WO2003013142A1 - Digital image watermarking - Google Patents
Digital image watermarking Download PDFInfo
- Publication number
- WO2003013142A1 WO2003013142A1 PCT/GB2001/005207 GB0105207W WO03013142A1 WO 2003013142 A1 WO2003013142 A1 WO 2003013142A1 GB 0105207 W GB0105207 W GB 0105207W WO 03013142 A1 WO03013142 A1 WO 03013142A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- digital
- watermark
- digital watermark
- points
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0064—Geometric transfor invariant watermarking, e.g. affine transform invariant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
- H04N1/32165—Transform domain methods using cosine transforms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
- H04N1/3217—Transform domain methods using wavelet transforms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32352—Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23892—Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Definitions
- This invention relates to a method and apparatus for watermarking digital images, particularly digital video images.
- This invention was produced in an attempt to overcome this problem, at least in part.
- this invention provides a method of digital watermarking in which a digital watermark is embedded into a first digital image and it is subsequently attempted to identify the digital watermark in a second digital image, including the steps of: measuring intensity gradients at a number of selected points in the first image; measuring intensity gradients at multiple points in the second image; comparing the measured intensity gradients in the first and second images and identifying a point in the second image corresponding to each selected point in the first image based on the comparison; calculating the changes between the first and second images from the differences between the locations of the selected points in the first image and the corresponding points in the second image; and correcting for the calculated changes between the first and second images when attempting to identify the watermark in the second image.
- this invention provides a method of digital watermarking in which an encoded digital signal is operated on by a decoding means to provide a displayable digital signal and the decoding means incorporates a digital watermark into the displayable digital signal.
- Figure 1 A shows a first Sobel operator for use in a first embodiment of the invention
- Figure IB shows a second Sobel operator for use in the first embodiment of the invention.
- a digital watermark is formed by data inserted into a digital image identifying the image producer or issuer, the watermark data being uniquely identifiable and recoverable from the image data or copies thereof and not effecting the appearance of the image produced from the data.
- Digital watermarking of digital images including digital video images can be used to validate the source of images or video and can also be used in various applications such as copy protection, fingerprinting, cost monitoring and data authentication.
- Watermarking In order for digital watermarking to be effective it must be both invisible and secure. Watermarking must be invisible to legitimate viewers of the image or video when this is displayed in the expected or normal manner. Further, the watermark must ideally be invisible or undetectable by unauthorised third parties making illicit copies because if they are able to detect the watermark they will usually be able to remove it or at least corrupt it sufficiently to prevent subsequent recovery and identification of the digital watermark.
- the digital watermark should be secure and reliable so the embedded digital watermark can be reliably extracted from the digital image or video or copy thereof and be reliably and unambiguously identified.
- the digital watermark must be robust in order to prevent it being removed either deliberately or unintentionally from the digital image or video.
- Unintentional removal of the digital watermark can take place during conventional video processing and editing using techniques such as noise reduction which is commonly applied during video processing before encoding, for example, using MPEG, in order to achieve better compression.
- a digital watermark is known or suspected illicit copiers may also make deliberate attempts to remove the digital watermark in order either to conceal the fact that a copy is an illicit copy or to prevent identification of the source of the illicit copy.
- the source being the legitimate copy from which illicit copies have been derived or the part of the supply channel allowing such copying.
- removal of the digital watermark is used to refer to the digital watermark being corrupted or damaged to such a degree that it can no longer be reliably identified or information encoded into the digital watermark can no longer be extracted and is not intended to be limited to the total deletion of the digital watermark from the digital image or video such that the digital image or video is returned to its condition before the digital watermark was applied.
- the most straightforward and reliable digital watermarking techniques are correlation-based algorythms.
- correlation techniques a key generated pseudo random pattern is added to either the video data or a transform of the video data as a digital watermark.
- the correlation between the video data or the appropriate transform thereof and a pseudo random pattern generated by the same key is calculated and the degree of correlation compared to a threshold.
- a high level of correlation confirms the presence of the watermark and a low level of correlation indicates the absence of the watermark.
- a digital watermark should carry as much energy as possible without it being visible so that destruction of the watermark will cause the watermarked image or video image to loose its economic value because of the harm done to the overall appearance of the image.
- the two plain problems in employing digital watermarks in digital video images are ensuring that the digital watermark can be reliably detected and recovered, that is, ensuring that the digital watermark is robust enough to resist accidental or deliberate removal, and concealing the digital watermark from illicit copiers who wish to remove or corrupt it.
- Possible geometric transforms include translation, scaling , rotation, skewing, tilting etc.
- markers added to a digital video signal are high frequency noise and like other forms of high frequency noise are vulnerable to removal by simple operations such as low pass filtering or digital to analogue followed by analogue to digital conversion.
- the fundamental characteristics of the digital video image itself are used to determine any changes such as geometric transforms that the digital image has suffered relative to the original image.
- the fundamental characteristics of the digital video image such as edges, shapes and texture cannot be changed inadvertently during transmission or processing of a video image or deliberately by illicit copiers without rendering the copy video valueless, because without them there is no video image.
- an alteration detection algorithm using image intensity gradients is applied to the video image copy.
- the gradients in the digital video image can be measured in a number of ways.
- One preferred method is to measure the gradients in the digital video image using Sobel opperators, such as those shown in Figures 1A and IB, to determine the amount of change in intensity, or in other words the gradient, at a particular pixel location in a particular direction.
- the operator shown in Figure 1 A detects vertical gradient G y and the operator shown in Figure IB detects horizontal gradient G x .
- Sharp horizontal edges have high vertical gradients and low horizontal gradients whilst sharp vertical edges have high horizontal gradients and low vertical gradients.
- Diagonal edges have high gradients in both directions, while srrioother areas have low gradients in both directions.
- the alteration detection is carried out as follows.
- the source video image is divided into blocks, for example 32 x 32 pixel blocks.
- the blocks along the image boundaries are then excluded because some or all of the pixels in these blocks could be lost from the image either by conventional video processing or by deliberate attack.
- Some or all of the remaining blocks are then chosen. Where only some blocks are chosen they are preferably dispersed across the image in a grid or other predetermined geometric arrangement.
- the gradients of each pixel within the blocks are calculated.
- the pixel with the greatest overall gradient which is defined as the sum of the absolute values of G x and G y is found and is selected as the salient point within that block.
- a search window in the copy video image is centered on the position in the copy video corresponding to the position of each selected salient point in the source image and a search made for the pixel within the search window having the best match to the selected salient point .
- the pixel having the closest gradient values G x and G y to the values of the selected salient point within the corresponding search window is identified as being the pixel in the copy video image corresponding to the respective selected salient point in the source video image.
- the size of the blocks of the source image, the number of the possible blocks used and the size of the search windows can be varied.
- the search window should be larger than the blocks in order to minimize the possibility of the changes moving the salient point outside the window.
- I(X n ) A x +B x S(X n )
- I(Y n ) A y +B y S(Y n )
- the values of A, B x and B y can be obtained easily by applying linear regression using the coordinate pairs in the correlation list. Once the values of A, B x and B y are known the copied image can be translated back to its original position and scaled back to its original scale. The embedded watermark can then be recovered.
- pixel gradients provide considerable advantages over the use of pixel intensities. Firstly, pixel gradients-are more likely to be unique over a local area than pixel intensities. Also pixel intensity data is vulnerable to attacks such as slight grey level shifting, which will not affect gradient data. For 8-bit images for example, pixel intensities range from 0 to 255, while each gradient G x or G y in each direction can range from below -1000 to over +1000. Thus, the combination of G x and G y of a pixel has a much large range of possible values than the pixel intensity so that it is more likely to be unique over a local area. Further, in practice images more commonly ; include groups of pixels having the same or very similar intensities than groups of pixels having the same or very similar gradients.
- the change detection process can exclude blocks including such uniform edges from consideration so that such blocks are not used to identify and select salient points.
- the change detection process compares the overall gradient of the salient point identified and selected within each block to a threshold and excludes those blocks in which the overall gradient is below the threshold from further consideration. This eliminates large smooth areas from consideration.
- This comparison of intensity gradients allows the changes between an original digital video image and a copy digital video image to be identified and corrected for so that an embedded watermark can be recovered even after filtering, reformatting or conversion between the digital and analogue domains and vice versa. This applies to all forms of change including scaling, repositioning or skewing.
- the digital watermark embeds a pseudo random code or other data sequence into the mid-frequency components of the transform of the main of the digital video image and is recovered from a digital video image using a correlation technique.
- the watermark should be embedded into the luminance data part of the digital video image instead of the chrominance data part.
