distortions and projective transforms

Country Status (3)

Country Link
US (2) US20030070075A1 (en)
EP (1) EP1444653B1 (en)
WO (1) WO2003032254A1 (en)

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030118208A1 (en) * 2001-12-20 2003-06-26 Koninklijke Philips Electronics N.V. Varying segment sizes to increase security
US20030152225A1 (en) * 2002-02-13 2003-08-14 Sanyo Electric Co., Ltd. Digital watermarking system using scrambling method
US20040042635A1 (en) * 2002-09-03 2004-03-04 Koninklijke Philips Electronics N.V. Copy protection via redundant watermark encoding
US20040071311A1 (en) * 2000-12-09 2004-04-15 Jong-Uk Choi Network camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof
US20040136528A1 (en) * 2002-12-27 2004-07-15 Kabushiki Kaisha Toshiba Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US6834344B1 (en) * 1999-09-17 2004-12-21 International Business Machines Corporation Semi-fragile watermarks
US20050108535A1 (en) * 2002-02-19 2005-05-19 Bruekers Alphons Antonius M.L. Collusion-robust watermarking
US20050129269A1 (en) * 2003-12-10 2005-06-16 Jyh-Han Lin Context watermark for digital contents
US20060075241A1 (en) * 2004-09-27 2006-04-06 Frederic Deguillaume Character and vector graphics watermark for structured electronic documents security
US20060195886A1 (en) * 2003-07-26 2006-08-31 Koninklijke Philips Electronics N.V. Content identification for broadcast media
US20070009134A1 (en) * 2003-08-08 2007-01-11 Ebroul Izquierdo Method and apparatus for fragile watermarking
US20070230708A1 (en) * 2004-04-27 2007-10-04 Koninklijke Philips Electroncs N.V. Watermarking a Compressed Information Signal
WO2007126180A1 (en) * 2006-05-02 2007-11-08 Electronics And Telecommunications Research Institute Method and apparatus for hybrid watermarking
US20080240435A1 (en) * 2005-11-17 2008-10-02 Mehmet Utku Celik Perpetual Masking For Secure Watermark Embedding
US20080297206A1 (en) * 2005-11-18 2008-12-04 Koninklijke Philips Electronics, N.V. Dc Offset Estimation
US20090060259A1 (en) * 2007-09-04 2009-03-05 Luis Goncalves Upc substitution fraud prevention
EP2071822A1 (en) * 2007-12-13 2009-06-17 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
WO2010021694A1 (en) * 2008-08-20 2010-02-25 Thomson Licensing Selection of watermarks for the watermarking of compressed video
US20110135143A1 (en) * 2008-08-19 2011-06-09 Dekun Zou Context-based adaptive binary arithmetic coding (cabac) video stream compliance
US20110142419A1 (en) * 2008-08-19 2011-06-16 Thomson Licensing Changeable block list
US20110145582A1 (en) * 2009-12-11 2011-06-16 Electronics And Telecommunications Research Institute Method for sharing and updating key using watermark
US20110176610A1 (en) * 2008-08-19 2011-07-21 Shan He Propagation map
CN102142073A (en) * 2010-12-27 2011-08-03 成都网安科技发展有限公司 System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
US20110228971A1 (en) * 2010-03-22 2011-09-22 Brigham Young University Robust watermarking for digital media
US20110299725A1 (en) * 2001-04-24 2011-12-08 Rodriguez Tony F Methods involving maps, imagery, video and steganography
US20120269412A1 (en) * 2009-09-18 2012-10-25 Nanyang Technological University Method of providing security for transmitting a digital medical image
US20130067180A1 (en) * 2011-09-12 2013-03-14 Microsoft Corporation Retaining verifiability of extracted data from signed archives
US20130132729A1 (en) * 2010-08-03 2013-05-23 Thomson Licensing Method and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented
US20140270331A1 (en) * 2013-03-15 2014-09-18 Rimage Corporation Content watermarking
US8948443B2 (en) 2008-08-19 2015-02-03 Thomson Licensing Luminance evaluation
US20150052364A1 (en) * 2012-03-08 2015-02-19 Sandia Corporation Increasing Security in Inter-Chip Communication
CN104486632A (en) * 2014-12-31 2015-04-01 四川九洲电器集团有限责任公司 Video data processing method and video data detection method
WO2015030894A3 (en) * 2013-06-20 2015-04-23 Verance Corporation Stego key management
US9105091B2 (en) 2010-02-09 2015-08-11 Thomson Licensing Watermark detection using a propagation map
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
WO2017058756A1 (en) * 2015-09-28 2017-04-06 EyeVerify Inc. Secure image pipeline
US9779227B1 (en) * 2014-10-24 2017-10-03 Amazon Technologies, Inc. Security system using keys encoded in holograms
EP3242239A1 (en) 2016-05-02 2017-11-08 Scantrust SA Optimized authentication of graphic authentication code
US20180089789A1 (en) * 2015-09-28 2018-03-29 EyeVerify Inc. Secure image pipeline
CN108470318A (en) * 2018-02-06 2018-08-31 杭州电子科技大学 The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
CN109214425A (en) * 2018-08-07 2019-01-15 歌尔股份有限公司 Picture verification method, image processing method, equipment and system
CN109285106A (en) * 2018-10-11 2019-01-29 中南大学 A kind of reversible reduction method of the medical image based on SLT-SVD
CN109785217A (en) * 2018-12-25 2019-05-21 湖南大学 Error Control core water mark method based on FPGA technology
CN110288505A (en) * 2019-06-30 2019-09-27 湖南科技大学 The airspace vectorial geographical spatial data digital watermark method of anti-Geometrical attack
US10498541B2 (en) * 2017-02-06 2019-12-03 ShocCard, Inc. Electronic identification verification methods and systems
US10586055B2 (en) * 2017-10-30 2020-03-10 Paypal, Inc. Electronically backing up files using steganography
CN111667395A (en) * 2020-06-03 2020-09-15 南京师范大学 Three-dimensional model copyright authentication method
CN112132731A (en) * 2020-09-10 2020-12-25 郑州轻工业大学 DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR
US10979227B2 (en) 2018-10-17 2021-04-13 Ping Identity Corporation Blockchain ID connect
CN113014742A (en) * 2021-02-09 2021-06-22 安徽师范大学 Image tampering detection positioning and self-recovery method based on fragile watermark
US11062106B2 (en) 2016-03-07 2021-07-13 Ping Identity Corporation Large data transfer using visual codes with feedback confirmation
US11082221B2 (en) 2018-10-17 2021-08-03 Ping Identity Corporation Methods and systems for creating and recovering accounts using dynamic passwords
US11082711B2 (en) * 2018-06-06 2021-08-03 JVC Kenwood Corporation Image coding device, image coding method, and image falsification identification program
US11134075B2 (en) 2016-03-04 2021-09-28 Ping Identity Corporation Method and system for authenticated login using static or dynamic codes
CN113469862A (en) * 2021-05-28 2021-10-01 安徽大学 Tamper-proof digital watermark embedding method and image restoration method for file scanning
US11170130B1 (en) 2021-04-08 2021-11-09 Aster Key, LLC Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
US11206133B2 (en) 2017-12-08 2021-12-21 Ping Identity Corporation Methods and systems for recovering data using dynamic passwords
US11263415B2 (en) 2016-03-07 2022-03-01 Ping Identity Corporation Transferring data files using a series of visual codes
US11323266B2 (en) * 2019-05-28 2022-05-03 Brownie Technologies Ltd. System and method for secured digital communication using a digital signature
CN114493976A (en) * 2022-04-15 2022-05-13 湖北微模式科技发展有限公司 JPEG image tampering detection method based on fragile watermark
CN114511437A (en) * 2022-04-19 2022-05-17 山东科技大学 Watermark embedding and image self-recovery method based on reference matrix and LSB replacement
CN114693500A (en) * 2022-05-31 2022-07-01 山东科技大学 Quantum image watermarking method for tampering detection and self-recovery
US11544367B2 (en) 2015-05-05 2023-01-03 Ping Identity Corporation Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
CN116825116A (en) * 2023-07-18 2023-09-29 合肥工业大学 Robust audio watermark embedding and extracting method for resisting desynchronization attack
CN117057971A (en) * 2023-10-07 2023-11-14 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110280434A1 (en) * 2010-05-11 2011-11-17 Rajesh Mamidwar Method and system for watermakr insertin using video start codes
WO2013067589A1 (en) * 2011-11-11 2013-05-16 Gauss Research Laboratory, Inc Digital communications
CN103093127B (en) * 2013-01-21 2015-07-15 深圳大学 Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks
CN103177219A (en) * 2013-03-29 2013-06-26 太原理工大学 Medical biochemical detection report critical data tamper-proofing method
US10515429B2 (en) * 2016-07-01 2019-12-24 Digimarc Corporation Image-based pose determination
