Image analysis – Applications
Reexamination Certificate
1999-07-27
2004-02-17
Johns, Andrew W. (Department: 2621)
Image analysis
Applications
Reexamination Certificate
active
06694040
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a technique for embedding digital-watermark information in image data.
2. Related Background Art
In recent years, computers and networks have advanced remarkably, and various kinds of data such as character data, image data, audio data, and the like are handled in computers and networks. Since such data are digital data, copies of data with equivalent quality can be readily created in the current environment.
For this reason, in order to prevent illicit copies and interpolation of data, and protect the copyright, copyright information and user information is embedded in image data, audio data, or the like as digital-watermark information. This is a technique for secretly embedding information in data by performing predetermined processing of this data.
Hence, since the copyright information or user information can be obtained by extracting the digital-watermark information from data, an illicit copy can be tracked.
As a method of embedding digital-watermark information, there are two methods, i.e., a method of embedding information in the space domain, and a method of embedding information in the frequency domain.
As an example of the method of embedding information in the space domain, a scheme of IBM (W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding”, Proceeding of the SPIE, San Jose Calif., USA, February 1955) and the like are known as one based on patchwork.
On the other hand, as an example of the method of embedding information in the frequency domain, a scheme of NTT (Nakamura, Ogawa, and Takashima, “Method of Watermarking under Frequency Domain for Protecting Copyright of Digital Image”, SCIS '97-26A, January 1997) is known as one using the discrete cosine transform. On the other hand, a scheme of National Defense Academy of Japan (Onishi, Oka, and Matsui, “Watermarking Scheme to Image by PN Sequence”, SCIS '97-26B, January 1997) is known as one using the discrete Fourier transform. Furthermore, a scheme of Mitsubishi and Kyushu University (Ishizuka, Sakai, and Sakurai, “On Experimental Evaluation of Steganography with Wavelet Transform”, SCIS '97-26DP, January 1997), and a scheme of Matsushita (Inoue, Miyazaki, Yamamoto, and Katsura, “Digital Watermark Technique Based on Wavelet Transform and its Robustness on Image Compression and Transformation”, SCIS '98-3.2.A, January 1998) are known as techniques using the discrete wavelet transform.
Note that requirements for the digital-watermark technique include:
(1) no visible image quality deterioration of original image;
(2) superior robustness against attacks; and
(3) large size of information that can be embedded.
Attacks will be briefly explained below.
Attacks are acts of deleting or destroying watermark information, and there are two types of attacks. One type is deliberate attacks, which include an attack of appending noise to image data embedded with watermark information, an attack of deleting an area where watermark information is likely to be embedded, and the like. The other type is attacks by means of image processes, such as image compression, enlargement and reduction, cut-out, gradation conversion, print-out, scanning, and the like for image data embedded with digital-watermark information. Hence, watermark information embedded in image data must be robust against any of these attacks.
The purposes of embedding digital-watermark information in digital contents such as image data and the like are to protect the copyright of digital contents, and to detect interpolation of digital contents. In case of the former purpose, digital-watermark information which is highly robust against attacks is preferably embedded in digital contents. In case of the latter purpose, digital-watermark information which is less robust against attacks is preferably embedded in digital contents.
Conventionally, when digital-watermark information which is highly robust against attacks is embedded in an image, the image quality visually deteriorates compared to an original image.
When an image embedded with digital-watermark information has been attacked, it is hard to reliably extract the digital-watermark information.
SUMMARY OF THE INVENTION
The present invention has been made to solve the above problems, and has as its object to provide a technique for embedding digital-watermark information in image data while minimizing deterioration of original image quality.
In order to achieve the above object, according to a preferred embodiment of the present invention, there is provided a data processing apparatus comprising:
an input unit for inputting image data composed of a plurality of coefficients; and
an embedding unit for embedding digital-watermark information in a coefficient having a value within a predetermined range of the input image data.
Also, there is provided a data processing apparatus comprising:
an input unit for inputting image data composed of a plurality of coefficients; and
an embedding unit for detecting a coefficient having a maximum absolute value of the input image data, and embedding digital-watermark information in the detected coefficient.
Furthermore, there is provided a data processing apparatus comprising:
an input unit for inputting image data composed of a plurality of coefficients; and
an embedding unit for embedding digital-watermark information at a first strength in a coefficient having a value within a first range, and embedding digital-watermark information at a second strength in a coefficient having a value within a second range.
Other objects and features of the present invention will become apparent from the following description of the embodiments taken in conjunction with the accompanying drawings.
REFERENCES:
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 5915027 (1999-06-01), Cox et al.
patent: 6185312 (2001-02-01), Nakamura et al.
patent: 6208735 (2001-03-01), Cox et al.
patent: 6226387 (2001-05-01), Tewfik et al.
patent: 6240121 (2001-05-01), Senoh
patent: 6332030 (2001-12-01), Manjunath et al.
patent: 6359998 (2002-03-01), Cooklev
W. Bender, et al., “Techniques for Data Hiding”, The International Society for Optical Engineering, vol. 2420, Feb. 1999, pp. 164-173.
H. Imai, “Recent Development of Cryptology in Japan”, The Transactions of the IEICE, vol. E73, No. 7, Jul. 1990, pp. 1026-1030.
T. Matsumoto, “A Prototype KPS and Its Application—IC Card Based Key Sharing and Cryptographic Communication”, The Transactions of the IEICE, vol. E73, No. 7, Jul. 1990, pp. 1111-1119.
Y. Zheng, “Connection Among Several Versions of One-Way Hash Functions”, The Transactions of the IEICE, vol. 73, No. 7, Jul. 1990, pp. 1092-1099.
Nakamura, Ogawa, Takashima, “Method of Watermarking Under Frequency Domain for Protecting Copyright of Digital Image”, SCIS '97-26A, Jan. 1997.
Onishi, Oka, Matsui, “Watermarking Scheme to Image by PN Sequence”, SCIS '97-26B, Jan. 1997.
Ishizuka, Sakai, Sakurai, “On an Experimental Evaluation of Steganography with Wavelet Transform”, SCIS '97-26DP, Jan. 1997.
Inoue, Miyazaki, Yamamoto, Katsura, “A Digital Watermark Technique Based on the Wavelet Transform and its Robustness on Image Compression and Transformation”, SCIS '98-3.2A, Jan. 1998.
Hayashi Junichi
Iwamura Keiichi
Johns Andrew W.
Nakhjavan Shervin
LandOfFree
Data processing apparatus and method, and memory medium does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data processing apparatus and method, and memory medium, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data processing apparatus and method, and memory medium will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3317518