WO2010073236A1 - A method of and apparatus for authenticating data content - Google Patents

A method of and apparatus for authenticating data content Download PDF

Info

Publication number
WO2010073236A1
WO2010073236A1 PCT/IB2009/056042 IB2009056042W WO2010073236A1 WO 2010073236 A1 WO2010073236 A1 WO 2010073236A1 IB 2009056042 W IB2009056042 W IB 2009056042W WO 2010073236 A1 WO2010073236 A1 WO 2010073236A1
Authority
WO
WIPO (PCT)
Prior art keywords
feature
data content
extracted
identification information
auxiliary identification
Prior art date
Application number
PCT/IB2009/056042
Other languages
French (fr)
Inventor
Shiguo Lian
Zhongxuan Liu
Yuan Dong
Original Assignee
France Telecom
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom filed Critical France Telecom
Publication of WO2010073236A1 publication Critical patent/WO2010073236A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/56Information retrieval; Database structures therefor; File system structures therefor of still image data having vectorial format
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0081Image watermarking whereby both original and watermarked images are required at decoder, e.g. destination-based, non-blind, non-oblivious

Definitions

  • the present invention relates to a method of authenticating data content. Particularly, but not exclusively the invention relates to a method of authenticating watermarked media content and a method of indexing media content.
  • Watermarking is a technique that is regularly used in copyright protection to determine the ownership or media data content or to detect the origin of physical or electronic media that has been illegally redistributed.
  • the technique involves embedding auxiliary identification information indicating ownership or customer ID into media data content in the form of a media signal before the media data content is distributed.
  • the embedded watermark is in the form of machine readable code and should be invisible and unobtrusive and not interfere with the protected media content.
  • the media content may be image, video or audio data. It may also include other types of media objects including documents, software, multidimensional graphics models and surface textures of objects. For example, referring to Figure 1a a media content provider distributes media content such as a television program to a number of customers.
  • the problem is then how to determine if the media data content which has been subsequently detected originates from that content provider.
  • the next problem involves determining which customer was responsible for redistributing the media data content over the Internet.
  • JP2004112318 describes a watermarking based image protection method in which the ownership information is embedded into images before they are distributed. By detecting whether or not the watermark exists in an image or not, the copyright of the image distributed over Internet can be authenticated.
  • Prior art techniques suffer the drawback that embedded watermark are often not robust to such geometrical transformations or desynchronisation operations.
  • Another requirement in media content distribution is content indexing. Content indexing refers to the finding specific data files from within a number of data files stored in a database.
  • FR2843212 describes a content index method based on image feature extraction and matching.
  • a feature of an image is extracted and compared with the features extracted from images stored in a database or with features directly stored in a database, to find one or more matching images.
  • content index and copyright protection are required.
  • the two functionalities are performed independently
  • a method of watermarking data content for distribution comprising: embedding auxiliary identification information in a data content; extracting a feature from the data content embedded with the auxiliary identification information; storing the extracted feature in a feature database, the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database is usable to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification information is extractable therefrom for authentication of the detected data content.
  • auxiliary data in embedded in a data content for authentication or identification purposes.
  • the auxiliary identification information may be a digital watermark.
  • the data content may be a digital media content such as image, audio or video data.
  • the feature may be a feature or a group of features.
  • the extracted feature may be a corner point based feature. Such features are more robust to desynchronisation operations.
  • the auxiliary identification information may be embedded into the wavelet domain of the data content.
  • embedding the auxiliary identification information may include transforming the data content by wavelet transformation to obtain sub-bands r s where re ⁇ 0,1 ,2,3 ⁇ is the resolution level, and se ⁇ LL,LH,HL,HH ⁇ is the orientation; and wherein the auxiliary information is embedded into the sub-bands according to the expression:
  • a second aspect of the invention provides a method of authenticating data content the method comprising extracting a feature from a data content; comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; rectifying the data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified data content so that the auxiliary identification information is usable for authentication of the data content.
  • Matching the extracted feature with the matching feature may comprise determining the difference Dist (F 1 F') between the extracted Feature F' and a matching feature F 1 according to the expression
  • Dist (F 1 F') comparing Dist (F 1 F') to a predetermined feature matching threshold T F .
  • Determining a transform relationship between the extracted feature and the matching feature may include determining a transformation according to:
  • the data content may be rectified or emended by rectifying a pixel position (x',y') in the data content according to:
  • Authentication of the auxiliary information may include computing a correlation value for correlating the extracted auxiliary information to a known auxiliary information according to the expression computing a threshold according to
  • a third aspect of the invention provides an apparatus for embedding authentication information in data content for distribution, the apparatus comprising: an embedder for embedding auxiliary identification information in a data content; a feature extractor for extracting a feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database is usable to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification data is extractable therefrom for authentication of the detected data content.
  • the feature extractor may be operable to extract a corner point based feature from the data content embedded with the auxiliary identification information.
  • a fourth aspect of the invention provides an apparatus for authenticating data content the apparatus comprising a feature extractor for extracting a feature from a data content; a processor for comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; and rectifying the data content according to determined transform relationship; the apparatus further comprising an extractor for extracting auxiliary identification information from the rectified data content so that the auxiliary identification information is usable for authentication of the data content.
  • a fifth aspect of the invention provides an method of data content authentication comprising, prior to distribution of a first data content, embedding auxiliary identification information in the first data content; extracting a first feature from the first data content embedded with the auxiliary identification information; storing the extracted first feature in a feature database, the extracted first feature being associated with identification data identifying the first data content from which the first feature has been extracted, and distributing the first data content; and on detection of a second data content after distribution, extracting a second feature from the second data content; comparing the second feature with the first feature stored in the feature database in order to determine if the second feature matches the first feature; and if it is determined that the second feature matches the first feature determining a transform relationship between the second feature and the first feature; rectifying the second data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified second data content so that the auxiliary identification information is usable for authentication of the second data content.
  • a sixth aspect of the invention provides a system for authenticating data content, the system comprising an embedder for embedding auxiliary identification information in a data content; a first feature extractor for extracting a first feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, a second feature extractor for extracting a second feature from distributed data content; a processor for comparing the second feature with the first feature stored in the feature database in order to determine if the second feature matches the first feature; and if it is determined that the second feature matches the first feature the processor being operable to determine a transform relationship between the second feature and the first feature; rectifying the second data content according to the determined transform relationship; and a watermark extractor for extracting auxiliary identification information from the rectified second data content so that the auxiliary identification information is usable for authentication of the second data content.
  • the first feature extractor and the second feature extractor may be the same feature extractor or separate feature
  • aspects of the invention provide a mechanism which combines both copyright protection and media content index since a feature extracted from watermarked media content can be used for media content indexing in a database as well as for rectifying a watermarked media content, which has been detected after distribution, for media content authentication. Moreover, the extracted feature stored in the feature database improves the watermarking algorithm's robustness. Since the data content is emended or rectified according to the determined transformation undergone by the feature extracted from the data content, a watermark can thereby be extracted from the rectified or emended data content and thus used for authentication purposes.
  • the methods according to the invention may be computer implemented.
  • the methods may be implemented in software on a programmable apparatus. They may also be implemented solely in hardware or in software, or in a combination thereof.
  • a tangible carrier medium may comprise a storage medium such as a floppy disk, a CD-ROM, a hard disk drive, a magnetic tape device or a solid state memory device and the like.
  • a transient carrier medium may include a signal such as an electrical signal, an electronic signal, an optical signal, an acoustic signal, a magnetic signal or an electromagnetic signal, e.g. a microwave or RF signal.
  • Figure 1 A is a schematic view of a media content being distributed to the public
  • Figure 1 B is a flow chart illustrating a method of authenticating media content according to the prior art
  • Figure 2A is a flowchart illustrating a method of embedding a watermark in media content according to an embodiment of the invention
  • Figure 2B is a flowchart illustrating a method of authenticating media content according to an embodiment of the invention
  • Figure 3A is a flowchart illustrating a method of embedding a watermark in media content according to a particular embodiment of the invention
  • Figure 3B is a flowchart illustrating a method of authenticating media content according to a particular embodiment of the invention.
  • Figure 4 is an example of an image highlighting corner features
  • Figure 5 is an example of an original image and corresponding operated images
  • Figure 6A is a graphical illustration of an example of corner point matching between features in an original image and features in a rotated original image
  • Figure 6B is a graphical illustration of watermark detection with watermark correlation and threshold
  • Figure 7 is a table illustrates the example of the results of a robustness test under the conditions of various attacks.
  • the method of authenticating content data includes five principal steps:
  • step S1 of the method according to the first embodiment of the invention comprises embedding a watermark W into media data content P under the control of a key K to generate watermarked media C.
  • Key K controls the watermark embedding position or parameters.
  • the watermark W represents the ownership information or customer ID.
  • the embedding method may be performed according to existing watermarking algorithms such as, for example, those descried in documents Cox et al.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans, on Image Processing, Vol. 6, No. 12.
  • step S2 a feature F is extracted from the watermarked media C and in step S3 stored and registered in a feature database D having a size M.
  • the feature F is associated with data representing the watermarked media content C from which it has been extracted.
  • Table 1 An example of a data structure of the feature database is shown in Table 1.
  • Table 1 Example of a data structure of the feature database
  • the first column represents the names of media signals, for example, Lena is the name of an image.
  • the second column represents the features which are extracted from the media signals, for example, F 0 is extracted from the signal named Lena.
  • feature F should satisfy two requirements: firstly, feature F should be robust to watermarking attacks, such as general geometrical attacks including rotation, shearing, translation, scaling, etc operations. Secondly, feature F should be usable in media indexing and be of a smaller data volume compared to the media data content itself. A feature as such as corner point, boundary, edge, histogram, may, for example, be used to this end.
  • step S4 the watermarked media is distributed to a number N of customers by means such as broadcasting, multicasting, unicasting, etc. Some customers may directly distribute the received media over Internet, or distribute it after operations such as recompression, scaling, translation, etc have been performed on the watermarked media content C. This distributed media content represented as C may then be distributed freely from one person to another.
  • step S6 a watermark W is extracted from the detected media content C and compared in step S7 with the original watermark W.
  • the watermark extraction method is symmetric to the watermark embedding method of step S1. If the difference
  • step S8 a feature F' is extracted from the detected media content C.
  • step S9 the extracted feature F' is compared with features F, stored in the feature database D.
  • the results from the comparison provide the n (1 ⁇ n ⁇ M) most matched features (Fo, F-i, ... ,F n- i) where M is the number of features F, stored in the feature database D.
  • the matching algorithm is based on the comparison
  • F'- FJ between the extracted feature F' and the stored feature F, where i 0,1 ,...,n-1 and T F where Tp corresponds to a predetermined feature comparison threshold.
  • F is different to F in terms of rotation angle
  • C is inverse rotated by the same angle in order to provide the original watermarked media content.
  • a watermark W" can be extracted in step S11 and compared with the original watermark W in step S12.
  • step S5 of Figure 2A the media index created using the registered Features F 1 is used to find the original media content C corresponding to C from feature database D.
  • robust feature F' is extracted from the received media C in step S7 and matched with the feature database D in step S9 of the feature extraction process the matching result gives the n (1 ⁇ n ⁇ M) most matched features (F 0 , F-i, ... ,F n- i).
  • the n media contents corresponding to the respective n features constitute the index results.
  • a corner point is used as the extracted feature.
  • An image ownership protection and index method using corner point features is illustrated in Fig. 3A, which depicts the process of watermark embedding and Figure 3B which illustrates the feature extraction process, the watermark extraction and the authentication processes.
  • the watermark embedding and feature extraction process includes an initial step S21 in which the original media content which in this embodiment comprises an image P, a watermark W and a key K are initialized.
  • step S22 watermark W is embedded into the wavelet domain of image P under the control of key K, resulting in watermarked media C.
  • key K controls the permutation of the watermark W.
  • a permutation method based on pseudorandom numbers or a chaotic map may be used.
  • the image P is firstly transformed by wavelet transformation, which produces coefficients in different sub-band.
  • wavelet transformation which produces coefficients in different sub-band.
  • the produced sub-bands are denoted by r s where re ⁇ 0,1 ,2,3 ⁇ is the resolution level, and se ⁇ LL, LH, HL 1 HH) is the orientation; L - Low frequency, H - High frequency.
  • LL, LH, HL and HH denote 4 different frequency bands divided by wavelet transformations.
  • watermark embedding step S22 the watermark W is embedded into the sub-bands according to the expression:
  • w is the i-th watermark value in the watermark sequence.
  • represents the embedding strength where (0 ⁇ ⁇ 1); ⁇ + aw t > 0 ), which ranges from [0,1] and can be computed by a human visual system (HVS) such as described in A. S. Lewis, and G. Knowles: Image Compression Using the 2-D Wavelet Transform. IEEE Transactions on Image Processing, Vol. 1 , No. 2. (1992) 244-250; or set as a constant.
  • HVS human visual system
  • the sub-bands are inversely transformed by wavelet transformation, and the produced watermarked image is C.
  • Edges are generally points where there is a boundary (or an edge) between two image regions.
  • edges are usually defined as sets of points in the image which have a strong gradient magnitude Corner points are typically points of the image where the difference between adjacent pixels is generally high in all directions.
  • a corner can be defined as the intersection of two edges and may also be defined as a point for which there are two dominant and different edge directions in a local neighbourhood of the point.
  • the corner points are generally robust to geometric operations such as rotation, shearing, scaling, translation, etc. Typically, for different images, the number of the extracted corner points differs. In order to maintain coherence, only R corner points are selected as the feature F. The selection can be random.
  • An example of the data structure of the database is shown in Table 2.
  • step S25 the watermarked and registered image C is distributed to customers.
  • step S31 image C is detected.
  • image C is the operated copy of image C, which has been attacked by operations such as adding noise, compression, rotation, shearing, scaling, translation, etc.
  • Tw is a threshold used to determine the existence of a watermark.
  • T F is the threshold used to determine the matching features.
  • step S32 the watermark W in image C is permuted under the control of key K.
  • the sub-bands of the watermark W are obtained by wavelet transformation, and the correlation value:
  • step S33 the computed correlation value p for watermark W is compared to the threshold T w if p> T w ,, then the watermark W is deemed as existing, and the authentication process terminates.
  • n images corresponding to the n features in SF correspond to the indexed images.
  • step S36 k is set to 0, (where k is the matching feature number of the n matching features ranges from 0 to n-1 ) and the following operations are performed:
  • the computing method may be least square method, such as described in G. Xue and P. Lu: A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images. The 3rd IWDW. (2004) 42-54; or a coarse matching before random sample consensus (RANSAC) method such as described in M. A. Fishier and R. C. Bolles: Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography. The Communications of the ACM, Vol. 24, No. 6. (1981 ) 381-395.
  • step S37 the computed parameters (a,b,c,d,e,f) are then used to rectify the image from C to C' k . That is, these parameters are used to emend the pixel position (x',y') in C according to:
  • step S38 from the emended image C' k , a watermark correlation p and a watermark threshold T is computed, respectively, according to a similar method to that of step S32.
  • step S39 if the watermark correlation ⁇ T, then the watermark is deemed as existing i.e. the image is copyright protected, and the authentication process is terminated.
  • FIG. 5 shows the corner detection results of the original and operated images where i) is the original image, ii) a cropped image iii) a rotated image, iv) a scaled imaged v) a sheared image and vi) a translated image.
  • Figure 6A graphically illustrates the result of corner point matching of a rotated image
  • Figure 6B illustrates watermark detection with correlation and threshold.
  • Figure 7 presents a table showing the robustness test under the condition of various attacks. The table of Figure 7 illustrates that the scheme can survive the desynchronization attacks of global geometrical transform and general signal processing attacks. For example, the angle range against the rotation attack and the rotation-scaling one is up to 10 degrees.
  • the embodiments of the invention provide the advantage that a mechanism for both copyright protection and media content index is provided since the extracted feature can be used for content index as well as for media content authentication. Moreover, the extracted feature stored in the feature database improves the watermarking algorithm's robustness.
  • Embodiments of the invention find application in the distribution of media content data by media service providers to customers where both copyright protection and content index functionalities are required.
  • the media data content is constituted of an image
  • the media content data may be any audio, video or image data content.

Abstract

A method of watermarking data content for distribution, the method comprising: embedding auxiliary identification information in a data content; extracting a feature from the data content embedded with the auxiliary identification information; storing the extracted feature in a feature database, the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database may be used to identify a detected data content and to détermine opération parameters for rectifying the detected data content such that auxiliary identification information may be extracted therefrom for authentication of the detected data content. A method of authenticating data content the method comprising the steps of extracting a feature from a data content; comparing the extracted feature with a plurality of features stored in a feature database in order to détermine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; rectifying the data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified data content so that the auxiliary identification information may be used for authentication of the data content.

Description

A METHOD OF AND APPARATUS FOR AUTHENTICATING DATA CONTENT
FIELD OF THE INVENTION
The present invention relates to a method of authenticating data content. Particularly, but not exclusively the invention relates to a method of authenticating watermarked media content and a method of indexing media content.
BACKGROUND OF THE INVENTION
Watermarking is a technique that is regularly used in copyright protection to determine the ownership or media data content or to detect the origin of physical or electronic media that has been illegally redistributed. The technique involves embedding auxiliary identification information indicating ownership or customer ID into media data content in the form of a media signal before the media data content is distributed. Generally the embedded watermark is in the form of machine readable code and should be invisible and unobtrusive and not interfere with the protected media content. The media content may be image, video or audio data. It may also include other types of media objects including documents, software, multidimensional graphics models and surface textures of objects. For example, referring to Figure 1a a media content provider distributes media content such as a television program to a number of customers. One of the customers then redistributes his copy to others via the internet. The problem is then how to determine if the media data content which has been subsequently detected originates from that content provider. The next problem involves determining which customer was responsible for redistributing the media data content over the Internet.
JP2004112318, for example, describes a watermarking based image protection method in which the ownership information is embedded into images before they are distributed. By detecting whether or not the watermark exists in an image or not, the copyright of the image distributed over Internet can be authenticated. However, considering that operations such as compression, rotation, shearing, scaling, translation, and the like are often performed on the images successfully detecting the watermark in the operated images is becoming increasingly difficult. Prior art techniques suffer the drawback that embedded watermark are often not robust to such geometrical transformations or desynchronisation operations. Another requirement in media content distribution is content indexing. Content indexing refers to the finding specific data files from within a number of data files stored in a database.
FR2843212 describes a content index method based on image feature extraction and matching. In the described method, a feature of an image is extracted and compared with the features extracted from images stored in a database or with features directly stored in a database, to find one or more matching images. For media related services, often both content index and copyright protection are required. Currently the two functionalities are performed independently
SUMMARY OF THE INVENTION
Accordingly, it would be advantageous to provide a method of authenticating content data which implements both a copyright protection technique and a content indexing functionality. It would also be desirable to provide a method of authenticating data content with improved robustness to desynchronisation operations.
To better address one or more of the foregoing concerns, in accordance with a first aspect of the invention there is provided a method of watermarking data content for distribution, the method comprising: embedding auxiliary identification information in a data content; extracting a feature from the data content embedded with the auxiliary identification information; storing the extracted feature in a feature database, the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database is usable to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification information is extractable therefrom for authentication of the detected data content.
By a method of watermarking is meant a method in which auxiliary data in embedded in a data content for authentication or identification purposes. The auxiliary identification information may be a digital watermark. The data content may be a digital media content such as image, audio or video data. The feature may be a feature or a group of features.
The extracted feature may be a corner point based feature. Such features are more robust to desynchronisation operations.
The auxiliary identification information may be embedded into the wavelet domain of the data content. For example embedding the auxiliary identification information may include transforming the data content by wavelet transformation to obtain sub-bands rs where re{0,1 ,2,3} is the resolution level, and se{LL,LH,HL,HH} is the orientation; and wherein the auxiliary information is embedded into the sub-bands according to the expression:
Figure imgf000005_0001
ot SherLwLise where α represents the embedding strength where (0< α< 1); l + awt > 0 ).
Preferably re{2,3} in order to provide a more robust auxiliary identification information.
A second aspect of the invention provides a method of authenticating data content the method comprising extracting a feature from a data content; comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; rectifying the data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified data content so that the auxiliary identification information is usable for authentication of the data content. Matching the extracted feature with the matching feature may comprise determining the difference Dist (F1F') between the extracted Feature F' and a matching feature F1 according to the expression
Figure imgf000006_0001
and comparing Dist (F1F') to a predetermined feature matching threshold TF.
Determining a transform relationship between the extracted feature and the matching feature may include determining a transformation according to:
Figure imgf000006_0002
where, (x',y') and (x,y) correspond to the corner point coordinates of the extracted feature F' and the matching feature Fk, respectively.
The data content may be rectified or emended by rectifying a pixel position (x',y') in the data content according to:
Figure imgf000006_0003
dx' - ay' - cd + af yk = bd - ae
where, (x'k.y'k) is the corresponding pixel position in the rectified data content.
Authentication of the auxiliary information may include computing a correlation value for correlating the extracted auxiliary information to a known auxiliary information according to the expression
Figure imgf000007_0001
computing a threshold according to
Figure imgf000007_0002
and determining if p≤T to authenticate the auxiliary information.
A third aspect of the invention provides an apparatus for embedding authentication information in data content for distribution, the apparatus comprising: an embedder for embedding auxiliary identification information in a data content; a feature extractor for extracting a feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database is usable to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification data is extractable therefrom for authentication of the detected data content.
The feature extractor may be operable to extract a corner point based feature from the data content embedded with the auxiliary identification information.
A fourth aspect of the invention provides an apparatus for authenticating data content the apparatus comprising a feature extractor for extracting a feature from a data content; a processor for comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; and rectifying the data content according to determined transform relationship; the apparatus further comprising an extractor for extracting auxiliary identification information from the rectified data content so that the auxiliary identification information is usable for authentication of the data content.
A fifth aspect of the invention provides an method of data content authentication comprising, prior to distribution of a first data content, embedding auxiliary identification information in the first data content; extracting a first feature from the first data content embedded with the auxiliary identification information; storing the extracted first feature in a feature database, the extracted first feature being associated with identification data identifying the first data content from which the first feature has been extracted, and distributing the first data content; and on detection of a second data content after distribution, extracting a second feature from the second data content; comparing the second feature with the first feature stored in the feature database in order to determine if the second feature matches the first feature; and if it is determined that the second feature matches the first feature determining a transform relationship between the second feature and the first feature; rectifying the second data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified second data content so that the auxiliary identification information is usable for authentication of the second data content.
A sixth aspect of the invention provides a system for authenticating data content, the system comprising an embedder for embedding auxiliary identification information in a data content; a first feature extractor for extracting a first feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, a second feature extractor for extracting a second feature from distributed data content; a processor for comparing the second feature with the first feature stored in the feature database in order to determine if the second feature matches the first feature; and if it is determined that the second feature matches the first feature the processor being operable to determine a transform relationship between the second feature and the first feature; rectifying the second data content according to the determined transform relationship; and a watermark extractor for extracting auxiliary identification information from the rectified second data content so that the auxiliary identification information is usable for authentication of the second data content. The first feature extractor and the second feature extractor may be the same feature extractor or separate feature extractors.
Aspects of the invention provide a mechanism which combines both copyright protection and media content index since a feature extracted from watermarked media content can be used for media content indexing in a database as well as for rectifying a watermarked media content, which has been detected after distribution, for media content authentication. Moreover, the extracted feature stored in the feature database improves the watermarking algorithm's robustness. Since the data content is emended or rectified according to the determined transformation undergone by the feature extracted from the data content, a watermark can thereby be extracted from the rectified or emended data content and thus used for authentication purposes.
The methods according to the invention may be computer implemented. The methods may be implemented in software on a programmable apparatus. They may also be implemented solely in hardware or in software, or in a combination thereof.
Since the present invention can be implemented in software, the present invention can be embodied as computer readable code for provision to a programmable apparatus on any suitable carrier medium. A tangible carrier medium may comprise a storage medium such as a floppy disk, a CD-ROM, a hard disk drive, a magnetic tape device or a solid state memory device and the like. A transient carrier medium may include a signal such as an electrical signal, an electronic signal, an optical signal, an acoustic signal, a magnetic signal or an electromagnetic signal, e.g. a microwave or RF signal.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the invention will now be described, by way of example only, and with reference to the following drawings in which:-
Figure 1 A is a schematic view of a media content being distributed to the public;
Figure 1 B is a flow chart illustrating a method of authenticating media content according to the prior art;
Figure 2A is a flowchart illustrating a method of embedding a watermark in media content according to an embodiment of the invention;
Figure 2B is a flowchart illustrating a method of authenticating media content according to an embodiment of the invention;
Figure 3A is a flowchart illustrating a method of embedding a watermark in media content according to a particular embodiment of the invention;
Figure 3B is a flowchart illustrating a method of authenticating media content according to a particular embodiment of the invention;
Figure 4 is an example of an image highlighting corner features;
Figure 5 is an example of an original image and corresponding operated images;
Figure 6A is a graphical illustration of an example of corner point matching between features in an original image and features in a rotated original image;
Figure 6B is a graphical illustration of watermark detection with watermark correlation and threshold; and Figure 7 is a table illustrates the example of the results of a robustness test under the conditions of various attacks.
DETAILED DESCRIPTION
A method of authenticating content data according to an embodiment of the invention will be described with reference to Figures 2A to 4B.
With reference to Figures 2 and 3, the method of authenticating content data includes five principal steps:
media watermark embedding;
robust feature extraction and registration;
media distribution; ■ watermark extraction and authentication; and
media indexing.
Referring to Figure 2A step S1 of the method according to the first embodiment of the invention comprises embedding a watermark W into media data content P under the control of a key K to generate watermarked media C. Key K controls the watermark embedding position or parameters. In this embodiment of the invention, the watermark W represents the ownership information or customer ID. The embedding method may be performed according to existing watermarking algorithms such as, for example, those descried in documents Cox et al.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans, on Image Processing, Vol. 6, No. 12.
(1997) 1673-1687, or Cheng et al.: Optimum Detection and Decoding of Multiplicative Watermarks in DFT Domain. Proceedings of IEEE International Conference on Acoustics, Speech and Processing, Vol. 4. (2002) 3477-3480. Preferably, a method which is more robust to robust to general attacks such as the method described in Cheng et al. An Additive Approach to Transform-Domain Information Hiding and Optimum Detection Structure. IEEE Transactions on Multimedia, Vol. 3, No. 3, pp. 273-284, 2001 , is implemented. These watermarking algorithms embed a watermark into the spatial domain or frequency domain of image, video or audio content data. Such algorithms are often robust to general attacks such as adding noise, compression, A/D or D/A conversion, filtering, etc.
In step S2 a feature F is extracted from the watermarked media C and in step S3 stored and registered in a feature database D having a size M. In the feature database D, the feature F is associated with data representing the watermarked media content C from which it has been extracted. An example of a data structure of the feature database is shown in Table 1.
Figure imgf000012_0001
Table 1 : Example of a data structure of the feature database
In Table 1 , the first column represents the names of media signals, for example, Lena is the name of an image. And the second column represents the features which are extracted from the media signals, for example, F0 is extracted from the signal named Lena.
The feature F should satisfy two requirements: firstly, feature F should be robust to watermarking attacks, such as general geometrical attacks including rotation, shearing, translation, scaling, etc operations. Secondly, feature F should be usable in media indexing and be of a smaller data volume compared to the media data content itself. A feature as such as corner point, boundary, edge, histogram, may, for example, be used to this end.
In step S4 the watermarked media is distributed to a number N of customers by means such as broadcasting, multicasting, unicasting, etc. Some customers may directly distribute the received media over Internet, or distribute it after operations such as recompression, scaling, translation, etc have been performed on the watermarked media content C. This distributed media content represented as C may then be distributed freely from one person to another.
Authentication of detected media content will now be described with reference to Figure 2B. If media content C is subsequently detected the steps of authentication of the detected media content are carried out. In step S6 a watermark W is extracted from the detected media content C and compared in step S7 with the original watermark W. In this embodiment the watermark extraction method is symmetric to the watermark embedding method of step S1. If the difference |W'-W| between the original watermark W and the extracted watermark W is less than Tw where Tw corresponds to a predetermined watermark matching threshold, then the watermark W is authenticated, the media content C is deemed as being copyright protected, and the authentication process terminates. From the identification of W matching W the origin of the detected media content C may be determined, as well as the identity of the customer to whom that media content C was distributed to.
If |W'-W| >T then the process continues to step S8 where a feature F' is extracted from the detected media content C. In step S9 the extracted feature F' is compared with features F, stored in the feature database D. The results from the comparison provide the n (1≤n<M) most matched features (Fo, F-i, ... ,Fn-i) where M is the number of features F, stored in the feature database D. The matching algorithm is based on the comparison |F'- FJ between the extracted feature F' and the stored feature F, where i=0,1 ,...,n-1 and TF where Tp corresponds to a predetermined feature comparison threshold. If the difference |F'- F,| between the extracted feature F' and the stored feature F, is less than TF, i.e. |F'- F,| <TF , the feature F1 is deemed to be a matching feature. Otherwise, the feature F, is not deemed to be matched.
The n media contents associated with the n features correspond to the matching index results. From the n indexed features, each pair of matching features (F', F1) (i=0,1 ,...,n-1) is used to compute the transformation from F, to F' caused by attack operations, by for example comer matching, and the determined transformation is then used accordingly to rectify or emend the media content from C to C" in step S10. For example, if F, is different to F in terms of rotation angle, then C is inverse rotated by the same angle in order to provide the original watermarked media content. From the rectified media C", a watermark W" can be extracted in step S11 and compared with the original watermark W in step S12. If the difference |W'-W| between the extracted watermark W and the original watermark W is less than Tw, i.e. |W'-W| < Tw then the watermark W is deemed to exist in the detected media content, and the media content is deemed to be copyright protected. The authentication process then terminates. Otherwise, steps S8 to S10 are repeated feature by feature F1 until i=n or the original watermark W is detected. From the identification of W the origin of the detected media content C may be determined, as well as the identity of the customer to whom that media content C was distributed to
In step S5 of Figure 2A the media index created using the registered Features F1 is used to find the original media content C corresponding to C from feature database D. When robust feature F' is extracted from the received media C in step S7 and matched with the feature database D in step S9 of the feature extraction process the matching result gives the n (1<n<M) most matched features (F0, F-i, ... ,Fn-i). The n media contents corresponding to the respective n features constitute the index results.
In a particular embodiment of the invention a corner point is used as the extracted feature. An image ownership protection and index method using corner point features is illustrated in Fig. 3A, which depicts the process of watermark embedding and Figure 3B which illustrates the feature extraction process, the watermark extraction and the authentication processes.
With reference to Figure 3A the watermark embedding and feature extraction process according to this particular embodiment of the invention includes an initial step S21 in which the original media content which in this embodiment comprises an image P, a watermark W and a key K are initialized. In this particular embodiment, the watermark W to be embedded in the image P, is a Gaussian sequence W=[Wo, Wi,...,wm.i]. In step S22 watermark W is embedded into the wavelet domain of image P under the control of key K, resulting in watermarked media C. In this embodiment, key K controls the permutation of the watermark W. A permutation method based on pseudorandom numbers or a chaotic map may be used. In the watermark embedding step S22, the image P is firstly transformed by wavelet transformation, which produces coefficients in different sub-band. For example, if image P is decomposed into 4 resolution levels by wavelet transformation, the produced sub-bands are denoted by rs where re{0,1 ,2,3} is the resolution level, and se{LL, LH, HL1HH) is the orientation; L - Low frequency, H - High frequency. Here, LL, LH, HL and HH denote 4 different frequency bands divided by wavelet transformations.
In watermark embedding step S22 the watermark W is embedded into the sub-bands according to the expression:
Figure imgf000015_0001
e
where m represents the length of watermark sequence, w, is the i-th watermark value in the watermark sequence. In order to keep the watermark robust, preferably re{2,3}
α represents the embedding strength where (0< α< 1); \ + awt > 0 ), which ranges from [0,1] and can be computed by a human visual system (HVS) such as described in A. S. Lewis, and G. Knowles: Image Compression Using the 2-D Wavelet Transform. IEEE Transactions on Image Processing, Vol. 1 , No. 2. (1992) 244-250; or set as a constant.
After embedding, the sub-bands are inversely transformed by wavelet transformation, and the produced watermarked image is C.
In step S23, by studying the pixels of the image C the corner features F=[fo,fi,...,fR-i] can be extracted from image C using for example a corner and edge detection method such as, for example, that described in C. Harris and M. Stephens: A
Combined Corner and Edge Detector. 4th Alvey Vision Conference. (1988) 147-151 ; or H. Moravec: Obstacle Avoidance and Navigation in the Real World by a Seen Robot Rover. Technical Report CMU-RI-TR-3. Robotics Institute, Carnegie-Mellon University. (1980). Edges are generally points where there is a boundary (or an edge) between two image regions. In practice, edges are usually defined as sets of points in the image which have a strong gradient magnitude Corner points are typically points of the image where the difference between adjacent pixels is generally high in all directions. A corner can be defined as the intersection of two edges and may also be defined as a point for which there are two dominant and different edge directions in a local neighbourhood of the point.
f,=(x,,y,) (i=0,1 R-1 ) correspond to the co-ordinates of a comer point. The corner points are generally robust to geometric operations such as rotation, shearing, scaling, translation, etc. Typically, for different images, the number of the extracted corner points differs. In order to maintain coherence, only R corner points are selected as the feature F. The selection can be random.
Figure 4A illustrates the selection of a number of corner points fι=(Xι,yι) in an image.
In step S24, the watermarked image C is registered by storing the corner points f,=(xt,y,) of feature F and the corresponding image name in the feature database D. An example of the data structure of the database is shown in Table 2.
Figure imgf000016_0001
Table 2
In step S25, the watermarked and registered image C is distributed to customers.
The watermark embedding and feature extraction process according to this particular embodiment will now be described with Figure 3B In step S31 , image C is detected. Here, image C is the operated copy of image C, which has been attacked by operations such as adding noise, compression, rotation, shearing, scaling, translation, etc. Tw is a threshold used to determine the existence of a watermark. TF is the threshold used to determine the matching features.
In step S32, the watermark W in image C is permuted under the control of key K. The sub-bands of the watermark W are obtained by wavelet transformation, and the correlation value:
1 r,s
/. W m /=1
and the watermark threshold:
Figure imgf000017_0001
Wtr are computed.
In step S33 the computed correlation value p for watermark W is compared to the threshold Tw if p> Tw,, then the watermark W is deemed as existing, and the authentication process terminates.
Otherwise, if ρ< Tw then the following steps of the process are carried out . In step S34, a feature F'=[f 0,f i,...,f R-I] composed of R corner points is extracted from the watermarked image C. In step S35 the n closest matching features SF=(F0, F-i, ... ,Fn- i} are obtained by computing the distance DiSt(F1, F') and comparing with the threshold TF.
The extracted feature F' and the stored features F1 are compared according to the expression:
Figure imgf000017_0002
If Dist\Fo F ) ≤ Tp then the feature F1 is deemed to be a matching feature.
Otherwise, F1 is deemed as not matching. The n images corresponding to the n features in SF correspond to the indexed images.
In step S36 k is set to 0, (where k is the matching feature number of the n matching features ranges from 0 to n-1 ) and the following operations are performed:
For k= 0 to k = n-1 two features (Fk, F') are matched by computing the parameters (a,b,c,d,e,f) of an affine transformation according to:
Figure imgf000018_0001
where, (x',y') and (x,y) correspond to the corner point coordinates of F' and Fk, respectively.
Using at least three point pairs, the parameters of H can be computed. The computing method may be least square method, such as described in G. Xue and P. Lu: A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images. The 3rd IWDW. (2004) 42-54; or a coarse matching before random sample consensus (RANSAC) method such as described in M. A. Fishier and R. C. Bolles: Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography. The Communications of the ACM, Vol. 24, No. 6. (1981 ) 381-395.
In step S37 the computed parameters (a,b,c,d,e,f) are then used to rectify the image from C to C'k. That is, these parameters are used to emend the pixel position (x',y') in C according to:
Figure imgf000019_0001
where, (x'k.y'k) is the pixel position in corresponding image CV
In step S38 from the emended image C'k, a watermark correlation p and a watermark threshold T is computed, respectively, according to a similar method to that of step S32.
In step S39 if the watermark correlation ρ<T, then the watermark is deemed as existing i.e. the image is copyright protected, and the authentication process is terminated.
Otherwise, if p≥T, the following steps are then performed:
k is set to k=k+1 , and the process returns to step S36 until K = n. If k reaches n in step S40 then it is deemed that there is no watermark in the image and thus determined that the image is not copyright protected. The authentication process then terminates.
An example of results of the process are shown in Figures 5 to 7. In this example, m=1000, R=80, TF=20 n=10, and the test image includes baboon, plane, lena, Elaine, Barbara, etc. Fig. 5 shows the corner detection results of the original and operated images where i) is the original image, ii) a cropped image iii) a rotated image, iv) a scaled imaged v) a sheared image and vi) a translated image. Figure 6A graphically illustrates the result of corner point matching of a rotated image and Figure 6B illustrates watermark detection with correlation and threshold. Figure 7 presents a table showing the robustness test under the condition of various attacks. The table of Figure 7 illustrates that the scheme can survive the desynchronization attacks of global geometrical transform and general signal processing attacks. For example, the angle range against the rotation attack and the rotation-scaling one is up to 10 degrees.
The embodiments of the invention provide the advantage that a mechanism for both copyright protection and media content index is provided since the extracted feature can be used for content index as well as for media content authentication. Moreover, the extracted feature stored in the feature database improves the watermarking algorithm's robustness.
Embodiments of the invention find application in the distribution of media content data by media service providers to customers where both copyright protection and content index functionalities are required.
Although the present invention has been described hereinabove with reference to specific embodiments, the present invention is not limited to the specific embodiments, and modifications will be apparent to a skilled person in the art which lie within the scope of the present invention.
For example, although in the preceding embodiment the media data content is constituted of an image, it will be appreciated that in alternative embodiments of the invention the media content data may be any audio, video or image data content.
While in the foregoing embodiments of the invention, a corner point based feature is used, it will be appreciated that in alternative embodiments of the invention other features such as boundary, edge or histogram features may be used .
Many further modifications and variations will suggest themselves to those versed in the art upon making reference to the foregoing illustrative embodiments, which are given by way of example only and which are not intended to limit the scope of the invention, that being determined solely by the appended claims. In particular the different features from different embodiments may be interchanged, where appropriate.
In the claims, the word "comprising" does not exclude other elements or steps, and the indefinite article "a" or "an" does not exclude a plurality. The mere fact that different features are recited in mutually different dependent claims does not indicate that a combination of these features cannot be advantageously used. Any reference signs in the claims should not be construed as limiting the scope of the invention.

Claims

1. A method of watermarking data content for distribution, the method comprising: embedding auxiliary identification information in a data content; extracting a feature from the data content embedded with the auxiliary identification information; storing the extracted feature in a feature database, the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database is usable to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification information is extractable therefrom for authentication of the detected data content.
2. A method according to claim 1 , wherein the extracted feature comprises a corner point based feature.
3. A method according to claim 1 wherein the auxiliary identification information is embedded into the wavelet domain of the data content.
4. A method according to claim 1 , wherein embedding the auxiliary identification information includes transforming the data content by wavelet transformation to obtain sub-bands irs where r<≡{0,1 ,2,3} is the resolution level, se{LL, LH, HL1HH) is the orientation L - Low frequency, H - High frequency. LL, LH, HL and HH denoting 4 different frequency bands divided by wavelet transformations; and wherein the auxiliary information is embedded into the sub-bands according to the expression:
Figure imgf000022_0001
e where α represents the embedding strength where: (0< α< 1); 1 + (XW1 > 0 m represents the length of watermark sequence, w, is the i-th watermark value in the watermark sequence.
5. A method according to claim 4 wherein re{2,3}.
6. A method of authenticating data content the method comprising the steps of extracting a feature from a data content; comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; rectifying the data content according to the determined transform relationship; and extracting auxiliary identification information from the rectified data content so that the auxiliary identification information may be used for authentication of the data content.
7. A method according to claim 6, wherein matching the extracted feature with the matching feature comprises determining the difference Dist (F1F') between the extracted Feature F' and a matching feature F1 according to the expression:
DiSt(F1 , n = yl(χ,J - χ J')2 + (yu - yJ' )2
Figure imgf000023_0001
and comparing Dist (F1F') to a predetermined feature matching threshold TF.
8. A method according to claim 6, wherein determining a transform relationship between the extracted feature and the matching feature includes determining a transformation according to
Figure imgf000024_0001
where, (x'.y1) and (x,y) correspond to the corner point coordinates of the extracted feature F' and the matching feature Fk, respectively.
9. A method according to claim 8, wherein the data content is rectified by rectifying a pixel position (x',y') in the data content according to
Figure imgf000024_0002
where, (x'k.y'k) is the corresponding pixel position in the rectified data content.
10. A method according to claim 6, wherein authentication of the auxiliary information comprises computing a correlation value for correlating the extracted auxiliary information to a known auxiliary information according to the expression
Figure imgf000024_0003
computing a watermark threshold Tw according to the expression
Figure imgf000024_0004
and determining if p≤ Tw to authenticate the auxiliary information.
11. An apparatus for watermarking data content for distribution, the apparatus comprising:
9? an embedder for embedding auxiliary identification information in a data content; a feature extractor for extracting a feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, wherein the extracted feature stored in the feature database may be used to identify a detected data content and to determine operation parameters for rectifying the detected data content such that auxiliary identification data may be extracted therefrom for authentication of the detected data content.
12. An apparatus according to claim 11 , wherein the feature extractor is operable to extract a corner point based feature from the data content embedded with the auxiliary identification information.
13. An apparatus for authenticating data content the apparatus comprising a feature extractor for extracting a feature from a data content; a processor for comparing the extracted feature with a plurality of features stored in a feature database in order to determine at least one matching feature from the plurality of stored features wherein each of the stored features has been extracted from a corresponding data content embedded with auxiliary identification information prior to distribution of said data content; determining a transform relationship between the extracted feature and the matching feature; and rectifying the data content according to the determined transform relationship; the apparatus further comprising an extractor for extracting auxiliary identification information from the rectified data content so that the auxiliary identification information may be used for authentication of the data content.
14. A system for authenticating data content, the system comprising an embedder for embedding auxiliary identification information in a data content; a first feature extractor for extracting a first feature from the data content embedded with the auxiliary identification information; a feature database for storing the extracted first feature , the extracted feature being associated with identification data identifying the data content from which the feature has been extracted, a second feature extractor for extracting a second feature from distributed data content; a processor for comparing the second feature with the first feature stored in the feature database in order to determine if the second feature matches the first feature; and if it is determined that the second feature matches the first feature the processor being operable to determine a transform relationship between the second feature and the first feature; rectifying the second data content according to the determined transform relationship; and a watermark extractor for extracting auxiliary identification information from the rectified second data content so that the auxiliary identification information is usable for authentication of the second data content.
15. A computer program product for a data-processing device, the computer program product comprising a set of instructions which, when loaded into the data- processing device, causes the device to perform the steps of the method according to claim 1 or claim 6.
16. A computer-readable medium carrying one or more sequences of instructions of the computer program product of claim 15.
PCT/IB2009/056042 2008-12-22 2009-12-18 A method of and apparatus for authenticating data content WO2010073236A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNPCT/CN2008/002029 2008-12-22
CN2008002029 2008-12-22

Publications (1)

Publication Number Publication Date
WO2010073236A1 true WO2010073236A1 (en) 2010-07-01

Family

ID=42133717

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2009/056042 WO2010073236A1 (en) 2008-12-22 2009-12-18 A method of and apparatus for authenticating data content

Country Status (1)

Country Link
WO (1) WO2010073236A1 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012037422A2 (en) * 2010-09-16 2012-03-22 Verance Corporation Improvements in watermark extraction efficiency
US8340348B2 (en) 2005-04-26 2012-12-25 Verance Corporation Methods and apparatus for thwarting watermark detection circumvention
US8346567B2 (en) 2008-06-24 2013-01-01 Verance Corporation Efficient and secure forensic marking in compressed domain
US8451086B2 (en) 2000-02-16 2013-05-28 Verance Corporation Remote control signaling using audio watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8549307B2 (en) 2005-07-01 2013-10-01 Verance Corporation Forensic marking using a common customization function
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US8745404B2 (en) 1998-05-28 2014-06-03 Verance Corporation Pre-processed information embedding system
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US8806517B2 (en) 2002-10-15 2014-08-12 Verance Corporation Media monitoring, management and information system
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9251322B2 (en) 2003-10-08 2016-02-02 Verance Corporation Signal continuity assessment using embedded watermarks
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9485089B2 (en) 2013-06-20 2016-11-01 Verance Corporation Stego key management
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US9602891B2 (en) 2014-12-18 2017-03-21 Verance Corporation Service signaling recovery for multimedia content using embedded watermarks
US9639911B2 (en) 2014-08-20 2017-05-02 Verance Corporation Watermark detection using a multiplicity of predicted patterns
US9769543B2 (en) 2014-11-25 2017-09-19 Verance Corporation Enhanced metadata and content delivery using watermarks
US9942602B2 (en) 2014-11-25 2018-04-10 Verance Corporation Watermark detection and metadata delivery associated with a primary content
US10257567B2 (en) 2015-04-30 2019-04-09 Verance Corporation Watermark based content recognition improvements
US10477285B2 (en) 2015-07-20 2019-11-12 Verance Corporation Watermark-based data recovery for content with multiple alternative components
US10504200B2 (en) 2014-03-13 2019-12-10 Verance Corporation Metadata acquisition using embedded watermarks
US11297398B2 (en) 2017-06-21 2022-04-05 Verance Corporation Watermark-based metadata acquisition and processing
US11368766B2 (en) 2016-04-18 2022-06-21 Verance Corporation System and method for signaling security and database population
US11468149B2 (en) 2018-04-17 2022-10-11 Verance Corporation Device authentication in collaborative content screening
US11722741B2 (en) 2021-02-08 2023-08-08 Verance Corporation System and method for tracking content timeline in the presence of playback rate changes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000039954A1 (en) * 1998-12-29 2000-07-06 Kent Ridge Digital Labs Method and apparatus for embedding digital information in digital multimedia data
WO2003013142A1 (en) * 2001-07-27 2003-02-13 Amino Holdings Limited Digital image watermarking
EP1345160A2 (en) * 2002-03-14 2003-09-17 Seiko Epson Corporation Method and apparatus for content-based image copy detection
FR2843212A1 (en) 2002-08-05 2004-02-06 Ltu Technologies Image or audiovisual sequence extraction method for extraction of an image or audiovisual sequence from an image flux, wherein images are analyzed to generate a reference index and this is compares with the current index
JP2004112318A (en) 2002-09-18 2004-04-08 Victor Co Of Japan Ltd System for searching illegitimate use of contents

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000039954A1 (en) * 1998-12-29 2000-07-06 Kent Ridge Digital Labs Method and apparatus for embedding digital information in digital multimedia data
WO2003013142A1 (en) * 2001-07-27 2003-02-13 Amino Holdings Limited Digital image watermarking
EP1345160A2 (en) * 2002-03-14 2003-09-17 Seiko Epson Corporation Method and apparatus for content-based image copy detection
FR2843212A1 (en) 2002-08-05 2004-02-06 Ltu Technologies Image or audiovisual sequence extraction method for extraction of an image or audiovisual sequence from an image flux, wherein images are analyzed to generate a reference index and this is compares with the current index
JP2004112318A (en) 2002-09-18 2004-04-08 Victor Co Of Japan Ltd System for searching illegitimate use of contents

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
A. S. LEWIS; G. KNOWLES: "Image Compression Using the 2-D Wavelet Transform", IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 1, no. 2, 1992, pages 244 - 250, XP000367551, DOI: doi:10.1109/83.136601
CHENG ET AL.: "An Additive Approach to Transform-Domain Information Hiding and Optimum Detection Structure", IEEE TRANSACTIONS ON MULTIMEDIA, vol. 3, no. 3, 2001, pages 273 - 284, XP011036251
CHENG ET AL.: "Optimum Detection and Decoding of Multiplicative Watermarks in DFT Domain", PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND PROCESSING, vol. 4, 2002, pages 3477 - 3480
COX ET AL.: "Secure Spread Spectrum Watermarking for Multimedia", IEEE TRANS. ON IMAGE PROCESSING, vol. 6, no. 12, 1997, pages 1673 - 1687, XP000199950, DOI: doi:10.1109/83.650120
G. XUE; P. LU: "A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images", THE 3RD IWDW., 2004, pages 42 - 54
JOHNSON N F ET AL: "RECOVERY OF WATERMARKS FROM DISTORTED IMAGES", INFORMATION HIDING. INTERNATIONAL WORKSHOP PROCEEDINGS, XX, XX, vol. 1768, 1 September 1999 (1999-09-01), pages 318 - 332, XP008002242 *
M. A. FISHLER; R. C. BOLLES: "Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography", THE COMMUNICATIONS OF THE ACM, vol. 24, no. 6, 1981, pages 381 - 395

Cited By (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8745404B2 (en) 1998-05-28 2014-06-03 Verance Corporation Pre-processed information embedding system
US9117270B2 (en) 1998-05-28 2015-08-25 Verance Corporation Pre-processed information embedding system
US8451086B2 (en) 2000-02-16 2013-05-28 Verance Corporation Remote control signaling using audio watermarks
US9189955B2 (en) 2000-02-16 2015-11-17 Verance Corporation Remote control signaling using audio watermarks
US8791789B2 (en) 2000-02-16 2014-07-29 Verance Corporation Remote control signaling using audio watermarks
US9648282B2 (en) 2002-10-15 2017-05-09 Verance Corporation Media monitoring, management and information system
US8806517B2 (en) 2002-10-15 2014-08-12 Verance Corporation Media monitoring, management and information system
US9558526B2 (en) 2003-10-08 2017-01-31 Verance Corporation Signal continuity assessment using embedded watermarks
US9704211B2 (en) 2003-10-08 2017-07-11 Verance Corporation Signal continuity assessment using embedded watermarks
US9251322B2 (en) 2003-10-08 2016-02-02 Verance Corporation Signal continuity assessment using embedded watermarks
US9990688B2 (en) 2003-10-08 2018-06-05 Verance Corporation Signal continuity assessment using embedded watermarks
US8811655B2 (en) 2005-04-26 2014-08-19 Verance Corporation Circumvention of watermark analysis in a host content
US8340348B2 (en) 2005-04-26 2012-12-25 Verance Corporation Methods and apparatus for thwarting watermark detection circumvention
US8538066B2 (en) 2005-04-26 2013-09-17 Verance Corporation Asymmetric watermark embedding/extraction
US9153006B2 (en) 2005-04-26 2015-10-06 Verance Corporation Circumvention of watermark analysis in a host content
US9009482B2 (en) 2005-07-01 2015-04-14 Verance Corporation Forensic marking using a common customization function
US8549307B2 (en) 2005-07-01 2013-10-01 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US8346567B2 (en) 2008-06-24 2013-01-01 Verance Corporation Efficient and secure forensic marking in compressed domain
US8681978B2 (en) 2008-06-24 2014-03-25 Verance Corporation Efficient and secure forensic marking in compressed domain
CN103189873A (en) * 2010-09-16 2013-07-03 凡瑞斯公司 Improvements in watermark extraction efficiency
WO2012037422A2 (en) * 2010-09-16 2012-03-22 Verance Corporation Improvements in watermark extraction efficiency
US8838978B2 (en) 2010-09-16 2014-09-16 Verance Corporation Content access management using extracted watermark information
WO2012037422A3 (en) * 2010-09-16 2012-06-14 Verance Corporation Improvements in watermark extraction efficiency
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US9298891B2 (en) 2011-11-23 2016-03-29 Verance Corporation Enhanced content management based on watermark extraction records
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US9706235B2 (en) 2012-09-13 2017-07-11 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9485089B2 (en) 2013-06-20 2016-11-01 Verance Corporation Stego key management
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US10504200B2 (en) 2014-03-13 2019-12-10 Verance Corporation Metadata acquisition using embedded watermarks
US9854332B2 (en) 2014-03-13 2017-12-26 Verance Corporation Interactive content acquisition using embedded codes
US9854331B2 (en) 2014-03-13 2017-12-26 Verance Corporation Interactive content acquisition using embedded codes
US10499120B2 (en) 2014-03-13 2019-12-03 Verance Corporation Interactive content acquisition using embedded codes
US10110971B2 (en) 2014-03-13 2018-10-23 Verance Corporation Interactive content acquisition using embedded codes
US9681203B2 (en) 2014-03-13 2017-06-13 Verance Corporation Interactive content acquisition using embedded codes
US10354354B2 (en) 2014-08-20 2019-07-16 Verance Corporation Content synchronization using watermark timecodes
US9639911B2 (en) 2014-08-20 2017-05-02 Verance Corporation Watermark detection using a multiplicity of predicted patterns
US9805434B2 (en) 2014-08-20 2017-10-31 Verance Corporation Content management based on dither-like watermark embedding
US10445848B2 (en) 2014-08-20 2019-10-15 Verance Corporation Content management based on dither-like watermark embedding
US10178443B2 (en) 2014-11-25 2019-01-08 Verance Corporation Enhanced metadata and content delivery using watermarks
US9942602B2 (en) 2014-11-25 2018-04-10 Verance Corporation Watermark detection and metadata delivery associated with a primary content
US9769543B2 (en) 2014-11-25 2017-09-19 Verance Corporation Enhanced metadata and content delivery using watermarks
US10277959B2 (en) 2014-12-18 2019-04-30 Verance Corporation Service signaling recovery for multimedia content using embedded watermarks
US9602891B2 (en) 2014-12-18 2017-03-21 Verance Corporation Service signaling recovery for multimedia content using embedded watermarks
US10257567B2 (en) 2015-04-30 2019-04-09 Verance Corporation Watermark based content recognition improvements
US10848821B2 (en) 2015-04-30 2020-11-24 Verance Corporation Watermark based content recognition improvements
US10477285B2 (en) 2015-07-20 2019-11-12 Verance Corporation Watermark-based data recovery for content with multiple alternative components
US11368766B2 (en) 2016-04-18 2022-06-21 Verance Corporation System and method for signaling security and database population
US11297398B2 (en) 2017-06-21 2022-04-05 Verance Corporation Watermark-based metadata acquisition and processing
US11468149B2 (en) 2018-04-17 2022-10-11 Verance Corporation Device authentication in collaborative content screening
US11722741B2 (en) 2021-02-08 2023-08-08 Verance Corporation System and method for tracking content timeline in the presence of playback rate changes

Similar Documents

Publication Publication Date Title
WO2010073236A1 (en) A method of and apparatus for authenticating data content
Simitopoulos et al. Robust image watermarking based on generalized radon transformations
Dong et al. Affine transformation resistant watermarking based on image normalization
Zheng et al. RST-invariant digital image watermarking based on log-polar mapping and phase correlation
Tao et al. Robust image watermarking theories and techniques: A review
Lin et al. Rotation, scaling, and translation resilient watermarking for images
US20090172404A1 (en) Method and Apparatus for Hybrid Watermarking
Johnson et al. Recovery of watermarks from distorted images
Monga et al. Image authentication under geometric attacks via structure matching
Pla et al. A wavelet watermarking algorithm based on a tree structure
Chen et al. A robust watermarking algorithm based on salient image features
Gao et al. Local feature based geometric-resistant image information hiding
Lian et al. Content distribution and copyright authentication based on combined indexing and watermarking
Mohammed et al. Robust image watermarking scheme based on wavelet technique
Kim et al. Image normalization using Invariant Centroid for RST Invariant digital image watermarking
Jimson et al. DFT BASED DIGITAL IMAGE WATERMARKING: A SURVEY.
Awrangjeb et al. Global geometric distortion correction in images
Gu et al. Multipurpose image watermarking in DCT domain using subsampling
Nikolaidis Affine transformation invariant image watermarking using moment normalization and radial symmetry transform
CN111861847A (en) GF-2 image double watermarking method applying DWT and SIFT
KR100468009B1 (en) Feature-based robust image watermarking scheme using bispectral invariant
Thanh et al. Comparison of watermarking schemes using linear and nonlinear feature matching
Xie et al. Robust wavelet-based blind image watermarking against geometrical attacks
Hu Geometric-invariant image watermarking by key-dependent triangulation
Su et al. A geometrically resilient digital image watermarking scheme based on sift and extended template embedding

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09810748

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09810748

Country of ref document: EP

Kind code of ref document: A1