US10902144B2 (en) * 2017-08-25 2021-01-26 Electronics And Telecommunications Research Institute Method and apparatus for securing data
CN112106100A (en) * 2019-03-15 2020-12-18 京东方科技集团股份有限公司 Method and device for encoding a watermark into a digital image, method and device for detecting a watermark in a digital image, computer program product
US10757292B1 (en) * 2019-04-10 2020-08-25 Beyontech, Inc Method of embedding and extracting watermark data from original image adjusted with noise based image converted using watermark

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6614914B1 (en) * 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US7113615B2 (en) * 1993-11-18 2006-09-26 Digimarc Corporation Watermark embedder and reader
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US6408082B1 (en) * 1996-04-25 2002-06-18 Digimarc Corporation Watermark detection using a fourier mellin transform
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
DE69631806T2 (en) 1995-05-08 2005-02-03 Digimarc Corp., Tualatin Used in the transformation domain of steganographic embedded calibration data for the detection of image distortions
US6282299B1 (en) * 1996-08-30 2001-08-28 Regents Of The University Of Minnesota Method and apparatus for video watermarking using perceptual masks
IT1308273B1 (en) 1999-04-16 2001-12-10 Univ Firenze METHOD OF DETECTION OF A BRAND IN DIGITAL IMAGES
US6385329B1 (en) * 2000-02-14 2002-05-07 Digimarc Corporation Wavelet domain watermarks
US7251256B1 (en) * 2000-05-18 2007-07-31 Luminous Networks, Inc. Synchronization of asynchronous networks using media access control (MAC) layer synchronization symbols
WO2002013138A1 (en) 2000-08-03 2002-02-14 Digital Copyright Technologies Ag Method for adaptive digital watermarking robust against geometric transforms
US6483927B2 (en) * 2000-12-18 2002-11-19 Digimarc Corporation Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes
US7024018B2 (en) * 2001-05-11 2006-04-04 Verance Corporation Watermark position modulation
US6904151B2 (en) * 2002-01-17 2005-06-07 Deguillaume Frederic Method for the estimation and recovering of general affine transform

Cited By (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US6834344B1 (en) * 1999-09-17 2004-12-21 International Business Machines Corporation Semi-fragile watermarks
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US20040071311A1 (en) * 2000-12-09 2004-04-15 Jong-Uk Choi Network camera apparatus, network camera server and digital video recorder for preventing forgery and alteration of a digital image, and apparatus for authenticating the digital image from said apparatus, and method thereof
US8976998B2 (en) * 2001-04-24 2015-03-10 Digimarc Corporation Methods involving maps, imagery, video and steganography
US9792661B2 (en) 2001-04-24 2017-10-17 Digimarc Corporation Methods involving maps, imagery, video and steganography
US20110299725A1 (en) * 2001-04-24 2011-12-08 Rodriguez Tony F Methods involving maps, imagery, video and steganography
US20030118208A1 (en) * 2001-12-20 2003-06-26 Koninklijke Philips Electronics N.V. Varying segment sizes to increase security
US7006658B2 (en) * 2001-12-20 2006-02-28 Koninklijke Philips Electronics N.V. Varying segment sizes to increase security
US7487356B2 (en) * 2002-02-13 2009-02-03 Sanyo Electric Co., Ltd. Digital watermarking system using scrambling method
US20030152225A1 (en) * 2002-02-13 2003-08-14 Sanyo Electric Co., Ltd. Digital watermarking system using scrambling method
US20050108535A1 (en) * 2002-02-19 2005-05-19 Bruekers Alphons Antonius M.L. Collusion-robust watermarking
US7133534B2 (en) * 2002-09-03 2006-11-07 Koninklijke Philips Electronics N.V. Copy protection via redundant watermark encoding
US20040042635A1 (en) * 2002-09-03 2004-03-04 Koninklijke Philips Electronics N.V. Copy protection via redundant watermark encoding
US7646882B2 (en) * 2002-12-27 2010-01-12 Kabushiki Kaisha Toshiba Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US20040136528A1 (en) * 2002-12-27 2004-07-15 Kabushiki Kaisha Toshiba Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
US20060195886A1 (en) * 2003-07-26 2006-08-31 Koninklijke Philips Electronics N.V. Content identification for broadcast media
US7489797B2 (en) 2003-08-08 2009-02-10 Motorola, Inc. Method and apparatus for fragile watermarking
US20070009134A1 (en) * 2003-08-08 2007-01-11 Ebroul Izquierdo Method and apparatus for fragile watermarking
US20050129269A1 (en) * 2003-12-10 2005-06-16 Jyh-Han Lin Context watermark for digital contents
US20070230708A1 (en) * 2004-04-27 2007-10-04 Koninklijke Philips Electroncs N.V. Watermarking a Compressed Information Signal
US7644281B2 (en) 2004-09-27 2010-01-05 Universite De Geneve Character and vector graphics watermark for structured electronic documents security
US20060075241A1 (en) * 2004-09-27 2006-04-06 Frederic Deguillaume Character and vector graphics watermark for structured electronic documents security
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US20080240435A1 (en) * 2005-11-17 2008-10-02 Mehmet Utku Celik Perpetual Masking For Secure Watermark Embedding
US20080297206A1 (en) * 2005-11-18 2008-12-04 Koninklijke Philips Electronics, N.V. Dc Offset Estimation
US20090172404A1 (en) * 2006-05-02 2009-07-02 Electronics And Telecommunications Research Institute Method and Apparatus for Hybrid Watermarking
WO2007126180A1 (en) * 2006-05-02 2007-11-08 Electronics And Telecommunications Research Institute Method and apparatus for hybrid watermarking
US8068674B2 (en) * 2007-09-04 2011-11-29 Evolution Robotics Retail, Inc. UPC substitution fraud prevention
US20090060259A1 (en) * 2007-09-04 2009-03-05 Luis Goncalves Upc substitution fraud prevention
WO2009074618A1 (en) * 2007-12-13 2009-06-18 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US20100254569A1 (en) * 2007-12-13 2010-10-07 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
EP2071822A1 (en) * 2007-12-13 2009-06-17 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US8635161B2 (en) 2007-12-13 2014-01-21 Thomson Licensing Method and apparatus for inserting a removable visible watermark in an image and method and apparatus for removing such watermarks
US9113231B2 (en) 2008-08-19 2015-08-18 Thomson Licensing Changeable block list
US20110135143A1 (en) * 2008-08-19 2011-06-09 Dekun Zou Context-based adaptive binary arithmetic coding (cabac) video stream compliance
US20110142419A1 (en) * 2008-08-19 2011-06-16 Thomson Licensing Changeable block list
US9042455B2 (en) 2008-08-19 2015-05-26 Thomson Licensing Propagation map
US8594366B2 (en) 2008-08-19 2013-11-26 Thomson Licensing Context-based adaptive binary arithmetic coding (CABAC) video stream compliance
US20110176610A1 (en) * 2008-08-19 2011-07-21 Shan He Propagation map
US8948443B2 (en) 2008-08-19 2015-02-03 Thomson Licensing Luminance evaluation
US8824727B2 (en) 2008-08-20 2014-09-02 Thomson Licensing Selection of watermarks for the watermarking of compressed video
US20110158465A1 (en) * 2008-08-20 2011-06-30 Dekun Zou Selection of watermarks for the watermarking of compressed video
WO2010021694A1 (en) * 2008-08-20 2010-02-25 Thomson Licensing Selection of watermarks for the watermarking of compressed video
US20120269412A1 (en) * 2009-09-18 2012-10-25 Nanyang Technological University Method of providing security for transmitting a digital medical image
US8818020B2 (en) * 2009-09-18 2014-08-26 Nanyang Technological University Method of providing security for transmitting a digital medical image
US8745399B2 (en) * 2009-12-11 2014-06-03 Electronics And Telecommunications Research Institute Method for sharing and updating key using watermark
US20110145582A1 (en) * 2009-12-11 2011-06-16 Electronics And Telecommunications Research Institute Method for sharing and updating key using watermark
US9105091B2 (en) 2010-02-09 2015-08-11 Thomson Licensing Watermark detection using a propagation map
US20110228971A1 (en) * 2010-03-22 2011-09-22 Brigham Young University Robust watermarking for digital media
US8588461B2 (en) * 2010-03-22 2013-11-19 Brigham Young University Robust watermarking for digital media
US20130132729A1 (en) * 2010-08-03 2013-05-23 Thomson Licensing Method and system for protecting by watermarking against non-authorised use original audio or video data which are to be presented
CN102142073A (en) * 2010-12-27 2011-08-03 成都网安科技发展有限公司 System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
US8819361B2 (en) * 2011-09-12 2014-08-26 Microsoft Corporation Retaining verifiability of extracted data from signed archives
US20130067180A1 (en) * 2011-09-12 2013-03-14 Microsoft Corporation Retaining verifiability of extracted data from signed archives
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US20150052364A1 (en) * 2012-03-08 2015-02-19 Sandia Corporation Increasing Security in Inter-Chip Communication
US9722796B2 (en) * 2012-03-08 2017-08-01 National Technology & Engineering Solutions Of Sandia, Llc Increasing security in inter-chip communication
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9245310B2 (en) * 2013-03-15 2016-01-26 Qumu Corporation Content watermarking
US20140270331A1 (en) * 2013-03-15 2014-09-18 Rimage Corporation Content watermarking
US20160155208A1 (en) * 2013-03-15 2016-06-02 Qumu Corporation Content watermarking
US9773290B2 (en) * 2013-03-15 2017-09-26 Qumu Corporation Content watermarking
US9485089B2 (en) 2013-06-20 2016-11-01 Verance Corporation Stego key management
WO2015030894A3 (en) * 2013-06-20 2015-04-23 Verance Corporation Stego key management
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US9779227B1 (en) * 2014-10-24 2017-10-03 Amazon Technologies, Inc. Security system using keys encoded in holograms
CN104486632A (en) * 2014-12-31 2015-04-01 四川九洲电器集团有限责任公司 Video data processing method and video data detection method
US11544367B2 (en) 2015-05-05 2023-01-03 Ping Identity Corporation Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
US20180089789A1 (en) * 2015-09-28 2018-03-29 EyeVerify Inc. Secure image pipeline
WO2017058756A1 (en) * 2015-09-28 2017-04-06 EyeVerify Inc. Secure image pipeline
US10931455B2 (en) * 2015-09-28 2021-02-23 EyeVerify Inc. Secure image pipeline
US11658961B2 (en) 2016-03-04 2023-05-23 Ping Identity Corporation Method and system for authenticated login using static or dynamic codes
US11134075B2 (en) 2016-03-04 2021-09-28 Ping Identity Corporation Method and system for authenticated login using static or dynamic codes
US11263415B2 (en) 2016-03-07 2022-03-01 Ping Identity Corporation Transferring data files using a series of visual codes
US11062106B2 (en) 2016-03-07 2021-07-13 Ping Identity Corporation Large data transfer using visual codes with feedback confirmation
US11544487B2 (en) 2016-03-07 2023-01-03 Ping Identity Corporation Large data transfer using visual codes with feedback confirmation
EP3242239A1 (en) 2016-05-02 2017-11-08 Scantrust SA Optimized authentication of graphic authentication code
US10498542B2 (en) * 2017-02-06 2019-12-03 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
US10498541B2 (en) * 2017-02-06 2019-12-03 ShocCard, Inc. Electronic identification verification methods and systems
US11323272B2 (en) 2017-02-06 2022-05-03 Ping Identity Corporation Electronic identification verification methods and systems with storage of certification records to a side chain
US11799668B2 (en) 2017-02-06 2023-10-24 Ping Identity Corporation Electronic identification verification methods and systems with storage of certification records to a side chain
US10586055B2 (en) * 2017-10-30 2020-03-10 Paypal, Inc. Electronically backing up files using steganography
US11206133B2 (en) 2017-12-08 2021-12-21 Ping Identity Corporation Methods and systems for recovering data using dynamic passwords
US11777726B2 (en) 2017-12-08 2023-10-03 Ping Identity Corporation Methods and systems for recovering data using dynamic passwords
CN108470318A (en) * 2018-02-06 2018-08-31 杭州电子科技大学 The three-dimensional grid doubly time series model method positioned based on grouping strategy and neighborhood relationships
US11082711B2 (en) * 2018-06-06 2021-08-03 JVC Kenwood Corporation Image coding device, image coding method, and image falsification identification program
CN109214425A (en) * 2018-08-07 2019-01-15 歌尔股份有限公司 Picture verification method, image processing method, equipment and system
CN109285106A (en) * 2018-10-11 2019-01-29 中南大学 A kind of reversible reduction method of the medical image based on SLT-SVD
US11082221B2 (en) 2018-10-17 2021-08-03 Ping Identity Corporation Methods and systems for creating and recovering accounts using dynamic passwords
US10979227B2 (en) 2018-10-17 2021-04-13 Ping Identity Corporation Blockchain ID connect
US11818265B2 (en) 2018-10-17 2023-11-14 Ping Identity Corporation Methods and systems for creating and recovering accounts using dynamic passwords
US11722301B2 (en) 2018-10-17 2023-08-08 Ping Identity Corporation Blockchain ID connect
CN109785217A (en) * 2018-12-25 2019-05-21 湖南大学 Error Control core water mark method based on FPGA technology
US11323266B2 (en) * 2019-05-28 2022-05-03 Brownie Technologies Ltd. System and method for secured digital communication using a digital signature
CN110288505A (en) * 2019-06-30 2019-09-27 湖南科技大学 The airspace vectorial geographical spatial data digital watermark method of anti-Geometrical attack
CN111667395A (en) * 2020-06-03 2020-09-15 南京师范大学 Three-dimensional model copyright authentication method
CN112132731A (en) * 2020-09-10 2020-12-25 郑州轻工业大学 DWT-SVD domain adaptive robust watermarking algorithm adopting preset PSNR
CN113014742A (en) * 2021-02-09 2021-06-22 安徽师范大学 Image tampering detection positioning and self-recovery method based on fragile watermark
US11170130B1 (en) 2021-04-08 2021-11-09 Aster Key, LLC Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
CN113469862A (en) * 2021-05-28 2021-10-01 安徽大学 Tamper-proof digital watermark embedding method and image restoration method for file scanning
CN114493976A (en) * 2022-04-15 2022-05-13 湖北微模式科技发展有限公司 JPEG image tampering detection method based on fragile watermark
CN114511437A (en) * 2022-04-19 2022-05-17 山东科技大学 Watermark embedding and image self-recovery method based on reference matrix and LSB replacement
CN114693500A (en) * 2022-05-31 2022-07-01 山东科技大学 Quantum image watermarking method for tampering detection and self-recovery
CN116825116A (en) * 2023-07-18 2023-09-29 合肥工业大学 Robust audio watermark embedding and extracting method for resisting desynchronization attack
CN117057971A (en) * 2023-10-07 2023-11-14 湖北微模式科技发展有限公司 JPEG image semi-fragile watermarking algorithm and device based on brightness shrinkage calibration

Also Published As

Publication number Publication date
EP1444653A1 (en) 2004-08-11
WO2003032254A1 (en) 2003-04-17
US7664288B2 (en) 2010-02-16
EP1444653B1 (en) 2015-06-03
US20050018871A1 (en) 2005-01-27

Similar Documents

Publication Publication Date Title
US20030070075A1 (en) Secure hybrid robust watermarking resistant against tampering and copy-attack
Deguillaume et al. Secure hybrid robust watermarking resistant against tampering and copy attack
Holliman et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
JP5596193B2 (en) Method and apparatus for enhancing robustness of extracting watermark from digital host content
Voyatzis et al. Protecting digital image copyrights: a framework
Lin et al. A review of data hiding in digital images
Celik et al. Hierarchical watermarking for secure image authentication with localization
US7616776B2 (en) Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US6834344B1 (en) Semi-fragile watermarks
Barni et al. Digital watermarking
US20060239501A1 (en) Security enhancements of digital watermarks for multi-media content
Chandra et al. Digital watermarking technique for protecting digital images
Zhou et al. A semifragile watermark scheme for image authentication
Chandramouli et al. Digital watermarking
Chen et al. Combined digital signature and digital watermark scheme for image authentication
He et al. Synchronous counterfeiting attacks on self-embedding watermarking schemes
Mursi et al. A DCT-based secure JPEG image authentication scheme
Abdul-Sada Hiding data using LSB-3
Marvel Information hiding: Steganography and watermarking
Jiang et al. Semi-fragile watermarking algorithm for image tampers localization and recovery
Wolthusen On the limitations of digital watermarks: a cautionary note
Li Digital watermarking schemes for multimedia authentication
Memon et al. Authentication techniques for multimedia content
Voloshynovskiy et al. Multimedia security: open problems and solutions
Mursi et al. A Secure Semi-Fragile JPEG Image Authentication Scheme Based on Discrete Cosine Transform

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION