Image analysis – Applications
Reexamination Certificate
2006-02-07
2006-02-07
Mehta, Bhavesh M. (Department: 2625)
Image analysis
Applications
C341S082000
Reexamination Certificate
active
06996249
ABSTRACT:
A watermark message embedded in a cover work can be made robust to various types of post-embedding operations, while simultaneously minimizing perceptual impact on the cover work. This is accomplished by the informed coding of the watermark message to be embedded. This is also accomplished by the informed embedding of the watermark message code in the cover work. Finally, the watermark message code may be perceptually shaped to minimize impact on the fidelity of the watermarked work. Further, these techniques may be combined for maximum effect.
REFERENCES:
patent: 6104434 (2000-08-01), Nakagawa et al.
patent: 6128736 (2000-10-01), Miller
patent: 6272177 (2001-08-01), Murakami et al.
patent: 6292199 (2001-09-01), Herpel
patent: 6307949 (2001-10-01), Rhoads
patent: 6381341 (2002-04-01), Rhoads
patent: 6430222 (2002-08-01), Okada
patent: 6480497 (2002-11-01), Flammer et al.
patent: 6683988 (2004-01-01), Fukunaga et al.
patent: 6728410 (2004-04-01), Fukunaga
patent: 6782116 (2004-08-01), Zhao et al.
patent: 6804374 (2004-10-01), Beattie et al.
patent: 6856693 (2005-02-01), Miller
patent: 2003/0066014 (2003-04-01), Van Dijk et al.
patent: 2003/0095056 (2003-05-01), Tolhuizen et al.
patent: 2004/0022411 (2004-02-01), Tamaru et al.
patent: 2004/0228502 (2004-11-01), Bradley et al.
patent: 2005/0025338 (2005-02-01), Zhao et al.
patent: 2005/0100214 (2005-05-01), Zhang et al.
patent: 2005/0129270 (2005-06-01), Prakash
Chen, B. et al., “An Information-Theoretic Approach to the Design of Robust Digital Watermarking Systems,” IEEE Transactions on Acoustics, Speech, and Signal Processing, pp. 2061-2064, 1999.
Chen, B. et al., “Digital Watermarking and Information Embedding Using Dither Modulation”, IEEE Second Workshop on Multimedia Signal Processing, pp. 273-278, 1998.
Chen, B. et al., “Preprocessed and Postprocessed Quantization Index Modulation Methods for Digital Watermarking”, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 48-59, 2000.
Chou, J. et al., “On the Duality between Distributed Source Coding and Data Hiding”, Thirty-third Asilomar Conference on Signals, Systems, and Computers, vol. 2, pp. 1503-1507, 1999.
Conway, J.H. et al.,Spheres Packing, Lattices and Groups, Springer-Verlag, Chapter 4, 1998.
Costa, M., “Writing on Dirty Paper”, IEEE Transactions on Information Theory, Vo. IT-29, No. 3, pp. 439-441, 1983.
Cox, I.J. et al.,Digital Watermarking, Morgan Kaufmann, pp. 117-155, 2001.
Cox, I.J. et al., “Watermarking as Communications with Side Information”, Proceedings of the IEEE, vol. 87, No. 7, pp. 1127-1141, 1999.
Eggers, J.J. et al., “Public Key Watermarking By Eigenvectors of Linear Transforms”, Proceedings of the European Signal Processing Conference (EUSIPCO), Tampere Finland, 2000.
Eggers, J.J. et al., “A Blind Watermarking Scheme Based on Structured Codebooks”, IEE Seminar on Secure Images and Image Authentication, pp. 4/1-4/21, 2000.
Miller, M.L. et al., “Informed Embedding: Exploiting Image and Detector Information During Watermark Insertion”, IEEE International Conference on Image Processing, pp. 1-4, Sep. 2000.
Miller, M.L. “Watermarking with Dirty-Paper Codes”, Proceedings of the International Conference on Image Processing—ICIP, pp. 538-541, 2001.
Moulin, P. et al., “Information-Theoretic Analysis of Information Hiding”, Proceedings of the IEEE International Symposium on Information Theory, Aug. 1998.
Moulin, P. et al., “Information-Theoretic Analysis of Information Hiding”, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Jun. 2000.
Petrovic, R. et al., “Data Hiding within Audio Signals”, Proceedings in the Fourth International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS), pp. 88-95, 1999.
Pradhan, S.S. et al., “Distributed Source Coding: Symmetric Rates and Applications to Sensor Networks”, Proceedings of the IEEE Data Compression Conference, pp. 363-372, 2000.
Ramkumar, M., “Data Hiding in Multimedia—Theory and Applications”, Ph.D. Thesis, New Jersey Institute of Technology, 1999.
Shannon, C.E., “Channels with Side Information at the Transmitter”, IBM Journal of Research and Development, pp. 289-293, Oct. 1958.
van den Branden Lambrecht, C. et al., “Perceptual Quality Metric for Digitally Coded Color Images”, Proceedings of the European Conference on Signal Processing and Communications (EUSIPCO), pp. 1175-1178, 1996.
Viterbi, A.J.,CDMA: Principles of Spread Spectrum Communication, Addison-Wesley, pp. 124-175, 1995.
Voloshynovskiy, S. et al., “A Stochastic Approach to Content Adaptive Digital Image Watermarking”, Third International Workshop on Information Hiding, pp. 211-227, 1999.
Watson, A.B., “DCT Quantization Matrices Visually Optimized for Individual Images”, Human Vision, Visual Processing, and Digital Display IV, SPIE, vol. 1913, pp. 202-216, 1993.
Cox Ingemar J.
Miller Matthew L.
Choobin Barry
Mehta Bhavesh M.
NEC Laboratories America, Inc.
Scully Scott Murphy & Presser
LandOfFree
Applying informed coding, informed embedding and perceptual... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Applying informed coding, informed embedding and perceptual..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Applying informed coding, informed embedding and perceptual... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3632117