Method and apparatus for robust embedded data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S201000, C380S282000, C713S176000, C382S100000, C382S250000, C382S252000

Reexamination Certificate

active

07055034

ABSTRACT:
This invention describes a method and apparatus for the increasing the robustness of embedded data. Since many times embedded data is susceptible to removal by an unauthorized person, one preferred embodiment enables an action such that removal of the embedded data provides the attacker no gain. In another preferred embodiment, recording devices are required to embed a registration code in copies, thus aiding in tracing illegal copies. Finally, dynamic locking, including modifying and encrypting the auxiliary data and applicable to all data embedding techniques, is shown to provide this robustness to duplication and modification. The apparatus implements the above two processes with a logic processor and storage unit.

REFERENCES:
patent: 3984624 (1976-10-01), Waggener
patent: 4238849 (1980-12-01), Gassmann
patent: 4422171 (1983-12-01), Wortley et al.
patent: 4807031 (1989-02-01), Broughton et al.
patent: 4943973 (1990-07-01), Werner
patent: 5091966 (1992-02-01), Bloomberg et al.
patent: 5103459 (1992-04-01), Gilhousen et al.
patent: 5134496 (1992-07-01), Schwab et al.
patent: 5146457 (1992-09-01), Veldhuis et al.
patent: 5337361 (1994-08-01), Wang et al.
patent: 5374976 (1994-12-01), Spannenburg
patent: 5436970 (1995-07-01), Ray et al.
patent: 5499294 (1996-03-01), Friedman
patent: 5530751 (1996-06-01), Morris
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5636292 (1997-06-01), Rhoads
patent: 5646997 (1997-07-01), Barton
patent: 5652626 (1997-07-01), Kawakami et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5687191 (1997-11-01), Lee et al.
patent: 5687236 (1997-11-01), Moskowitz et al.
patent: 5694471 (1997-12-01), Chen et al.
patent: 5710834 (1998-01-01), Rhoads
patent: 5719937 (1998-02-01), Warren et al.
patent: 5721788 (1998-02-01), Powell et al.
patent: 5774452 (1998-06-01), Wolosewicz
patent: 5796869 (1998-08-01), Tsuji et al.
patent: 5799092 (1998-08-01), Kristol et al.
patent: 5819289 (1998-10-01), Sanford, II et al.
patent: 5822360 (1998-10-01), Lee et al.
patent: 5828325 (1998-10-01), Wolosewicz et al.
patent: 5835639 (1998-11-01), Honsinger et al.
patent: 5838814 (1998-11-01), Moore
patent: 5841886 (1998-11-01), Rhoads
patent: 5848155 (1998-12-01), Cox
patent: 5862260 (1999-01-01), Rhoads
patent: 5875249 (1999-02-01), Mintzer et al.
patent: 5889686 (1999-03-01), Mimotogi et al.
patent: 5905800 (1999-05-01), Moskowitz et al.
patent: 5912972 (1999-06-01), Barton
patent: 5930369 (1999-07-01), Cox et al.
patent: 5933798 (1999-08-01), Linnartz
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5970147 (1999-10-01), Davis
patent: 5974548 (1999-10-01), Adams
patent: 5982891 (1999-11-01), Ginter et al.
patent: 6021196 (2000-02-01), Sandford, II et al.
patent: 6024287 (2000-02-01), Takai et al.
patent: 6044182 (2000-03-01), Daly et al.
patent: 6049627 (2000-04-01), Becker et al.
patent: 6061793 (2000-05-01), Tewfik et al.
patent: 6101602 (2000-08-01), Fridrich
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 6226387 (2001-05-01), Tewfik et al.
patent: 6243480 (2001-06-01), Zhao
patent: 6249870 (2001-06-01), Kobayashi et al.
patent: 6272634 (2001-08-01), Tewfik et al.
patent: 6275599 (2001-08-01), Adler et al.
patent: 6282654 (2001-08-01), Ikeda et al.
patent: 6285775 (2001-09-01), Wu et al.
patent: 6286761 (2001-09-01), Wen
patent: 6292092 (2001-09-01), Chow et al.
patent: 6301663 (2001-10-01), Kato et al.
patent: 6321981 (2001-11-01), Ray et al.
patent: 6466670 (2002-10-01), Tsuria et al.
patent: 6487301 (2002-11-01), Zhao
patent: 6490355 (2002-12-01), Epstein
patent: 6496933 (2002-12-01), Nunally
patent: 6499105 (2002-12-01), Yoshiura et al.
patent: 6504941 (2003-01-01), Wong
patent: 6512837 (2003-01-01), Ahmed
patent: 6611607 (2003-08-01), Davis et al.
patent: 6788800 (2004-09-01), Carr et al.
patent: 6807534 (2004-10-01), Erickson
patent: 2001/0019611 (2001-09-01), Hilton
patent: 2001/0026618 (2001-10-01), Van Wie et al.
patent: 2001/0027450 (2001-10-01), Shinoda et al.
patent: 2001/0034835 (2001-10-01), Smith
patent: 2001/0037455 (2001-11-01), Lawandy et al.
patent: 2001/0046307 (2001-11-01), Wong
patent: 2001/0047478 (2001-11-01), Mase
patent: 2002/0009208 (2002-01-01), Alattar et al.
patent: 2002/0016916 (2002-02-01), Natarajan
patent: 2002/0031240 (2002-03-01), Levy et al.
patent: 2002/0076048 (2002-06-01), Hars
patent: 2002/0095579 (2002-07-01), Yoshiura et al.
patent: 2002/0122568 (2002-09-01), Zhao
patent: 2002/0199106 (2002-12-01), Hayashi
patent: 2943436 (1981-05-01), None
patent: 2943436 (1981-05-01), None
patent: 650146 (1995-04-01), None
patent: 95/3938 (1999-11-01), None
patent: 200041144 (2000-02-01), None
patent: WO95/13597 (1995-05-01), None
patent: WO9626494 (1996-08-01), None
patent: WO0172030 (2001-09-01), None
patent: WO0173997 (2001-10-01), None
Anderson, “Stretching the Limits of Steganography,” Information Hiding, First Insternational Workshop Proc., May 30-Jun. 1, 1996, pp. 39-48.
Aura, “Practical Invisibility in Digital Communication,” Information Hiding, First Int. Workshop Proc. May 30-Jun. 1, 1996, pp. 265-78.
Boland et al, “Watermarking Digital Images for Copyright Protection,” Fifth International Conference on Image Processing and its Applications, Conference Date Jul. 4-6, 1995, Conf. Publ. No. 410, p. 326-330.
Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905-910.
Komatsu et al., “A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature,”Electronics and Communications in Japan, Part 1, vol. 73, No. 5, 1990, pp. 22-33.
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School ofScience & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60.
Gerzon + Craven, A High-Rate Buried-Data Channel for Audio CD, J. Audio Eng. Soc., Jan./Feb., 1995, pp. 3-22, vol. 43, No. 1/2, New York.
Lacy, Quackenbush, Reibman, Shuk + Snyder, On Combining Watermarking With Perceptual Coding, IEEE ICASSP Symposium, May 1998, Seattle, WA, USA.
Petitcolas + Anderson, Evaluation of Copyright Marking Systems, IEEE Multimedia Systems Symposium, Jun. 7-11, 1999, Florence, Italy.
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture,” IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205.
Bender, “Techniques for Data Hiding,” Proc. SPIE, vol. 2420, Feb. 9, 1995, pp. 164-173.
Boney, et al., “Digital Watermarks for Audio Signals, ” IEEE Int'l Conference on Multimedia Computing and Systems, Jun. 1996, Hiroshima, Japan.
U.S. Appl. No. 60/101,851, filed Sep. 25, 1998, Levy.
U.S. Appl. No. 60/110,683, filed Dec. 2, 1998, Levy.
U.S. Appl. No. 60/114,725, filed Dec. 31, 1998, Levy.
U.S. Appl. No. 60/126,592, filed Mar. 26, 1999, Levy.
U.S. Appl. No. 60/123,587, filed Mar. 10, 1999, Levy.
U.S. Appl. No. 60/126,591, filed Mar. 26, 1999, Levy.
U.S. Appl. No. 09/404,292, filed Sep. 23, 1999, Levy.
Dittman et al., “Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” 1999 IEEE, pp. 209-213.
Lin et al., “Generating Robust Digital Signature for Image/Video Authentication,” Proc. Multimedia and Security Workshop at ACM Multimedia '98, pp. 49-54, Sep. 1998, pp. 49-54.
Pitas et al., “Applying Signatures on Digital Images,” Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 1995, 4 pp.
Hirotsuga, “An Image Digital Signature system with ZKIP for the Graph Isomorphism,” 1996 IEEE, pp. 247-250.
Seybold Report on Desktop Publishing, “Holographic Signature for Digital Images,” Aug. 1995, 1 p.
Schneider et al., “A Robust Content Based Digital Signature for Image Authentication,” 1996 IEEE, pp. 227-230.
Schneier, “Digital Signatures,” BYTE, Nov., 1993, pp. 309-312.
Szepanski, “A Signal Theroertic Method for Creat

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for robust embedded data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for robust embedded data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for robust embedded data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3613082

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.