- the embedding of the digital watermark into the luminance part of the digital video image signal instead of the chrominance part provides the advantage that because the luminance part of the video image is the most visible part the degradation in the quality of the copy digital video image which will occur if the digital video image is corrupted or changed sufficiently to remove the digital watermark is maximised.
- the more energy the watermark carries that is the greater the difference between the digital video signal with and without the watermark, the more robust the watermark will be. Accordingly, it is advantageous for the watermark to carry as much energy as possible without it becoming visible.
- the maximum amount of energy that can be carried by an embedded digital watermark without affecting the perceived video image and becoming visible is increased if the digital watermark is embedded into higher frequency areas of the digital video signal. This is because the human visual system is more sensitive to noise, which is how the digital watermark is perceived, in low frequency or smooth parts of the digital image than in high frequency or detailed parts of the video image. Thus, a higher energy digital watermark can be embedded into high frequency or detailed parts of the digital video image without the digital watermark being visible. As a result of this higher energy the digital watermark is more robust to attacks such as noise filtering.
- Digital watermarks embedded in the spatial domain are low power high frequency noise added to the video image signal and as a result arevulnerable to attacks by processing techniques such as noise reduction or low pass filtering.
- a preferred transform is the discreet wavelet transform or DWT.
- the discreet cosine transform or DCT can be used.
- the DWT transform is preferred because this gives a better match to the performance of the human visual system.
- the DWT decomposition bands to be used for digital watermarking are partitioned into blocks of suitable size to allow the required amount of the digital watermark data to be embedded, for example the bands can be partitioned into 32 by 32 or 64 by 64 blocks. These relatively large blocks together with appropriately selected correlation thresholds provide a relatively robust digital watermarking system in which the digital watermark can be reliably extracted by correlation.
- attack on a digital watermark embedded in the first stage DWT decomposition bands have a relatively limited adverse effect on the reconstructed or copied video image.
- the first stage or stage 1 wavelet decomposition bands correspond to the highest frequency parts of the digital image representing the finest details of horizontal, vertical and diagonal edges in the video image. Tampering with or removal of these coefficients will cause some loss of detail in the video image but will often not make the image unwatchable or unacceptable.
- the maximum energy which can be carried by the digital watermark is limited by the requirement that the digital watermark should not have any visible effect on the displayed video image. It is preferred that the watermarking procedure controls the energy held in the digital watermark to be as high as possible without affecting the digital video image in response to the characteristics of the part of the video image in which the watermark is to be embedded, taking into account the features of the human visual system. It is preferred to carry out this process by measuring the variance of the part of the video image where the digital watermark is to be embedded and to control the weight or energy of the digital watermark based on this variance.
- the digital watermark itself is preferably a pseudo random code embedded into multiple parts of the image and recoverable or identifiable by correlation as discussed above.
- the image is divided into a number of areas corresponding to the number of bits in the digital watermark so that a separate binary digit of the digital watermark can be embedded into and recovered from each of these parts of the image.
- the digital watermark according to the invention is sufficiently robust to survive digital to analogue and analogue to digital conversion. Accordingly the watermark can be extracted from analogue copies of the digital original, provided they are digitised first.
- the pseudo random code of the digital watermark can be used to deter copyright infringement by encoding the origin or distribution channel of the digital image into the digital watermark in a second embodiment of the invention.
- the second embodiment of the invention provides a watermarking scheme in which an encrypted digital video image signal is received by a consumer decrypting device, for example a set top box, which inserts a digital watermark into the decrypted video signal sent for display.
- a consumer decrypting device for example a set top box
- the digital watermarking can be recovered from the illicit copies and the consumer decrypting device, and thus the consumer producing the illicit copies or allowing their decrypted video signal to be used to produce the encrypted copies can be identified.
- the digital watermarking scheme is a two stage digital watermarking process in which a first video watermark is applied by the distributor or content provider transmitting the encrypted digital video signal and a second digital watermark is inserted by the customer equipment.
- a particularly useful application of the second embodiment of the invention is for use in the field of distributing pay per view or subscription only video, as follows.
- the digital video signal has a first digital watermark embedded into it by the video supplier identifying the video supplier.
- the video supplier encodes the digital video signal, for example using MPEG, and transmits it to subscribers, for example through a fibreoptic cable digital network.
- the supplier digital watermark may be embedded into the signal before encoding.
- the encoded digital video signal is received by an authorised subscriber having a subscriber set top box.
- the set top box decodes the encoded digital signal using a subscriber smart card which also carries a unique subscriber identity code.
- the set top box decodes the received encoded video signal to produce a decoded viewable video signal and simultaneously embeds into the viewable decoded video signal a digital watermark including the unique subscriber identity code. If the subscriber makes or allows to be made illicit copies of the decoded viewable digital video signal, the digital watermark carrying the unique subscriber identity code can be recovered from these copies.
- the example of the second embodiment of the invention refers to the unique subscriber identity being encoded into the second watermark it is only necessary that the unique subscriber identity be deduceable from the second watermark.
- the digital image is a digital video image. This is expected to be the most commercially valuable application of the invention.
- the invention can be applied to digital watermarking of other forms of signal such as still images.
- the transmitted digital video signal is encoded. It is not essential that the transmitted signal be encoded, some other form of copy protection requiring that the received signal be processed by the set top box could be used such as transmitting the digital video signal in a deliberately degraded form requiring processing by the set top box to reproduce the original digital video image.
- the transmitted digital video signal may also or alternatively be encrypted.
- the described example of the second embodiment of the invention refers to the use of a consumer set top box to carry out decoding with the unique consumer identity being stored in and read from a subscriber smart card.
- the second embodiment of the invention is equally applicable to other forms of signal processing equipment and other techniques for providing a unique subscriber identity to be embedded into the second digital watermark.
- the unique code embedded into the second digital watermark could be unique to the data processing device used to provide the viewable digital video signal rather than the subscriber if preferred.
- the encoded video signal includes a digital watermark identifying the provider so that the displayable video signal includes two digital watermarks identifying the provider and the subscriber. This is preferred but not essential, the displayable video signal may include only the digital watermark identifying the subscriber.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0118352.4 | 2001-07-27 | ||
GB0118352A GB0118352D0 (en) | 2001-07-27 | 2001-07-27 | Digital image watermarking |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003013142A1 true WO2003013142A1 (en) | 2003-02-13 |
Family
ID=9919315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2001/005207 WO2003013142A1 (en) | 2001-07-27 | 2001-11-26 | Digital image watermarking |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB0118352D0 (en) |
WO (1) | WO2003013142A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010073236A1 (en) * | 2008-12-22 | 2010-07-01 | France Telecom | A method of and apparatus for authenticating data content |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0975165A2 (en) * | 1994-07-08 | 2000-01-26 | Sony Corporation | Receiving controlled-access broadcast signals |
WO2000013136A1 (en) * | 1998-08-31 | 2000-03-09 | Digital Video Express, L.P. | Watermarking system and methodology for digital multimedia content |
EP1005229A2 (en) * | 1998-11-23 | 2000-05-31 | Hewlett-Packard Company | Apparatus and method for modifying a compressed video signal |
FR2789783A1 (en) * | 1999-02-16 | 2000-08-18 | Canon Kk | Method of insertion and extraction of a digital signature |
-
2001
- 2001-07-27 GB GB0118352A patent/GB0118352D0/en not_active Ceased
- 2001-11-26 WO PCT/GB2001/005207 patent/WO2003013142A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0975165A2 (en) * | 1994-07-08 | 2000-01-26 | Sony Corporation | Receiving controlled-access broadcast signals |
WO2000013136A1 (en) * | 1998-08-31 | 2000-03-09 | Digital Video Express, L.P. | Watermarking system and methodology for digital multimedia content |
EP1005229A2 (en) * | 1998-11-23 | 2000-05-31 | Hewlett-Packard Company | Apparatus and method for modifying a compressed video signal |
FR2789783A1 (en) * | 1999-02-16 | 2000-08-18 | Canon Kk | Method of insertion and extraction of a digital signature |
Non-Patent Citations (7)
Title |
---|
CELIK M U ET AL: "Analysis of feature-based geometry invariant watermarking", SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, SAN JOSE, CA, USA, 22-25 JAN. 2001, vol. 4314, Proceedings of the SPIE - The International Society for Optical Engineering, 2001, SPIE-Int. Soc. Opt. Eng, USA, pages 261 - 268, XP008001969, ISSN: 0277-786X * |
JOHNSON N F ET AL: "RECOVERY OF WATERMARKS FROM DISTORTED IMAGES", INFORMATION HIDING. INTERNATIONAL WORKSHOP PROCEEDINGS, XX, XX, no. 1768, September 1999 (1999-09-01), pages 318 - 332, XP008002242 * |
KAEWKAMNERD N ET AL: "Wavelet based watermarking detection using multiresolution image registration", 2000 TENCON PROCEEDINGS. INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM (CAT. NO.00CH37119), 2000 TENCON PROCEEDINGS. INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, KUALA LUMPUR, MALAYSIA, 24-27 SEPT. 2000, 2000, Piscataway, NJ, USA, IEEE, USA, pages 171 - 175 vol.2, XP001066364, ISBN: 0-7803-6355-8 * |
LOO P ET AL: "Digital watermarking with complex wavelets", IEE SEMINAR ON SECURE IMAGES AND IMAGE AUTHENTICATION (REF. NO.00/039), IEE SEMINAR ON SECURE IMAGES AND IMAGE AUTHENTICATION, LONDON, UK, 10 APRIL 2000, 2000, London, UK, IEE, UK, pages 10/1 - 7, XP001066365 * |
LOO P ET AL: "Motion estimation based registration of geometrically distorted images for watermark recovery", SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, SAN JOSE, CA, USA, 22-25 JAN. 2001, vol. 4314, Proceedings of the SPIE - The International Society for Optical Engineering, 2001, SPIE-Int. Soc. Opt. Eng, USA, pages 606 - 617, XP008001970, ISSN: 0277-786X * |
SCHMID C ET AL: "LOCAL GRAYVALUE INVARIANTS FOR IMAGE RETRIEVAL", IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, IEEE INC. NEW YORK, US, vol. 19, no. 5, 1 May 1997 (1997-05-01), pages 530 - 535, XP000693746, ISSN: 0162-8828 * |
SUN Q ET AL: "RECOVERING MODIFIED WATERMARKED IMAGE WITH REFERENCE TO ORIGINAL IMAGE", PROCEEDINGS OF THE SPIE, SPIE, BELLINGHAM, VA, US, vol. 3657, January 1999 (1999-01-01), pages 415 - 424, XP000961849 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010073236A1 (en) * | 2008-12-22 | 2010-07-01 | France Telecom | A method of and apparatus for authenticating data content |
Also Published As
Publication number | Publication date |
---|---|
GB0118352D0 (en) | 2001-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0766468B1 (en) | Method and system for inserting a spread spectrum watermark into multimedia data | |
US6208735B1 (en) | Secure spread spectrum watermarking for multimedia data | |
Holliman et al. | Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes | |
US6101602A (en) | Digital watermarking by adding random, smooth patterns | |
Cox et al. | A secure, robust watermark for multimedia | |
Hartung et al. | Spread spectrum watermarking: Malicious attacks and counterattacks | |
Wolfgang et al. | Perceptual watermarks for digital images and video | |
Cox et al. | Some general methods for tampering with watermarks | |
Swanson et al. | Multiresolution scene-based video watermarking using perceptual models | |
US6359985B1 (en) | Procedure for marking binary coded data sets | |
US20030026422A1 (en) | Method and apparatus for digitally fingerprinting videos | |
Mohanty | Watermarking of digital images | |
US8379911B2 (en) | Method and system for efficient watermarking of video content | |
Barnett | Digital watermarking: applications, techniques and challenges | |
US8913779B2 (en) | System and method for securing media content | |
JP2002543692A (en) | How to insert a watermark in an image | |
Samuel et al. | Digital watermarking for copyright protection | |
Mahmoud et al. | Frequency domain watermarking: An overview. | |
Mehta et al. | Digital image watermarking: A review | |
Jain et al. | Robust Multiple Image Watermarking Based on Spread Transform | |
WO2003013142A1 (en) | Digital image watermarking | |
Sahu et al. | A survey on robust image watermarking techniques and different applications | |
Duan et al. | A short summary of digital watermarking techniques for multimedia data | |
Kaur et al. | A Survey and Comparative Analysis on Video Watermarking | |
Muharemagic et al. | Multimedia security: watermarking techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EE ES FI GB GD GE GH GM HU ID IL IN IS JP KE KG KP KR KZ LK LR LS LT LU LV MA MD MG MK MW MX MZ NO NZ PL PT RO RU SD SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE CH CY DE DK FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |