WO2001045316A1 - Method and apparatus for embedding text watermark - Google Patents

Method and apparatus for embedding text watermark Download PDF

Info

Publication number
WO2001045316A1
WO2001045316A1 PCT/KR2000/001114 KR0001114W WO0145316A1 WO 2001045316 A1 WO2001045316 A1 WO 2001045316A1 KR 0001114 W KR0001114 W KR 0001114W WO 0145316 A1 WO0145316 A1 WO 0145316A1
Authority
WO
WIPO (PCT)
Prior art keywords
text
digital data
format
converting
dimensional
Prior art date
Application number
PCT/KR2000/001114
Other languages
French (fr)
Inventor
Won Ha Lee
Jung Seok Cho
Seung Won Shin
Jong Uk Choi
Original Assignee
Markany Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Markany Inc. filed Critical Markany Inc.
Priority to JP2001546085A priority Critical patent/JP2003517769A/en
Priority to AU76912/00A priority patent/AU7691200A/en
Publication of WO2001045316A1 publication Critical patent/WO2001045316A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3217Transform domain methods using wavelet transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information

Definitions

  • the present invention relates to a method and apparatus for embedding a text watermark into target data such as color images, black and white images and audio data. More particularly, it relates to a method for embedding a text watermark in target data such that the inserted text is not damaged by digital signal processing such as compression, filtering, re-sampling, or cropping.
  • watermarking is a technique for embedding a characteristic mark into each individual copy of a digitized work protected by copyright. Such mark may identify the title, the copyright holder, and even the licensed owner of a particular copy.
  • the watermarking process can embed the identifying information in the multimedia data without significantly increasing the size of the resultant watermark-inserted original data.
  • Information related to copyrights includes text such as the title, name of the author and other licensing information.
  • conventional watermarking technologies did not offer an efficient method for embedding texts as watermark.
  • text can be inserted into other kinds of data without being noticed, it can be utilized to transfer important messages together with the multimedia data without being tampered. This, there is a compelling need for an efficient watermarking technique for inserting text as watermark into digital data.
  • a method of inserting/embedding a text into digital data comprising the steps of: converting said digital data to have a 2-dimensional image format; converting the text to have the same 2-dimensional image format; and inserting the converted text into the converted digital data.
  • a method of inserting a text into original digital data and transferring the text inserted digital data comprising the steps of: converting the digital data to one in a predetermined 2-dimensional image format; converting the text to one in said predetermined 2- dimensional image format; inserting the converted text into the converted digital data in the 2-dimensional format, to provide text watermarked digital data; transmitting said text watermarked digital data; receiving the text watermarked digital data; recovering the converted text of the 2-dimensional format by using the text watermarked digital data and the original digital data; and extracting the text from the recovered text.
  • a system for extracting a text from text watermarked digital data and transmitting the extracted text comprising: means for storing a plurality of digital data; means for transmitting, to a first user, digital data selected in response to a request of the first user; means for receiving the text watermarked digital data which is generated by converting the digital data transmitted to the first user in a predetermined 2- dimensional format, converting a text selected by the first user in said predetermined 2-dimensional format, and inserting the formatted text into the formatted digital data; means for recovering said converted text of the 2- dimensional format by using the text watermarked digital data and the selected digital data; means for extracting the text from the recovered text; means for encoding the extracted text; and means for transmitting the encoded text to a second user.
  • Fig. 1 shows schematic block diagram of the text watermark embedding apparatus in accordance with the present invention
  • Fig. 2 is a detailed diagram of the 2-D formatter 120 shown in Fig. 1;
  • Fig. 3 is a detailed block diagram of the value set providing block 210 shown in Fig. 2;
  • Fig. 4 shows three exemplary scheme for making up 2-D text image by using the value set
  • Fig. 5 shows a detailed block diagram of the target data analyzer 110 shown in Fig. 1
  • Fig. 6 is a detailed block diagram of the image watermark inserting block 130 shown in Fig. 1;
  • Fig. 7 shows a process for embedding a text watermark
  • Fig. 8 shows an apparatus for extracting text from watermarked audio/image signal
  • Fig. 9 shows a schematic block diagram of the text extractor shown in Fig. 8;
  • Fig. 10 shows an embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
  • Fig. 11 shows another embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
  • Fig. 1 shows a block diagram of the text watermark embedding apparatus in accordance with the present invention.
  • the text watermark embedding apparatus of the present invention receives a target data which is image or audio data and a text which will be embedded into the target data. By combining these two different kinds of data, the apparatus 100 provides image or audio data where a text watermark is inserted.
  • a 2-dimensional (“2-D”) formatter 120 converts text to be inputted into 2-dimensional formatted data (hereinafter "text image").
  • text refers to one or more characters or symbols, at least part of image or audio, or a set including at least one of them.
  • the string “Why don't you meet me at 3 P.M.?" is a text since it is a set including a plurality of characters.
  • the text image is inserted into the target data by using the image watermarking method which can insert an image watermark into a target data.
  • the text watermark embedding apparatus 100 shown in Fig. 1 includes a target data analyzer 110, a 2-D formatter 120, and an image watermark inserting block 130.
  • the target data analyzer 110 studies the target image/audio data which was received in various formats and discriminates its format. Then, it separates overhead information such as headers from the target image/audio data and provides data which represents pure image or audio. Then, it converts the data into a 2-dimensional image format and provides the formatted data to the watermark inserting block 130.
  • the target data analyzer 110 also extract information on the target data format (“target data format information”) such as the size of the image, the color mode, bit arrangement structure of each pixel data, and provides the target data format information to the 2-D formatter 120. Using this format information, the 2-D formatter 120 arranges the text image to have the same format as that of the data which is inputted to the image watermark inserting block 130 from the target data analyzer 110.
  • target data format information such as the size of the image, the color mode, bit arrangement
  • the image watermark inserting block 130 inserts the text image from the 2-D formatter 120 into the target data in the 2-D image format so as to provide text watermarked data.
  • the text watermarked data may be distributed via a multimedia management server 105 to users around the world.
  • Fig. 2 is a detailed diagram of the 2-D formatter 120 shown in Fig. 1.
  • the 2-D formatter 120 includes a value set providing block 210 that receives a text string such as "Why don't you meet me at 3 P.M.?" and converts the text into a set of numbers, which will be referred to as a "value set", each number having one of assigned values.
  • the 2-D formatter 120 further includes an image constructing block 220 which receives the value set and generates from the value set a text image which is a text converted into 2-D image format.
  • the image constructing block 220 uses the target data format information to provides a text image having the same 2-D format with that of the target image or audio provided from the target data analyzing block 110.
  • Fig. 3 is a detailed block diagram of the value set providing block 210 shown in Fig. 2.
  • the value set providing block 210 includes a bit generator 310 for converting the text into a binary bit stream and a mapping block 320 for mapping each binary bit to one of two assigned values. For example, binary 0 is mapped to a value 0 and binary 1 is mapped to a value 255.
  • the bit generator 310 converts the text "Why don't you meet me at 3 P.M.?" into the binary bit stream "100011001" and the mapping block 320 converts the binary bit stream "100011001" into "255 0 0 0 255 255 0 0 255 ."
  • the assigned values can be any values.
  • the assigned values may be fed to the mapping block 320 from outside as T shown in Fig. 3. It is preferable to choose two values which are distinct from each other.
  • 0 and 255 are represented as "00000000” and "11111111.” Since the Euclidean distance between the numbers is the maximum, 0 and 255 are preferred as the set of assigned values. A pair of values such as "00001111” and "00011111” are not preferred since only one bit of error in the first value would have the value seen as the other.
  • Fig. 4 shows three exemplary schemes for making up 2-D text image by using the value set.
  • the strip in Fig. 4a depicts a value set.
  • the value set is formatted into one or more lines of an image.
  • a portion which is not filled with the assigned values in the value set is made blank. Repeating these two lines including the blank region results in a text image as shown in Fig. 4b.
  • the set of assigned values are repeatedly placed in predetermined locations, for example, the start of first, fourth and seventh lines in Fig. 4c. Remaining portions are filled with blanks.
  • Fig. 4d the set of assigned values are repeated without inserting blank between two consecutive sets. Instead, a mark which is distinct from data in the sets is inserted between two sets. For example, "1111111111111111' can be used as the mark since this bit pattern is very unlikely to be part of the value set.
  • the above method can be implemented by storing the sets of assigned values in certain location in a frame memory. In that case, Fig. 4 also represents contents of the frame memory. Like the error correction coding scheme, repetition of the value set also helps to recover the exact original text without being affected by transmission error.
  • Fig. 5 shows a detailed block diagram of the target data analyzer 110 shown in Fig. 1.
  • the data format analyzer 510 analyzes audio or image signals in various formats and extracts data which represents only audio or image without including additional information such as a header. Specifically, when image signals are inputted to the data format analyzer 510, it detects the size of the image and provides it to the 2-D formatter 120 as the target data format information. The analyzer 510 extracts raw 2-D image data representing pixel values. The analyzer 510 provides the image data in 2-D format to the YIQ converter 520 in case of the color image and directly to the image watermark inserting block 130 in case of the black and white image. The YIQ converter 520 converts the color image in RGB mode into the color image in YIQ mode and provides the only Y component to the image watermark inserting block 130. Thus, a watermark is inserted into the Y component of an image.
  • the data format analyzer 510 When audio signals are inputted to the data format analyzer 510, the data format analyzer 510 extracts raw audio stream and provides it in 2-D image format to the image watermark inserting block 130.
  • the 2-D image format for example the size of the image, may be assigned to a certain value or may be determined by a user.
  • Fig. 6 is a detailed block diagram of the image watermark inserting block 130 shown in Fig. 1.
  • the Y component of the color image, the black-and-white image or audio data in 2-D format, which is provided from the target data analyzer 110, is transformed by WT in a wavelet transform block 610 shown in Fig. 6.
  • the text image from the 2-D formatter 120 is transformed by DCT in the DCT block 620.
  • the transformed data is combined in the mixer 630 and then transformed by inverse wavelet transform (" IWT" ) in the IWT block.
  • the inverse wavelet transformed data is audio data, B/W image data or Y component of the color image where a text watermark is inserted.
  • the watermarked data may be distributed via the Internet by an Internet management server.
  • I and Q components may bee recombined into the watermarked Y component and YIQ image data may be converted back to RGB format before being distributed.
  • an error correcting encoder may be used to make it possible to recover the original text without being affected by transmission error after the watermarked data is transmitted via the Internet.
  • the error correcting encoder can be placed before the data is transmitted over the Internet.
  • the error correcting encoder 330 may utilize, without limitation, parity bits, convolutional coding or any other known error correcting coding method.
  • Fig. 7 shows a process for embedding a text watermark.
  • step S700 audio or image data in 2-D image format ("D") is provided.
  • step S710 D is transformed by WT(T WT ) to provide transformed data "X" .
  • image or audio signal in 2-D format is transformed by DWT before being mixed with the transformed text watermark.
  • a fast WT using filter banks is used.
  • a text image W is provided and it is transformed by discrete cosine transform (" DCT" , T DCT ) in step S740 to provide transformed text image y.
  • the transformed text image y is weighted by ⁇ and then added to the transformed data X.
  • discrete cosine transform
  • the value of weight ⁇ may be decided by a user. Alternatively, an optimum weight value may be determined after testing with typical image or audio data.
  • the combined data X' is transformed by IWT in step S750, to provide watermarked audio or image data D ⁇ ,.
  • a text is first converted into a text image in a 2-D image format and then a method for inserting a 2-D watermark (watermark image) into the 2-D data (original image) is utilized which will be explained below.
  • transformed text image T DCT (W) may be transformed by WT before it is combined with T WT (D).
  • image/audio data and T DCT (W) may be transformed in different signal levels .
  • Fig. 8 shows an apparatus for extracting the original text from a text watermarked audio/image data.
  • the text watermarked data and the original image/audio data are transformed by WT in blocks 810 and 820 respectively and the difference between them is calculated.
  • the difference is transformed by IDCT to provide a recovered text image.
  • the text extractor 850 determines what the original text was.
  • Fig. 9 shows a block diagram of the text extractor shown in Fig. 8. Since data in the recovered text image is obtained by IDCT, it has floating point values. In the integer conversion block 910, these floating point values are converted to one of the assigned values by truncation.
  • the assigned values are 0 and 255
  • values not greater than 128 are converted to 0 and values greater that 128 are converted to 255.
  • Various other methods may be used to select one assigned value used in the watermarking system for each of the floating point numbers. After being converted to assigned values, the data is subject to processing steps which are the inverse of the process for making a text image out of a text, which is explained with reference to Figs. 2 and 3.
  • a text image includes repeated sets of assigned values and, marks or blanks between sets. From the value set extracting block 920, a number of value sets are provided, excluding blanks and marks.
  • Data (0 or 255) in each value set is converted to a set of binary bits in the inverse mapping block 940.
  • the inverse of the process performed in the bit generator 310 that is, conversion of each set of bit stream into a text is done.
  • a plurality of texts obtained from the sets of binary bit stream are called candidate texts.
  • the text extractor may include an error correction decoder which corresponds to an error correction encoder included in the watermark embedding stage, to correct errors such as transmission errors . Since identical value sets are repeated to form the text image in the watermark embedding apparatus, value sets extracted by the value set extracting block 920 should be identical provided that there was no transmission errors and thus candidate texts should be all identical. Even if all of the candidate texts are not identical because of transmission error, one can recover the original text by, for example, selecting the most frequent text.
  • Methods for producing a text image from a text is not limited to those described in this specification.
  • 8 by 8 image matrix is determined so that the matrix represents the shape of the symbol.
  • a number of 8 by 8 matrices corresponding to the text are repeated to fill a 2-D image.
  • the shapes of the symbols in the text are repeated.
  • a symbol which best matches each 8 by 8 matrix in a recovered text image should be decided in order to recover the original text.
  • various matching technique can be used, including but not limited to character recognition method that uses a neural network.
  • the text watermark inserting apparatus 100 or the text recovering apparatus is depicted as apparatus including many functional blocks. Preferably, they can be implemented as computer programs which are executed in a general-purpose computer such as a personal computer or workstation. Each functional block will correspond to each sub-program or subroutine. Especially, as the computational capability of personal computers is increased and the memory capacity gets much larger, it is possible to process image data in a personal computer. After the watermarking process is done in a personal computer, the watermarked data may be distributed over the Internet coupled by modem or other communication lines without going through the server shown in Fig. 1. Similarly, recovering of text from watermarked data can be done in the personal computer.
  • the text used as a watermark may be inputted through keyboard.
  • the program may be designed to receive two assigned values, the method for repeating the value sets, and the weight value used by combining X and y shown in Fig. 7 from users of the program.
  • a text watermarking method of the present invention may be applied to communication of important transaction data in the electric commerce.
  • important data such as transaction order, electronic money, debit note can be transmitted securely without being disclosed to a third party by using the method of the present invention.
  • Fig. 10 shows an embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
  • Fig. 10 shows an embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
  • the watermarking institution includes a database of user information, a database of image/audio data, a text extracting program and an encoding program. If a user A selects and requests one among the image/audio data stored in the watermarking institution via network, a server in the watermarking institution transmits the image/audio data to the user. The user A inserts a text watermark to this data and transmits the watermarked data back to the watermarking institution. The watermarking institution extracts the watermark from the watermarked data, encodes the original image/audio data and the watermark using its own encoding scheme, and sends the encoded data to a user B. The user B can obtain the image/audio data and the text by decoding the encoded data.
  • the user A and the watermarking institution have the watermarking/extracting method in common, while the watermarking institution and the user B have the encoding/decoding method in common.
  • both of encoding and decoding methods or inserting and extracting method are not disclosed to the general public.
  • the overall system may be very secure.
  • this scheme it is possible to transfer important data without being tampered even via an insecure communication network such as the Internet.
  • Fig. 11 shows another embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
  • the watermarking institution includes a database of user information, a database of image/audio data, a text watermarking program and a decoding program.
  • a user sends to the watermarking institution data encoded by an encoding method predetermined between the user A and the watermarking institution.
  • the user also selects image/audio data in the database of the institution.
  • the server of the watermarking institution decodes the encoded text, inserts the text into the selected image/audio signal as a watermark and transfers the watermarked data to a user B.
  • the user B extracts the text by using a program which does the exact inverse of the watermarking procedure in the institution.
  • the present invention makes it easier to embed copyright related information into image/audio data. Also, by repeating the value set and using the error correction method, it is possible to recover the original text even after watermarked data is transmitted through a noisy channel. By using DCT and WT, the text watermark data is not much damaged after undergoing digital processing such as compression, filtering and re-sampling.

Abstract

A text is inserted as watermark into digital data by using wavelet transform and discrete cosine transform. The method of inserting a text into digital data comprises the steps of: converting said digital data to have a 2-dimensional image format; converting the text to have the 2-dimensional image format; and inserting the converted text into the converted digital data by using DCT and DWT. The text is extracted from the text watermarked digital data by recovering the converted text of the 2-dimensional format using the text watermarked digital data and the original digital data; and extracting the text form the recovered text of the 2-dimensional format.

Description

METHOD AND APPARATUS FOR EMBEDDING TEXT WATERMARK
TECHNICAL FIELD
The present invention relates to a method and apparatus for embedding a text watermark into target data such as color images, black and white images and audio data. More particularly, it relates to a method for embedding a text watermark in target data such that the inserted text is not damaged by digital signal processing such as compression, filtering, re-sampling, or cropping.
BACKGROUND ART
With the development of computer networks and digital multimedia, protection of intellectual property has become a prime concern for creators and publishers of digitized copies of copyrightable works, such as musical recordings, movies, and video games. One method of protecting copyrights in the digital domain is to use "digital watermarks". Basically, watermarking is a technique for embedding a characteristic mark into each individual copy of a digitized work protected by copyright. Such mark may identify the title, the copyright holder, and even the licensed owner of a particular copy. The watermarking process can embed the identifying information in the multimedia data without significantly increasing the size of the resultant watermark-inserted original data.
To date, various watermarking techniques have been developed which vary depending on the type of data they handle and the type of transformation technique they employ. A copending PCT application International Application Number PCT/US99/20649 filed on September 10, 1999, entitled "Watermarking of digital images using wavelet and discrete cosine transforms," assigned to the same assignee of the present application, which is incorporated herein by reference, discloses a method for embedding image watermark into image data using wavelet and discrete cosine transforms (WT and DCT) .
A copending USA application serial number of 09/537,308 filed on March, 29, 2000, entitled "Digital Watermarking method and apparatus," assigned to the same assignee of the present application, which is incorporated herein by reference, discloses a method for embedding image watermark into digital audio data using wavelet and discrete cosine transform.
Information related to copyrights includes text such as the title, name of the author and other licensing information. However, conventional watermarking technologies did not offer an efficient method for embedding texts as watermark. Moreover, if text can be inserted into other kinds of data without being noticed, it can be utilized to transfer important messages together with the multimedia data without being tampered. This, there is a compelling need for an efficient watermarking technique for inserting text as watermark into digital data.
DISCLOSURE OF THE INVENTION
It is, therefore, a primary object of the present invention to provide a method for inserting a text watermark into digital data such as audio/image data.
It is another object of the present invention to provide a method for extracting a text from text watermarked digital data.
In one aspect of the present invention, there is provided a method of inserting/embedding a text into digital data comprising the steps of: converting said digital data to have a 2-dimensional image format; converting the text to have the same 2-dimensional image format; and inserting the converted text into the converted digital data.
In another aspect of the present invention, there is provided a method of inserting a text into original digital data and transferring the text inserted digital data, comprising the steps of: converting the digital data to one in a predetermined 2-dimensional image format; converting the text to one in said predetermined 2- dimensional image format; inserting the converted text into the converted digital data in the 2-dimensional format, to provide text watermarked digital data; transmitting said text watermarked digital data; receiving the text watermarked digital data; recovering the converted text of the 2-dimensional format by using the text watermarked digital data and the original digital data; and extracting the text from the recovered text. In yet another aspect of the present invention, there is provided a system for extracting a text from text watermarked digital data and transmitting the extracted text, comprising: means for storing a plurality of digital data; means for transmitting, to a first user, digital data selected in response to a request of the first user; means for receiving the text watermarked digital data which is generated by converting the digital data transmitted to the first user in a predetermined 2- dimensional format, converting a text selected by the first user in said predetermined 2-dimensional format, and inserting the formatted text into the formatted digital data; means for recovering said converted text of the 2- dimensional format by using the text watermarked digital data and the selected digital data; means for extracting the text from the recovered text; means for encoding the extracted text; and means for transmitting the encoded text to a second user.
BRIEF DESCRIPTIONS OF THE DRAWINGS
The above and other objects and features of the present invention will become apparent from the following description of preferred embodiments given in conjunction with the accompanying drawings, in which:
Fig. 1 shows schematic block diagram of the text watermark embedding apparatus in accordance with the present invention;
Fig. 2 is a detailed diagram of the 2-D formatter 120 shown in Fig. 1;
Fig. 3 is a detailed block diagram of the value set providing block 210 shown in Fig. 2;
Fig. 4 shows three exemplary scheme for making up 2-D text image by using the value set;
Fig. 5 shows a detailed block diagram of the target data analyzer 110 shown in Fig. 1; Fig. 6 is a detailed block diagram of the image watermark inserting block 130 shown in Fig. 1;
Fig. 7 shows a process for embedding a text watermark; Fig. 8 shows an apparatus for extracting text from watermarked audio/image signal; Fig. 9 shows a schematic block diagram of the text extractor shown in Fig. 8;
Fig. 10 shows an embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention; and
Fig. 11 shows another embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention.
MODE OF CARRYING OUT THE INVENTION
Fig. 1 shows a block diagram of the text watermark embedding apparatus in accordance with the present invention. The text watermark embedding apparatus of the present invention receives a target data which is image or audio data and a text which will be embedded into the target data. By combining these two different kinds of data, the apparatus 100 provides image or audio data where a text watermark is inserted.
To do this, a 2-dimensional ("2-D") formatter 120 converts text to be inputted into 2-dimensional formatted data (hereinafter "text image"). In this specification, text refers to one or more characters or symbols, at least part of image or audio, or a set including at least one of them. For example, the string "Why don't you meet me at 3 P.M.?" is a text since it is a set including a plurality of characters. The text image is inserted into the target data by using the image watermarking method which can insert an image watermark into a target data.
The text watermark embedding apparatus 100 shown in Fig. 1 includes a target data analyzer 110, a 2-D formatter 120, and an image watermark inserting block 130. The target data analyzer 110 studies the target image/audio data which was received in various formats and discriminates its format. Then, it separates overhead information such as headers from the target image/audio data and provides data which represents pure image or audio. Then, it converts the data into a 2-dimensional image format and provides the formatted data to the watermark inserting block 130. The target data analyzer 110 also extract information on the target data format ("target data format information") such as the size of the image, the color mode, bit arrangement structure of each pixel data, and provides the target data format information to the 2-D formatter 120. Using this format information, the 2-D formatter 120 arranges the text image to have the same format as that of the data which is inputted to the image watermark inserting block 130 from the target data analyzer 110.
The image watermark inserting block 130 inserts the text image from the 2-D formatter 120 into the target data in the 2-D image format so as to provide text watermarked data. The text watermarked data may be distributed via a multimedia management server 105 to users around the world.
Fig. 2 is a detailed diagram of the 2-D formatter 120 shown in Fig. 1. The 2-D formatter 120 includes a value set providing block 210 that receives a text string such as "Why don't you meet me at 3 P.M.?" and converts the text into a set of numbers, which will be referred to as a "value set", each number having one of assigned values. The 2-D formatter 120 further includes an image constructing block 220 which receives the value set and generates from the value set a text image which is a text converted into 2-D image format. The image constructing block 220 uses the target data format information to provides a text image having the same 2-D format with that of the target image or audio provided from the target data analyzing block 110.
Fig. 3 is a detailed block diagram of the value set providing block 210 shown in Fig. 2. The value set providing block 210 includes a bit generator 310 for converting the text into a binary bit stream and a mapping block 320 for mapping each binary bit to one of two assigned values. For example, binary 0 is mapped to a value 0 and binary 1 is mapped to a value 255. In one embodiment of the present invention, the bit generator 310 converts the text "Why don't you meet me at 3 P.M.?" into the binary bit stream "100011001..." and the mapping block 320 converts the binary bit stream "100011001..." into "255 0 0 0 255 255 0 0 255 ...." Though 0 and 255 are chosen for illustration, the assigned values can be any values. The assigned values may be fed to the mapping block 320 from outside as T shown in Fig. 3. It is preferable to choose two values which are distinct from each other. For example, in a system where values are represented in unsigned binary bits, 0 and 255 are represented as "00000000" and "11111111." Since the Euclidean distance between the numbers is the maximum, 0 and 255 are preferred as the set of assigned values. A pair of values such as "00001111" and "00011111" are not preferred since only one bit of error in the first value would have the value seen as the other.
Fig. 4 shows three exemplary schemes for making up 2-D text image by using the value set. The strip in Fig. 4a depicts a value set. In Fig. 4b, the value set is formatted into one or more lines of an image. In the last row, a portion which is not filled with the assigned values in the value set is made blank. Repeating these two lines including the blank region results in a text image as shown in Fig. 4b. In Fig. 4c, the set of assigned values are repeatedly placed in predetermined locations, for example, the start of first, fourth and seventh lines in Fig. 4c. Remaining portions are filled with blanks.
In Fig. 4d, the set of assigned values are repeated without inserting blank between two consecutive sets. Instead, a mark which is distinct from data in the sets is inserted between two sets. For example, "1111111111111111' can be used as the mark since this bit pattern is very unlikely to be part of the value set. The above method can be implemented by storing the sets of assigned values in certain location in a frame memory. In that case, Fig. 4 also represents contents of the frame memory. Like the error correction coding scheme, repetition of the value set also helps to recover the exact original text without being affected by transmission error.
Fig. 5 shows a detailed block diagram of the target data analyzer 110 shown in Fig. 1. A data format analyzer
510 analyzes audio or image signals in various formats and extracts data which represents only audio or image without including additional information such as a header. Specifically, when image signals are inputted to the data format analyzer 510, it detects the size of the image and provides it to the 2-D formatter 120 as the target data format information. The analyzer 510 extracts raw 2-D image data representing pixel values. The analyzer 510 provides the image data in 2-D format to the YIQ converter 520 in case of the color image and directly to the image watermark inserting block 130 in case of the black and white image. The YIQ converter 520 converts the color image in RGB mode into the color image in YIQ mode and provides the only Y component to the image watermark inserting block 130. Thus, a watermark is inserted into the Y component of an image.
When audio signals are inputted to the data format analyzer 510, the data format analyzer 510 extracts raw audio stream and provides it in 2-D image format to the image watermark inserting block 130. In doing this, the 2-D image format, for example the size of the image, may be assigned to a certain value or may be determined by a user.
Fig. 6 is a detailed block diagram of the image watermark inserting block 130 shown in Fig. 1. The Y component of the color image, the black-and-white image or audio data in 2-D format, which is provided from the target data analyzer 110, is transformed by WT in a wavelet transform block 610 shown in Fig. 6. The text image from the 2-D formatter 120 is transformed by DCT in the DCT block 620. The transformed data is combined in the mixer 630 and then transformed by inverse wavelet transform (" IWT" ) in the IWT block. The inverse wavelet transformed data is audio data, B/W image data or Y component of the color image where a text watermark is inserted. The watermarked data may be distributed via the Internet by an Internet management server. Although not shown in the figure, in case of a color image, I and Q components may bee recombined into the watermarked Y component and YIQ image data may be converted back to RGB format before being distributed.
Although not shown in the figures, an error correcting encoder may be used to make it possible to recover the original text without being affected by transmission error after the watermarked data is transmitted via the Internet. The error correcting encoder can be placed before the data is transmitted over the Internet. The error correcting encoder 330 may utilize, without limitation, parity bits, convolutional coding or any other known error correcting coding method. Fig. 7 shows a process for embedding a text watermark. In step S700, audio or image data in 2-D image format ("D") is provided.
In step S710, D is transformed by WT(TWT) to provide transformed data "X" . In the present invention, image or audio signal in 2-D format is transformed by DWT before being mixed with the transformed text watermark. To reduce computational burden, a fast WT using filter banks is used.
In step S730, a text image W is provided and it is transformed by discrete cosine transform (" DCT" , TDCT) in step S740 to provide transformed text image y. In step S720, the transformed text image y is weighted by α and then added to the transformed data X. With large value of α, it is easy to recover the watermark, but embedding of a watermark may cause degradation in the quality of audio or image. With a small value of α, even slightest noise added to a watermarked data may make it difficult to recover the text watermark. The value of weight α may be decided by a user. Alternatively, an optimum weight value may be determined after testing with typical image or audio data. The combined data X' is transformed by IWT in step S750, to provide watermarked audio or image data D^,.
As described above, in the present invention, a text is first converted into a text image in a 2-D image format and then a method for inserting a 2-D watermark (watermark image) into the 2-D data (original image) is utilized which will be explained below.
In an alternative embodiment of the present invention, transformed text image TDCT(W) may be transformed by WT before it is combined with TWT(D). In that case, image/audio data and TDCT(W) may be transformed in different signal levels .
Fig. 8 shows an apparatus for extracting the original text from a text watermarked audio/image data. The text watermarked data and the original image/audio data are transformed by WT in blocks 810 and 820 respectively and the difference between them is calculated. The difference is transformed by IDCT to provide a recovered text image. From the recovered text image, the text extractor 850 determines what the original text was. Fig. 9 shows a block diagram of the text extractor shown in Fig. 8. Since data in the recovered text image is obtained by IDCT, it has floating point values. In the integer conversion block 910, these floating point values are converted to one of the assigned values by truncation. In one embodiment, in case that the assigned values are 0 and 255, values not greater than 128 are converted to 0 and values greater that 128 are converted to 255. Various other methods may be used to select one assigned value used in the watermarking system for each of the floating point numbers. After being converted to assigned values, the data is subject to processing steps which are the inverse of the process for making a text image out of a text, which is explained with reference to Figs. 2 and 3.
As mentioned above, a text image includes repeated sets of assigned values and, marks or blanks between sets. From the value set extracting block 920, a number of value sets are provided, excluding blanks and marks.
Data (0 or 255) in each value set is converted to a set of binary bits in the inverse mapping block 940. In the candidate text generation block 950, the inverse of the process performed in the bit generator 310, that is, conversion of each set of bit stream into a text is done. A plurality of texts obtained from the sets of binary bit stream are called candidate texts. Although not shown in the figure, the text extractor may include an error correction decoder which corresponds to an error correction encoder included in the watermark embedding stage, to correct errors such as transmission errors . Since identical value sets are repeated to form the text image in the watermark embedding apparatus, value sets extracted by the value set extracting block 920 should be identical provided that there was no transmission errors and thus candidate texts should be all identical. Even if all of the candidate texts are not identical because of transmission error, one can recover the original text by, for example, selecting the most frequent text.
Methods for producing a text image from a text is not limited to those described in this specification. For example, in one embodiment of the present invention, for each symbol, 8 by 8 image matrix is determined so that the matrix represents the shape of the symbol. To form a text image, a number of 8 by 8 matrices corresponding to the text are repeated to fill a 2-D image. In the text image which is created by this method, the shapes of the symbols in the text are repeated. After the text image is inserted into image or audio data and then transmitted, a symbol which best matches each 8 by 8 matrix in a recovered text image should be decided in order to recover the original text. To do this, various matching technique can be used, including but not limited to character recognition method that uses a neural network.
The text watermark inserting apparatus 100 or the text recovering apparatus is depicted as apparatus including many functional blocks. Preferably, they can be implemented as computer programs which are executed in a general-purpose computer such as a personal computer or workstation. Each functional block will correspond to each sub-program or subroutine. Especially, as the computational capability of personal computers is increased and the memory capacity gets much larger, it is possible to process image data in a personal computer. After the watermarking process is done in a personal computer, the watermarked data may be distributed over the Internet coupled by modem or other communication lines without going through the server shown in Fig. 1. Similarly, recovering of text from watermarked data can be done in the personal computer.
In a program for watermarking, the text used as a watermark may be inputted through keyboard. The program may be designed to receive two assigned values, the method for repeating the value sets, and the weight value used by combining X and y shown in Fig. 7 from users of the program.
A text watermarking method of the present invention may be applied to communication of important transaction data in the electric commerce. For example, important data such as transaction order, electronic money, debit note can be transmitted securely without being disclosed to a third party by using the method of the present invention.
Users can transmit and receive data directly with each other by using the text watermark embedding and extracting method of the present invention. However, by establishing an independent watermarking institution as shown in Fig. 10 and 11, more secure data transmission can be achieved. In the system shown in Fig. 10, the user can only insert a text watermark into an original data while a server in the institution can extract the watermark from the watermarked data. On the contrary, in the system shown in Fig. 11, the user can only extract text watermark from watermarked data while a server in the institution inserts text watermark. Fig. 10 shows an embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention. In the system shown in Fig. 10, the watermarking institution includes a database of user information, a database of image/audio data, a text extracting program and an encoding program. If a user A selects and requests one among the image/audio data stored in the watermarking institution via network, a server in the watermarking institution transmits the image/audio data to the user. The user A inserts a text watermark to this data and transmits the watermarked data back to the watermarking institution. The watermarking institution extracts the watermark from the watermarked data, encodes the original image/audio data and the watermark using its own encoding scheme, and sends the encoded data to a user B. The user B can obtain the image/audio data and the text by decoding the encoded data. The user A and the watermarking institution have the watermarking/extracting method in common, while the watermarking institution and the user B have the encoding/decoding method in common. But both of encoding and decoding methods or inserting and extracting method are not disclosed to the general public. As a result the overall system may be very secure. Thus, by using this scheme, it is possible to transfer important data without being tampered even via an insecure communication network such as the Internet.
Fig. 11 shows another embodiment of a system for transmitting/receiving data on the Internet which utilizes the text watermark embedding and text extracting method of the present invention. In the system shown in Fig. 11, the watermarking institution includes a database of user information, a database of image/audio data, a text watermarking program and a decoding program. First, a user sends to the watermarking institution data encoded by an encoding method predetermined between the user A and the watermarking institution. The user also selects image/audio data in the database of the institution. Then, the server of the watermarking institution decodes the encoded text, inserts the text into the selected image/audio signal as a watermark and transfers the watermarked data to a user B. The user B extracts the text by using a program which does the exact inverse of the watermarking procedure in the institution.
By including a third party institution in the system, either insertion or extraction is only done by the institution and thus both of them do not have to be disclosed to the general public. Further, billing for the use of the watermarking method becomes easier.
Compared to the conventional watermarking method where random numbers are used as watermarks, the present invention makes it easier to embed copyright related information into image/audio data. Also, by repeating the value set and using the error correction method, it is possible to recover the original text even after watermarked data is transmitted through a noisy channel. By using DCT and WT, the text watermark data is not much damaged after undergoing digital processing such as compression, filtering and re-sampling.
While the present invention has been described and illustrated with respect to the particular embodiment, it will be apparent to those skilled in the art that variations and modifications are possible without deviating from the broad principles and teachings of the present invention which should be limited solely by the spirit and scope of the claims appended hereto.

Claims

WHAT IS CLAIMED IS:
1. A method of inserting/embedding a text into digital data comprising the steps of:
(a) converting said digital data to have a 2-dimensional image format;
(b) converting the text to have the same 2-dimensional image format; and (c) inserting the converted text into the converted digital data.
2. The method according to claim 1 wherein said text includes one or more of a character, a symbol, and at least part of image or audio which can be generated, represented, received or transmitted in a computer or a combination thereof.
3. The method according to claim 1, wherein said text is made of a series of symbols such as alphanumeric characters.
4. The method according to claim 3, wherein said converting step comprises: converting said symbols to a corresponding set of assigned values; and repeating said set of assigned values in series to form the text in the 2-dimensional format.
5. The method according to claim 4, wherein said repeating step includes placing said set of assigned values in at least one predetermined position in said image format.
6. The method according to claim 4, wherein said repeating step includes inserting a mark between two consecutive sets of assigned values, said mark being distinct from the assigned values.
7. The method according to claim 4, wherein said repeating step includes: converting the set of assigned values into one or more lines in the 2-dimensional image format; and repeating said one or more lines to form the text in the image format .
8. The method according to claim 4, wherein said step of converting said symbols into a corresponding set of assigned values includes: converting said symbols into a set of binary bit stream; and converting said binary bit stream into said assigned values .
9. The method according to claim 8, wherein said assigned values are two pixel values ranging from 0 to 255.
10. The method according to claim 9, wherein said two pixel values being much apart in distance from each other.
11. The method according to claim 1, wherein said digital data represent image or audio signal.
12. The method according to claim 11, wherein said step of converting said digital data into a predetermined 2- dimensional image format includes: extracting format information from the digital data; and if the digital data represents color image signal, converting the color image from RGB format into YIQ format, extracting the Y component, and providing the Y component in the predetermined image format.
13. The method according to claim 11, wherein said step of inserting the text in 2-dimensional format into the digital data in said 2-dimensional format includes: converting the digital data in the 2-dimensional format by using discrete wavelet transform; converting the text in the 2-D format by using discrete cosine transform; and combining discrete cosine transformed text in the 2- dimensionals format with wavelet transformed digital data, to provide text watermarked digital data.
14. The method according to claim 13, wherein said combining step includes: adding the discrete cosine transformed text in the 2- dimensional format with the wavelet transformed digital data; and inverse wavelet transforming the added data.
15. The method according to claim 14, wherein said combining step further includes: weighting the discrete cosine transformed text in the 2-dimensional format before added to the wavelet transformed digital data.
16. A method of extracting a text from text watermarked digital data which is obtained by: converting original digital data to one in a predetermined 2-dimensional image format; converting the text to one in said predetermined 2- dimensional image format; and inserting the converted text into the digital data, to provide text watermarked digital data, said method comprising the steps of: providing a recovered text in the 2-dimensional format by using the text watermarked digital data and the original digital data; and extracting the text from the recovered text in the 2-D format .
17. The method according to claim 16, wherein said step of extracting recovered text in the 2-dimensional format includes : mapping each data in the recovered text in the 2- dimensional format into one of assigned values; obtaining sets of assigned values from the mapped values; converting each set of assigned values into binary bit stream; deciding a candidate text for each binary bit stream; selecting one among the candidate texts and providing the selected one as the text.
18. The method according to claim 16, wherein said step of providing the recovered text in the 2-D format includes: discrete wavelet transforming the text watermarked digital data and the original digital data and determining the difference between the two discrete wavelet transformed data; and inverse discrete cosine transforming the difference, to provide the recovered text in the 2-dimensional format .
19. A method of inserting a text into original digital data and transferring the text inserted digital data, comprising the steps of: converting the digital data to one in a predetermined 2-dimensional image format; converting the text to one in said predetermined 2- dimensional image format; inserting the converted text into the converted digital data in the 2-dimensional format, to provide text watermarked digital data; transmitting said text watermarked digital data; receiving the text watermarked digital data; recovering the converted text of the 2-dimensional format by using the text watermarked digital data and the original digital data; and extracting the text from the recovered text.
20. A system for inserting a text into digital data and transferring the text inserted digital data, comprising:
(a) means for inserting a text watermark into digital data, to provide text inserted digital data;
(b) means for transmitting and receiving the text watermarked digital data; and
(c) means for extracting the text from the received digital data, wherein said means for inserting includes:
(al) means for converting the digital data in a predetermined 2-dimensional image format; (a2) means for converting the text in the predetermined 2-dimensional image format; and (a3) means for inserting the converted text into the converted digital data, thereby providing the text inserted digital data, and said means for extraction includes:
(cl) means for recovering the converted text of the 2-dimensional format by using the text inserted digital data and the digital data; and (c2) extracting the text from the recovered text.
21. Computer readable storage medium where a program of computer-executables instructions is embodied to perform steps in a method for inserting a text watermark to digital data, said method comprising the steps of: converting said digital data in a predetermined 2- dimensional image format; converting the text in said predetermined 2- dimensional image format; and inserting the converted text into the converted digital data.
22. Computer readable storage medium where a program of computer-executable instructions is embodied to perform steps in a method of extracting a text from text watermarked digital data which is obtained by: converting digital data in a predetermined 2- dimensional image format; converting a text in said predetermined 2-dimensioanl image format; and inserting the converted text into the converted digital data, to provide the text watermarked digital data, said extracting method comprising the steps of: recovering the converted text of the 2-dimensional format by using the text watermarked digital data and the digital data; and extracting the text from the recovered text.
23. A system for extracting a text from text watermarked digital data and transmitting the extracted text, comprising: means for storing a plurality of digital data; means for transmitting, to a first user, digital data selected in response to a request of the first user; means for receiving the text watermarked digital data which is generated by converting the digital data transmitted to the first user in a predetermined 2- dimensional format, converting a text selected by the first user in said predetermined 2-dimensional format, and inserting the formatted text into the formatted digital data; means for recovering said converted text of the 2- di ensional format by using the text watermarked digital data and the selected digital data; means for extracting the text from the recovered text; means for encoding the extracted text; and means for transmitting the encoded text to a second user.
24. A system for inserting a text watermark into digital data and transmitting the text watermarked digital data, comprising:
(a) means for receiving an encoded text which has been encoded by a first user;
(b) means for decoding the encoded text;
(c) a database including a plurality of digital data ;
(d) means for inserting the decoded text into digital data selected in response to a request of the first user, to provide text watermarked digital data; and (e) transmitting the text watermarked digital data to a second user, wherein said means for inserting comprises:
(dl) means for converting the selected digital data to a predetermined 2-dimensional image ; (d2) means for converting the decoded text to a predetermined 2-dimensioanl image; and
(d3) means for inserting the converted text into the converted digital data.
PCT/KR2000/001114 1999-12-16 2000-10-06 Method and apparatus for embedding text watermark WO2001045316A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2001546085A JP2003517769A (en) 1999-12-16 2000-10-06 Method and apparatus for inserting text watermark
AU76912/00A AU7691200A (en) 1999-12-16 2000-10-06 Method and apparatus for embedding text watermark

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1019990058131A KR100337954B1 (en) 1999-12-16 1999-12-16 Text watermark embedding method and apparatus
KR1999/58131 1999-12-16

Publications (1)

Publication Number Publication Date
WO2001045316A1 true WO2001045316A1 (en) 2001-06-21

Family

ID=19626224

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2000/001114 WO2001045316A1 (en) 1999-12-16 2000-10-06 Method and apparatus for embedding text watermark

Country Status (4)

Country Link
JP (1) JP2003517769A (en)
KR (1) KR100337954B1 (en)
AU (1) AU7691200A (en)
WO (1) WO2001045316A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100434727B1 (en) * 2002-02-08 2004-06-07 (주)드림투리얼리티 Method for inserting password in image file
US7046818B2 (en) 2001-07-20 2006-05-16 Seiko Epson Corporation Standards compliant watermarking for access management
US7124442B2 (en) 2001-07-25 2006-10-17 440 Pammel, Inc. System and method for insertion and retrieval of microthreads in transmitted data
US7668205B2 (en) 2005-09-20 2010-02-23 Celo Data, Inc. Method, system and program product for the insertion and retrieval of identifying artifacts in transmitted lossy and lossless data
CN101699508B (en) * 2009-09-03 2012-01-11 中兴通讯股份有限公司 Image digital watermark embedding and extracting method and system
KR101310140B1 (en) 2012-01-19 2013-09-23 금오공과대학교 산학협력단 Integrity checking Process of Image using Reversible Watermarking Process Tecjnique
US8566857B2 (en) 2005-09-20 2013-10-22 Forefront Assets Limited Liability Company Method, system and program product for broadcast advertising and other broadcast content performance verification utilizing digital artifacts
US8566858B2 (en) 2005-09-20 2013-10-22 Forefront Assets Limited Liability Company Method, system and program product for broadcast error protection of content elements utilizing digital artifacts
US8966517B2 (en) 2005-09-20 2015-02-24 Forefront Assets Limited Liability Company Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100734397B1 (en) * 2005-09-12 2007-07-02 엘지전자 주식회사 apparatus and method for providing multimedia file, and apparatus and method for reproducing the download multimedia file
FR2894759A1 (en) * 2005-12-12 2007-06-15 Nextamp Sa METHOD AND DEVICE FOR FLOW TATTOO
JP2008219552A (en) * 2007-03-06 2008-09-18 Nec Corp Device for generating image data for authentication, authentication device, method of generating image data for authentication, authentication method, and program
KR100967725B1 (en) 2008-04-29 2010-07-05 전북대학교산학협력단 The method of generation and restoration of added value copyright information for protection of still images intellectual property

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0901102A2 (en) * 1997-09-03 1999-03-10 Hitachi, Ltd. Watermark embedding method and system
WO1999063443A1 (en) * 1998-06-01 1999-12-09 Datamark Technologies Pte Ltd. Methods for embedding image, audio and video watermarks in digital data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0901102A2 (en) * 1997-09-03 1999-03-10 Hitachi, Ltd. Watermark embedding method and system
WO1999063443A1 (en) * 1998-06-01 1999-12-09 Datamark Technologies Pte Ltd. Methods for embedding image, audio and video watermarks in digital data

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7046818B2 (en) 2001-07-20 2006-05-16 Seiko Epson Corporation Standards compliant watermarking for access management
US7124442B2 (en) 2001-07-25 2006-10-17 440 Pammel, Inc. System and method for insertion and retrieval of microthreads in transmitted data
KR100434727B1 (en) * 2002-02-08 2004-06-07 (주)드림투리얼리티 Method for inserting password in image file
US7668205B2 (en) 2005-09-20 2010-02-23 Celo Data, Inc. Method, system and program product for the insertion and retrieval of identifying artifacts in transmitted lossy and lossless data
US8566857B2 (en) 2005-09-20 2013-10-22 Forefront Assets Limited Liability Company Method, system and program product for broadcast advertising and other broadcast content performance verification utilizing digital artifacts
US8566858B2 (en) 2005-09-20 2013-10-22 Forefront Assets Limited Liability Company Method, system and program product for broadcast error protection of content elements utilizing digital artifacts
US8966517B2 (en) 2005-09-20 2015-02-24 Forefront Assets Limited Liability Company Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts
USRE47229E1 (en) 2005-09-20 2019-02-05 Gula Consulting Limited Liability Company Method, system and program product for broadcast operations utilizing internet protocol and digital artifacts
CN101699508B (en) * 2009-09-03 2012-01-11 中兴通讯股份有限公司 Image digital watermark embedding and extracting method and system
KR101310140B1 (en) 2012-01-19 2013-09-23 금오공과대학교 산학협력단 Integrity checking Process of Image using Reversible Watermarking Process Tecjnique

Also Published As

Publication number Publication date
KR100337954B1 (en) 2002-05-23
KR20010056598A (en) 2001-07-04
JP2003517769A (en) 2003-05-27
AU7691200A (en) 2001-06-25

Similar Documents

Publication Publication Date Title
EP1953752B1 (en) Embedding and detecting hidden information
US7817818B2 (en) Digital watermark embedding method, digital watermark embedding apparatus, and storage medium storing a digital watermark embedding program
Pereira et al. Fast robust template matching for affine resistant image watermarks
KR100465950B1 (en) Information processing apparatus and its control method, storage medium storing computer program
US6834344B1 (en) Semi-fragile watermarks
US20060153424A1 (en) Image processing apparatus and method, program code and storage medium
Chandramouli et al. Digital watermarking
WO2002015586A9 (en) Method and system of watermarking digital data using scaled bin encoding and maximum likelihood decoding
US6671387B1 (en) Watermarking of a digitized image
WO2001045316A1 (en) Method and apparatus for embedding text watermark
EP1316917B1 (en) Apparatus and method for embedding watermark into original information, transmitting watermarked information, and reconstructing the watermark
Tseng et al. Steganography using JPEG-compressed images
US6724913B1 (en) Digital watermarking
Lin et al. Both color and gray scale secret images hiding in a color image
Rakhmawati et al. Blind Robust and Self-Embedding Fragile Image Watermarking for Image Authentication and Copyright Protection with Recovery Capability.
CN114745475A (en) Robust reversible information hiding method for encrypted image
Banik et al. Review on steganography in digital media
CN115545998A (en) Blind watermark embedding and extracting method and device, electronic equipment and storage medium
CN110047495B (en) High-capacity audio watermarking algorithm based on 2-level singular value decomposition
Ayyappan et al. A review on reversible data hiding techniques
Bandyopadhyay Genetic Algorithm Based Substitution Technique of Image Steganography
Imran et al. A robust method for encrypted data hiding technique based on neighborhood pixels information
Chang et al. A feature-oriented copyright owner proving technique for still images
Memon et al. Authentication techniques for multimedia content
Patra et al. Robust CRT-based watermarking technique for authentication of image and document

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AU AZ BA BB BG BR BY BZ CA CN CR CU CZ DM DZ EE GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LV MA MD MG MK MN MW MX MZ NO NZ PL RO RU SD SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 546085

Kind code of ref document: A

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase