Method and apparatus for overcoming a watermark security system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C713S152000, C380S201000, C380S202000, C380S203000, C380S204000, C380S221000, C380S229000, C380S255000, C380S028000, C382S164000, C382S173000, C382S190000, C382S232000, C382S254000, C705S051000

Reexamination Certificate

active

06944771

ABSTRACT:
To overcome a watermark security system that is based on a limited set of possible watermark values, a collection of authentic watermarked material is created, and a substitution system provides material from this collection in lieu of the content material that the watermark verification system is intended to verify. In security systems that are designed to verify the existence of authentic watermarked material, without regard to the actual content of the material, this substitution scheme will be successful. In security systems that are designed to verify the existence of an entirety of a data set in order to authorize the presentation of select material from the data set, the substitution of authentic watermarked material for the non-selected material will also be successful. A dictionary of expected watermarks for the data set is provided. When the security system requests the watermarked segments of the selected material, the selected material is presented; when the security system requests watermarked segments of the non-selected material, the dictionary of expected watermarks is accessed, and the appropriate authentic watermarked material is presented from the stored collection.

REFERENCES:
patent: 4228348 (1980-10-01), Lee
patent: 5598526 (1997-01-01), Daniel et al.
patent: 5636362 (1997-06-01), Stone et al.
patent: 5666412 (1997-09-01), Handelman et al.
patent: 5734811 (1998-03-01), Croslin
patent: 5825892 (1998-10-01), Braudaway et al.
patent: 5915027 (1999-06-01), Cox et al.
patent: 6104826 (2000-08-01), Nakagawa et al.
patent: 6219634 (2001-04-01), Levine
patent: 6256736 (2001-07-01), Coppersmith et al.
patent: 6272634 (2001-08-01), Tewfik et al.
patent: 6282299 (2001-08-01), Tewfik et al.
patent: 6411725 (2002-06-01), Rhoads
patent: 6546397 (2003-04-01), Rempell
patent: 6631198 (2003-10-01), Hannigan et al.
patent: 6633654 (2003-10-01), Hannigan et al.
patent: 6674876 (2004-01-01), Hannigan et al.
patent: 6728408 (2004-04-01), Echizen et al.
patent: 6728414 (2004-04-01), Chang et al.
patent: 6751359 (2004-06-01), Handley
patent: 6766056 (2004-07-01), Huang et al.
patent: 6771812 (2004-08-01), Ikenoue
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6836549 (2004-12-01), Quan et al.
patent: 6839462 (2005-01-01), Kitney et al.
patent: 6850619 (2005-02-01), Hirai
patent: 6853726 (2005-02-01), Moskowitz et al.
patent: 6859790 (2005-02-01), Nonaka et al.
patent: 6885748 (2005-04-01), Wang
patent: 1215624 (2002-01-01), None
patent: WO 01362/0 (1888-12-01), None
Garofalakis et al, Digital Data Processing for intellectual Property Rights Preservation Over World Wide Web, 1977, IEEE, pp. 833-836.
Arnold, Michael, Computer Science; Digital Data provide invisible proof of copyright, Mar. 2003, Science Letter, p. 19.
Mobasseri, Bijan, Direct Sequence watermarking of Digital Video using m-frames, 1998, IEEE, pp. 399-403.
Thanos et al, Broadcasting Copyrighted Video, 2002, Broadcasting Engineering, pp. 6-7.
Mizrachi et al, Parameter Identification of a Classof Nonlinear Systems for Robust Audio Watermarking Verification, 2002, IEEE, pp. 13-15.
US 000040 filed on Mar. 28, 2000, Ser. No. 09/5436,944, Inventors: Antonius A. Staring et al., Entitled: Protecting Content Form Illicit Reproduction by Proof of Existence of a Complete Data Set via Self-Referencing Sections.
Craver et al: “Reading between the lines: Lessons from the SDMI challenge” PRoceedings of the USenix Security Symposium, Aug. 13, 2001, pp. 1-12.
Kirovski et al: “Replacement attack on arbitrary watermark systems” 2002 IEEE International Conference on Acoustics, Speech, and signal processing. Proceedings. ((IGASSP), May 18, 2002, vol. 4 of 4, pp IV3740-IV3743.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for overcoming a watermark security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for overcoming a watermark security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for overcoming a watermark security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3402620

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.